/hostap-latest/src/common/ |
D | wpa_common.c | 3117 int rsn_cipher_put_suites(u8 *start, int ciphers) in rsn_cipher_put_suites() argument 3121 if (ciphers & WPA_CIPHER_CCMP_256) { in rsn_cipher_put_suites() 3125 if (ciphers & WPA_CIPHER_GCMP_256) { in rsn_cipher_put_suites() 3129 if (ciphers & WPA_CIPHER_CCMP) { in rsn_cipher_put_suites() 3133 if (ciphers & WPA_CIPHER_GCMP) { in rsn_cipher_put_suites() 3137 if (ciphers & WPA_CIPHER_TKIP) { in rsn_cipher_put_suites() 3141 if (ciphers & WPA_CIPHER_NONE) { in rsn_cipher_put_suites() 3150 int wpa_cipher_put_suites(u8 *start, int ciphers) in wpa_cipher_put_suites() argument 3154 if (ciphers & WPA_CIPHER_CCMP) { in wpa_cipher_put_suites() 3158 if (ciphers & WPA_CIPHER_TKIP) { in wpa_cipher_put_suites() [all …]
|
D | wpa_common.h | 755 int rsn_cipher_put_suites(u8 *pos, int ciphers); 756 int wpa_cipher_put_suites(u8 *pos, int ciphers); 757 int wpa_pick_pairwise_cipher(int ciphers, int none_allowed); 758 int wpa_pick_group_cipher(int ciphers); 760 int wpa_write_ciphers(char *start, char *end, int ciphers, const char *delim);
|
/hostap-latest/src/crypto/ |
D | tls_mbedtls_alt.c | 1197 static int tls_mbedtls_set_ciphers(struct tls_conf *tls_conf, const char *ciphers) in tls_mbedtls_set_ciphers() argument 1207 next = os_strchr(ciphers, ':'); in tls_mbedtls_set_ciphers() 1208 clen = next ? (size_t)(next - ciphers) : os_strlen(ciphers); in tls_mbedtls_set_ciphers() 1214 if (clen == 9 && os_memcmp(ciphers, "SUITEB192", 9) == 0) in tls_mbedtls_set_ciphers() 1219 if (clen == 9 && os_memcmp(ciphers, "SUITEB128", 9) == 0) in tls_mbedtls_set_ciphers() 1224 if (clen == 7 && os_memcmp(ciphers, "DEFAULT", 7) == 0) in tls_mbedtls_set_ciphers() 1226 if (clen == 6 && os_memcmp(ciphers, "AES128", 6) == 0) in tls_mbedtls_set_ciphers() 1234 if (clen == 6 && os_memcmp(ciphers, "AES256", 6) == 0) in tls_mbedtls_set_ciphers() 1242 if (clen == 4 && os_memcmp(ciphers, "HIGH", 4) == 0) in tls_mbedtls_set_ciphers() 1250 if (clen == 4 && os_memcmp(ciphers, "!ADH", 4) == 0) in tls_mbedtls_set_ciphers() [all …]
|
D | tls_wolfssl.c | 230 const char *ciphers; in tls_init() local 284 ciphers = conf->openssl_ciphers; in tls_init() 286 ciphers = "ALL"; in tls_init() 287 wpa_printf(MSG_DEBUG, "wolfSSL: cipher suites: %s", ciphers); in tls_init() 288 if (wolfSSL_CTX_set_cipher_list(ssl_ctx, ciphers) != 1) { in tls_init() 291 ciphers); in tls_init() 1864 u8 *ciphers) in tls_connection_set_cipher_list() argument 1870 if (!conn || !conn->ssl || !ciphers) in tls_connection_set_cipher_list() 1877 c = ciphers; in tls_connection_set_cipher_list()
|
D | tls_openssl.c | 997 const char *ciphers; in tls_init() local 1171 ciphers = conf->openssl_ciphers; in tls_init() 1173 ciphers = TLS_DEFAULT_CIPHERS; in tls_init() 1174 if (SSL_CTX_set_cipher_list(ssl, ciphers) != 1) { in tls_init() 1177 ciphers); in tls_init() 3207 const char *ciphers = "DHE-RSA-AES256-GCM-SHA384"; in tls_set_conn_flags() local 3213 ciphers = openssl_ciphers; in tls_set_conn_flags() 3215 if (SSL_set_cipher_list(ssl, ciphers) != 1) { in tls_set_conn_flags() 3224 const char *ciphers = in tls_set_conn_flags() local 3232 ciphers = openssl_ciphers; in tls_set_conn_flags() [all …]
|
D | tls_internal.c | 660 u8 *ciphers) in tls_connection_set_cipher_list() argument 664 return tlsv1_client_set_cipher_list(conn->client, ciphers); in tls_connection_set_cipher_list() 668 return tlsv1_server_set_cipher_list(conn->server, ciphers); in tls_connection_set_cipher_list()
|
D | tls_none.c | 152 u8 *ciphers) in tls_connection_set_cipher_list() argument
|
D | tls.h | 544 u8 *ciphers);
|
D | tls_gnutls.c | 1649 u8 *ciphers) in tls_connection_set_cipher_list() argument
|
/hostap-latest/src/ap/ |
D | wpa_auth_ie.c | 864 int ciphers, key_mgmt, res, version; in wpa_validate_wpa_ie() local 1093 ciphers = data.pairwise_cipher & in wpa_validate_wpa_ie() 1096 ciphers = data.pairwise_cipher & in wpa_validate_wpa_ie() 1099 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise; in wpa_validate_wpa_ie() 1101 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise; in wpa_validate_wpa_ie() 1102 if (!ciphers) { in wpa_validate_wpa_ie() 1166 if (sm->mgmt_frame_prot && (ciphers & WPA_CIPHER_TKIP)) { in wpa_validate_wpa_ie() 1210 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0); in wpa_validate_wpa_ie()
|
