Home
last modified time | relevance | path

Searched refs:sha384 (Results 1 – 14 of 14) sorted by relevance

/hostap-latest/tests/hwsim/auth_serv/
Dsha512-generate.sh40 …a-openssl.cnf.tmp -batch -new -newkey rsa:3072 -nodes -keyout sha384-server.key -out sha384-server…
41 …-cert sha512-ca.pem -create_serial -in sha384-server.req -out sha384-server.pem -extensions ext_se…
64 …ca-openssl.cnf.tmp -batch -new -newkey rsa:2900 -nodes -keyout sha384-user.key -out sha384-user.re…
65 …y -cert sha512-ca.pem -create_serial -in sha384-user.req -out sha384-user.pem -extensions ext_clie…
73 $OPENSSL verify -CAfile sha512-ca.pem sha384-server.pem
75 $OPENSSL verify -CAfile sha512-ca.pem sha384-user.pem
Drsa3072-generate.sh26 … -newkey rsa:3072 -nodes -keyout rsa3072-ca.key -out rsa3072-ca.pem -outform PEM -days 3650 -sha384
42 …new -newkey rsa:3072 -nodes -keyout rsa3072-server.key -out rsa3072-server.req -outform PEM -sha384
44 …e_serial -in rsa3072-server.req -out rsa3072-server.pem -extensions ext_server -days 730 -md sha384
57 …2 -nodes -keyout rsa3072-user.key -out rsa3072-user.req -outform PEM -extensions ext_client -sha384
59 …reate_serial -in rsa3072-user.req -out rsa3072-user.pem -extensions ext_client -days 730 -md sha384
72 … rsa3072-user-rsa2048.key -out rsa3072-user-rsa2048.req -outform PEM -extensions ext_client -sha384
74 … rsa3072-user-rsa2048.req -out rsa3072-user-rsa2048.pem -extensions ext_client -days 730 -md sha384
Dsha384-server.pem10 Subject: C=FI, O=w1.fi, CN=sha384.server.w1.fi
51 DNS:sha384.server.w1.fi
Dsha384-user.pem10 Subject: C=FI, O=w1.fi, CN=user-sha384
50 email:user-sha384@w1.fi
/hostap-latest/src/crypto/
DMakefile43 sha384.o \
44 sha384-prf.o \
45 sha384-internal.o \
Dcrypto_internal.c28 struct sha384_state sha384; member
67 sha384_init(&ctx->u.sha384); in crypto_hash_init()
165 sha384_process(&ctx->u.sha384, data, len); in crypto_hash_update()
230 sha384_done(&ctx->u.sha384, mac); in crypto_hash_finish()
Dcrypto_wolfssl.c298 wc_Sha384 sha384; in sha384_vector() local
306 err = wc_InitSha384(&sha384); in sha384_vector()
313 err = wc_Sha384Update(&sha384, addr[i], len[i]); in sha384_vector()
320 err = wc_Sha384Final(&sha384, mac); in sha384_vector()
328 wc_Sha384Free(&sha384); in sha384_vector()
/hostap-latest/tests/fuzzing/pasn-init/
DMakefile25 OBJS += $(SRC)/crypto/sha384-prf.o
27 OBJS += $(SRC)/crypto/sha384-kdf.o
/hostap-latest/tests/fuzzing/pasn-resp/
DMakefile25 OBJS += $(SRC)/crypto/sha384-prf.o
27 OBJS += $(SRC)/crypto/sha384-kdf.o
/hostap-latest/tests/fuzzing/dpp-uri/
DMakefile20 OBJS += $(SRC)/crypto/sha384-kdf.o
/hostap-latest/tests/hwsim/
Dtest_ap_ft.py137 force_initial_conn_to_first_ap=False, sha384=False, argument
163 copts["key_mgmt"] = "WPA-EAP-SUITE-B-192 FT-EAP-SHA384" if sha384 else "WPA-EAP FT-EAP"
165 copts["key_mgmt"] = "FT-EAP-SHA384" if sha384 else "FT-EAP"
3443 sha384=True)
3466 sha384=True, also_non_ft=True, roam_with_reassoc=True)
3489 eap=True, sha384=True)
3567 eap_identity=identity, pmksa_caching=True, sha384=True)
Dtest_ap_eap.py159 expect_cert_error=None, sha384=False, **kwargs): argument
170 sha384=sha384)
182 expect_cert_error=None, sha384=False): argument
247 elif sha384:
257 def eap_reauth(dev, method, rsn=True, sha256=False, expect_failure=False, sha384=False): argument
260 expect_failure=expect_failure, sha384=sha384)
7894 password_hex="0123456789abcdef0123456789abcdef", sha384=True)
7896 eap_reauth(dev[0], "PSK", sha384=True)
Dtest_pasn.py747 sha384=True)
/hostap-latest/doc/
Ddbus.doxygen2182 …wpa-eap-suite-b-192", "wpa-fils-sha256", "wpa-fils-sha384", "wpa-ft-fils-sha256", "wpa-ft-fils-sha…