/hostap-3.6.0/src/rsn_supp/ |
D | wpa_ie.c | 47 u32 suite; in wpa_gen_wpa_ie_wpa() local 59 suite = wpa_cipher_to_suite(WPA_PROTO_WPA, group_cipher); in wpa_gen_wpa_ie_wpa() 60 if (suite == 0) { in wpa_gen_wpa_ie_wpa() 65 RSN_SELECTOR_PUT(pos, suite); in wpa_gen_wpa_ie_wpa() 70 suite = wpa_cipher_to_suite(WPA_PROTO_WPA, pairwise_cipher); in wpa_gen_wpa_ie_wpa() 71 if (suite == 0 || in wpa_gen_wpa_ie_wpa() 78 RSN_SELECTOR_PUT(pos, suite); in wpa_gen_wpa_ie_wpa() 132 u32 suite; in wpa_gen_wpa_ie_rsn() local 147 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, group_cipher); in wpa_gen_wpa_ie_rsn() 148 if (suite == 0) { in wpa_gen_wpa_ie_rsn() [all …]
|
/hostap-3.6.0/src/ap/ |
D | wpa_auth_ie.c | 32 u32 suite; in wpa_write_wpa_ie() local 40 suite = wpa_cipher_to_suite(WPA_PROTO_WPA, conf->wpa_group); in wpa_write_wpa_ie() 41 if (suite == 0) { in wpa_write_wpa_ie() 46 RSN_SELECTOR_PUT(pos, suite); in wpa_write_wpa_ie() 127 u32 suite; in wpa_write_rsn_ie() local 134 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, conf->wpa_group); in wpa_write_rsn_ie() 135 if (suite == 0) { in wpa_write_rsn_ie() 140 RSN_SELECTOR_PUT(pos, suite); in wpa_write_rsn_ie() 1154 u32 cipher, suite, selector, mask; in wpa_auth_write_fd_rsn_info() local 1169 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, conf->wpa_group); in wpa_auth_write_fd_rsn_info() [all …]
|
D | ieee802_1x.c | 376 u32 suite; in add_common_radius_sta_attr_rsn() local 381 suite = wpa_cipher_to_suite(ver, val); in add_common_radius_sta_attr_rsn() 386 suite)) { in add_common_radius_sta_attr_rsn() 391 suite = wpa_cipher_to_suite(((hapd->conf->wpa & 0x2) || in add_common_radius_sta_attr_rsn() 398 suite)) { in add_common_radius_sta_attr_rsn() 404 suite = wpa_akm_to_suite(val); in add_common_radius_sta_attr_rsn() 409 suite)) { in add_common_radius_sta_attr_rsn() 415 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, in add_common_radius_sta_attr_rsn() 420 msg, RADIUS_ATTR_WLAN_GROUP_MGMT_CIPHER, suite)) { in add_common_radius_sta_attr_rsn()
|
/hostap-3.6.0/src/tls/ |
D | tlsv1_record.c | 33 const struct tls_cipher_suite *suite; in tlsv1_record_set_cipher_suite() local 40 suite = tls_get_cipher_suite(cipher_suite); in tlsv1_record_set_cipher_suite() 41 if (suite == NULL) in tlsv1_record_set_cipher_suite() 44 if (suite->hash == TLS_HASH_MD5) { in tlsv1_record_set_cipher_suite() 47 } else if (suite->hash == TLS_HASH_SHA) { in tlsv1_record_set_cipher_suite() 50 } else if (suite->hash == TLS_HASH_SHA256) { in tlsv1_record_set_cipher_suite() 55 data = tls_get_cipher_data(suite->cipher); in tlsv1_record_set_cipher_suite()
|
D | tlsv1_common.c | 107 const struct tls_cipher_suite * tls_get_cipher_suite(u16 suite) in tls_get_cipher_suite() argument 111 if (tls_cipher_suites[i].suite == suite) in tls_get_cipher_suite() 129 const struct tls_cipher_suite *suite; in tls_server_key_exchange_allowed() local 132 suite = tls_get_cipher_suite(cipher); in tls_server_key_exchange_allowed() 133 if (suite == NULL) in tls_server_key_exchange_allowed() 136 switch (suite->key_exchange) { in tls_server_key_exchange_allowed()
|
D | tlsv1_server_read.c | 30 static int testing_cipher_suite_filter(struct tlsv1_server *conn, u16 suite) in testing_cipher_suite_filter() argument 37 suite != TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 && in testing_cipher_suite_filter() 38 suite != TLS_DHE_RSA_WITH_AES_256_CBC_SHA && in testing_cipher_suite_filter() 39 suite != TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 && in testing_cipher_suite_filter() 40 suite != TLS_DHE_RSA_WITH_AES_128_CBC_SHA && in testing_cipher_suite_filter() 41 suite != TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA) in testing_cipher_suite_filter() 814 const struct tls_cipher_suite *suite; in tls_process_client_key_exchange() local 862 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_process_client_key_exchange() 863 if (suite == NULL) in tls_process_client_key_exchange() 866 keyx = suite->key_exchange; in tls_process_client_key_exchange()
|
D | tlsv1_server_write.c | 195 const struct tls_cipher_suite *suite; in tls_write_server_certificate() local 197 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_write_server_certificate() 198 if (suite && suite->key_exchange == TLS_KEY_X_DH_anon) { in tls_write_server_certificate() 372 const struct tls_cipher_suite *suite; in tls_write_server_key_exchange() local 380 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_write_server_key_exchange() 381 if (suite == NULL) in tls_write_server_key_exchange() 384 keyx = suite->key_exchange; in tls_write_server_key_exchange()
|