D | wpa_auth_ft.c | 3055 int key_mgmt, ciphers; in wpa_ft_set_key_mgmt() local 3080 ciphers = parse->pairwise_cipher & sm->wpa_auth->conf.rsn_pairwise; in wpa_ft_set_key_mgmt() 3081 if (!ciphers) { in wpa_ft_set_key_mgmt() 3087 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0); in wpa_ft_set_key_mgmt()
|
/hostap-latest/src/eap_peer/ |
D | eap_fast.c | 1456 u8 ciphers[7]; in eap_fast_set_provisioning_ciphers() local 1462 ciphers[count++] = TLS_CIPHER_ANON_DH_AES128_SHA; in eap_fast_set_provisioning_ciphers() 1468 ciphers[count++] = TLS_CIPHER_RSA_DHE_AES256_SHA; in eap_fast_set_provisioning_ciphers() 1469 ciphers[count++] = TLS_CIPHER_RSA_DHE_AES128_SHA; in eap_fast_set_provisioning_ciphers() 1470 ciphers[count++] = TLS_CIPHER_AES256_SHA; in eap_fast_set_provisioning_ciphers() 1471 ciphers[count++] = TLS_CIPHER_AES128_SHA; in eap_fast_set_provisioning_ciphers() 1472 ciphers[count++] = TLS_CIPHER_RC4_SHA; in eap_fast_set_provisioning_ciphers() 1475 ciphers[count++] = TLS_CIPHER_NONE; in eap_fast_set_provisioning_ciphers() 1478 ciphers)) { in eap_fast_set_provisioning_ciphers()
|
/hostap-latest/src/tls/ |
D | tlsv1_server.h | 38 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers);
|
D | tlsv1_client.h | 42 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers);
|
D | tlsv1_server.c | 686 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers) in tlsv1_server_set_cipher_list() argument 692 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) { in tlsv1_server_set_cipher_list()
|
D | tlsv1_client.c | 810 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers) in tlsv1_client_set_cipher_list() argument 816 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) { in tlsv1_client_set_cipher_list()
|
/hostap-latest/tests/hwsim/ |
D | test_suite_b.py | 600 ciphers = "ECDHE-RSA-AES256-GCM-SHA384" 604 ciphers = "DHE-RSA-AES256-GCM-SHA384" 623 openssl_ciphers=ciphers,
|
/hostap-latest/wpa_supplicant/doc/docbook/ |
D | wpa_supplicant.conf.sgml | 55 # home network; allow all valid ciphers 63 # work network; use EAP-TLS with WPA; allow only CCMP and TKIP ciphers
|
/hostap-latest/hostapd/ |
D | defconfig | 289 # can be enabled to get a stronger construction of messages when block ciphers 297 # Select which ciphers to use by default with OpenSSL if the user does not
|
/hostap-latest/src/eap_server/ |
D | eap_server_fast.c | 403 u8 ciphers[7] = { in eap_fast_init() local 433 ciphers) < 0) { in eap_fast_init()
|
/hostap-latest/src/drivers/ |
D | driver_nl80211_capa.c | 441 u32 *ciphers; in wiphy_info_cipher_suites() local 447 ciphers = nla_data(tb); in wiphy_info_cipher_suites() 449 u32 c = ciphers[i]; in wiphy_info_cipher_suites()
|
D | driver_nl80211.c | 3310 static int wpa_cipher_to_cipher_suites(unsigned int ciphers, u32 suites[], in wpa_cipher_to_cipher_suites() argument 3315 if (num_suites < max_suites && ciphers & WPA_CIPHER_CCMP_256) in wpa_cipher_to_cipher_suites() 3317 if (num_suites < max_suites && ciphers & WPA_CIPHER_GCMP_256) in wpa_cipher_to_cipher_suites() 3319 if (num_suites < max_suites && ciphers & WPA_CIPHER_CCMP) in wpa_cipher_to_cipher_suites() 3321 if (num_suites < max_suites && ciphers & WPA_CIPHER_GCMP) in wpa_cipher_to_cipher_suites() 3323 if (num_suites < max_suites && ciphers & WPA_CIPHER_TKIP) in wpa_cipher_to_cipher_suites() 3325 if (num_suites < max_suites && ciphers & WPA_CIPHER_WEP104) in wpa_cipher_to_cipher_suites() 3327 if (num_suites < max_suites && ciphers & WPA_CIPHER_WEP40) in wpa_cipher_to_cipher_suites()
|
/hostap-latest/wpa_supplicant/ |
D | android.config | 287 # can be enabled to get a stronger construction of messages when block ciphers 300 # Select which ciphers to use by default with OpenSSL if the user does not
|
D | defconfig | 337 # can be enabled to get a stronger construction of messages when block ciphers 350 # Select which ciphers to use by default with OpenSSL if the user does not
|
D | ctrl_iface.c | 4078 static const struct cipher_info ciphers[] = { variable 4126 for (i = 0; i < ARRAY_SIZE(ciphers); i++) { in ctrl_iface_get_capability_pairwise() 4127 if (!ciphers[i].group_only && capa->enc & ciphers[i].capa) { in ctrl_iface_get_capability_pairwise() 4130 ciphers[i].name); in ctrl_iface_get_capability_pairwise() 4174 for (i = 0; i < ARRAY_SIZE(ciphers); i++) { in ctrl_iface_get_capability_group() 4175 if (capa->enc & ciphers[i].capa) { in ctrl_iface_get_capability_group() 4178 ciphers[i].name); in ctrl_iface_get_capability_group()
|