Home
last modified time | relevance | path

Searched refs:digest (Results 1 – 25 of 26) sorted by relevance

12

/hostap-latest/src/crypto/
Dfips_prf_wolfssl.c22 sha.digest[0] = state[0]; in sha1_transform()
23 sha.digest[1] = state[1]; in sha1_transform()
24 sha.digest[2] = state[2]; in sha1_transform()
25 sha.digest[3] = state[3]; in sha1_transform()
26 sha.digest[4] = state[4]; in sha1_transform()
28 state[0] = sha.digest[0]; in sha1_transform()
29 state[1] = sha.digest[1]; in sha1_transform()
30 state[2] = sha.digest[2]; in sha1_transform()
31 state[3] = sha.digest[3]; in sha1_transform()
32 state[4] = sha.digest[4]; in sha1_transform()
Dsha1-pbkdf2.c16 u8 *digest) in pbkdf2_sha1_f() argument
43 os_memcpy(digest, tmp, SHA1_MAC_LEN); in pbkdf2_sha1_f()
51 digest[j] ^= tmp2[j]; in pbkdf2_sha1_f()
80 unsigned char digest[SHA1_MAC_LEN]; in pbkdf2_sha1() local
85 count, digest)) in pbkdf2_sha1()
88 os_memcpy(pos, digest, plen); in pbkdf2_sha1()
92 forced_memzero(digest, SHA1_MAC_LEN); in pbkdf2_sha1()
Dmd4-internal.c26 static void MD4Final(unsigned char digest[MD4_DIGEST_LENGTH], MD4_CTX *ctx);
168 static void MD4Final(unsigned char digest[MD4_DIGEST_LENGTH], MD4_CTX *ctx) in MD4Final()
173 if (digest != NULL) { in MD4Final()
175 PUT_32BIT_LE(digest + i * 4, ctx->state[i]); in MD4Final()
Dms_funcs.c396 u8 digest[SHA1_MAC_LEN]; in get_asymetric_start_key() local
409 if (sha1_vector(4, addr, len, digest)) in get_asymetric_start_key()
414 os_memcpy(session_key, digest, session_key_len); in get_asymetric_start_key()
Dmd5_i.h21 void MD5Final(unsigned char digest[16], struct MD5Context *context);
Dsha1_i.h20 void SHA1Final(unsigned char digest[20], struct SHA1Context *context);
Dmd5-internal.c150 void MD5Final(unsigned char digest[16], struct MD5Context *ctx) in MD5Final()
187 os_memcpy(digest, ctx->buf, 16); in MD5Final()
Dsha1-internal.c278 void SHA1Final(unsigned char digest[20], SHA1_CTX* context) in SHA1Final()
295 digest[i] = (unsigned char) in SHA1Final()
Dcrypto_nettle.c66 alg->digest(ctx, alg->digest_size, mac); in nettle_digest_vector()
Dtls_openssl.c4358 int cipher, digest; in openssl_get_keyblock_size()
4367 digest = SSL_CIPHER_get_digest_nid(ssl_cipher); in openssl_get_keyblock_size()
4369 cipher, digest); in openssl_get_keyblock_size()
4370 if (cipher < 0 || digest < 0) in openssl_get_keyblock_size()
4385 if (digest == NID_undef) { in openssl_get_keyblock_size()
4389 h = EVP_get_digestbynid(digest); in openssl_get_keyblock_size()
Dcrypto_mbedtls_alt.c2998 unsigned char digest[MBEDTLS_MD_MAX_SIZE]; in crypto_csr_verify() local
3001 mbedtls_md(md_info, csr->cri.p, csr->cri.len, digest) == 0) in crypto_csr_verify()
3003 …switch (mbedtls_pk_verify(&csr->pk, csr->MBEDTLS_PRIVATE(sig_md), digest, mbedtls_md_get_size(md_i… in crypto_csr_verify()
Dcrypto_openssl.c1520 static int openssl_hmac_vector(char *digest, const u8 *key, in openssl_hmac_vector() argument
