Home
last modified time | relevance | path

Searched refs:pkey (Results 1 – 16 of 16) sorted by relevance

/hostap-latest/src/crypto/
Dcrypto_openssl.c97 static EC_KEY * EVP_PKEY_get0_EC_KEY(EVP_PKEY *pkey) in EVP_PKEY_get0_EC_KEY() argument
99 if (pkey->type != EVP_PKEY_EC) in EVP_PKEY_get0_EC_KEY()
101 return pkey->pkey.ec; in EVP_PKEY_get0_EC_KEY()
331 u8 pkey[8], next, tmp; in des_encrypt() local
341 pkey[i] = (tmp >> i) | next | 1; in des_encrypt()
344 pkey[i] = next | 1; in des_encrypt()
348 EVP_EncryptInit_ex(ctx, EVP_des_ecb(), NULL, pkey, NULL) == 1 && in des_encrypt()
1019 EVP_PKEY *pkey = NULL; in dh5_init()
1039 EVP_PKEY_generate(gctx, &pkey) != 1 || in dh5_init()
1040 EVP_PKEY_get_bn_param(pkey, OSSL_PKEY_PARAM_PRIV_KEY, in dh5_init()
[all …]
Ddes-internal.c401 u8 pkey[8], next, tmp; in des_encrypt() local
409 pkey[i] = (tmp >> i) | next | 1; in des_encrypt()
412 pkey[i] = next | 1; in des_encrypt()
414 deskey(pkey, 0, ek); in des_encrypt()
422 os_memset(pkey, 0, sizeof(pkey)); in des_encrypt()
Dtls_openssl.c635 pub_rsa = cert->cert_info->key->pkey->pkey.rsa; in tls_cryptoapi_cert()
3583 EVP_PKEY *pkey; in tls_parse_pkcs12() local
3589 pkey = NULL; in tls_parse_pkcs12()
3594 if (!PKCS12_parse(p12, passwd, &pkey, &cert, &certs)) { in tls_parse_pkcs12()
3617 if (pkey) { in tls_parse_pkcs12()
3620 if (SSL_use_PrivateKey(ssl, pkey) != 1) in tls_parse_pkcs12()
3623 if (SSL_CTX_use_PrivateKey(data->ssl, pkey) != 1) in tls_parse_pkcs12()
3626 EVP_PKEY_free(pkey); in tls_parse_pkcs12()
3914 EVP_PKEY *pkey; in tls_use_private_key_file() local
3921 pkey = d2i_PrivateKey_bio(bio, NULL); in tls_use_private_key_file()
[all …]
Dcrypto_nettle.c32 u8 pkey[8], next, tmp; in des_encrypt() local
39 pkey[i] = (tmp >> i) | next | 1; in des_encrypt()
42 pkey[i] = next | 1; in des_encrypt()
44 nettle_des_set_key(&ctx, pkey); in des_encrypt()
Dcrypto_gnutls.c51 u8 pkey[8], next, tmp; in des_encrypt() local
58 pkey[i] = (tmp >> i) | next | 1; in des_encrypt()
61 pkey[i] = next | 1; in des_encrypt()
64 gcry_err_code(gcry_cipher_setkey(hd, pkey, 8)); in des_encrypt()
Dcrypto_libtomcrypt.c40 u8 pkey[8], next, tmp; in des_encrypt() local
48 pkey[i] = (tmp >> i) | next | 1; in des_encrypt()
51 pkey[i] = next | 1; in des_encrypt()
53 des_setup(pkey, 8, 0, &skey); in des_encrypt()
Dcrypto_linux.c609 u8 pkey[8], next, tmp; in des_encrypt() local
624 pkey[i] = (tmp >> i) | next | 1; in des_encrypt()
627 pkey[i] = next | 1; in des_encrypt()
629 skcipher = linux_af_alg_skcipher("ecb(des)", pkey, sizeof(pkey)); in des_encrypt()
Dcrypto_mbedtls_alt.c778 u8 pkey[8], next, tmp; in des_encrypt() local
786 pkey[i] = (tmp >> i) | next | 1; in des_encrypt()
789 pkey[i] = next | 1; in des_encrypt()
793 …int ret = mbedtls_des_setkey_enc(&des, pkey) || mbedtls_des_crypt_ecb(&des, clear, cypher) ? -1 : … in des_encrypt()
Dcrypto_wolfssl.c534 u8 pkey[8], next, tmp; in des_encrypt() local
541 pkey[i] = (tmp >> i) | next | 1; in des_encrypt()
544 pkey[i] = next | 1; in des_encrypt()
546 wc_Des_SetKey(&des, pkey, NULL, DES_ENCRYPTION); in des_encrypt()
/hostap-latest/src/drivers/
Ddriver_macsec_qca.c773 rx_sak.sak_len = sa->pkey->key_len; in macsec_qca_create_receive_sa()
774 if (sa->pkey->key_len == SAK_128_LEN) { in macsec_qca_create_receive_sa()
776 rx_sak.sak[i] = sa->pkey->key[15 - i]; in macsec_qca_create_receive_sa()
777 } else if (sa->pkey->key_len == SAK_256_LEN) { in macsec_qca_create_receive_sa()
