/hostap-3.7.0/src/crypto/ |
D | sha256-internal.c | 84 static int sha256_compress(struct sha256_state *md, unsigned char *buf) in sha256_compress() argument 92 S[i] = md->state[i]; in sha256_compress() 120 md->state[i] = md->state[i] + S[i]; in sha256_compress() 127 void sha256_init(struct sha256_state *md) in sha256_init() argument 129 md->curlen = 0; in sha256_init() 130 md->length = 0; in sha256_init() 131 md->state[0] = 0x6A09E667UL; in sha256_init() 132 md->state[1] = 0xBB67AE85UL; in sha256_init() 133 md->state[2] = 0x3C6EF372UL; in sha256_init() 134 md->state[3] = 0xA54FF53AUL; in sha256_init() [all …]
|
D | sha512-internal.c | 110 static int sha512_compress(struct sha512_state *md, unsigned char *buf) in sha512_compress() argument 122 S[i] = md->state[i]; in sha512_compress() 151 md->state[i] = md->state[i] + S[i]; in sha512_compress() 164 void sha512_init(struct sha512_state *md) in sha512_init() argument 166 md->curlen = 0; in sha512_init() 167 md->length = 0; in sha512_init() 168 md->state[0] = CONST64(0x6a09e667f3bcc908); in sha512_init() 169 md->state[1] = CONST64(0xbb67ae8584caa73b); in sha512_init() 170 md->state[2] = CONST64(0x3c6ef372fe94f82b); in sha512_init() 171 md->state[3] = CONST64(0xa54ff53a5f1d36f1); in sha512_init() [all …]
|
D | sha384-internal.c | 52 void sha384_init(struct sha384_state *md) in sha384_init() argument 54 md->curlen = 0; in sha384_init() 55 md->length = 0; in sha384_init() 56 md->state[0] = CONST64(0xcbbb9d5dc1059ed8); in sha384_init() 57 md->state[1] = CONST64(0x629a292a367cd507); in sha384_init() 58 md->state[2] = CONST64(0x9159015a3070dd17); in sha384_init() 59 md->state[3] = CONST64(0x152fecd8f70e5939); in sha384_init() 60 md->state[4] = CONST64(0x67332667ffc00b31); in sha384_init() 61 md->state[5] = CONST64(0x8eb44a8768581511); in sha384_init() 62 md->state[6] = CONST64(0xdb0c2e0d64f98fa7); in sha384_init() [all …]
|
D | crypto_libtomcrypt.c | 27 hash_state md; in md4_vector() local 30 md4_init(&md); in md4_vector() 32 md4_process(&md, addr[i], len[i]); in md4_vector() 33 md4_done(&md, mac); in md4_vector() 62 hash_state md; in md5_vector() local 65 md5_init(&md); in md5_vector() 67 md5_process(&md, addr[i], len[i]); in md5_vector() 68 md5_done(&md, mac); in md5_vector() 75 hash_state md; in sha1_vector() local 78 sha1_init(&md); in sha1_vector() [all …]
|
D | sha384_i.h | 18 void sha384_init(struct sha384_state *md); 19 int sha384_process(struct sha384_state *md, const unsigned char *in, 21 int sha384_done(struct sha384_state *md, unsigned char *out);
|
D | sha256_i.h | 20 void sha256_init(struct sha256_state *md); 21 int sha256_process(struct sha256_state *md, const unsigned char *in, 23 int sha256_done(struct sha256_state *md, unsigned char *out);
|
D | sha512_i.h | 20 void sha512_init(struct sha512_state *md); 21 int sha512_process(struct sha512_state *md, const unsigned char *in, 23 int sha512_done(struct sha512_state *md, unsigned char *out);
|
