/hostap-latest/src/crypto/ |
D | crypto_openssl.c | 97 static EC_KEY * EVP_PKEY_get0_EC_KEY(EVP_PKEY *pkey) in EVP_PKEY_get0_EC_KEY() argument 99 if (pkey->type != EVP_PKEY_EC) in EVP_PKEY_get0_EC_KEY() 101 return pkey->pkey.ec; in EVP_PKEY_get0_EC_KEY() 331 u8 pkey[8], next, tmp; in des_encrypt() local 341 pkey[i] = (tmp >> i) | next | 1; in des_encrypt() 344 pkey[i] = next | 1; in des_encrypt() 348 EVP_EncryptInit_ex(ctx, EVP_des_ecb(), NULL, pkey, NULL) == 1 && in des_encrypt() 1019 EVP_PKEY *pkey = NULL; in dh5_init() 1039 EVP_PKEY_generate(gctx, &pkey) != 1 || in dh5_init() 1040 EVP_PKEY_get_bn_param(pkey, OSSL_PKEY_PARAM_PRIV_KEY, in dh5_init() [all …]
|
D | des-internal.c | 401 u8 pkey[8], next, tmp; in des_encrypt() local 409 pkey[i] = (tmp >> i) | next | 1; in des_encrypt() 412 pkey[i] = next | 1; in des_encrypt() 414 deskey(pkey, 0, ek); in des_encrypt() 422 os_memset(pkey, 0, sizeof(pkey)); in des_encrypt()
|
D | tls_openssl.c | 635 pub_rsa = cert->cert_info->key->pkey->pkey.rsa; in tls_cryptoapi_cert() 3583 EVP_PKEY *pkey; in tls_parse_pkcs12() local 3589 pkey = NULL; in tls_parse_pkcs12() 3594 if (!PKCS12_parse(p12, passwd, &pkey, &cert, &certs)) { in tls_parse_pkcs12() 3617 if (pkey) { in tls_parse_pkcs12() 3620 if (SSL_use_PrivateKey(ssl, pkey) != 1) in tls_parse_pkcs12() 3623 if (SSL_CTX_use_PrivateKey(data->ssl, pkey) != 1) in tls_parse_pkcs12() 3626 EVP_PKEY_free(pkey); in tls_parse_pkcs12() 3914 EVP_PKEY *pkey; in tls_use_private_key_file() local 3921 pkey = d2i_PrivateKey_bio(bio, NULL); in tls_use_private_key_file() [all …]
|
D | crypto_nettle.c | 32 u8 pkey[8], next, tmp; in des_encrypt() local 39 pkey[i] = (tmp >> i) | next | 1; in des_encrypt() 42 pkey[i] = next | 1; in des_encrypt() 44 nettle_des_set_key(&ctx, pkey); in des_encrypt()
|
D | crypto_gnutls.c | 51 u8 pkey[8], next, tmp; in des_encrypt() local 58 pkey[i] = (tmp >> i) | next | 1; in des_encrypt() 61 pkey[i] = next | 1; in des_encrypt() 64 gcry_err_code(gcry_cipher_setkey(hd, pkey, 8)); in des_encrypt()
|
D | crypto_libtomcrypt.c | 40 u8 pkey[8], next, tmp; in des_encrypt() local 48 pkey[i] = (tmp >> i) | next | 1; in des_encrypt() 51 pkey[i] = next | 1; in des_encrypt() 53 des_setup(pkey, 8, 0, &skey); in des_encrypt()
|
D | crypto_linux.c | 609 u8 pkey[8], next, tmp; in des_encrypt() local 624 pkey[i] = (tmp >> i) | next | 1; in des_encrypt() 627 pkey[i] = next | 1; in des_encrypt() 629 skcipher = linux_af_alg_skcipher("ecb(des)", pkey, sizeof(pkey)); in des_encrypt()
|
D | crypto_mbedtls_alt.c | 778 u8 pkey[8], next, tmp; in des_encrypt() local 786 pkey[i] = (tmp >> i) | next | 1; in des_encrypt() 789 pkey[i] = next | 1; in des_encrypt() 793 …int ret = mbedtls_des_setkey_enc(&des, pkey) || mbedtls_des_crypt_ecb(&des, clear, cypher) ? -1 : … in des_encrypt()
|
D | crypto_wolfssl.c | 534 u8 pkey[8], next, tmp; in des_encrypt() local 541 pkey[i] = (tmp >> i) | next | 1; in des_encrypt() 544 pkey[i] = next | 1; in des_encrypt() 546 wc_Des_SetKey(&des, pkey, NULL, DES_ENCRYPTION); in des_encrypt()
|
/hostap-latest/src/drivers/ |
