/hostap-latest/src/eap_common/ |
D | eap_teap_common.c | 20 static int tls_cipher_suite_mac_sha384(u16 cs); 238 static int tls_cipher_suite_match(const u16 *list, size_t count, u16 cs) in tls_cipher_suite_match() argument 243 if (list[i] == cs) in tls_cipher_suite_match() 251 static int tls_cipher_suite_mac_sha1(u16 cs) in tls_cipher_suite_mac_sha1() argument 268 return tls_cipher_suite_match(sha1_cs, ARRAY_SIZE(sha1_cs), cs); in tls_cipher_suite_mac_sha1() 272 static int tls_cipher_suite_mac_sha256(u16 cs) in tls_cipher_suite_mac_sha256() argument 293 return tls_cipher_suite_match(sha256_cs, ARRAY_SIZE(sha256_cs), cs); in tls_cipher_suite_mac_sha256() 297 static int tls_cipher_suite_mac_sha384(u16 cs) in tls_cipher_suite_mac_sha384() argument 313 return tls_cipher_suite_match(sha384_cs, ARRAY_SIZE(sha384_cs), cs); in tls_cipher_suite_mac_sha384() 719 int eap_teap_allowed_anon_prov_cipher_suite(u16 cs) in eap_teap_allowed_anon_prov_cipher_suite() argument [all …]
|
D | eap_teap_common.h | 228 int eap_teap_allowed_anon_prov_cipher_suite(u16 cs);
|
/hostap-latest/src/drivers/ |
D | driver_macsec_qca.c | 476 static fal_cipher_suite_e macsec_qca_cs_type_get(u64 cs) in macsec_qca_cs_type_get() argument 478 if (cs == CS_ID_GCM_AES_128) in macsec_qca_cs_type_get() 480 if (cs == CS_ID_GCM_AES_256) in macsec_qca_cs_type_get() 486 static int macsec_qca_set_current_cipher_suite(void *priv, u64 cs) in macsec_qca_set_current_cipher_suite() argument 491 if (cs != CS_ID_GCM_AES_128 && cs != CS_ID_GCM_AES_256) { in macsec_qca_set_current_cipher_suite() 494 __func__, cs); in macsec_qca_set_current_cipher_suite() 498 wpa_printf(MSG_DEBUG, "%s: CipherSuite: %016" PRIx64, __func__, cs); in macsec_qca_set_current_cipher_suite() 500 cs_type = macsec_qca_cs_type_get(cs); in macsec_qca_set_current_cipher_suite()
|
D | driver_macsec_linux.c | 512 static int macsec_drv_set_current_cipher_suite(void *priv, u64 cs) in macsec_drv_set_current_cipher_suite() argument 516 wpa_printf(MSG_DEBUG, "%s -> %016" PRIx64, __func__, cs); in macsec_drv_set_current_cipher_suite() 519 drv->cipher_suite = cs; in macsec_drv_set_current_cipher_suite() 1124 u64 cs) in lookup_sc() argument 1135 if (cs) in lookup_sc() 1136 rtnl_link_macsec_set_cipher_suite(needle, cs); in lookup_sc() 1161 u64 cs = 0; in macsec_drv_create_transmit_sc() local 1187 cs = drv->cipher_suite; in macsec_drv_create_transmit_sc() 1189 rtnl_link_macsec_set_cipher_suite(link, cs); in macsec_drv_create_transmit_sc() 1207 link = lookup_sc(drv->link_cache, drv->parent_ifi, sci, cs); in macsec_drv_create_transmit_sc()
|
D | driver.h | 4754 int (*set_current_cipher_suite)(void *priv, u64 cs);
|
/hostap-latest/src/pae/ |
D | ieee802_1x_cp.h | 28 void ieee802_1x_cp_set_ciphersuite(void *cp_ctx, u64 cs);
|
D | ieee802_1x_kay.c | 409 u64 cs; in ieee802_1x_kay_get_cipher_suite() local 413 cs = be_to_host64(_cs); in ieee802_1x_kay_get_cipher_suite() 416 if (cipher_suite_tbl[i].id == cs) { in ieee802_1x_kay_get_cipher_suite() 1650 be64 cs; in ieee802_1x_mka_encode_dist_sak_body() local 1652 cs = host_to_be64(cipher_suite_tbl[cs_index].id); in ieee802_1x_mka_encode_dist_sak_body() 1653 os_memcpy(body->sak, &cs, CS_ID_LEN); in ieee802_1x_mka_encode_dist_sak_body() 1694 struct macsec_ciphersuite *cs; in ieee802_1x_mka_decode_dist_sak_body() local 1776 cs = &cipher_suite_tbl[kay->macsec_csindex]; in ieee802_1x_mka_decode_dist_sak_body() 1780 cs = ieee802_1x_kay_get_cipher_suite(participant, body->sak, in ieee802_1x_mka_decode_dist_sak_body() 1782 if (!cs) { in ieee802_1x_mka_decode_dist_sak_body() [all …]
