Home
last modified time | relevance | path

Searched refs:out (Results 1 – 25 of 185) sorted by relevance

12345678

/hostap-latest/tests/
Dtest-https.c76 struct wpabuf *in, *out, *appl; in https_client() local
96 out = tls_connection_handshake2(tls, conn, in, &appl, in https_client()
100 if (out == NULL) { in https_client()
112 (int) wpabuf_len(out)); in https_client()
113 if (send(s, wpabuf_head(out), wpabuf_len(out), 0) < 0) { in https_client()
117 wpabuf_free(out); in https_client()
118 out = NULL; in https_client()
125 wpabuf_free(out); in https_client()
126 out = NULL; in https_client()
138 out = tls_connection_encrypt(tls, conn, in); in https_client()
[all …]
Dtest-https_server.c82 struct wpabuf *in, *out, *appl; in https_server() local
117 out = tls_connection_server_handshake(tls, conn, in, &appl); in https_server()
120 if (!out) { in https_server()
127 (int) wpabuf_len(out)); in https_server()
128 if (send(s, wpabuf_head(out), wpabuf_len(out), 0) < 0) { in https_server()
132 wpabuf_free(out); in https_server()
133 out = NULL; in https_server()
141 wpabuf_free(out); in https_server()
142 out = NULL; in https_server()
155 out = tls_connection_decrypt2(tls, conn, in, &need_more_data); in https_server()
[all …]
/hostap-latest/tests/fuzzing/tls-server/
Dtls-server.c63 struct wpabuf *in = NULL, *out = NULL, *appl; in LLVMFuzzerTestOneInput() local
94 out = read_msg(&ctx); in LLVMFuzzerTestOneInput()
97 if (!out) in LLVMFuzzerTestOneInput()
102 out, &appl); in LLVMFuzzerTestOneInput()
103 wpabuf_free(out); in LLVMFuzzerTestOneInput()
104 out = NULL; in LLVMFuzzerTestOneInput()
120 wpabuf_free(out); in LLVMFuzzerTestOneInput()
121 out = read_msg(&ctx); in LLVMFuzzerTestOneInput()
124 if (!out) in LLVMFuzzerTestOneInput()
127 in = tls_connection_decrypt(tls_server, conn_server, out); in LLVMFuzzerTestOneInput()
[all …]
/hostap-latest/tests/hwsim/auth_serv/
Dupdate.sh14 openssl dhparam -out dh.conf 2048
27 …mp -batch -x509 -new -newkey rsa:2048 -nodes -keyout ca-incorrect-key.pem -out ca-incorrect.der -o…
28 $OPENSSL x509 -in ca-incorrect.der -inform DER -out ca-incorrect.pem -outform PEM -text
33 …nssl.cnf.tmp -batch -x509 -new -newkey rsa:2048 -nodes -keyout ca-key.pem -out ca.der -outform DER…
34 $OPENSSL x509 -in ca.der -inform DER -out ca.pem -outform PEM -text
40 $OPENSSL ca -config ca-openssl.cnf.tmp -gencrl -crldays 2922 -out crl.pem
42 faketime yesterday $OPENSSL ca -config ca-openssl.cnf.tmp -gencrl -crlhours 1 -out crl.pem
57 …ig openssl.cnf.tmp -batch -new -newkey rsa:2048 -nodes -keyout server.key -out server.csr -outform…
59 $OPENSSL ca -config $PWD/openssl.cnf.tmp -batch -in server.csr -out server.pem -extensions ext_serv…
61 $OPENSSL pkcs12 -export -out server.pkcs12 -in server.pem -inkey server.key -passout pass:
[all …]
Dec2-generate.sh16 $OPENSSL ecparam -out ec2-ca.key -name $CURVE -genkey
17 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -x509 -new -key ec2-ca.key -out ec2-ca.pem -outfo…
30 $OPENSSL ecparam -out ec2-server.key -name $CURVE -genkey
31 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -new -nodes -key ec2-server.key -out ec2-server.r…
32 …ch -keyfile ec2-ca.key -cert ec2-ca.pem -create_serial -in ec2-server.req -out ec2-server.pem -ext…
43 $OPENSSL ecparam -out ec2-user.key -name $CURVE -genkey
