/hostap-latest/src/tls/ |
D | tlsv1_server_read.c | 23 static int tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct, 25 static int tls_process_change_cipher_spec(struct tlsv1_server *conn, 30 static int testing_cipher_suite_filter(struct tlsv1_server *conn, u16 suite) in testing_cipher_suite_filter() argument 33 if ((conn->test_flags & in testing_cipher_suite_filter() 49 static void tls_process_status_request_item(struct tlsv1_server *conn, in tls_process_status_request_item() argument 86 conn->status_request_multi = 1; in tls_process_status_request_item() 90 static void tls_process_status_request_v2(struct tlsv1_server *conn, in tls_process_status_request_v2() argument 95 conn->status_request_v2 = 1; in tls_process_status_request_v2() 115 tls_process_status_request_item(conn, pos, len); in tls_process_status_request_v2() 121 static int tls_process_client_hello(struct tlsv1_server *conn, u8 ct, in tls_process_client_hello() argument [all …]
|
D | tlsv1_client.c | 25 void tls_alert(struct tlsv1_client *conn, u8 level, u8 description) in tls_alert() argument 27 conn->alert_level = level; in tls_alert() 28 conn->alert_description = description; in tls_alert() 32 void tlsv1_client_free_dh(struct tlsv1_client *conn) in tlsv1_client_free_dh() argument 34 os_free(conn->dh_p); in tlsv1_client_free_dh() 35 os_free(conn->dh_g); in tlsv1_client_free_dh() 36 os_free(conn->dh_ys); in tlsv1_client_free_dh() 37 conn->dh_p = conn->dh_g = conn->dh_ys = NULL; in tlsv1_client_free_dh() 41 u16 tls_client_highest_ver(struct tlsv1_client *conn) in tls_client_highest_ver() argument 47 if ((conn->flags & TLS_CONN_DISABLE_TLSv1_2) && in tls_client_highest_ver() [all …]
|
D | tlsv1_server.c | 24 void tlsv1_server_log(struct tlsv1_server *conn, const char *fmt, ...) in tlsv1_server_log() argument 42 if (conn->log_cb) in tlsv1_server_log() 43 conn->log_cb(conn->log_cb_ctx, buf); in tlsv1_server_log() 49 void tlsv1_server_alert(struct tlsv1_server *conn, u8 level, u8 description) in tlsv1_server_alert() argument 51 conn->alert_level = level; in tlsv1_server_alert() 52 conn->alert_description = description; in tlsv1_server_alert() 56 int tlsv1_server_derive_keys(struct tlsv1_server *conn, in tlsv1_server_derive_keys() argument 68 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); in tlsv1_server_derive_keys() 69 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random, in tlsv1_server_derive_keys() 71 if (tls_prf(conn->rl.tls_version, in tlsv1_server_derive_keys() [all …]
|
D | tlsv1_server_write.c | 24 static size_t tls_server_cert_chain_der_len(struct tlsv1_server *conn) in tls_server_cert_chain_der_len() argument 29 cert = conn->cred ? conn->cred->cert : NULL; in tls_server_cert_chain_der_len() 34 cert = x509_certificate_get_subject(conn->cred->trusted_certs, in tls_server_cert_chain_der_len() 42 static int tls_write_server_hello(struct tlsv1_server *conn, in tls_write_server_hello() argument 51 tlsv1_server_log(conn, "Send ServerHello"); in tls_write_server_hello() 59 WPA_PUT_BE32(conn->server_random, now.sec); in tls_write_server_hello() 60 if (random_get_bytes(conn->server_random + 4, TLS_RANDOM_LEN - 4)) { in tls_write_server_hello() 66 conn->server_random, TLS_RANDOM_LEN); in tls_write_server_hello() 68 conn->session_id_len = TLS_SESSION_ID_MAX_LEN; in tls_write_server_hello() 69 if (random_get_bytes(conn->session_id, conn->session_id_len)) { in tls_write_server_hello() [all …]
|
