/hostap-latest/src/tls/ |
D | tlsv1_cred.c | 111 unsigned char *der; in tlsv1_add_cert() local 133 der = hostap_base64_decode((const char *) pos, end - pos, &der_len); in tlsv1_add_cert() 134 if (der == NULL) { in tlsv1_add_cert() 140 if (tlsv1_add_cert_der(chain, der, der_len) < 0) { in tlsv1_add_cert() 143 os_free(der); in tlsv1_add_cert() 147 os_free(der); in tlsv1_add_cert() 269 unsigned char *der; in tlsv1_set_key_pem() local 296 der = hostap_base64_decode((const char *) pos, end - pos, &der_len); in tlsv1_set_key_pem() 297 if (!der) in tlsv1_set_key_pem() 299 pkey = crypto_private_key_import(der, der_len, NULL); in tlsv1_set_key_pem() [all …]
|
/hostap-latest/tests/hwsim/auth_serv/ |
D | update.sh | 27 …new -newkey rsa:2048 -nodes -keyout ca-incorrect-key.pem -out ca-incorrect.der -outform DER -days … 28 $OPENSSL x509 -in ca-incorrect.der -inform DER -out ca-incorrect.pem -outform PEM -text 33 …f.tmp -batch -x509 -new -newkey rsa:2048 -nodes -keyout ca-key.pem -out ca.der -outform DER -days … 34 $OPENSSL x509 -in ca.der -inform DER -out ca.pem -outform PEM -text 155 …Afile test-ca/cacert.pem -issuer test-ca/cacert.pem -cert server.pem -reqout ocsp-req.der -no_nonce 156 …/cakey.pem -CA test-ca/cacert.pem -resp_no_certs -reqin ocsp-req.der -respout ocsp-server-cache.der 157 SIZ=`ls -l ocsp-server-cache.der | cut -f5 -d' '` 158 (echo -n 000; echo "obase=16;$SIZ" | bc) | xxd -r -ps > ocsp-multi-server-cache.der 159 cat ocsp-server-cache.der >> ocsp-multi-server-cache.der 169 $OPENSSL x509 -in server.pem -out server.der -outform DER [all …]
|
D | as2.conf | 14 ocsp_stapling_response=LOGDIR/ocsp-server-cache.der 15 ocsp_stapling_response_multi=auth_serv/ocsp-multi-server-cache.der
|
D | as.conf | 14 ocsp_stapling_response=LOGDIR/ocsp-server-cache.der 15 ocsp_stapling_response_multi=auth_serv/ocsp-multi-server-cache.der
|
/hostap-latest/hostapd/ |
D | sae_pk_gen.c | 19 char *der = NULL; in main() local 59 der = os_readfile(argv[1], &der_len); in main() 60 if (!der) { in main() 66 key = crypto_ec_key_parse_priv((u8 *) der, der_len); in main() 134 b64 = hostap_base64_encode(der, der_len, NULL); in main() 186 os_free(der); in main()
|
/hostap-latest/hs20/server/ca/ |
D | clean.sh | 11 rm -f ca.pem logo.asn1 logo.der server.der ocsp-server-cache.der
|
D | setup.sh | 108 …$OPENSSL x509 -in rootCA/cacert.pem -out rootCA/cacert.der -outform DER || fail "Failed to create … 109 …sha256sum rootCA/cacert.der > rootCA/cacert.fingerprint || fail "Failed to create rootCA fingerpri… 131 …$OPENSSL x509 -in demoCA/cacert.pem -out demoCA/cacert.der -outform DER || fail "Failed to create … 132 …sha256sum demoCA/cacert.der > demoCA/cacert.fingerprint || fail "Failed to create demoCA fingerpri… 191 $OPENSSL x509 -in server.pem -out server.der -outform DER 192 openssl asn1parse -in server.der -inform DER | grep HEX | tail -1 | sed 's/.*://' | xxd -r -p > log… 193 openssl asn1parse -in logo.der -inform DER > logo.asn1
|
D | est-csrattrs.sh | 3 openssl asn1parse -genconf est-csrattrs.cnf -out est-csrattrs.der -oid hs20.oid 4 base64 est-csrattrs.der > est-attrs.b64
|
D | ocsp-update-cache.sh | 11 -respout ocsp-server-cache.der
|
/hostap-latest/tests/hwsim/ |