44 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -new -nodes -key ec2-user.key -out ec2-user.req -…
45 …atch -keyfile ec2-ca.key -cert ec2-ca.pem -create_serial -in ec2-user.req -out ec2-user.pem -exten…
56 $OPENSSL ecparam -out ec2-user-p256.key -name prime256v1 -genkey
57 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -new -nodes -key ec2-user-p256.key -out ec2-user-…
[all …]
Dec-generate.sh16 $OPENSSL ecparam -out ec-ca.key -name $CURVE -genkey
17 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -x509 -new -key ec-ca.key -out ec-ca.pem -outform…
30 $OPENSSL ecparam -out ec-server.key -name $CURVE -genkey
31 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -new -nodes -key ec-server.key -out ec-server.req…
32 …batch -keyfile ec-ca.key -cert ec-ca.pem -create_serial -in ec-server.req -out ec-server.pem -exte…
43 $OPENSSL ecparam -out ec-user.key -name $CURVE -genkey
44 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -new -nodes -key ec-user.key -out ec-user.req -ou…
45 … -batch -keyfile ec-ca.key -cert ec-ca.pem -create_serial -in ec-user.req -out ec-user.pem -extens…
Dsha512-generate.sh15 …l.cnf.tmp -batch -x509 -new -newkey rsa:4096 -nodes -keyout sha512-ca.key -out sha512-ca.pem -outf…
28 …ssl.cnf.tmp -batch -new -newkey rsa:3500 -nodes -keyout sha512-server.key -out sha512-server.req -…
29 …le sha512-ca.key -cert sha512-ca.pem -create_serial -in sha512-server.req -out sha512-server.pem -…
40 …ssl.cnf.tmp -batch -new -newkey rsa:3072 -nodes -keyout sha384-server.key -out sha384-server.req -…
41 …le sha512-ca.key -cert sha512-ca.pem -create_serial -in sha384-server.req -out sha384-server.pem -…
52 …enssl.cnf.tmp -batch -new -newkey rsa:3400 -nodes -keyout sha512-user.key -out sha512-user.req -ou…
53 …file sha512-ca.key -cert sha512-ca.pem -create_serial -in sha512-user.req -out sha512-user.pem -ex…
64 …enssl.cnf.tmp -batch -new -newkey rsa:2900 -nodes -keyout sha384-user.key -out sha384-user.req -ou…
65 …file sha512-ca.key -cert sha512-ca.pem -create_serial -in sha384-user.req -out sha384-user.pem -ex…
Drsa3072-generate.sh12 openssl dhparam -out dh_param_3072.pem 3072
26 ….cnf.tmp -batch -x509 -new -newkey rsa:3072 -nodes -keyout rsa3072-ca.key -out rsa3072-ca.pem -out…
42 …sl.cnf.tmp -batch -new -newkey rsa:3072 -nodes -keyout rsa3072-server.key -out rsa3072-server.req …
44 …rsa3072-ca.key -cert rsa3072-ca.pem -create_serial -in rsa3072-server.req -out rsa3072-server.pem …
57 …nssl.cnf.tmp -batch -new -newkey rsa:3072 -nodes -keyout rsa3072-user.key -out rsa3072-user.req -o…
59 …e rsa3072-ca.key -cert rsa3072-ca.pem -create_serial -in rsa3072-user.req -out rsa3072-user.pem -e…
72 ….tmp -batch -new -newkey rsa:2048 -nodes -keyout rsa3072-user-rsa2048.key -out rsa3072-user-rsa204…
74 …2-ca.key -cert rsa3072-ca.pem -create_serial -in rsa3072-user-rsa2048.req -out rsa3072-user-rsa204…
Dica-generate.sh15 … -batch -new -newkey rsa:2048 -nodes -keyout iCA-server/private/cakey.pem -out iCA-server/careq.pe…
16 $OPENSSL ca -config openssl.cnf.tmp -md sha256 -create_serial -out iCA-server/cacert.pem -days 3652…
30 …mp -batch -new -newkey rsa:2048 -nodes -keyout iCA-user/private/cakey.pem -out iCA-user/careq.pem …
31 $OPENSSL ca -config openssl.cnf.tmp -md sha256 -create_serial -out iCA-user/cacert.pem -days 3652 -…
44 …cnf.tmp -batch -new -newkey rsa:2048 -nodes -keyout iCA-server/server.key -out iCA-server/server.r…