D | tlsv1_client_read.c | 22 static int tls_process_server_key_exchange(struct tlsv1_client *conn, u8 ct, 24 static int tls_process_certificate_request(struct tlsv1_client *conn, u8 ct, 26 static int tls_process_server_hello_done(struct tlsv1_client *conn, u8 ct, 30 static int tls_version_disabled(struct tlsv1_client *conn, u16 ver) in tls_version_disabled() argument 32 return (((conn->flags & TLS_CONN_DISABLE_TLSv1_0) && in tls_version_disabled() 34 ((conn->flags & TLS_CONN_DISABLE_TLSv1_1) && in tls_version_disabled() 36 ((conn->flags & TLS_CONN_DISABLE_TLSv1_2) && in tls_version_disabled() 41 static int tls_process_server_hello_extensions(struct tlsv1_client *conn, in tls_process_server_hello_extensions() argument 78 static int tls_process_server_hello(struct tlsv1_client *conn, u8 ct, in tls_process_server_hello() argument 89 tls_alert(conn, TLS_ALERT_LEVEL_FATAL, in tls_process_server_hello() [all …]
|
D | tlsv1_client_write.c | 24 static size_t tls_client_cert_chain_der_len(struct tlsv1_client *conn) in tls_client_cert_chain_der_len() argument 29 if (conn->cred == NULL) in tls_client_cert_chain_der_len() 32 cert = conn->cred->cert; in tls_client_cert_chain_der_len() 37 cert = x509_certificate_get_subject(conn->cred->trusted_certs, in tls_client_cert_chain_der_len() 45 u8 * tls_send_client_hello(struct tlsv1_client *conn, size_t *out_len) in tls_send_client_hello() argument 51 u16 tls_version = tls_client_highest_ver(conn); in tls_send_client_hello() 66 WPA_PUT_BE32(conn->client_random, now.sec); in tls_send_client_hello() 67 if (random_get_bytes(conn->client_random + 4, TLS_RANDOM_LEN - 4)) { in tls_send_client_hello() 73 conn->client_random, TLS_RANDOM_LEN); in tls_send_client_hello() 75 len = 150 + conn->num_cipher_suites * 2 + conn->client_hello_ext_len; in tls_send_client_hello() [all …]
|
D | tlsv1_server.h | 19 void tlsv1_server_deinit(struct tlsv1_server *conn); 20 int tlsv1_server_established(struct tlsv1_server *conn); 21 int tlsv1_server_prf(struct tlsv1_server *conn, const char *label, 24 u8 * tlsv1_server_handshake(struct tlsv1_server *conn, 26 int tlsv1_server_encrypt(struct tlsv1_server *conn, 29 int tlsv1_server_decrypt(struct tlsv1_server *conn, 32 int tlsv1_server_get_cipher(struct tlsv1_server *conn, char *buf, 34 int tlsv1_server_shutdown(struct tlsv1_server *conn); 35 int tlsv1_server_resumed(struct tlsv1_server *conn); 36 int tlsv1_server_get_random(struct tlsv1_server *conn, struct tls_random *data); [all …]
|
D | tlsv1_client.h | 19 void tlsv1_client_deinit(struct tlsv1_client *conn); 20 int tlsv1_client_established(struct tlsv1_client *conn); 21 int tlsv1_client_prf(struct tlsv1_client *conn, const char *label, 24 u8 * tlsv1_client_handshake(struct tlsv1_client *conn, 28 int tlsv1_client_encrypt(struct tlsv1_client *conn, 31 struct wpabuf * tlsv1_client_decrypt(struct tlsv1_client *conn, 34 int tlsv1_client_get_cipher(struct tlsv1_client *conn, char *buf, 36 int tlsv1_client_shutdown(struct tlsv1_client *conn); 37 int tlsv1_client_resumed(struct tlsv1_client *conn); 38 int tlsv1_client_hello_ext(struct tlsv1_client *conn, int ext_type, [all …]
|
D | tlsv1_client_i.h | 79 void tls_alert(struct tlsv1_client *conn, u8 level, u8 description); 80 void tlsv1_client_free_dh(struct tlsv1_client *conn); 81 u16 tls_client_highest_ver(struct tlsv1_client *conn); 82 int tls_derive_pre_master_secret(struct tlsv1_client *conn, 84 int tls_derive_keys(struct tlsv1_client *conn, 86 u8 * tls_send_client_hello(struct tlsv1_client *conn, size_t *out_len); 87 u8 * tlsv1_client_send_alert(struct tlsv1_client *conn, u8 level, 89 u8 * tlsv1_client_handshake_write(struct tlsv1_client *conn, size_t *out_len, 91 int tlsv1_client_process_handshake(struct tlsv1_client *conn, u8 ct, 99 enum tls_ocsp_result tls_process_ocsp_response(struct tlsv1_client *conn,
|
