/hostap-latest/src/crypto/ |
D | sha256-internal.c | 81 static int sha256_compress(struct sha256_state *md, unsigned char *buf) in sha256_compress() argument 89 S[i] = md->state[i]; in sha256_compress() 117 md->state[i] = md->state[i] + S[i]; in sha256_compress() 124 void sha256_init(struct sha256_state *md) in sha256_init() argument 126 md->curlen = 0; in sha256_init() 127 md->length = 0; in sha256_init() 128 md->state[0] = 0x6A09E667UL; in sha256_init() 129 md->state[1] = 0xBB67AE85UL; in sha256_init() 130 md->state[2] = 0x3C6EF372UL; in sha256_init() 131 md->state[3] = 0xA54FF53AUL; in sha256_init() [all …]
|
D | sha512-internal.c | 107 static int sha512_compress(struct sha512_state *md, unsigned char *buf) in sha512_compress() argument 119 S[i] = md->state[i]; in sha512_compress() 148 md->state[i] = md->state[i] + S[i]; in sha512_compress() 161 void sha512_init(struct sha512_state *md) in sha512_init() argument 163 md->curlen = 0; in sha512_init() 164 md->length = 0; in sha512_init() 165 md->state[0] = CONST64(0x6a09e667f3bcc908); in sha512_init() 166 md->state[1] = CONST64(0xbb67ae8584caa73b); in sha512_init() 167 md->state[2] = CONST64(0x3c6ef372fe94f82b); in sha512_init() 168 md->state[3] = CONST64(0xa54ff53a5f1d36f1); in sha512_init() [all …]
|
D | sha384-internal.c | 52 void sha384_init(struct sha384_state *md) in sha384_init() argument 54 md->curlen = 0; in sha384_init() 55 md->length = 0; in sha384_init() 56 md->state[0] = CONST64(0xcbbb9d5dc1059ed8); in sha384_init() 57 md->state[1] = CONST64(0x629a292a367cd507); in sha384_init() 58 md->state[2] = CONST64(0x9159015a3070dd17); in sha384_init() 59 md->state[3] = CONST64(0x152fecd8f70e5939); in sha384_init() 60 md->state[4] = CONST64(0x67332667ffc00b31); in sha384_init() 61 md->state[5] = CONST64(0x8eb44a8768581511); in sha384_init() 62 md->state[6] = CONST64(0xdb0c2e0d64f98fa7); in sha384_init() [all …]
|
D | crypto_libtomcrypt.c | 27 hash_state md; in md4_vector() local 30 md4_init(&md); in md4_vector() 32 md4_process(&md, addr[i], len[i]); in md4_vector() 33 md4_done(&md, mac); in md4_vector() 62 hash_state md; in md5_vector() local 65 md5_init(&md); in md5_vector() 67 md5_process(&md, addr[i], len[i]); in md5_vector() 68 md5_done(&md, mac); in md5_vector() 75 hash_state md; in sha1_vector() local 78 sha1_init(&md); in sha1_vector() [all …]
|
D | sha384_i.h | 18 void sha384_init(struct sha384_state *md); 19 int sha384_process(struct sha384_state *md, const unsigned char *in, 21 int sha384_done(struct sha384_state *md, unsigned char *out);
|
D | sha256_i.h | 20 void sha256_init(struct sha256_state *md); 21 int sha256_process(struct sha256_state *md, const unsigned char *in, 23 int sha256_done(struct sha256_state *md, unsigned char *out);
|
D | sha512_i.h | 20 void sha512_init(struct sha512_state *md); 21 int sha512_process(struct sha512_state *md, const unsigned char *in, 23 int sha512_done(struct sha512_state *md, unsigned char *out);
|
