Home
last modified time | relevance | path

Searched refs:ssl (Results 1 – 18 of 18) sorted by relevance

/hostap-latest/src/crypto/
Dtls_openssl.c88 static size_t SSL_get_client_random(const SSL *ssl, unsigned char *out, in SSL_get_client_random() argument
91 if (!ssl->s3 || outlen < SSL3_RANDOM_SIZE) in SSL_get_client_random()
93 os_memcpy(out, ssl->s3->client_random, SSL3_RANDOM_SIZE); in SSL_get_client_random()
98 static size_t SSL_get_server_random(const SSL *ssl, unsigned char *out, in SSL_get_server_random() argument
101 if (!ssl->s3 || outlen < SSL3_RANDOM_SIZE) in SSL_get_server_random()
103 os_memcpy(out, ssl->s3->server_random, SSL3_RANDOM_SIZE); in SSL_get_server_random()
228 SSL_CTX *ssl; member
243 SSL *ssl; member
562 static int tls_cryptoapi_cert(SSL *ssl, const char *name) in tls_cryptoapi_cert() argument
630 if (!SSL_use_certificate(ssl, cert)) { in tls_cryptoapi_cert()
[all …]
Dtls_wolfssl.c73 WOLFSSL *ssl; member
140 static int wolfssl_receive_cb(WOLFSSL *ssl, char *buf, int sz, void *ctx) in wolfssl_receive_cb() argument
162 static int wolfssl_send_cb(WOLFSSL *ssl, char *buf, int sz, void *ctx) in wolfssl_send_cb() argument
346 conn->ssl = wolfSSL_new(ssl_ctx); in tls_connection_init()
347 if (!conn->ssl) { in tls_connection_init()
352 wolfSSL_SetIOReadCtx(conn->ssl, &conn->input); in tls_connection_init()
353 wolfSSL_SetIOWriteCtx(conn->ssl, &conn->output); in tls_connection_init()
354 wolfSSL_set_ex_data(conn->ssl, 0, conn); in tls_connection_init()
359 wolfSSL_KeepArrays(conn->ssl); in tls_connection_init()
360 wolfSSL_KeepHandshakeResources(conn->ssl); in tls_connection_init()
[all …]
Dtls_mbedtls_alt.c83 #define mbedtls_ssl_get_ciphersuite_id_from_ssl(ssl) \ argument
84 …((ssl)->MBEDTLS_PRIVATE(session) ? (ssl)->MBEDTLS_PRIVATE(session)->MBEDTLS_PRIVATE(ciphersuite) :…
208 mbedtls_ssl_context ssl; member
484 mbedtls_ssl_free(&conn->ssl); in tls_connection_deinit()
498 mbedtls_ssl_init(&conn->ssl); in tls_connection_init()
551 const mbedtls_x509_crt *crt = mbedtls_ssl_get_peer_cert(&conn->ssl); in tls_connection_peer_serial_num()
581 return mbedtls_ssl_session_reset(&conn->ssl); in tls_connection_shutdown()
651 int ret = mbedtls_ssl_setup(&conn->ssl, &conn->tls_conf->conf); in tls_mbedtls_ssl_setup()
658 mbedtls_ssl_set_bio(&conn->ssl, conn, tls_push_func, tls_pull_func, NULL); in tls_mbedtls_ssl_setup()
660 mbedtls_ssl_set_export_keys_cb(&conn->ssl, tls_connection_export_keys_cb, conn); in tls_mbedtls_ssl_setup()
[all …]
Dtls_openssl.h16 enum ocsp_result check_ocsp_resp(SSL_CTX *ssl_ctx, SSL *ssl, X509 *cert,
Dtls_openssl_ocsp.c480 enum ocsp_result check_ocsp_resp(SSL_CTX *ssl_ctx, SSL *ssl, X509 *cert, in check_ocsp_resp() argument
513 SSL_get0_ocsp_response(ssl, &resp_data, &resp_len); in check_ocsp_resp()
/hostap-latest/src/eap_server/
Deap_server_tls.c21 struct eap_ssl_data ssl; member
53 tls_connection_remove_session(data->ssl.conn); in eap_tls_state()
68 tls_connection_set_success_data(data->ssl.conn, buf); in eap_tls_valid_session()
81 if (eap_server_tls_ssl_init(sm, &data->ssl, 1, EAP_TYPE_TLS)) { in eap_tls_init()
105 if (eap_server_tls_ssl_init(sm, &data->ssl, 0, EAP_UNAUTH_TLS_TYPE)) { in eap_unauth_tls_init()
127 if (eap_server_tls_ssl_init(sm, &data->ssl, 0, in eap_wfa_unauth_tls_init()
145 eap_server_tls_ssl_deinit(sm, &data->ssl); in eap_tls_reset()
176 if (data->ssl.state == FRAG_ACK) { in eap_tls_buildReq()
180 if (data->ssl.state == WAIT_FRAG_ACK) { in eap_tls_buildReq()
181 res = eap_server_tls_build_msg(&data->ssl, data->eap_type, 0, in eap_tls_buildReq()
[all …]
Deap_server_peap.c33 struct eap_ssl_data ssl; member
103 tls_connection_remove_session(data->ssl.conn); in eap_peap_state()
113 tls_connection_resumed(sm->cfg->ssl_ctx, data->ssl.conn)) in eap_peap_valid_session()
132 tls_connection_set_success_data(data->ssl.conn, buf); in eap_peap_valid_session()
