Home
last modified time | relevance | path

Searched refs:suite (Results 1 – 25 of 26) sorted by relevance

12

/hostap-3.6.0/src/rsn_supp/
Dwpa_ie.c47 u32 suite; in wpa_gen_wpa_ie_wpa() local
59 suite = wpa_cipher_to_suite(WPA_PROTO_WPA, group_cipher); in wpa_gen_wpa_ie_wpa()
60 if (suite == 0) { in wpa_gen_wpa_ie_wpa()
65 RSN_SELECTOR_PUT(pos, suite); in wpa_gen_wpa_ie_wpa()
70 suite = wpa_cipher_to_suite(WPA_PROTO_WPA, pairwise_cipher); in wpa_gen_wpa_ie_wpa()
71 if (suite == 0 || in wpa_gen_wpa_ie_wpa()
78 RSN_SELECTOR_PUT(pos, suite); in wpa_gen_wpa_ie_wpa()
132 u32 suite; in wpa_gen_wpa_ie_rsn() local
147 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, group_cipher); in wpa_gen_wpa_ie_rsn()
148 if (suite == 0) { in wpa_gen_wpa_ie_rsn()
[all …]
/hostap-3.6.0/src/ap/
Dwpa_auth_ie.c32 u32 suite; in wpa_write_wpa_ie() local
40 suite = wpa_cipher_to_suite(WPA_PROTO_WPA, conf->wpa_group); in wpa_write_wpa_ie()
41 if (suite == 0) { in wpa_write_wpa_ie()
46 RSN_SELECTOR_PUT(pos, suite); in wpa_write_wpa_ie()
127 u32 suite; in wpa_write_rsn_ie() local
134 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, conf->wpa_group); in wpa_write_rsn_ie()
135 if (suite == 0) { in wpa_write_rsn_ie()
140 RSN_SELECTOR_PUT(pos, suite); in wpa_write_rsn_ie()
1154 u32 cipher, suite, selector, mask; in wpa_auth_write_fd_rsn_info() local
1169 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, conf->wpa_group); in wpa_auth_write_fd_rsn_info()
[all …]
Dieee802_1x.c376 u32 suite; in add_common_radius_sta_attr_rsn() local
381 suite = wpa_cipher_to_suite(ver, val); in add_common_radius_sta_attr_rsn()
386 suite)) { in add_common_radius_sta_attr_rsn()
391 suite = wpa_cipher_to_suite(((hapd->conf->wpa & 0x2) || in add_common_radius_sta_attr_rsn()
398 suite)) { in add_common_radius_sta_attr_rsn()
404 suite = wpa_akm_to_suite(val); in add_common_radius_sta_attr_rsn()
409 suite)) { in add_common_radius_sta_attr_rsn()
415 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, in add_common_radius_sta_attr_rsn()
420 msg, RADIUS_ATTR_WLAN_GROUP_MGMT_CIPHER, suite)) { in add_common_radius_sta_attr_rsn()
/hostap-3.6.0/src/tls/
Dtlsv1_record.c33 const struct tls_cipher_suite *suite; in tlsv1_record_set_cipher_suite() local
40 suite = tls_get_cipher_suite(cipher_suite); in tlsv1_record_set_cipher_suite()
41 if (suite == NULL) in tlsv1_record_set_cipher_suite()
44 if (suite->hash == TLS_HASH_MD5) { in tlsv1_record_set_cipher_suite()
47 } else if (suite->hash == TLS_HASH_SHA) { in tlsv1_record_set_cipher_suite()
50 } else if (suite->hash == TLS_HASH_SHA256) { in tlsv1_record_set_cipher_suite()
55 data = tls_get_cipher_data(suite->cipher); in tlsv1_record_set_cipher_suite()
Dtlsv1_common.c107 const struct tls_cipher_suite * tls_get_cipher_suite(u16 suite) in tls_get_cipher_suite() argument
111 if (tls_cipher_suites[i].suite == suite) in tls_get_cipher_suite()
129 const struct tls_cipher_suite *suite; in tls_server_key_exchange_allowed() local
132 suite = tls_get_cipher_suite(cipher); in tls_server_key_exchange_allowed()
133 if (suite == NULL) in tls_server_key_exchange_allowed()
136 switch (suite->key_exchange) { in tls_server_key_exchange_allowed()
Dtlsv1_server_read.c30 static int testing_cipher_suite_filter(struct tlsv1_server *conn, u16 suite) in testing_cipher_suite_filter() argument
37 suite != TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 && in testing_cipher_suite_filter()
38 suite != TLS_DHE_RSA_WITH_AES_256_CBC_SHA && in testing_cipher_suite_filter()
39 suite != TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 && in testing_cipher_suite_filter()
40 suite != TLS_DHE_RSA_WITH_AES_128_CBC_SHA && in testing_cipher_suite_filter()
41 suite != TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA) in testing_cipher_suite_filter()
814 const struct tls_cipher_suite *suite; in tls_process_client_key_exchange() local
862 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_process_client_key_exchange()
863 if (suite == NULL) in tls_process_client_key_exchange()
866 keyx = suite->key_exchange; in tls_process_client_key_exchange()
Dtlsv1_server_write.c195 const struct tls_cipher_suite *suite; in tls_write_server_certificate() local
197 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_write_server_certificate()
198 if (suite && suite->key_exchange == TLS_KEY_X_DH_anon) { in tls_write_server_certificate()
372 const struct tls_cipher_suite *suite; in tls_write_server_key_exchange() local
380 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_write_server_key_exchange()
381 if (suite == NULL) in tls_write_server_key_exchange()