45 ….pem -cert iCA-server/cacert.pem -create_serial -in iCA-server/server.req -out iCA-server/server.p…
58 …-batch -new -newkey rsa:2048 -nodes -keyout iCA-server/server-revoked.key -out iCA-server/server-r…
59 …rt iCA-server/cacert.pem -create_serial -in iCA-server/server-revoked.req -out iCA-server/server-r…
73 …ssl.cnf.tmp -batch -new -newkey rsa:2048 -nodes -keyout iCA-user/user.key -out iCA-user/user.req -…
74 …/cakey.pem -cert iCA-user/cacert.pem -create_serial -in iCA-user/user.req -out iCA-user/user.pem -…
/hostap-latest/src/crypto/
Dtls_openssl_ocsp.c221 static char * mem_bio_to_str(BIO *out) in DEFINE_STACK_OF()
227 rlen = BIO_ctrl_pending(out); in DEFINE_STACK_OF()
230 BIO_free(out); in DEFINE_STACK_OF()
234 res = BIO_read(out, txt, rlen); in DEFINE_STACK_OF()
235 BIO_free(out); in DEFINE_STACK_OF()
248 BIO *out; in generalizedtime_str() local
250 out = BIO_new(BIO_s_mem()); in generalizedtime_str()
251 if (!out) in generalizedtime_str()
254 if (!ASN1_GENERALIZEDTIME_print(out, t)) { in generalizedtime_str()
255 BIO_free(out); in generalizedtime_str()
[all …]
Dcrypto_internal-rsa.c74 u8 *out, size_t *outlen) in crypto_public_key_encrypt_pkcs1_v15() argument
77 0, in, inlen, out, outlen); in crypto_public_key_encrypt_pkcs1_v15()
83 u8 *out, size_t *outlen) in crypto_private_key_decrypt_pkcs1_v15() argument
86 in, inlen, out, outlen); in crypto_private_key_decrypt_pkcs1_v15()
92 u8 *out, size_t *outlen) in crypto_private_key_sign_pkcs1() argument
95 1, in, inlen, out, outlen); in crypto_private_key_sign_pkcs1()
Dtls_internal.c409 int skip_keyblock, u8 *out, size_t out_len) in tls_connection_prf() argument
413 u8 *_out = out; in tls_connection_prf()
440 os_memcpy(out, _out + skip, out_len); in tls_connection_prf()
449 size_t context_len, u8 *out, size_t out_len) in tls_connection_export_key() argument
452 0, 0, out, out_len); in tls_connection_export_key()
457 u8 *out, size_t out_len) in tls_connection_get_eap_fast_key() argument
460 1, 1, out, out_len); in tls_connection_get_eap_fast_key()
483 struct wpabuf *out; in tls_connection_handshake2() local
495 out = wpabuf_alloc_ext_data(res, res_len); in tls_connection_handshake2()
496 if (out == NULL) { in tls_connection_handshake2()
[all …]
Dtls_gnutls.c902 size_t context_len, u8 *out, size_t out_len) in tls_connection_export_key() argument
910 out_len, (char *) out); in tls_connection_export_key()
916 (char *) out); in tls_connection_export_key()
922 u8 *out, size_t out_len) in tls_connection_get_eap_fast_key() argument
1175 goto out; in tls_connection_verify_peer()
1190 goto out; in tls_connection_verify_peer()
1201 goto out; in tls_connection_verify_peer()
1213 goto out; in tls_connection_verify_peer()
1222 goto out; in tls_connection_verify_peer()
1230 goto out; in tls_connection_verify_peer()
[all …]
/hostap-latest/tests/fuzzing/tls-client/
Dtls-client.c63 struct wpabuf *in = NULL, *out = NULL, *appl; in LLVMFuzzerTestOneInput() local
88 out = tls_connection_handshake(tls_client, conn_client, in, in LLVMFuzzerTestOneInput()
92 if (!out) in LLVMFuzzerTestOneInput()
103 wpabuf_free(out); in LLVMFuzzerTestOneInput()
104 out = NULL; in LLVMFuzzerTestOneInput()
116 wpabuf_free(out); in LLVMFuzzerTestOneInput()
117 out = tls_connection_encrypt(tls_client, conn_client, in); in LLVMFuzzerTestOneInput()
120 if (!out) in LLVMFuzzerTestOneInput()