D | tlsv1_server_i.h | 74 void tlsv1_server_log(struct tlsv1_server *conn, const char *fmt, ...) 77 void tlsv1_server_alert(struct tlsv1_server *conn, u8 level, u8 description); 78 int tlsv1_server_derive_keys(struct tlsv1_server *conn, 81 u8 * tlsv1_server_handshake_write(struct tlsv1_server *conn, size_t *out_len); 82 u8 * tlsv1_server_send_alert(struct tlsv1_server *conn, u8 level, 84 int tlsv1_server_process_handshake(struct tlsv1_server *conn, u8 ct, 86 void tlsv1_server_get_dh_p(struct tlsv1_server *conn, const u8 **dh_p,
|
/hostap-latest/src/common/ |
D | dpp_tcp.c | 33 int (*pkex_done)(void *ctx, void *conn, struct dpp_bootstrap_info *bi); 69 struct dl_list conn; /* struct dpp_connection */ member 78 struct dl_list conn; /* struct dpp_connection */ member 92 static void dpp_controller_auth_success(struct dpp_connection *conn, 102 static void dpp_connection_free(struct dpp_connection *conn) in dpp_connection_free() argument 104 if (conn->sock >= 0) { in dpp_connection_free() 106 conn->sock); in dpp_connection_free() 107 eloop_unregister_sock(conn->sock, EVENT_TYPE_READ); in dpp_connection_free() 108 eloop_unregister_sock(conn->sock, EVENT_TYPE_WRITE); in dpp_connection_free() 109 close(conn->sock); in dpp_connection_free() [all …]
|
/hostap-latest/src/crypto/ |
D | tls_internal.c | 95 struct tls_connection *conn; in tls_connection_init() local 98 conn = os_zalloc(sizeof(*conn)); in tls_connection_init() 99 if (conn == NULL) in tls_connection_init() 101 conn->global = global; in tls_connection_init() 105 conn->client = tlsv1_client_init(); in tls_connection_init() 106 if (conn->client == NULL) { in tls_connection_init() 107 os_free(conn); in tls_connection_init() 110 tlsv1_client_set_cb(conn->client, global->event_cb, in tls_connection_init() 116 conn->server = tlsv1_server_init(global->server_cred); in tls_connection_init() 117 if (conn->server == NULL) { in tls_connection_init() [all …]
|
D | tls_gnutls.c | 157 struct tls_connection *conn = (struct tls_connection *) ptr; in tls_pull_func() local 159 if (conn->pull_buf == NULL) { in tls_pull_func() 164 end = wpabuf_head_u8(conn->pull_buf) + wpabuf_len(conn->pull_buf); in tls_pull_func() 165 if ((size_t) (end - conn->pull_buf_offset) < len) in tls_pull_func() 166 len = end - conn->pull_buf_offset; in tls_pull_func() 167 os_memcpy(buf, conn->pull_buf_offset, len); in tls_pull_func() 168 conn->pull_buf_offset += len; in tls_pull_func() 169 if (conn->pull_buf_offset == end) { in tls_pull_func() 171 wpabuf_free(conn->pull_buf); in tls_pull_func() 172 conn->pull_buf = NULL; in tls_pull_func() [all …]
|
D | tls_wolfssl.c | 339 struct tls_connection *conn; in tls_connection_init() local 343 conn = os_zalloc(sizeof(*conn)); in tls_connection_init() 344 if (!conn) in tls_connection_init() 346 conn->ssl = wolfSSL_new(ssl_ctx); in tls_connection_init() 347 if (!conn->ssl) { in tls_connection_init() 348 os_free(conn); in tls_connection_init() 352 wolfSSL_SetIOReadCtx(conn->ssl, &conn->input); in tls_connection_init() 353 wolfSSL_SetIOWriteCtx(conn->ssl, &conn->output); in tls_connection_init() 354 wolfSSL_set_ex_data(conn->ssl, 0, conn); in tls_connection_init() 355 conn->context = wolfSSL_CTX_get_ex_data(ssl_ctx, 0); in tls_connection_init() [all …]
|
D | tls_mbedtls_alt.c | 445 static void tls_connection_deinit_expkey(struct tls_connection *conn) in tls_connection_deinit_expkey() argument 447 conn->tls_prf_type = 0; /* MBEDTLS_SSL_TLS_PRF_NONE; */ in tls_connection_deinit_expkey() 448 conn->expkey_keyblock_size = 0; in tls_connection_deinit_expkey() 449 conn->expkey_secret_len = 0; in tls_connection_deinit_expkey() 450 forced_memzero(conn->expkey_secret, sizeof(conn->expkey_secret)); in tls_connection_deinit_expkey() 451 forced_memzero(conn->expkey_randbytes, sizeof(conn->expkey_randbytes)); in tls_connection_deinit_expkey() 455 void tls_connection_deinit_clienthello_session_ticket(struct tls_connection *conn) in tls_connection_deinit_clienthello_session_ticket() argument 457 if (conn->clienthello_session_ticket) in tls_connection_deinit_clienthello_session_ticket() 459 … mbedtls_platform_zeroize(conn->clienthello_session_ticket, conn->clienthello_session_ticket_len); in tls_connection_deinit_clienthello_session_ticket() 460 mbedtls_free(conn->clienthello_session_ticket); in tls_connection_deinit_clienthello_session_ticket() [all …]
