Home
last modified time | relevance | path

Searched refs:cs (Results 1 – 19 of 19) sorted by relevance

/hostap-latest/src/eap_common/
Deap_teap_common.c20 static int tls_cipher_suite_mac_sha384(u16 cs);
238 static int tls_cipher_suite_match(const u16 *list, size_t count, u16 cs) in tls_cipher_suite_match() argument
243 if (list[i] == cs) in tls_cipher_suite_match()
251 static int tls_cipher_suite_mac_sha1(u16 cs) in tls_cipher_suite_mac_sha1() argument
268 return tls_cipher_suite_match(sha1_cs, ARRAY_SIZE(sha1_cs), cs); in tls_cipher_suite_mac_sha1()
272 static int tls_cipher_suite_mac_sha256(u16 cs) in tls_cipher_suite_mac_sha256() argument
293 return tls_cipher_suite_match(sha256_cs, ARRAY_SIZE(sha256_cs), cs); in tls_cipher_suite_mac_sha256()
297 static int tls_cipher_suite_mac_sha384(u16 cs) in tls_cipher_suite_mac_sha384() argument
313 return tls_cipher_suite_match(sha384_cs, ARRAY_SIZE(sha384_cs), cs); in tls_cipher_suite_mac_sha384()
719 int eap_teap_allowed_anon_prov_cipher_suite(u16 cs) in eap_teap_allowed_anon_prov_cipher_suite() argument
[all …]
Deap_teap_common.h228 int eap_teap_allowed_anon_prov_cipher_suite(u16 cs);
/hostap-latest/src/drivers/
Ddriver_macsec_qca.c476 static fal_cipher_suite_e macsec_qca_cs_type_get(u64 cs) in macsec_qca_cs_type_get() argument
478 if (cs == CS_ID_GCM_AES_128) in macsec_qca_cs_type_get()
480 if (cs == CS_ID_GCM_AES_256) in macsec_qca_cs_type_get()
486 static int macsec_qca_set_current_cipher_suite(void *priv, u64 cs) in macsec_qca_set_current_cipher_suite() argument
491 if (cs != CS_ID_GCM_AES_128 && cs != CS_ID_GCM_AES_256) { in macsec_qca_set_current_cipher_suite()
494 __func__, cs); in macsec_qca_set_current_cipher_suite()
498 wpa_printf(MSG_DEBUG, "%s: CipherSuite: %016" PRIx64, __func__, cs); in macsec_qca_set_current_cipher_suite()
500 cs_type = macsec_qca_cs_type_get(cs); in macsec_qca_set_current_cipher_suite()
Ddriver_macsec_linux.c512 static int macsec_drv_set_current_cipher_suite(void *priv, u64 cs) in macsec_drv_set_current_cipher_suite() argument
516 wpa_printf(MSG_DEBUG, "%s -> %016" PRIx64, __func__, cs); in macsec_drv_set_current_cipher_suite()
519 drv->cipher_suite = cs; in macsec_drv_set_current_cipher_suite()
1124 u64 cs) in lookup_sc() argument
1135 if (cs) in lookup_sc()
1136 rtnl_link_macsec_set_cipher_suite(needle, cs); in lookup_sc()
1161 u64 cs = 0; in macsec_drv_create_transmit_sc() local
1187 cs = drv->cipher_suite; in macsec_drv_create_transmit_sc()
1189 rtnl_link_macsec_set_cipher_suite(link, cs); in macsec_drv_create_transmit_sc()
1207 link = lookup_sc(drv->link_cache, drv->parent_ifi, sci, cs); in macsec_drv_create_transmit_sc()
Ddriver.h4754 int (*set_current_cipher_suite)(void *priv, u64 cs);
/hostap-latest/src/pae/
Dieee802_1x_cp.h28 void ieee802_1x_cp_set_ciphersuite(void *cp_ctx, u64 cs);
Dieee802_1x_kay.c409 u64 cs; in ieee802_1x_kay_get_cipher_suite() local
413 cs = be_to_host64(_cs); in ieee802_1x_kay_get_cipher_suite()
416 if (cipher_suite_tbl[i].id == cs) { in ieee802_1x_kay_get_cipher_suite()
1650 be64 cs; in ieee802_1x_mka_encode_dist_sak_body() local
1652 cs = host_to_be64(cipher_suite_tbl[cs_index].id); in ieee802_1x_mka_encode_dist_sak_body()
1653 os_memcpy(body->sak, &cs, CS_ID_LEN); in ieee802_1x_mka_encode_dist_sak_body()
1694 struct macsec_ciphersuite *cs; in ieee802_1x_mka_decode_dist_sak_body() local