128 wpabuf_free(out); in LLVMFuzzerTestOneInput()
129 out = read_msg(&ctx); in LLVMFuzzerTestOneInput()
[all …]
/hostap-latest/src/drivers/
Ddriver_zephyr.c427 goto out; in wpa_drv_zep_abort_scan()
431 out: in wpa_drv_zep_abort_scan()
1112 goto out; in wpa_drv_zep_get_hw_feature_data()
1117 goto out; in wpa_drv_zep_get_hw_feature_data()
1152 out: in wpa_drv_zep_get_hw_feature_data()
1207 goto out; in wpa_drv_zep_init()
1212 goto out; in wpa_drv_zep_init()
1227 goto out; in wpa_drv_zep_init()
1258 goto out; in wpa_drv_zep_init()
1265 out: in wpa_drv_zep_init()
[all …]
/hostap-latest/src/utils/
Dhttp_curl.c182 BIO *out; in debug_dump_cert() local
186 out = BIO_new(BIO_s_mem()); in debug_dump_cert()
187 if (!out) in debug_dump_cert()
190 X509_print_ex(out, cert, XN_FLAG_COMPAT, X509_FLAG_COMPAT); in debug_dump_cert()
191 rlen = BIO_ctrl_pending(out); in debug_dump_cert()
194 int res = BIO_read(out, txt, rlen); in debug_dump_cert()
201 BIO_free(out); in debug_dump_cert()
584 static void i2r_HashAlgAndValue(HashAlgAndValue *hash, BIO *out, int indent) in i2r_HashAlgAndValue() argument
589 BIO_printf(out, "%*shashAlg: ", indent, ""); in i2r_HashAlgAndValue()
590 i2a_ASN1_OBJECT(out, hash->hashAlg->algorithm); in i2r_HashAlgAndValue()
[all …]
Dbase64.c29 char *out, *pos; in base64_gen_encode() local
42 out = os_malloc(olen); in base64_gen_encode()
43 if (out == NULL) in base64_gen_encode()
48 pos = out; in base64_gen_encode()
84 *out_len = pos - out; in base64_gen_encode()
85 return out; in base64_gen_encode()
92 unsigned char dtable[256], *out, *pos, block[4], tmp; in base64_gen_decode() local
113 pos = out = os_malloc(olen); in base64_gen_decode()
114 if (out == NULL) in base64_gen_decode()
145 os_free(out); in base64_gen_decode()
[all …]
/hostap-latest/src/tls/
Dpkcs1.c20 u8 *out, size_t *outlen) in pkcs1_generate_encryption_block() argument
44 pos = out; in pkcs1_generate_encryption_block()
83 u8 *out, size_t *outlen) in pkcs1_encrypt() argument
90 out, outlen) < 0) in pkcs1_encrypt()
93 return crypto_rsa_exptmod(out, modlen, out, outlen, key, use_private); in pkcs1_encrypt()
99 u8 *out, size_t *outlen) in pkcs1_v15_private_key_decrypt() argument
104 res = crypto_rsa_exptmod(in, inlen, out, outlen, key, 1); in pkcs1_v15_private_key_decrypt()
108 if (*outlen < 2 || out[0] != 0 || out[1] != 2) in pkcs1_v15_private_key_decrypt()
112 pos = out + 2; in pkcs1_v15_private_key_decrypt()
113 end = out + *outlen; in pkcs1_v15_private_key_decrypt()
[all …]
/hostap-latest/hs20/server/ca/
Dsetup.sh105 …ssl.cnf.tmp -batch -new -newkey rsa:4096 -keyout rootCA/private/cakey.pem -out rootCA/careq.pem ||…
107 …$OPENSSL ca -config openssl.cnf.tmp -md sha256 -create_serial -out rootCA/cacert.pem -days 10957 -…
108 …$OPENSSL x509 -in rootCA/cacert.pem -out rootCA/cacert.der -outform DER || fail "Failed to create …
126 …ssl.cnf.tmp -batch -new -newkey rsa:2048 -keyout demoCA/private/cakey.pem -out demoCA/careq.pem ||…
128 …$OPENSSL ca -config openssl.cnf.tmp -md sha256 -create_serial -out demoCA/cacert.pem -days 3652 -b…
130 openssl rsa -in demoCA/private/cakey.pem -out demoCA/private/cakey-plain.pem -passin pass:$PASS
131 …$OPENSSL x509 -in demoCA/cacert.pem -out demoCA/cacert.der -outform DER || fail "Failed to create …
143 $OPENSSL req -config $PWD/openssl.cnf.tmp -batch -new -newkey rsa:2048 -nodes -out ocsp.csr -keyout…