|
D | tls_openssl.c | 758 struct tls_connection *conn = SSL_get_app_data((SSL *) ssl); in ssl_info_cb() local 767 conn->read_alerts++; in ssl_info_cb() 769 conn->write_alerts++; in ssl_info_cb() 771 if (conn->context->event_cb != NULL) { in ssl_info_cb() 773 struct tls_context *context = conn->context; in ssl_info_cb() 1261 static int tls_engine_init(struct tls_connection *conn, const char *engine_id, in tls_engine_init() argument 1271 conn->engine = NULL; in tls_engine_init() 1272 conn->private_key = EVP_PKEY_from_keystore(key_id); in tls_engine_init() 1273 if (!conn->private_key) { in tls_engine_init() 1293 conn->engine = ENGINE_by_id(engine_id); in tls_engine_init() [all …]
|
D | tls_none.c | 37 void tls_connection_deinit(void *tls_ctx, struct tls_connection *conn) in tls_connection_deinit() argument 42 int tls_connection_established(void *tls_ctx, struct tls_connection *conn) in tls_connection_established() argument 49 struct tls_connection *conn) in tls_connection_peer_serial_num() argument 55 int tls_connection_shutdown(void *tls_ctx, struct tls_connection *conn) in tls_connection_shutdown() argument 61 int tls_connection_set_params(void *tls_ctx, struct tls_connection *conn, in tls_connection_set_params() argument 81 int tls_connection_set_verify(void *tls_ctx, struct tls_connection *conn, in tls_connection_set_verify() argument 89 int tls_connection_get_random(void *tls_ctx, struct tls_connection *conn, in tls_connection_get_random() argument 96 int tls_connection_export_key(void *tls_ctx, struct tls_connection *conn, in tls_connection_export_key() argument 104 int tls_connection_get_eap_fast_key(void *tls_ctx, struct tls_connection *conn, in tls_connection_get_eap_fast_key() argument 112 struct tls_connection *conn, in tls_connection_handshake() argument [all …]
|
D | tls.h | 276 void tls_connection_deinit(void *tls_ctx, struct tls_connection *conn); 284 int tls_connection_established(void *tls_ctx, struct tls_connection *conn); 296 struct tls_connection *conn); 309 int tls_connection_shutdown(void *tls_ctx, struct tls_connection *conn); 331 tls_connection_set_params(void *tls_ctx, struct tls_connection *conn, 373 struct tls_connection *conn, 387 struct tls_connection *conn, 406 struct tls_connection *conn, 425 struct tls_connection *conn, 456 struct tls_connection *conn, [all …]
|
/hostap-latest/tests/hwsim/ |
D | test_ocv.py | 443 conn = APConnection(apdev[0], dev[0], params) 444 conn.test_bad_oci("element missing", None, 0, 0) 445 conn.test_bad_oci("wrong channel number", 81, 6, 0) 446 conn.test_bad_oci("invalid channel number", 81, 0, 0) 447 conn.test_bad_oci("wrong operating class", 80, 0, 0) 448 conn.test_bad_oci("invalid operating class", 0, 0, 0) 449 conn.confirm_valid_oci(81, 1, 0) 459 conn = APConnection(apdev[0], dev[0], params) 460 conn.test_bad_oci("wrong primary channel", 84, 5, 0) 461 conn.test_bad_oci("lower bandwidth than negotiated", 81, 6, 0) [all …]
|
D | run-tests.py | 83 def add_log_file(conn, test, run, type, path): argument 94 conn.execute(sql, params) 95 conn.commit() 100 def report(conn, prefill, build, commit, run, test, result, duration, logdir, argument 102 if conn: 108 … conn.execute('DELETE FROM results WHERE test=? AND run=? AND result=?', (test, run, 'NOTRUN')) 112 conn.execute(sql, params) 114 conn.commit() 122 add_log_file(conn, test, run, log, 331 conn = sqlite3.connect(args.database) [all …]