|
D | ieee802_1x_secy_ops.h | 27 int secy_cp_control_current_cipher_suite(struct ieee802_1x_kay *kay, u64 cs);
|
D | ieee802_1x_secy_ops.c | 108 int secy_cp_control_current_cipher_suite(struct ieee802_1x_kay *kay, u64 cs) in secy_cp_control_current_cipher_suite() argument 124 return ops->set_current_cipher_suite(ops->ctx, cs); in secy_cp_control_current_cipher_suite()
|
D | ieee802_1x_kay.h | 148 int (*set_current_cipher_suite)(void *ctx, u64 cs);
|
D | ieee802_1x_cp.c | 615 void ieee802_1x_cp_set_ciphersuite(void *cp_ctx, u64 cs) in ieee802_1x_cp_set_ciphersuite() argument 618 sm->cipher_suite = cs; in ieee802_1x_cp_set_ciphersuite()
|
/hostap-latest/wpa_supplicant/ |
D | wpas_kay.c | 65 static int wpas_set_current_cipher_suite(void *wpa_s, u64 cs) in wpas_set_current_cipher_suite() argument 67 return wpa_drv_set_current_cipher_suite(wpa_s, cs); in wpas_set_current_cipher_suite()
|
D | driver_i.h | 818 u64 cs) in wpa_drv_set_current_cipher_suite() argument 822 return wpa_s->driver->set_current_cipher_suite(wpa_s->drv_priv, cs); in wpa_drv_set_current_cipher_suite()
|
D | README | 844 Integrating with pcmcia-cs/cardmgr scripts 849 pcmcia-cs/cardmgr scripts (when using PC Cards). WPA handshake must be 853 For example, following small changes to pcmcia-cs scripts can be used
|
/hostap-latest/src/eap_peer/ |
D | eap_pwd.c | 696 u32 cs; in eap_pwd_perform_confirm_exchange() local 721 ptr = (u8 *) &cs; in eap_pwd_perform_confirm_exchange() 786 eap_pwd_h_update(hash, (u8 *) &cs, sizeof(u32)); in eap_pwd_perform_confirm_exchange() 848 eap_pwd_h_update(hash, (u8 *) &cs, sizeof(u32)); in eap_pwd_perform_confirm_exchange() 856 &cs, data->msk, data->emsk, data->session_id) < 0) { in eap_pwd_perform_confirm_exchange()
|
/hostap-latest/src/crypto/ |
D | tls_openssl.c | 518 HCERTSTORE cs; in cryptoapi_find_cert() local 521 cs = CertOpenStore((LPCSTR) CERT_STORE_PROV_SYSTEM, 0, 0, in cryptoapi_find_cert() 524 if (cs == NULL) { in cryptoapi_find_cert() 532 ret = CertFindCertificateInStore(cs, X509_ASN_ENCODING | in cryptoapi_find_cert() 547 ret = CertFindCertificateInStore(cs, in cryptoapi_find_cert() 556 CertCloseStore(cs, 0); in cryptoapi_find_cert() 665 HCERTSTORE cs; in tls_cryptoapi_ca_cert() local 683 cs = CertOpenSystemStore(0, wstore); in tls_cryptoapi_ca_cert() 686 cs = CertOpenSystemStore(0, store); in tls_cryptoapi_ca_cert() 688 if (cs == NULL) { in tls_cryptoapi_ca_cert() [all …]
|
/hostap-latest/src/eap_server/ |
D | eap_server_pwd.c | 759 u32 cs; in eap_pwd_process_confirm_resp() local 776 ptr = (u8 *) &cs; in eap_pwd_process_confirm_resp() 837 eap_pwd_h_update(hash, (u8 *) &cs, sizeof(u32)); in eap_pwd_process_confirm_resp() 853 data->my_confirm, &cs, data->msk, data->emsk, in eap_pwd_process_confirm_resp()
|
/hostap-latest/src/ap/ |
D | wpa_auth_kay.c | 86 static int hapd_set_current_cipher_suite(void *priv, u64 cs) in hapd_set_current_cipher_suite() argument 92 return hapd->driver->set_current_cipher_suite(hapd->drv_priv, cs); in hapd_set_current_cipher_suite()
|
/hostap-latest/wpa_supplicant/doc/docbook/ |
D | wpa_supplicant.sgml | 722 <title>Interface to pcmcia-cs/cardmrg</title> 724 <para>For example, the following small changes to pcmcia-cs scripts
|