1776 cs = &cipher_suite_tbl[kay->macsec_csindex]; in ieee802_1x_mka_decode_dist_sak_body()
1780 cs = ieee802_1x_kay_get_cipher_suite(participant, body->sak, in ieee802_1x_mka_decode_dist_sak_body()
1782 if (!cs) { in ieee802_1x_mka_decode_dist_sak_body()
[all …]
Dieee802_1x_secy_ops.h27 int secy_cp_control_current_cipher_suite(struct ieee802_1x_kay *kay, u64 cs);
Dieee802_1x_secy_ops.c108 int secy_cp_control_current_cipher_suite(struct ieee802_1x_kay *kay, u64 cs) in secy_cp_control_current_cipher_suite() argument
124 return ops->set_current_cipher_suite(ops->ctx, cs); in secy_cp_control_current_cipher_suite()
Dieee802_1x_kay.h148 int (*set_current_cipher_suite)(void *ctx, u64 cs);
Dieee802_1x_cp.c615 void ieee802_1x_cp_set_ciphersuite(void *cp_ctx, u64 cs) in ieee802_1x_cp_set_ciphersuite() argument
618 sm->cipher_suite = cs; in ieee802_1x_cp_set_ciphersuite()
/hostap-latest/wpa_supplicant/
Dwpas_kay.c65 static int wpas_set_current_cipher_suite(void *wpa_s, u64 cs) in wpas_set_current_cipher_suite() argument
67 return wpa_drv_set_current_cipher_suite(wpa_s, cs); in wpas_set_current_cipher_suite()
Ddriver_i.h818 u64 cs) in wpa_drv_set_current_cipher_suite() argument
822 return wpa_s->driver->set_current_cipher_suite(wpa_s->drv_priv, cs); in wpa_drv_set_current_cipher_suite()
DREADME844 Integrating with pcmcia-cs/cardmgr scripts
849 pcmcia-cs/cardmgr scripts (when using PC Cards). WPA handshake must be
853 For example, following small changes to pcmcia-cs scripts can be used
/hostap-latest/src/eap_peer/
Deap_pwd.c696 u32 cs; in eap_pwd_perform_confirm_exchange() local
721 ptr = (u8 *) &cs; in eap_pwd_perform_confirm_exchange()
786 eap_pwd_h_update(hash, (u8 *) &cs, sizeof(u32)); in eap_pwd_perform_confirm_exchange()
848 eap_pwd_h_update(hash, (u8 *) &cs, sizeof(u32)); in eap_pwd_perform_confirm_exchange()
856 &cs, data->msk, data->emsk, data->session_id) < 0) { in eap_pwd_perform_confirm_exchange()
/hostap-latest/src/crypto/
Dtls_openssl.c518 HCERTSTORE cs; in cryptoapi_find_cert() local
521 cs = CertOpenStore((LPCSTR) CERT_STORE_PROV_SYSTEM, 0, 0, in cryptoapi_find_cert()
524 if (cs == NULL) { in cryptoapi_find_cert()
532 ret = CertFindCertificateInStore(cs, X509_ASN_ENCODING | in cryptoapi_find_cert()
547 ret = CertFindCertificateInStore(cs, in cryptoapi_find_cert()
556 CertCloseStore(cs, 0); in cryptoapi_find_cert()
665 HCERTSTORE cs; in tls_cryptoapi_ca_cert() local
683 cs = CertOpenSystemStore(0, wstore); in tls_cryptoapi_ca_cert()
686 cs = CertOpenSystemStore(0, store); in tls_cryptoapi_ca_cert()
688 if (cs == NULL) { in tls_cryptoapi_ca_cert()
[all …]
/hostap-latest/src/eap_server/
Deap_server_pwd.c759 u32 cs; in eap_pwd_process_confirm_resp() local
776 ptr = (u8 *) &cs; in eap_pwd_process_confirm_resp()
837 eap_pwd_h_update(hash, (u8 *) &cs, sizeof(u32)); in eap_pwd_process_confirm_resp()
853 data->my_confirm, &cs, data->msk, data->emsk, in eap_pwd_process_confirm_resp()
/hostap-latest/src/ap/
Dwpa_auth_kay.c86 static int hapd_set_current_cipher_suite(void *priv, u64 cs) in hapd_set_current_cipher_suite() argument
92 return hapd->driver->set_current_cipher_suite(hapd->drv_priv, cs); in hapd_set_current_cipher_suite()
/hostap-latest/wpa_supplicant/doc/docbook/
Dwpa_supplicant.sgml722 <title>Interface to pcmcia-cs/cardmrg</title>
724 <para>For example, the following small changes to pcmcia-cs scripts