D | start.sh | 157 -reqin $DIR/auth_serv/ocsp-req.der \ 158 -respout $LOGDIR/ocsp-server-cache.der > $LOGDIR/ocsp.log 2>&1 159 if [ ! -r $LOGDIR/ocsp-server-cache.der ]; then 160 cp $DIR/auth_serv/ocsp-server-cache.der $LOGDIR/ocsp-server-cache.der
|
D | test_sigma_dut.py | 656 der = f.read() 657 hash = hashlib.sha256(der).digest() 4617 der = f.read() 4618 hash = hashlib.sha256(der).digest() 4680 der = f.read() 4681 hash = hashlib.sha256(der).digest() 4752 der = f.read() 4753 hash = hashlib.sha256(der).digest()
|
/hostap-latest/src/common/ |
D | sae_pk.c | 458 unsigned char *der; in sae_parse_pk() local 491 der = hostap_base64_decode(pos, b_len, &der_len); in sae_parse_pk() 492 if (!der) { in sae_parse_pk() 497 pk->key = crypto_ec_key_parse_priv(der, der_len); in sae_parse_pk() 498 bin_clear_free(der, der_len); in sae_parse_pk() 508 der = hostap_base64_decode(pos2, os_strlen(pos2), &der_len); in sae_parse_pk() 509 if (!der) { in sae_parse_pk() 515 pk->sign_key_override = crypto_ec_key_parse_priv(der, der_len); in sae_parse_pk() 516 bin_clear_free(der, der_len); in sae_parse_pk()
|
D | dpp_crypto.c | 82 struct wpabuf *der = NULL; in dpp_debug_print_key() local 86 der = crypto_ec_key_get_ecprivate_key(key, true); in dpp_debug_print_key() 87 if (der) { in dpp_debug_print_key() 88 wpa_hexdump_buf_key(MSG_DEBUG, "DPP: ECPrivateKey", der); in dpp_debug_print_key() 90 der = crypto_ec_key_get_subject_public_key(key); in dpp_debug_print_key() 91 if (der) in dpp_debug_print_key() 92 wpa_hexdump_buf_key(MSG_DEBUG, "DPP: EC_PUBKEY", der); in dpp_debug_print_key() 95 wpabuf_clear_free(der); in dpp_debug_print_key() 317 struct wpabuf *der; in dpp_bootstrap_key_hash() local 320 der = crypto_ec_key_get_subject_public_key(bi->pubkey); in dpp_bootstrap_key_hash() [all …]
|
/hostap-latest/wpa_supplicant/wpa_gui-qt4/lang/ |
D | wpa_gui_de.ts | 34 <translation>Fehler beim hinzufügen der Schnittstelle.</translation> 39 <translation>Fehler beim hinzufügen der Schnittstelle in die Registry.</translation> 317 <translation>Aktivieren des Netzwerks in der wpa_supplicant 326 der Konfiguration entfernen. Möchtest du 343 <translation>Entfernen des Netzwerks aus der wpa_supplicant 572 <translation>Fehler beim erkennen der AP Konfiguration.</translation> 1071 <translation>Wähle ein Netzwerk aus der Liste zum bearbeiten. 1085 <translation>Wähle ein Netzwerk aus der Liste zum entfernen. 1091 <translation>Speichern der Konfiguration fehlgeschlagen</translation> 1167 <translation> wird weiterhin in der System Ablage laufen.</translation> [all …]
|
/hostap-latest/hs20/server/ |
D | sql-example.txt | 4 …xample.com','trust_root_cert_url','https://osu-server.osu.example.com/hs20/files/spp-root-ca.der'); 6 …le.com','aaa_trust_root_cert_url','https://osu-server.osu.example.com/hs20/files/aaa-root-ca.der');
|
D | hs20-osu-server.txt | 200 ocsp_stapling_response=/home/user/hs20-server/ca/ocsp-server-cache.der
|
/hostap-latest/src/crypto/ |