779 rx_sak.sak1[i] = sa->pkey->key[15 - i]; in macsec_qca_create_receive_sa()
780 rx_sak.sak[i] = sa->pkey->key[31 - i]; in macsec_qca_create_receive_sa()
786 if (sa->pkey->confidentiality_offset == CONFIDENTIALITY_OFFSET_0) in macsec_qca_create_receive_sa()
788 else if (sa->pkey->confidentiality_offset == CONFIDENTIALITY_OFFSET_30) in macsec_qca_create_receive_sa()
790 else if (sa->pkey->confidentiality_offset == CONFIDENTIALITY_OFFSET_50) in macsec_qca_create_receive_sa()
963 tx_sak.sak_len = sa->pkey->key_len; in macsec_qca_create_transmit_sa()
[all …]
Ddriver_macsec_linux.c964 &sa->pkey->key_identifier, in macsec_drv_create_receive_sa()
965 sizeof(sa->pkey->key_identifier)); in macsec_drv_create_receive_sa()
967 sa->pkey->key, sa->pkey->key_len); in macsec_drv_create_receive_sa()
983 NLA_PUT(msg, MACSEC_SA_ATTR_KEYID, sizeof(sa->pkey->key_identifier), in macsec_drv_create_receive_sa()
984 &sa->pkey->key_identifier); in macsec_drv_create_receive_sa()
985 NLA_PUT(msg, MACSEC_SA_ATTR_KEY, sa->pkey->key_len, sa->pkey->key); in macsec_drv_create_receive_sa()
1290 &sa->pkey->key_identifier, in macsec_drv_create_transmit_sa()
1291 sizeof(sa->pkey->key_identifier)); in macsec_drv_create_transmit_sa()
1293 sa->pkey->key, sa->pkey->key_len); in macsec_drv_create_transmit_sa()
1305 NLA_PUT(msg, MACSEC_SA_ATTR_KEYID, sizeof(sa->pkey->key_identifier), in macsec_drv_create_transmit_sa()
[all …]
/hostap-latest/hs20/client/
Dest.c368 EVP_PKEY *pkey = NULL; in generate_csr() local
391 if (EVP_PKEY_keygen(pctx, &pkey) <= 0) in generate_csr()
400 if (!PEM_write_PrivateKey(f, pkey, NULL, NULL, 0, NULL, NULL)) { in generate_csr()
447 if (!X509_REQ_set_pubkey(req, pkey)) in generate_csr()
479 if (!X509_REQ_sign(req, pkey, EVP_sha256())) in generate_csr()
567 if (pkey) in generate_csr()
568 EVP_PKEY_free(pkey); in generate_csr()
/hostap-latest/src/pae/
Dieee802_1x_kay.c469 static void ieee802_1x_kay_use_data_key(struct data_key *pkey);
490 psa->pkey = key; in ieee802_1x_kay_init_receive_sa()
508 static void ieee802_1x_kay_deinit_data_key(struct data_key *pkey);
515 ieee802_1x_kay_deinit_data_key(psa->pkey); in ieee802_1x_kay_deinit_receive_sa()
516 psa->pkey = NULL; in ieee802_1x_kay_deinit_receive_sa()
1256 if (is_ki_equal(&txsa->pkey->key_identifier, ki)) { in ieee802_1x_mka_get_lpn()
1545 if (sa_key && rxsa->pkey == sa_key) { in ieee802_1x_mka_decode_sak_use_body()
1672 static void ieee802_1x_kay_init_data_key(struct data_key *pkey) in ieee802_1x_kay_init_data_key() argument
1674 pkey->transmits = true; in ieee802_1x_kay_init_data_key()
1675 pkey->receives = true; in ieee802_1x_kay_init_data_key()
[all …]
Dieee802_1x_kay.h104 struct data_key *pkey; member
131 struct data_key *pkey; member
/hostap-latest/src/tls/
Dtlsv1_cred.c271 struct crypto_private_key *pkey; in tlsv1_set_key_pem() local
299 pkey = crypto_private_key_import(der, der_len, NULL); in tlsv1_set_key_pem()
301 return pkey; in tlsv1_set_key_pem()
312 struct crypto_private_key *pkey; in tlsv1_set_key_enc_pem() local
327 pkey = crypto_private_key_import(der, der_len, passwd); in tlsv1_set_key_enc_pem()
329 return pkey; in tlsv1_set_key_enc_pem()
/hostap-latest/tests/hwsim/
Dtest_dpp.py1513 def ecdsa_sign(pkey, message, alg="sha256"): argument
1514 sign = OpenSSL.crypto.sign(pkey, message, alg)
1546 pkey = OpenSSL.crypto.load_privatekey(OpenSSL.crypto.FILETYPE_PEM,
1563 sign = ecdsa_sign(pkey, conn)