/hostap-3.6.0/src/crypto/ |
D | fips_prf_wolfssl.c | 22 sha.digest[0] = state[0]; in sha1_transform() 23 sha.digest[1] = state[1]; in sha1_transform() 24 sha.digest[2] = state[2]; in sha1_transform() 25 sha.digest[3] = state[3]; in sha1_transform() 26 sha.digest[4] = state[4]; in sha1_transform() 28 state[0] = sha.digest[0]; in sha1_transform() 29 state[1] = sha.digest[1]; in sha1_transform() 30 state[2] = sha.digest[2]; in sha1_transform() 31 state[3] = sha.digest[3]; in sha1_transform() 32 state[4] = sha.digest[4]; in sha1_transform()
|
D | sha1-pbkdf2.c | 16 u8 *digest) in pbkdf2_sha1_f() argument 43 os_memcpy(digest, tmp, SHA1_MAC_LEN); in pbkdf2_sha1_f() 51 digest[j] ^= tmp2[j]; in pbkdf2_sha1_f() 80 unsigned char digest[SHA1_MAC_LEN]; in pbkdf2_sha1() local 85 count, digest)) in pbkdf2_sha1() 88 os_memcpy(pos, digest, plen); in pbkdf2_sha1() 92 forced_memzero(digest, SHA1_MAC_LEN); in pbkdf2_sha1()
|
D | md4-internal.c | 26 static void MD4Final(unsigned char digest[MD4_DIGEST_LENGTH], MD4_CTX *ctx); 168 static void MD4Final(unsigned char digest[MD4_DIGEST_LENGTH], MD4_CTX *ctx) in MD4Final() 173 if (digest != NULL) { in MD4Final() 175 PUT_32BIT_LE(digest + i * 4, ctx->state[i]); in MD4Final()
|
D | ms_funcs.c | 396 u8 digest[SHA1_MAC_LEN]; in get_asymetric_start_key() local 409 if (sha1_vector(4, addr, len, digest)) in get_asymetric_start_key() 414 os_memcpy(session_key, digest, session_key_len); in get_asymetric_start_key()
|
D | md5_i.h | 21 void MD5Final(unsigned char digest[16], struct MD5Context *context);
|
D | sha1_i.h | 20 void SHA1Final(unsigned char digest[20], struct SHA1Context *context);
|
D | md5-internal.c | 150 void MD5Final(unsigned char digest[16], struct MD5Context *ctx) in MD5Final() 187 os_memcpy(digest, ctx->buf, 16); in MD5Final()
|
D | sha1-internal.c | 278 void SHA1Final(unsigned char digest[20], SHA1_CTX* context) in SHA1Final() 295 digest[i] = (unsigned char) in SHA1Final()
|
D | crypto_nettle.c | 66 alg->digest(ctx, alg->digest_size, mac); in nettle_digest_vector()
|
D | tls_openssl.c | 4145 int cipher, digest; in openssl_get_keyblock_size() 4154 digest = SSL_CIPHER_get_digest_nid(ssl_cipher); in openssl_get_keyblock_size() 4156 cipher, digest); in openssl_get_keyblock_size() 4157 if (cipher < 0 || digest < 0) in openssl_get_keyblock_size() 4172 if (digest == NID_undef) { in openssl_get_keyblock_size() 4176 h = EVP_get_digestbynid(digest); in openssl_get_keyblock_size()
|
/hostap-3.6.0/src/eap_common/ |
D | eap_pwd_common.c | 37 void eap_pwd_h_final(struct crypto_hash *hash, u8 *digest) in eap_pwd_h_final() argument 40 crypto_hash_finish(hash, digest, &len); in eap_pwd_h_final() 49 u8 digest[SHA256_MAC_LEN]; in eap_pwd_kdf() local 64 crypto_hash_update(hash, digest, SHA256_MAC_LEN); in eap_pwd_kdf() 69 if (crypto_hash_finish(hash, digest, &mdlen) < 0) in eap_pwd_kdf() 72 os_memcpy(result + len, digest, resultbytelen - len); in eap_pwd_kdf() 74 os_memcpy(result + len, digest, mdlen); in eap_pwd_kdf()
|
D | eap_pwd_common.h | 69 void eap_pwd_h_final(struct crypto_hash *hash, u8 *digest);
|
/hostap-3.6.0/tests/hwsim/ |
D | radius_das.py | 29 + self.secret).digest() 46 + self.secret).digest()
|
D | test_radius.py | 794 req.AddAttribute("Message-Authenticator", hmac_obj.digest()) 1080 reply.AddAttribute("Message-Authenticator", hmac_obj.digest()) 1159 b = hashlib.md5(secret + authenticator + a).digest() 1166 b = hashlib.md5(secret + cc).digest() 1446 req.AddAttribute("Message-Authenticator", hmac_obj.digest())
|
D | test_ieee8021x.py | 270 sign = hmac_obj.digest()
|
D | test_ap_wps.py | 6514 result += m.digest() 6527 return m.digest()[0:16] 6538 auth = m.digest()[0:8] 6543 kwa = m.digest()[0:8] 6578 calc_kwa = m.digest()[0:8] 6608 dhkey = hashlib.sha256(binascii.unhexlify(ss)).digest() 6612 kdk = m.digest() 6629 hash1 = m.digest() 6634 hash2 = m.digest() 7006 kwa = m.digest()[0:8] [all …]
|
D | test_eap_proto.py | 122 reply.AddAttribute("Message-Authenticator", hmac_obj.digest()) 6263 return hashlib.new('md4', pw).digest() 6266 return hashlib.new('md4', password_hash).digest() 6270 return hashlib.sha1(data).digest()[0:8] 6280 digest = hashlib.sha1(data).digest() 6284 data = digest + challenge + magic2 6285 resp = hashlib.sha1(data).digest()
|
D | test_sigma_dut.py | 676 hash = hashlib.sha256(der).digest() 4152 hash = hashlib.sha256(der).digest() 4219 hash = hashlib.sha256(der).digest() 4295 hash = hashlib.sha256(der).digest()
|
D | test_fils.py | 597 hash = hashlib.sha256(realm.lower().encode()).digest() 610 hash = hashlib.sha256(realm.lower().encode()).digest()
|
D | test_ap_psk.py | 1356 hash = m.digest() 1384 msg['rsn_key_mic'] = m.digest()[0:16]
|
D | test_dpp.py | 1331 kid = base64.urlsafe_b64encode(hashlib.sha256(pubkey).digest()).decode().rstrip('=')
|
/hostap-3.6.0/src/common/ |
D | dpp_crypto.c | 167 unsigned int iterations, unsigned int count, u8 *digest) in dpp_pbkdf2_f() argument 191 os_memcpy(digest, tmp, hash_len); in dpp_pbkdf2_f() 199 digest[j] ^= tmp2[j]; in dpp_pbkdf2_f() 213 unsigned char digest[DPP_MAX_HASH_LEN]; in dpp_pbkdf2() local 218 salt, salt_len, iterations, count, digest)) in dpp_pbkdf2() 221 os_memcpy(pos, digest, plen); in dpp_pbkdf2()
|
/hostap-3.6.0/hostapd/ |
D | ChangeLog | 807 * added support for SHA-256 as X.509 certificate digest when using the
|
/hostap-3.6.0/wpa_supplicant/ |
D | ChangeLog | 1385 * added support for SHA-256 as X.509 certificate digest when using the
|