D | tls_openssl_ocsp.c | 401 unsigned char md[EVP_MAX_MD_SIZE]; in issuer_match() local 413 if (!X509_NAME_digest(iname, dgst, md, &len)) in issuer_match() 418 if (!ASN1_OCTET_STRING_set(hash, md, len)) { in issuer_match() 437 !EVP_Digest(ikey->data, ikey->length, md, &len, dgst, NULL) || in issuer_match() 438 !ASN1_OCTET_STRING_set(hash, md, len)) { in issuer_match()
|
D | crypto_openssl.c | 1060 const EVP_MD *md; in crypto_hash_init() local 1065 md = EVP_md5(); in crypto_hash_init() 1070 md = EVP_sha1(); in crypto_hash_init() 1076 md = EVP_sha256(); in crypto_hash_init() 1093 if (HMAC_Init_ex(ctx->ctx, key, key_len, md, NULL) != 1) { in crypto_hash_init()
|
/hostap-3.7.0/hs20/server/ca/ |
D | setup.sh | 107 …$OPENSSL ca -config openssl.cnf.tmp -md sha256 -create_serial -out rootCA/cacert.pem -days 10957 -… 128 …$OPENSSL ca -config openssl.cnf.tmp -md sha256 -create_serial -out demoCA/cacert.pem -days 3652 -b… 144 $OPENSSL ca -config $PWD/openssl.cnf.tmp -batch -md sha256 -keyfile demoCA/private/cakey.pem -passi… 152 $OPENSSL ca -config $PWD/openssl.cnf.tmp -batch -md sha256 -in server-revoked.csr -out server-revok… 162 $OPENSSL ca -config $PWD/openssl.cnf.tmp -batch -md sha256 -in server-client.csr -out server-client… 170 $OPENSSL ca -config $PWD/openssl.cnf.tmp -batch -md sha256 -in user.csr -out user.pem -key $PASS -d… 188 $OPENSSL ca -config $PWD/openssl.cnf.tmp -batch -md sha256 -in server.csr -out server.pem -key $PAS… 200 $OPENSSL ca -config $PWD/my-openssl.cnf -gencrl -md sha256 -out demoCA/crl/crl.pem -passin pass:$PA…
|
/hostap-3.7.0/tests/ |
D | test-sha1.c | 22 u8 md[20], hash[20]; in cavp_shavs() local 82 if (hexstr2bin(pos, md, 20) < 0) { in cavp_shavs() 91 os_memcmp(hash, md, 20) != 0) in cavp_shavs()
|
D | test-sha256.c | 22 u8 md[32], hash[32]; in cavp_shavs() local 82 if (hexstr2bin(pos, md, 32) < 0) { in cavp_shavs() 91 os_memcmp(hash, md, 32) != 0) in cavp_shavs()
|
/hostap-3.7.0/tests/hwsim/auth_serv/ |
D | ica-generate.sh | 16 $OPENSSL ca -config openssl.cnf.tmp -md sha256 -create_serial -out iCA-server/cacert.pem -days 3652… 31 $OPENSSL ca -config openssl.cnf.tmp -md sha256 -create_serial -out iCA-user/cacert.pem -days 3652 -… 45 …reate_serial -in iCA-server/server.req -out iCA-server/server.pem -extensions ext_server -md sha256 59 … iCA-server/server-revoked.req -out iCA-server/server-revoked.pem -extensions ext_server -md sha256 74 …t.pem -create_serial -in iCA-user/user.req -out iCA-user/user.pem -extensions ext_client -md sha256
|
D | rsa3072-generate.sh | 44 …e_serial -in rsa3072-server.req -out rsa3072-server.pem -extensions ext_server -days 730 -md sha384 59 …reate_serial -in rsa3072-user.req -out rsa3072-user.pem -extensions ext_client -days 730 -md sha384 74 … rsa3072-user-rsa2048.req -out rsa3072-user-rsa2048.pem -extensions ext_client -days 730 -md sha384
|
