Searched refs:sha384 (Results 1 – 14 of 14) sorted by relevance
/hostap-latest/tests/hwsim/auth_serv/ |
D | sha512-generate.sh | 40 …a-openssl.cnf.tmp -batch -new -newkey rsa:3072 -nodes -keyout sha384-server.key -out sha384-server… 41 …-cert sha512-ca.pem -create_serial -in sha384-server.req -out sha384-server.pem -extensions ext_se… 64 …ca-openssl.cnf.tmp -batch -new -newkey rsa:2900 -nodes -keyout sha384-user.key -out sha384-user.re… 65 …y -cert sha512-ca.pem -create_serial -in sha384-user.req -out sha384-user.pem -extensions ext_clie… 73 $OPENSSL verify -CAfile sha512-ca.pem sha384-server.pem 75 $OPENSSL verify -CAfile sha512-ca.pem sha384-user.pem
|
D | rsa3072-generate.sh | 26 … -newkey rsa:3072 -nodes -keyout rsa3072-ca.key -out rsa3072-ca.pem -outform PEM -days 3650 -sha384 42 …new -newkey rsa:3072 -nodes -keyout rsa3072-server.key -out rsa3072-server.req -outform PEM -sha384 44 …e_serial -in rsa3072-server.req -out rsa3072-server.pem -extensions ext_server -days 730 -md sha384 57 …2 -nodes -keyout rsa3072-user.key -out rsa3072-user.req -outform PEM -extensions ext_client -sha384 59 …reate_serial -in rsa3072-user.req -out rsa3072-user.pem -extensions ext_client -days 730 -md sha384 72 … rsa3072-user-rsa2048.key -out rsa3072-user-rsa2048.req -outform PEM -extensions ext_client -sha384 74 … rsa3072-user-rsa2048.req -out rsa3072-user-rsa2048.pem -extensions ext_client -days 730 -md sha384
|
D | sha384-server.pem | 10 Subject: C=FI, O=w1.fi, CN=sha384.server.w1.fi 51 DNS:sha384.server.w1.fi
|
D | sha384-user.pem | 10 Subject: C=FI, O=w1.fi, CN=user-sha384 50 email:user-sha384@w1.fi
|
/hostap-latest/src/crypto/ |
D | Makefile | 43 sha384.o \ 44 sha384-prf.o \ 45 sha384-internal.o \
|
D | crypto_internal.c | 28 struct sha384_state sha384; member 67 sha384_init(&ctx->u.sha384); in crypto_hash_init() 165 sha384_process(&ctx->u.sha384, data, len); in crypto_hash_update() 230 sha384_done(&ctx->u.sha384, mac); in crypto_hash_finish()
|
D | crypto_wolfssl.c | 298 wc_Sha384 sha384; in sha384_vector() local 306 err = wc_InitSha384(&sha384); in sha384_vector() 313 err = wc_Sha384Update(&sha384, addr[i], len[i]); in sha384_vector() 320 err = wc_Sha384Final(&sha384, mac); in sha384_vector() 328 wc_Sha384Free(&sha384); in sha384_vector()
|
/hostap-latest/tests/fuzzing/pasn-init/ |
D | Makefile | 25 OBJS += $(SRC)/crypto/sha384-prf.o 27 OBJS += $(SRC)/crypto/sha384-kdf.o
|
/hostap-latest/tests/fuzzing/pasn-resp/ |
D | Makefile | 25 OBJS += $(SRC)/crypto/sha384-prf.o 27 OBJS += $(SRC)/crypto/sha384-kdf.o
|
/hostap-latest/tests/fuzzing/dpp-uri/ |
D | Makefile | 20 OBJS += $(SRC)/crypto/sha384-kdf.o
|
/hostap-latest/tests/hwsim/ |
D | test_ap_ft.py | 137 force_initial_conn_to_first_ap=False, sha384=False, argument 163 copts["key_mgmt"] = "WPA-EAP-SUITE-B-192 FT-EAP-SHA384" if sha384 else "WPA-EAP FT-EAP" 165 copts["key_mgmt"] = "FT-EAP-SHA384" if sha384 else "FT-EAP" 3443 sha384=True) 3466 sha384=True, also_non_ft=True, roam_with_reassoc=True) 3489 eap=True, sha384=True) 3567 eap_identity=identity, pmksa_caching=True, sha384=True)
|
D | test_ap_eap.py | 159 expect_cert_error=None, sha384=False, **kwargs): argument 170 sha384=sha384) 182 expect_cert_error=None, sha384=False): argument 247 elif sha384: 257 def eap_reauth(dev, method, rsn=True, sha256=False, expect_failure=False, sha384=False): argument 260 expect_failure=expect_failure, sha384=sha384) 7894 password_hex="0123456789abcdef0123456789abcdef", sha384=True) 7896 eap_reauth(dev[0], "PSK", sha384=True)
|
D | test_pasn.py | 747 sha384=True)
|
/hostap-latest/doc/ |
D | dbus.doxygen | 2182 …wpa-eap-suite-b-192", "wpa-fils-sha256", "wpa-fils-sha384", "wpa-ft-fils-sha256", "wpa-ft-fils-sha…
|