189 if (eap_server_tls_ssl_init(sm, &data->ssl, 0, EAP_TYPE_PEAP)) { in eap_peap_init()
206 eap_server_tls_ssl_deinit(sm, &data->ssl); in eap_peap_reset()
264 encr_req = eap_server_tls_encrypt(sm, &data->ssl, &msgbuf); in eap_peap_build_phase2_req()
303 encr_req = eap_server_tls_encrypt(sm, &data->ssl, &msgbuf); in eap_peap_build_phase2_soh()
337 if (data->ssl.tls_v13) { in eap_peap_derive_cmk()
350 tk = eap_server_tls_derive_key(sm, &data->ssl, label, in eap_peap_derive_cmk()
[all …]
Deap_server_ttls.c28 struct eap_ssl_data ssl; member
75 tls_connection_remove_session(data->ssl.conn); in eap_ttls_state()
103 tls_connection_set_success_data(data->ssl.conn, buf); in eap_ttls_valid_session()
334 return eap_server_tls_derive_key(sm, &data->ssl, "ttls challenge", in eap_ttls_implicit_challenge()
349 if (eap_server_tls_ssl_init(sm, &data->ssl, 0, EAP_TYPE_TTLS)) { in eap_ttls_init()
366 eap_server_tls_ssl_deinit(sm, &data->ssl); in eap_ttls_reset()
417 encr_req = eap_server_tls_encrypt(sm, &data->ssl, buf); in eap_ttls_build_phase2_eap_req()
459 encr_req = eap_server_tls_encrypt(sm, &data->ssl, &msgbuf); in eap_ttls_build_phase2_mschapv2()
470 if (data->ssl.state == FRAG_ACK) { in eap_ttls_buildReq()
475 if (data->ssl.state == WAIT_FRAG_ACK) { in eap_ttls_buildReq()
[all …]
Deap_server_fast.c32 struct eap_ssl_data ssl; member
281 sks = eap_fast_derive_key(sm->cfg->ssl_ctx, data->ssl.conn, in eap_fast_derive_key_auth()
307 eap_fast_derive_key(sm->cfg->ssl_ctx, data->ssl.conn, in eap_fast_derive_key_provisioning()
426 if (eap_server_tls_ssl_init(sm, &data->ssl, 0, EAP_TYPE_FAST)) { in eap_fast_init()
432 if (tls_connection_set_cipher_list(sm->cfg->ssl_ctx, data->ssl.conn, in eap_fast_init()
441 data->ssl.conn, in eap_fast_init()
504 eap_server_tls_ssl_deinit(sm, &data->ssl); in eap_fast_reset()
546 if (tls_get_cipher(sm->cfg->ssl_ctx, data->ssl.conn, in eap_fast_phase1_done()
815 encr = eap_server_tls_encrypt(sm, &data->ssl, plain); in eap_fast_encrypt_phase2()
821 if (data->ssl.tls_out && piggyback) { in eap_fast_encrypt_phase2()
[all …]
Deap_server_teap.c30 struct eap_ssl_data ssl; member
298 res = tls_connection_export_key(sm->cfg->ssl_ctx, data->ssl.conn, in eap_teap_derive_key_auth()
372 if (eap_server_tls_ssl_init(sm, &data->ssl, in eap_teap_init()
384 data->ssl.conn, in eap_teap_init()
449 eap_server_tls_ssl_deinit(sm, &data->ssl); in eap_teap_reset()
514 subject = tls_connection_get_peer_subject(data->ssl.conn); in eap_teap_phase1_done()
524 data->tls_cs = tls_connection_get_cipher_suite(data->ssl.conn); in eap_teap_phase1_done()
528 if (tls_get_cipher(sm->cfg->ssl_ctx, data->ssl.conn, in eap_teap_phase1_done()
863 encr = eap_server_tls_encrypt(sm, &data->ssl, plain); in eap_teap_encrypt_phase2()
869 if (data->ssl.tls_out && piggyback) { in eap_teap_encrypt_phase2()
[all …]
/hostap-latest/src/eap_peer/
Deap_tls.c22 struct eap_ssl_data ssl; member
59 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_TLS)) { in eap_tls_init()
95 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, in eap_unauth_tls_init()
122 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, in eap_wfa_unauth_tls_init()
150 eap_peer_tls_ssl_deinit(sm, &data->ssl); in eap_tls_deinit()
190 if (data->ssl.tls_out) { in eap_tls_success()
195 if (data->ssl.tls_v13) { in eap_tls_success()
212 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, label, in eap_tls_success()
227 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, in eap_tls_success()
277 pos = eap_peer_tls_process_init(sm, &data->ssl, data->eap_type, ret, in eap_tls_process()
[all …]
Deap_peap.c33 struct eap_ssl_data ssl; member
174 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_PEAP)) { in eap_peap_init()
201 eap_peer_tls_ssl_deinit(sm, &data->ssl); in eap_peap_deinit()
282 resumed = tls_connection_resumed(sm->ssl_ctx, data->ssl.conn); in eap_peap_derive_cmk()
477 !tls_connection_resumed(sm->ssl_ctx, data->ssl.conn) && in peap_phase2_sufficient()