D | tlsv1_common.h | 216 u16 suite; member 250 const struct tls_cipher_suite * tls_get_cipher_suite(u16 suite);
|
D | tlsv1_client_read.c | 1027 const struct tls_cipher_suite *suite; in tls_process_server_key_exchange() local 1094 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_process_server_key_exchange() 1095 if (suite && (suite->key_exchange == TLS_KEY_X_DH_anon || in tls_process_server_key_exchange() 1096 suite->key_exchange == TLS_KEY_X_DHE_RSA)) { in tls_process_server_key_exchange() 1098 suite->key_exchange) < 0) { in tls_process_server_key_exchange()
|
D | tlsv1_client_write.c | 512 const struct tls_cipher_suite *suite; in tls_write_client_key_exchange() local 514 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_write_client_key_exchange() 515 if (suite == NULL) in tls_write_client_key_exchange() 518 keyx = suite->key_exchange; in tls_write_client_key_exchange()
|
/hostap-3.6.0/src/crypto/ |
D | tls_wolfssl.c | 1830 const char *suite; in tls_connection_set_cipher_list() local 1834 suite = "RC4-SHA"; in tls_connection_set_cipher_list() 1837 suite = "AES128-SHA"; in tls_connection_set_cipher_list() 1840 suite = "DHE-RSA-AES128-SHA"; in tls_connection_set_cipher_list() 1843 suite = "ADH-AES128-SHA"; in tls_connection_set_cipher_list() 1846 suite = "DHE-RSA-AES256-SHA"; in tls_connection_set_cipher_list() 1849 suite = "AES256-SHA"; in tls_connection_set_cipher_list() 1856 ret = os_snprintf(pos, end - pos, ":%s", suite); in tls_connection_set_cipher_list()
|
D | tls_openssl.c | 4632 const char *suite; in tls_connection_set_cipher_list() local 4636 suite = "RC4-SHA"; in tls_connection_set_cipher_list() 4639 suite = "AES128-SHA"; in tls_connection_set_cipher_list() 4642 suite = "DHE-RSA-AES128-SHA"; in tls_connection_set_cipher_list() 4645 suite = "ADH-AES128-SHA"; in tls_connection_set_cipher_list() 4648 suite = "DHE-RSA-AES256-SHA"; in tls_connection_set_cipher_list() 4651 suite = "AES256-SHA"; in tls_connection_set_cipher_list() 4658 ret = os_snprintf(pos, end - pos, ":%s", suite); in tls_connection_set_cipher_list()
|
/hostap-3.6.0/wpa_supplicant/doc/docbook/ |
D | eapol_test.sgml | 66 test suite for a RADIUS authentication server.</para>
|
/hostap-3.6.0/hostapd/ |
D | android.config | 92 # Include support for optional SHA256 cipher suite in EAP-GPSK
|
D | defconfig | 101 # Include support for optional SHA256 cipher suite in EAP-GPSK
|
D | README | 328 # Group cipher suite (encryption algorithm for broadcast and multicast frames)
|
/hostap-3.6.0/doc/ |
D | testing_tools.doxygen | 33 could be used to implement an automated regression test suite for a
|
D | driver_wrapper.doxygen | 68 WPA requires that the pairwise cipher suite (encryption algorithm for
|
D | dbus.doxygen | 2080 …<tr><td>KeyMgmt</td><td>as</td><td>Key management suite. Possible array elements: "wpa-psk", "wpa-… 2082 …<tr><td>Group</td><td>s</td><td>Group cipher suite. Possible values are: "ccmp", "tkip", "wep104",… 2089 … suite. Possible array elements: "wpa-psk", "wpa-ft-psk", "wpa-psk-sha256", "wpa-eap", "wpa-ft-eap… 2091 …<tr><td>Group</td><td>s</td><td>Group cipher suite. Possible values are: "ccmp", "tkip", "wep104",… 2092 …<tr><td>MgmtGroup</td><td>s</td><td>Management frames cipher suite. Possible values are: "aes128cm…
|
/hostap-3.6.0/src/drivers/ |
D | driver_nl80211.c | 3336 u32 suite; in wpa_driver_nl80211_set_key() local 3338 suite = wpa_alg_to_cipher_suite(alg, key_len); in wpa_driver_nl80211_set_key() 3339 if (!suite) { in wpa_driver_nl80211_set_key() 3348 nla_put_u32(key_msg, NL80211_KEY_CIPHER, suite)) in wpa_driver_nl80211_set_key() 3500 u32 suite; in nl_add_key() local 3505 suite = wpa_alg_to_cipher_suite(alg, key_len); in nl_add_key() 3506 if (!suite) in nl_add_key() 3518 nla_put_u32(msg, NL80211_KEY_CIPHER, suite) || in nl_add_key() 4548 u32 suites[20], suite; in wpa_driver_nl80211_set_ap() local 4691 suite = wpa_cipher_to_cipher_suite(params->group_cipher); in wpa_driver_nl80211_set_ap() [all …]
|
/hostap-3.6.0/src/common/ |
D | wpa_common.c | 3329 u32 suite; in wpa_pasn_add_rsne() local 3355 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, cipher); in wpa_pasn_add_rsne() 3356 RSN_SELECTOR_PUT(pos, suite); in wpa_pasn_add_rsne()
|
/hostap-3.6.0/wpa_supplicant/ |
D | eap_testing.txt | 15 The full automated test suite can now be run in couple of seconds, but
|
D | android.config | 132 # Include support for optional SHA256 cipher suite in EAP-GPSK
|
D | defconfig | 163 # Include support for optional SHA256 cipher suite in EAP-GPSK
|
/hostap-3.6.0/tests/ |
D | cipher-and-key-mgmt-testing.txt | 1 Cipher suite (CCMP, TKIP, GCMP, ..) and key management testing
|