1538 params[0] = OSSL_PARAM_construct_utf8_string("digest", digest, 0); in openssl_hmac_vector()
/hostap-latest/src/eap_common/
Deap_pwd_common.c37 void eap_pwd_h_final(struct crypto_hash *hash, u8 *digest) in eap_pwd_h_final() argument
40 crypto_hash_finish(hash, digest, &len); in eap_pwd_h_final()
49 u8 digest[SHA256_MAC_LEN]; in eap_pwd_kdf() local
64 crypto_hash_update(hash, digest, SHA256_MAC_LEN); in eap_pwd_kdf()
69 if (crypto_hash_finish(hash, digest, &mdlen) < 0) in eap_pwd_kdf()
72 os_memcpy(result + len, digest, resultbytelen - len); in eap_pwd_kdf()
74 os_memcpy(result + len, digest, mdlen); in eap_pwd_kdf()
Deap_pwd_common.h69 void eap_pwd_h_final(struct crypto_hash *hash, u8 *digest);
/hostap-latest/tests/hwsim/
Dradius_das.py29 + self.secret).digest()
46 + self.secret).digest()
Dtest_radius.py832 add_message_authenticator_attr(req, hmac_obj.digest())
1118 add_message_authenticator_attr(reply, hmac_obj.digest())
1197 b = hashlib.md5(secret + authenticator + a).digest()
1204 b = hashlib.md5(secret + cc).digest()
1533 add_message_authenticator_attr(req, hmac_obj.digest())
Dtest_ieee8021x.py270 sign = hmac_obj.digest()
Dtest_eap_proto.py77 def add_message_authenticator_attr(reply, digest): argument
78 if digest.startswith(b'0x'):
82 digest = b"0x" + binascii.hexlify(digest)
83 reply.AddAttribute("Message-Authenticator", digest)
99 add_message_authenticator_attr(reply, hmac_obj.digest())
6305 return hashlib.new('md4', pw).digest()
6308 return hashlib.new('md4', password_hash).digest()
6312 return hashlib.sha1(data).digest()[0:8]
6322 digest = hashlib.sha1(data).digest()
6326 data = digest + challenge + magic2
[all …]
Dtest_ap_wps.py6537 result += m.digest()
6550 return m.digest()[0:16]
6561 auth = m.digest()[0:8]
6566 kwa = m.digest()[0:8]
6601 calc_kwa = m.digest()[0:8]
6631 dhkey = hashlib.sha256(binascii.unhexlify(ss)).digest()
6635 kdk = m.digest()
6652 hash1 = m.digest()
6657 hash2 = m.digest()
7029 kwa = m.digest()[0:8]
[all …]
Dtest_fils.py630 hash = hashlib.sha256(realm.lower().encode()).digest()
643 hash = hashlib.sha256(realm.lower().encode()).digest()
Dtest_sigma_dut.py657 hash = hashlib.sha256(der).digest()
4618 hash = hashlib.sha256(der).digest()
4681 hash = hashlib.sha256(der).digest()
4753 hash = hashlib.sha256(der).digest()
Dtest_ap_psk.py1452 hash = m.digest()
1480 msg['rsn_key_mic'] = m.digest()[0:16]
Dtest_dpp.py1552 kid = base64.urlsafe_b64encode(hashlib.sha256(pubkey).digest()).decode().rstrip('=')
/hostap-latest/src/common/
Ddpp_crypto.c167 unsigned int iterations, unsigned int count, u8 *digest) in dpp_pbkdf2_f() argument
191 os_memcpy(digest, tmp, hash_len); in dpp_pbkdf2_f()
199 digest[j] ^= tmp2[j]; in dpp_pbkdf2_f()
213 unsigned char digest[DPP_MAX_HASH_LEN]; in dpp_pbkdf2() local
218 salt, salt_len, iterations, count, digest)) in dpp_pbkdf2()
221 os_memcpy(pos, digest, plen); in dpp_pbkdf2()
/hostap-latest/hostapd/
DChangeLog844 * added support for SHA-256 as X.509 certificate digest when using the

12