144 … sha256 -keyfile demoCA/private/cakey.pem -passin pass:$PASS -in ocsp.csr -out ocsp.pem -days 730 …
151 $OPENSSL req -config $PWD/openssl.cnf.tmp -batch -new -newkey rsa:2048 -nodes -out server-revoked.c…
[all …]
/hostap-latest/wpa_supplicant/
Dmain.c229 goto out; in main()
251 goto out; in main()
264 goto out; in main()
307 goto out; in main()
318 goto out; in main()
330 goto out; in main()
338 goto out; in main()
347 goto out; in main()
356 goto out; in main()
399 out: in main()
/hostap-latest/src/radius/
Dradius_client.c386 struct wpabuf *out = NULL; in radius_client_retransmit() local
509 out = tls_connection_encrypt(radius->tls_ctx, conn, buf); in radius_client_retransmit()
510 if (!out) { in radius_client_retransmit()
517 wpabuf_len(buf), wpabuf_len(out)); in radius_client_retransmit()
518 buf = out; in radius_client_retransmit()
528 wpabuf_free(out); in radius_client_retransmit()
534 wpabuf_free(out); in radius_client_retransmit()
857 struct wpabuf *out = NULL; in radius_client_send() local
927 out = tls_connection_encrypt(radius->tls_ctx, conn, buf); in radius_client_send()
928 if (!out) { in radius_client_send()
[all …]
/hostap-latest/src/ap/
Dieee802_11_eht.c532 goto out; in hostapd_eid_eht_basic_ml_common()
631 out: in hostapd_eid_eht_basic_ml_common()
968 goto out; in auth_skip_fixed_fields()
991 out: in auth_skip_fixed_fields()
1090 goto out; in hostapd_process_ml_assoc_req_addr()
1097 goto out; in hostapd_process_ml_assoc_req_addr()
1105 goto out; in hostapd_process_ml_assoc_req_addr()
1111 goto out; in hostapd_process_ml_assoc_req_addr()
1117 goto out; in hostapd_process_ml_assoc_req_addr()
1128 goto out; in hostapd_process_ml_assoc_req_addr()
[all …]
/hostap-latest/src/eap_server/
Deap_server_tls_common.c119 u8 *out; in eap_server_tls_derive_key() local
121 out = os_malloc(len); in eap_server_tls_derive_key()
122 if (out == NULL) in eap_server_tls_derive_key()
126 context, context_len, out, len)) { in eap_server_tls_derive_key()
127 os_free(out); in eap_server_tls_derive_key()
131 return out; in eap_server_tls_derive_key()
153 u8 *out; in eap_server_tls_derive_session_id() local
186 out = os_malloc(*len); in eap_server_tls_derive_session_id()
187 if (out == NULL) in eap_server_tls_derive_session_id()
191 out[0] = eap_type; in eap_server_tls_derive_session_id()
[all …]
/hostap-latest/hs20/client/
Dest.c39 BIO *out = NULL; in pkcs7_to_cert() local
89 out = BIO_new(BIO_s_file()); in pkcs7_to_cert()
90 if (out == NULL || in pkcs7_to_cert()
91 BIO_write_filename(out, pem_file) <= 0) in pkcs7_to_cert()
96 X509_print(out, cert); in pkcs7_to_cert()
97 PEM_write_bio_X509(out, cert); in pkcs7_to_cert()
98 BIO_puts(out, "\n"); in pkcs7_to_cert()
111 if (out) in pkcs7_to_cert()
112 BIO_free_all(out); in pkcs7_to_cert()
376 BIO *out; in generate_csr() local
[all …]
/hostap-latest/tests/hwsim/
Dtest_wmediumd.py354 out = run_tshark(capfile, filt, ["wlan.rann.root_sta"])
355 if out is None:
357 if out.find(dev[2].own_addr()) == -1 or \
358 out.find(dev[0].own_addr()) > -1 or \
359 out.find(dev[1].own_addr()) > -1:
360 raise Exception("RANN should be sent by dev2 only:\n" + out)
367 out = run_tshark(capfile, filt, ["frame.time_relative"])
368 if out is None:
370 lines = out.splitlines()
384 out = run_tshark(capfile, filt, ["wlan.sa", "wlan.da"])
[all …]

12345678