D | driver_macsec_qca.c | 773 rx_sak.sak_len = sa->pkey->key_len; in macsec_qca_create_receive_sa() 774 if (sa->pkey->key_len == SAK_128_LEN) { in macsec_qca_create_receive_sa() 776 rx_sak.sak[i] = sa->pkey->key[15 - i]; in macsec_qca_create_receive_sa() 777 } else if (sa->pkey->key_len == SAK_256_LEN) { in macsec_qca_create_receive_sa() 779 rx_sak.sak1[i] = sa->pkey->key[15 - i]; in macsec_qca_create_receive_sa() 780 rx_sak.sak[i] = sa->pkey->key[31 - i]; in macsec_qca_create_receive_sa() 786 if (sa->pkey->confidentiality_offset == CONFIDENTIALITY_OFFSET_0) in macsec_qca_create_receive_sa() 788 else if (sa->pkey->confidentiality_offset == CONFIDENTIALITY_OFFSET_30) in macsec_qca_create_receive_sa() 790 else if (sa->pkey->confidentiality_offset == CONFIDENTIALITY_OFFSET_50) in macsec_qca_create_receive_sa() 963 tx_sak.sak_len = sa->pkey->key_len; in macsec_qca_create_transmit_sa() [all …]
|
D | driver_macsec_linux.c | 964 &sa->pkey->key_identifier, in macsec_drv_create_receive_sa() 965 sizeof(sa->pkey->key_identifier)); in macsec_drv_create_receive_sa() 967 sa->pkey->key, sa->pkey->key_len); in macsec_drv_create_receive_sa() 983 NLA_PUT(msg, MACSEC_SA_ATTR_KEYID, sizeof(sa->pkey->key_identifier), in macsec_drv_create_receive_sa() 984 &sa->pkey->key_identifier); in macsec_drv_create_receive_sa() 985 NLA_PUT(msg, MACSEC_SA_ATTR_KEY, sa->pkey->key_len, sa->pkey->key); in macsec_drv_create_receive_sa() 1290 &sa->pkey->key_identifier, in macsec_drv_create_transmit_sa() 1291 sizeof(sa->pkey->key_identifier)); in macsec_drv_create_transmit_sa() 1293 sa->pkey->key, sa->pkey->key_len); in macsec_drv_create_transmit_sa() 1305 NLA_PUT(msg, MACSEC_SA_ATTR_KEYID, sizeof(sa->pkey->key_identifier), in macsec_drv_create_transmit_sa() [all …]
|
/hostap-latest/hs20/client/ |
D | est.c | 368 EVP_PKEY *pkey = NULL; in generate_csr() local 391 if (EVP_PKEY_keygen(pctx, &pkey) <= 0) in generate_csr() 400 if (!PEM_write_PrivateKey(f, pkey, NULL, NULL, 0, NULL, NULL)) { in generate_csr() 447 if (!X509_REQ_set_pubkey(req, pkey)) in generate_csr() 479 if (!X509_REQ_sign(req, pkey, EVP_sha256())) in generate_csr() 567 if (pkey) in generate_csr() 568 EVP_PKEY_free(pkey); in generate_csr()
|
/hostap-latest/src/pae/ |
D | ieee802_1x_kay.c | 469 static void ieee802_1x_kay_use_data_key(struct data_key *pkey); 490 psa->pkey = key; in ieee802_1x_kay_init_receive_sa() 508 static void ieee802_1x_kay_deinit_data_key(struct data_key *pkey); 515 ieee802_1x_kay_deinit_data_key(psa->pkey); in ieee802_1x_kay_deinit_receive_sa() 516 psa->pkey = NULL; in ieee802_1x_kay_deinit_receive_sa() 1256 if (is_ki_equal(&txsa->pkey->key_identifier, ki)) { in ieee802_1x_mka_get_lpn() 1545 if (sa_key && rxsa->pkey == sa_key) { in ieee802_1x_mka_decode_sak_use_body() 1672 static void ieee802_1x_kay_init_data_key(struct data_key *pkey) in ieee802_1x_kay_init_data_key() argument 1674 pkey->transmits = true; in ieee802_1x_kay_init_data_key() 1675 pkey->receives = true; in ieee802_1x_kay_init_data_key() [all …]
|
D | ieee802_1x_kay.h | 104 struct data_key *pkey; member 131 struct data_key *pkey; member
|
/hostap-latest/src/tls/ |
D | tlsv1_cred.c | 271 struct crypto_private_key *pkey; in tlsv1_set_key_pem() local 299 pkey = crypto_private_key_import(der, der_len, NULL); in tlsv1_set_key_pem() 301 return pkey; in tlsv1_set_key_pem() 312 struct crypto_private_key *pkey; in tlsv1_set_key_enc_pem() local 327 pkey = crypto_private_key_import(der, der_len, passwd); in tlsv1_set_key_enc_pem() 329 return pkey; in tlsv1_set_key_enc_pem()
|
/hostap-latest/tests/hwsim/ |
D | test_dpp.py | 1513 def ecdsa_sign(pkey, message, alg="sha256"): argument 1514 sign = OpenSSL.crypto.sign(pkey, message, alg) 1546 pkey = OpenSSL.crypto.load_privatekey(OpenSSL.crypto.FILETYPE_PEM, 1563 sign = ecdsa_sign(pkey, conn)
|