|
D | netlink.py | 122 def send(self, conn): argument 124 self.seq = conn.seq() 126 self.pid = conn.pid 131 conn.send(hdr + self.payload) 142 def send_and_recv(self, conn): argument 143 self.send(conn) 145 m = conn.recv() 226 def __init__(self, conn): argument 227 self.conn = conn 231 m.send(self.conn) [all …]
|
/hostap-latest/tests/ |
D | test-https_server.c | 81 struct tls_connection *conn; in https_server() local 103 conn = tls_connection_init(tls); in https_server() 104 if (!conn) { in https_server() 109 tls_connection_set_log_cb(conn, https_tls_log_cb, NULL); in https_server() 117 out = tls_connection_server_handshake(tls, conn, in, &appl); in https_server() 121 if (!tls_connection_get_failed(tls, conn) && in https_server() 122 !tls_connection_established(tls, conn)) in https_server() 134 if (tls_connection_get_failed(tls, conn)) { in https_server() 138 if (tls_connection_established(tls, conn)) in https_server() 155 out = tls_connection_decrypt2(tls, conn, in, &need_more_data); in https_server() [all …]
|
D | test-https.c | 75 struct tls_connection *conn; in https_client() local 86 conn = tls_connection_init(tls); in https_client() 87 if (conn == NULL) { in https_client() 96 out = tls_connection_handshake2(tls, conn, in, &appl, in https_client() 105 if (tls_connection_get_failed(tls, conn)) { in https_client() 109 if (tls_connection_established(tls, conn)) in https_client() 138 out = tls_connection_encrypt(tls, conn, in); in https_client() 159 out = tls_connection_decrypt2(tls, conn, in, &need_more_data); in https_client() 177 tls_connection_deinit(tls, conn); in https_client()
|
/hostap-latest/src/eap_server/ |
D | eap_server_tls_common.c | 60 data->conn = tls_connection_init(sm->cfg->ssl_ctx); in eap_server_tls_ssl_init() 61 if (data->conn == NULL) { in eap_server_tls_ssl_init() 68 tls_connection_set_log_cb(data->conn, eap_server_tls_log_cb, sm); in eap_server_tls_ssl_init() 70 tls_connection_set_test_flags(data->conn, sm->tls_test_flags); in eap_server_tls_ssl_init() 78 if (tls_connection_set_verify(sm->cfg->ssl_ctx, data->conn, verify_peer, in eap_server_tls_ssl_init() 83 tls_connection_deinit(sm->cfg->ssl_ctx, data->conn); in eap_server_tls_ssl_init() 84 data->conn = NULL; in eap_server_tls_ssl_init() 108 tls_connection_deinit(sm->cfg->ssl_ctx, data->conn); in eap_server_tls_ssl_deinit() 125 if (tls_connection_export_key(sm->cfg->ssl_ctx, data->conn, label, in eap_server_tls_derive_key() 179 if (tls_connection_get_random(sm->cfg->ssl_ctx, data->conn, &keys)) in eap_server_tls_derive_session_id() [all …]
|
/hostap-latest/src/eap_peer/ |
D | eap_tls_common.c | 262 data->conn = tls_connection_init(data->ssl_ctx); in eap_tls_init_connection() 263 if (data->conn == NULL) { in eap_tls_init_connection() 269 res = tls_connection_set_params(data->ssl_ctx, data->conn, params); in eap_tls_init_connection() 291 tls_connection_deinit(data->ssl_ctx, data->conn); in eap_tls_init_connection() 292 data->conn = NULL; in eap_tls_init_connection() 361 tls_connection_deinit(data->ssl_ctx, data->conn); in eap_peer_tls_ssl_deinit() 395 if (tls_connection_export_key(data->ssl_ctx, data->conn, label, in eap_peer_tls_derive_key() 449 if (tls_connection_get_random(sm->ssl_ctx, data->conn, &keys) || in eap_peer_tls_derive_session_id() 603 data->tls_out = tls_connection_handshake(data->ssl_ctx, data->conn, in eap_tls_process_input() 609 tls_connection_established(data->ssl_ctx, data->conn) && in eap_tls_process_input() [all …]
|