384 keyx = suite->key_exchange; in tls_write_server_key_exchange()
Dtlsv1_common.h216 u16 suite; member
250 const struct tls_cipher_suite * tls_get_cipher_suite(u16 suite);
Dtlsv1_client_read.c1027 const struct tls_cipher_suite *suite; in tls_process_server_key_exchange() local
1094 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_process_server_key_exchange()
1095 if (suite && (suite->key_exchange == TLS_KEY_X_DH_anon || in tls_process_server_key_exchange()
1096 suite->key_exchange == TLS_KEY_X_DHE_RSA)) { in tls_process_server_key_exchange()
1098 suite->key_exchange) < 0) { in tls_process_server_key_exchange()
Dtlsv1_client_write.c512 const struct tls_cipher_suite *suite; in tls_write_client_key_exchange() local
514 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_write_client_key_exchange()
515 if (suite == NULL) in tls_write_client_key_exchange()
518 keyx = suite->key_exchange; in tls_write_client_key_exchange()
/hostap-3.6.0/src/crypto/
Dtls_wolfssl.c1830 const char *suite; in tls_connection_set_cipher_list() local
1834 suite = "RC4-SHA"; in tls_connection_set_cipher_list()
1837 suite = "AES128-SHA"; in tls_connection_set_cipher_list()
1840 suite = "DHE-RSA-AES128-SHA"; in tls_connection_set_cipher_list()
1843 suite = "ADH-AES128-SHA"; in tls_connection_set_cipher_list()
1846 suite = "DHE-RSA-AES256-SHA"; in tls_connection_set_cipher_list()
1849 suite = "AES256-SHA"; in tls_connection_set_cipher_list()
1856 ret = os_snprintf(pos, end - pos, ":%s", suite); in tls_connection_set_cipher_list()
Dtls_openssl.c4632 const char *suite; in tls_connection_set_cipher_list() local
4636 suite = "RC4-SHA"; in tls_connection_set_cipher_list()
4639 suite = "AES128-SHA"; in tls_connection_set_cipher_list()
4642 suite = "DHE-RSA-AES128-SHA"; in tls_connection_set_cipher_list()
4645 suite = "ADH-AES128-SHA"; in tls_connection_set_cipher_list()
4648 suite = "DHE-RSA-AES256-SHA"; in tls_connection_set_cipher_list()
4651 suite = "AES256-SHA"; in tls_connection_set_cipher_list()
4658 ret = os_snprintf(pos, end - pos, ":%s", suite); in tls_connection_set_cipher_list()
/hostap-3.6.0/wpa_supplicant/doc/docbook/
Deapol_test.sgml66 test suite for a RADIUS authentication server.</para>
/hostap-3.6.0/hostapd/
Dandroid.config92 # Include support for optional SHA256 cipher suite in EAP-GPSK
Ddefconfig101 # Include support for optional SHA256 cipher suite in EAP-GPSK
DREADME328 # Group cipher suite (encryption algorithm for broadcast and multicast frames)
/hostap-3.6.0/doc/
Dtesting_tools.doxygen33 could be used to implement an automated regression test suite for a
Ddriver_wrapper.doxygen68 WPA requires that the pairwise cipher suite (encryption algorithm for
Ddbus.doxygen2080 …<tr><td>KeyMgmt</td><td>as</td><td>Key management suite. Possible array elements: "wpa-psk", "wpa-…
2082 …<tr><td>Group</td><td>s</td><td>Group cipher suite. Possible values are: "ccmp", "tkip", "wep104",…
2089suite. Possible array elements: "wpa-psk", "wpa-ft-psk", "wpa-psk-sha256", "wpa-eap", "wpa-ft-eap…
2091 …<tr><td>Group</td><td>s</td><td>Group cipher suite. Possible values are: "ccmp", "tkip", "wep104",…
2092 …<tr><td>MgmtGroup</td><td>s</td><td>Management frames cipher suite. Possible values are: "aes128cm…
/hostap-3.6.0/src/drivers/
Ddriver_nl80211.c3336 u32 suite; in wpa_driver_nl80211_set_key() local
3338 suite = wpa_alg_to_cipher_suite(alg, key_len); in wpa_driver_nl80211_set_key()
3339 if (!suite) { in wpa_driver_nl80211_set_key()
3348 nla_put_u32(key_msg, NL80211_KEY_CIPHER, suite)) in wpa_driver_nl80211_set_key()
3500 u32 suite; in nl_add_key() local
3505 suite = wpa_alg_to_cipher_suite(alg, key_len); in nl_add_key()
3506 if (!suite) in nl_add_key()
3518 nla_put_u32(msg, NL80211_KEY_CIPHER, suite) || in nl_add_key()
4548 u32 suites[20], suite; in wpa_driver_nl80211_set_ap() local
4691 suite = wpa_cipher_to_cipher_suite(params->group_cipher); in wpa_driver_nl80211_set_ap()
[all …]
/hostap-3.6.0/src/common/
Dwpa_common.c3329 u32 suite; in wpa_pasn_add_rsne() local
3355 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, cipher); in wpa_pasn_add_rsne()
3356 RSN_SELECTOR_PUT(pos, suite); in wpa_pasn_add_rsne()
/hostap-3.6.0/wpa_supplicant/
Deap_testing.txt15 The full automated test suite can now be run in couple of seconds, but
Dandroid.config132 # Include support for optional SHA256 cipher suite in EAP-GPSK
Ddefconfig163 # Include support for optional SHA256 cipher suite in EAP-GPSK
/hostap-3.6.0/tests/
Dcipher-and-key-mgmt-testing.txt1 Cipher suite (CCMP, TKIP, GCMP, ..) and key management testing

12