D | crypto_openssl.c | 3008 struct crypto_ec_key * crypto_ec_key_parse_priv(const u8 *der, size_t der_len) in crypto_ec_key_parse_priv() argument 3020 OSSL_DECODER_from_data(ctx, &der, &der_len) != 1) { in crypto_ec_key_parse_priv() 3038 eckey = d2i_ECPrivateKey(NULL, &der, der_len); in crypto_ec_key_parse_priv() 3195 struct crypto_ec_key * crypto_ec_key_parse_pub(const u8 *der, size_t der_len) in crypto_ec_key_parse_pub() argument 3199 pkey = d2i_PUBKEY(NULL, &der, der_len); in crypto_ec_key_parse_pub() 3563 unsigned char *der = NULL; in crypto_ec_key_get_subject_public_key() local 3596 der = OPENSSL_malloc(len); in crypto_ec_key_get_subject_public_key() 3597 if (!der) in crypto_ec_key_get_subject_public_key() 3600 der, len, ctx); in crypto_ec_key_get_subject_public_key() 3603 pubkey->pub_key->data = der; in crypto_ec_key_get_subject_public_key() [all …]
|
D | crypto_wolfssl.c | 2337 struct crypto_ec_key * crypto_ec_key_parse_priv(const u8 *der, size_t der_len) in crypto_ec_key_parse_priv() argument 2349 err = wc_EccPrivateKeyDecode(der, &idx, ret->eckey, (word32) der_len); in crypto_ec_key_parse_priv() 2490 struct crypto_ec_key * crypto_ec_key_parse_pub(const u8 *der, size_t der_len) in crypto_ec_key_parse_pub() argument 2502 err = wc_EccPublicKeyDecode(der, &idx, ret->eckey, (word32) der_len); in crypto_ec_key_parse_pub() 2911 u8 *der = NULL; in crypto_ec_key_get_public_key() local 2925 der = os_malloc(der_len); in crypto_ec_key_get_public_key() 2926 if (!der) { in crypto_ec_key_get_public_key() 2931 err = wc_ecc_export_x963(key->eckey, der, &der_len); in crypto_ec_key_get_public_key() 2937 err = wc_ecc_export_x963(key->eckey, der, &der_len); in crypto_ec_key_get_public_key() 2950 err = wc_ecc_import_point_der(der, der_len, key->eckey->idx, point); in crypto_ec_key_get_public_key() [all …]
|
D | crypto.h | 1013 struct crypto_ec_key * crypto_ec_key_parse_priv(const u8 *der, size_t der_len); 1031 struct crypto_ec_key * crypto_ec_key_parse_pub(const u8 *der, size_t der_len);
|
D | crypto_mbedtls_alt.c | 2377 struct crypto_ec_key *crypto_ec_key_parse_priv(const u8 *der, size_t der_len) in crypto_ec_key_parse_priv() argument 2384 if (mbedtls_pk_parse_key(ctx, der, der_len, NULL, 0) == 0) in crypto_ec_key_parse_priv() 2386 if (mbedtls_pk_parse_key(ctx, der, der_len, NULL, 0, hostap_rng_fn, hostap_rng_ctx()) == 0) in crypto_ec_key_parse_priv() 2397 static int crypto_mbedtls_pk_parse_subpubkey_compressed(mbedtls_pk_context *ctx, const u8 *der, siz… in crypto_mbedtls_pk_parse_subpubkey_compressed() argument 2408 const unsigned char *end = der + der_len; in crypto_mbedtls_pk_parse_subpubkey_compressed() 2410 *(const unsigned char **)&p = der; in crypto_mbedtls_pk_parse_subpubkey_compressed() 2505 struct crypto_ec_key *crypto_ec_key_parse_pub(const u8 *der, size_t der_len) in crypto_ec_key_parse_pub() argument 2512 int rc = mbedtls_pk_parse_public_key(ctx, der, der_len); in crypto_ec_key_parse_pub() 2519 rc = crypto_mbedtls_pk_parse_subpubkey_compressed(ctx, der, der_len); in crypto_ec_key_parse_pub()
|
/hostap-latest/hs20/server/www/ |
D | est.php | 201 $der = file_get_contents($cert_der); variable 202 $fingerprint = hash("sha256", $der);
|
/hostap-latest/hs20/client/ |
D | osu_client.c | 222 char *der, *pem; in process_est_cert() local 240 der = os_readfile("Cert/est_cert.der", &der_len); in process_est_cert() 241 if (der == NULL) { in process_est_cert() 247 if (sha256_vector(1, (const u8 **) &der, &der_len, digest2) < 0) { in process_est_cert() 248 os_free(der); in process_est_cert() 251 os_free(der); in process_est_cert()
|