D | sha512-generate.sh | 41 …a.pem -create_serial -in sha384-server.req -out sha384-server.pem -extensions ext_server -md sha384 65 …12-ca.pem -create_serial -in sha384-user.req -out sha384-user.pem -extensions ext_client -md sha384
|
D | ec2-generate.sh | 58 …a.pem -create_serial -in ec2-user-p256.req -out ec2-user-p256.pem -extensions ext_client -md sha256
|
/hostap-3.7.0/wpa_supplicant/ |
D | sme.h | 19 int sme_update_ft_ies(struct wpa_supplicant *wpa_s, const u8 *md, 60 static inline int sme_update_ft_ies(struct wpa_supplicant *wpa_s, const u8 *md, in sme_update_ft_ies() argument
|
D | sme.c | 333 const u8 *md = NULL; in sme_send_authentication() local 539 md = ie + 2; in sme_send_authentication() 541 if (md && (!wpa_key_mgmt_ft(ssid->key_mgmt) || in sme_send_authentication() 543 md = NULL; in sme_send_authentication() 544 if (md) { in sme_send_authentication() 549 if (md) { in sme_send_authentication() 551 md[0], md[1]); in sme_send_authentication() 562 os_memcpy(mdie->mobility_domain, md, in sme_send_authentication() 564 mdie->ft_capab = md[MOBILITY_DOMAIN_ID_LEN]; in sme_send_authentication() 569 os_memcmp(md, wpa_s->sme.mobility_domain, 2) == 0 && in sme_send_authentication() [all …]
|
D | wpas_glue.c | 650 static int wpa_supplicant_update_ft_ies(void *ctx, const u8 *md, in wpa_supplicant_update_ft_ies() argument 655 return sme_update_ft_ies(wpa_s, md, ies, ies_len); in wpa_supplicant_update_ft_ies() 656 return wpa_drv_update_ft_ies(wpa_s, md, ies, ies_len); in wpa_supplicant_update_ft_ies()
|
D | driver_i.h | 332 const u8 *md, in wpa_drv_update_ft_ies() argument 336 return wpa_s->driver->update_ft_ies(wpa_s->drv_priv, md, in wpa_drv_update_ft_ies()
|
D | wpa_supplicant.c | 3332 const u8 *md = mdie + 2; in wpas_populate_assoc_ies() local 3335 if (os_memcmp(md, wpa_md, in wpas_populate_assoc_ies() 3694 const u8 *ie, *md = NULL; in wpas_start_assoc_cb() local 3707 md = ie + 2; in wpas_start_assoc_cb() 3709 if (md) { in wpas_start_assoc_cb()
|
/hostap-3.7.0/src/rsn_supp/ |
D | wpa_i.h | 326 static inline int wpa_sm_update_ft_ies(struct wpa_sm *sm, const u8 *md, in wpa_sm_update_ft_ies() argument 330 return sm->ctx->update_ft_ies(sm->ctx->ctx, md, ies, ies_len); in wpa_sm_update_ft_ies()
|
D | wpa.h | 54 int (*update_ft_ies)(void *ctx, const u8 *md, const u8 *ies, 556 struct wpabuf * fils_build_auth(struct wpa_sm *sm, int dh_group, const u8 *md);
|
D | wpa.c | 4033 struct wpabuf * fils_build_auth(struct wpa_sm *sm, int dh_group, const u8 *md) in fils_build_auth() argument 4113 if (md) { in fils_build_auth() 4120 os_memcpy(mdie->mobility_domain, md, MOBILITY_DOMAIN_ID_LEN); in fils_build_auth()
|
/hostap-3.7.0/tests/hwsim/ |
D | test_ap_eap.py | 4570 def ica_ocsp(cert, md="-sha256"): argument 4578 arg = ["openssl", "ocsp", "-reqout", fn2, "-issuer", ca, md, 4601 def run_ap_wpa2_eap_tls_intermediate_ca_ocsp(dev, apdev, params, md): argument 4606 fn = ica_ocsp("server.pem", md) 4636 def run_ap_wpa2_eap_tls_intermediate_ca_ocsp_revoked(dev, apdev, params, md): argument 4642 fn = ica_ocsp("server-revoked.pem", md)
|