478 !data->ssl.client_cert_conf) || in peap_phase2_sufficient()
811 eap_peer_tls_reset_input(&data->ssl); in eap_peap_decrypt()
832 return eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_PEAP, in eap_peap_decrypt()
837 res = eap_peer_tls_decrypt(sm, &data->ssl, in_data, &in_decrypted); in eap_peap_decrypt()
1008 if (eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_PEAP, in eap_peap_decrypt()
[all …]
Deap_fast.c34 struct eap_ssl_data ssl; member
173 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_FAST)) { in eap_fast_init()
179 if (tls_connection_set_session_ticket_cb(sm->ssl_ctx, data->ssl.conn, in eap_fast_init()
193 if (tls_connection_enable_workaround(sm->ssl_ctx, data->ssl.conn)) { in eap_fast_init()
241 eap_peer_tls_ssl_deinit(sm, &data->ssl); in eap_fast_deinit()
278 sks = eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, in eap_fast_derive_key_auth()
305 eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, in eap_fast_derive_key_provisioning()
821 sm, &data->ssl, EAP_TYPE_FAST, &data->id_len); in eap_fast_process_crypto_binding()
1157 if (eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_FAST, in eap_fast_encrypt_response()
1315 eap_peer_tls_reset_input(&data->ssl); in eap_fast_decrypt()
[all …]
Deap_ttls.c30 struct eap_ssl_data ssl; member
184 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_TTLS)) { in eap_ttls_init()
221 eap_peer_tls_ssl_deinit(sm, &data->ssl); in eap_ttls_deinit()
301 if (data->ssl.tls_v13) { in eap_ttls_v0_derive_key()
310 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, label, in eap_ttls_v0_derive_key()
326 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, in eap_ttls_v0_derive_key()
344 return eap_peer_tls_derive_key(sm, &data->ssl, "ttls challenge", in eap_ttls_implicit_challenge()
1127 if (eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_TTLS, in eap_ttls_encrypt_response()
1432 tls_connection_resumed(sm->ssl_ctx, data->ssl.conn)) { in eap_ttls_phase2_start()
1467 eap_peer_tls_reset_input(&data->ssl); in eap_ttls_decrypt()
[all …]
Deap_teap.c28 struct eap_ssl_data ssl; member
193 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_TEAP)) { in eap_teap_init()
199 if (tls_connection_set_session_ticket_cb(sm->ssl_ctx, data->ssl.conn, in eap_teap_init()
263 eap_peer_tls_ssl_deinit(sm, &data->ssl); in eap_teap_deinit()
297 res = tls_connection_export_key(sm->ssl_ctx, data->ssl.conn, in eap_teap_derive_key_auth()
803 res = tls_get_tls_unique(data->ssl.conn, data->session_id + 1, in eap_teap_session_id()
1399 tls_connection_get_own_cert_used(data->ssl.conn) && in eap_teap_process_decrypted()
1489 if (eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_TEAP, in eap_teap_process_decrypted()
1517 eap_peer_tls_reset_input(&data->ssl); in eap_teap_decrypt()
1526 res = eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_TEAP, in eap_teap_decrypt()
[all …]
/hostap-latest/src/utils/
Dhttp_curl.c980 SSL *ssl; in curl_cb_ssl_verify() local
983 ssl = X509_STORE_CTX_get_ex_data(x509_ctx, in curl_cb_ssl_verify()
985 ssl_ctx = SSL_get_SSL_CTX(ssl); in curl_cb_ssl_verify()
1021 res = check_ocsp_resp(ssl_ctx, ssl, cert, ctx->peer_issuer, in curl_cb_ssl_verify()
1277 SSL_CTX *ssl = SSL_get_SSL_CTX(s); in curl_patch_ssl_new() local
1280 ssl->method = real_ssl_method; in curl_patch_ssl_new()
1296 SSL_CTX *ssl = sslctx; in curl_cb_ssl() local
1299 SSL_CTX_set_app_data(ssl, ctx); in curl_cb_ssl()
1300 SSL_CTX_set_verify(ssl, SSL_VERIFY_PEER, curl_cb_ssl_verify); in curl_cb_ssl()
1304 SSL_CTX_set_tlsext_status_cb(ssl, ocsp_resp_cb); in curl_cb_ssl()
[all …]
/hostap-latest/hs20/server/
Dhs20-osu-server.txt222 Edit /etc/apache2/sites-available/default-ssl
242 Enable default-ssl site and restart Apache2:
243 sudo a2ensite default-ssl
244 sudo a2enmod ssl
/hostap-latest/wpa_supplicant/
DChangeLog1939 to configure OpenSSL CA path, e.g., /etc/ssl/certs, for using the