D | tls_openssl_ocsp.c | 395 unsigned char md[EVP_MAX_MD_SIZE]; in issuer_match() local 407 if (!X509_NAME_digest(iname, dgst, md, &len)) in issuer_match() 412 if (!ASN1_OCTET_STRING_set(hash, md, len)) { in issuer_match() 431 !EVP_Digest(ikey->data, ikey->length, md, &len, dgst, NULL) || in issuer_match() 432 !ASN1_OCTET_STRING_set(hash, md, len)) { in issuer_match()
|
D | crypto_openssl.c | 1385 const EVP_MD *md; in crypto_hash_init() 1390 md = EVP_md5(); in crypto_hash_init() 1395 md = EVP_sha1(); in crypto_hash_init() 1401 md = EVP_sha256(); in crypto_hash_init() 1418 if (HMAC_Init_ex(ctx->ctx, key, key_len, md, NULL) != 1) { in crypto_hash_init()
|
/hostap-latest/hs20/server/ca/ |
D | setup.sh | 107 …$OPENSSL ca -config openssl.cnf.tmp -md sha256 -create_serial -out rootCA/cacert.pem -days 10957 -… 128 …$OPENSSL ca -config openssl.cnf.tmp -md sha256 -create_serial -out demoCA/cacert.pem -days 3652 -b… 144 $OPENSSL ca -config $PWD/openssl.cnf.tmp -batch -md sha256 -keyfile demoCA/private/cakey.pem -passi… 152 $OPENSSL ca -config $PWD/openssl.cnf.tmp -batch -md sha256 -in server-revoked.csr -out server-revok… 162 $OPENSSL ca -config $PWD/openssl.cnf.tmp -batch -md sha256 -in server-client.csr -out server-client… 170 $OPENSSL ca -config $PWD/openssl.cnf.tmp -batch -md sha256 -in user.csr -out user.pem -key $PASS -d… 188 $OPENSSL ca -config $PWD/openssl.cnf.tmp -batch -md sha256 -in server.csr -out server.pem -key $PAS… 200 $OPENSSL ca -config $PWD/my-openssl.cnf -gencrl -md sha256 -out demoCA/crl/crl.pem -passin pass:$PA…
|
/hostap-latest/tests/ |
D | test-sha1.c | 22 u8 md[20], hash[20]; in cavp_shavs() local 82 if (hexstr2bin(pos, md, 20) < 0) { in cavp_shavs() 91 os_memcmp(hash, md, 20) != 0) in cavp_shavs()
|
D | test-sha256.c | 22 u8 md[32], hash[32]; in cavp_shavs() local 82 if (hexstr2bin(pos, md, 32) < 0) { in cavp_shavs() 91 os_memcmp(hash, md, 32) != 0) in cavp_shavs()
|
/hostap-latest/tests/hwsim/auth_serv/ |
D | ica-generate.sh | 16 $OPENSSL ca -config openssl.cnf.tmp -md sha256 -create_serial -out iCA-server/cacert.pem -days 3652… 31 $OPENSSL ca -config openssl.cnf.tmp -md sha256 -create_serial -out iCA-user/cacert.pem -days 3652 -… 45 …reate_serial -in iCA-server/server.req -out iCA-server/server.pem -extensions ext_server -md sha256 59 … iCA-server/server-revoked.req -out iCA-server/server-revoked.pem -extensions ext_server -md sha256 74 …t.pem -create_serial -in iCA-user/user.req -out iCA-user/user.pem -extensions ext_client -md sha256
|
D | rsa3072-generate.sh | 44 …e_serial -in rsa3072-server.req -out rsa3072-server.pem -extensions ext_server -days 730 -md sha384 59 …reate_serial -in rsa3072-user.req -out rsa3072-user.pem -extensions ext_client -days 730 -md sha384 74 … rsa3072-user-rsa2048.req -out rsa3072-user-rsa2048.pem -extensions ext_client -days 730 -md sha384
|
D | sha512-generate.sh | 41 …a.pem -create_serial -in sha384-server.req -out sha384-server.pem -extensions ext_server -md sha384 65 …12-ca.pem -create_serial -in sha384-user.req -out sha384-user.pem -extensions ext_client -md sha384
|
D | ec2-generate.sh | 58 …a.pem -create_serial -in ec2-user-p256.req -out ec2-user-p256.pem -extensions ext_client -md sha256
|
/hostap-latest/wpa_supplicant/ |
D | sme.h | 19 int sme_update_ft_ies(struct wpa_supplicant *wpa_s, const u8 *md, 59 static inline int sme_update_ft_ies(struct wpa_supplicant *wpa_s, const u8 *md, in sme_update_ft_ies() argument
|
D | sme.c | 561 const u8 *md = NULL; in sme_send_authentication() local 799 md = ie + 2; in sme_send_authentication() 801 if (md && (!wpa_key_mgmt_ft(ssid->key_mgmt) || in sme_send_authentication() 803 md = NULL; in sme_send_authentication() 804 if (md) { in sme_send_authentication() 809 if (md) { in sme_send_authentication() 811 md[0], md[1]); in sme_send_authentication() 822 os_memcpy(mdie->mobility_domain, md, in sme_send_authentication() 824 mdie->ft_capab = md[MOBILITY_DOMAIN_ID_LEN]; in sme_send_authentication() 829 os_memcmp(md, wpa_s->sme.mobility_domain, 2) == 0 && in sme_send_authentication() [all …]
|
D | wpas_glue.c | 686 static int wpa_supplicant_update_ft_ies(void *ctx, const u8 *md, in wpa_supplicant_update_ft_ies() argument 691 return sme_update_ft_ies(wpa_s, md, ies, ies_len); in wpa_supplicant_update_ft_ies() 692 return wpa_drv_update_ft_ies(wpa_s, md, ies, ies_len); in wpa_supplicant_update_ft_ies()
|
D | driver_i.h | 336 const u8 *md, in wpa_drv_update_ft_ies() argument 340 return wpa_s->driver->update_ft_ies(wpa_s->drv_priv, md, in wpa_drv_update_ft_ies()
|
D | wpa_supplicant.c | 3724 const u8 *md = mdie + 2; in wpas_populate_assoc_ies() local 3727 if (os_memcmp(md, wpa_md, in wpas_populate_assoc_ies() 3737 wpa_sm_has_ft_keys(wpa_s->wpa, md)) { in wpas_populate_assoc_ies() 4132 const u8 *ie, *md = NULL; in wpas_start_assoc_cb() local 4145 md = ie + 2; in wpas_start_assoc_cb() 4147 if (md) { in wpas_start_assoc_cb()
|
/hostap-latest/src/rsn_supp/ |
D | wpa.h | 56 int (*update_ft_ies)(void *ctx, const u8 *md, const u8 *ies, 260 bool wpa_sm_has_ft_keys(struct wpa_sm *sm, const u8 *md); 647 struct wpabuf * fils_build_auth(struct wpa_sm *sm, int dh_group, const u8 *md);
|
D | wpa_i.h | 345 static inline int wpa_sm_update_ft_ies(struct wpa_sm *sm, const u8 *md, in wpa_sm_update_ft_ies() argument 349 return sm->ctx->update_ft_ies(sm->ctx->ctx, md, ies, ies_len); in wpa_sm_update_ft_ies()
|
D | wpa.c | 5598 bool wpa_sm_has_ft_keys(struct wpa_sm *sm, const u8 *md) in wpa_sm_has_ft_keys() argument 5603 os_memcmp(md, sm->key_mobility_domain, in wpa_sm_has_ft_keys() 5793 struct wpabuf * fils_build_auth(struct wpa_sm *sm, int dh_group, const u8 *md) in fils_build_auth() argument 5873 if (md) { in fils_build_auth() 5880 os_memcpy(mdie->mobility_domain, md, MOBILITY_DOMAIN_ID_LEN); in fils_build_auth()
|
/hostap-latest/tests/hwsim/ |
D | test_ap_eap.py | 4933 def ica_ocsp(cert, md="-sha256"): argument 4941 arg = ["openssl", "ocsp", "-reqout", fn2, "-issuer", ca, md, 4964 def run_ap_wpa2_eap_tls_intermediate_ca_ocsp(dev, apdev, params, md): argument 4969 fn = ica_ocsp("server.pem", md) 4999 def run_ap_wpa2_eap_tls_intermediate_ca_ocsp_revoked(dev, apdev, params, md): argument 5005 fn = ica_ocsp("server-revoked.pem", md)
|