/hostap-latest/src/crypto/ |
D | tls_openssl.c | 88 static size_t SSL_get_client_random(const SSL *ssl, unsigned char *out, in SSL_get_client_random() argument 91 if (!ssl->s3 || outlen < SSL3_RANDOM_SIZE) in SSL_get_client_random() 93 os_memcpy(out, ssl->s3->client_random, SSL3_RANDOM_SIZE); in SSL_get_client_random() 98 static size_t SSL_get_server_random(const SSL *ssl, unsigned char *out, in SSL_get_server_random() argument 101 if (!ssl->s3 || outlen < SSL3_RANDOM_SIZE) in SSL_get_server_random() 103 os_memcpy(out, ssl->s3->server_random, SSL3_RANDOM_SIZE); in SSL_get_server_random() 228 SSL_CTX *ssl; member 243 SSL *ssl; member 562 static int tls_cryptoapi_cert(SSL *ssl, const char *name) in tls_cryptoapi_cert() argument 630 if (!SSL_use_certificate(ssl, cert)) { in tls_cryptoapi_cert() [all …]
|
D | tls_wolfssl.c | 73 WOLFSSL *ssl; member 140 static int wolfssl_receive_cb(WOLFSSL *ssl, char *buf, int sz, void *ctx) in wolfssl_receive_cb() argument 162 static int wolfssl_send_cb(WOLFSSL *ssl, char *buf, int sz, void *ctx) in wolfssl_send_cb() argument 346 conn->ssl = wolfSSL_new(ssl_ctx); in tls_connection_init() 347 if (!conn->ssl) { in tls_connection_init() 352 wolfSSL_SetIOReadCtx(conn->ssl, &conn->input); in tls_connection_init() 353 wolfSSL_SetIOWriteCtx(conn->ssl, &conn->output); in tls_connection_init() 354 wolfSSL_set_ex_data(conn->ssl, 0, conn); in tls_connection_init() 359 wolfSSL_KeepArrays(conn->ssl); in tls_connection_init() 360 wolfSSL_KeepHandshakeResources(conn->ssl); in tls_connection_init() [all …]
|
D | tls_mbedtls_alt.c | 83 #define mbedtls_ssl_get_ciphersuite_id_from_ssl(ssl) \ argument 84 …((ssl)->MBEDTLS_PRIVATE(session) ? (ssl)->MBEDTLS_PRIVATE(session)->MBEDTLS_PRIVATE(ciphersuite) :… 208 mbedtls_ssl_context ssl; member 484 mbedtls_ssl_free(&conn->ssl); in tls_connection_deinit() 498 mbedtls_ssl_init(&conn->ssl); in tls_connection_init() 551 const mbedtls_x509_crt *crt = mbedtls_ssl_get_peer_cert(&conn->ssl); in tls_connection_peer_serial_num() 581 return mbedtls_ssl_session_reset(&conn->ssl); in tls_connection_shutdown() 651 int ret = mbedtls_ssl_setup(&conn->ssl, &conn->tls_conf->conf); in tls_mbedtls_ssl_setup() 658 mbedtls_ssl_set_bio(&conn->ssl, conn, tls_push_func, tls_pull_func, NULL); in tls_mbedtls_ssl_setup() 660 mbedtls_ssl_set_export_keys_cb(&conn->ssl, tls_connection_export_keys_cb, conn); in tls_mbedtls_ssl_setup() [all …]
|
D | tls_openssl.h | 16 enum ocsp_result check_ocsp_resp(SSL_CTX *ssl_ctx, SSL *ssl, X509 *cert,
|
D | tls_openssl_ocsp.c | 480 enum ocsp_result check_ocsp_resp(SSL_CTX *ssl_ctx, SSL *ssl, X509 *cert, in check_ocsp_resp() argument 513 SSL_get0_ocsp_response(ssl, &resp_data, &resp_len); in check_ocsp_resp()
|
/hostap-latest/src/eap_server/ |
D | eap_server_tls.c | 21 struct eap_ssl_data ssl; member 53 tls_connection_remove_session(data->ssl.conn); in eap_tls_state() 68 tls_connection_set_success_data(data->ssl.conn, buf); in eap_tls_valid_session() 81 if (eap_server_tls_ssl_init(sm, &data->ssl, 1, EAP_TYPE_TLS)) { in eap_tls_init() 105 if (eap_server_tls_ssl_init(sm, &data->ssl, 0, EAP_UNAUTH_TLS_TYPE)) { in eap_unauth_tls_init() 127 if (eap_server_tls_ssl_init(sm, &data->ssl, 0, in eap_wfa_unauth_tls_init() 145 eap_server_tls_ssl_deinit(sm, &data->ssl); in eap_tls_reset() 176 if (data->ssl.state == FRAG_ACK) { in eap_tls_buildReq() 180 if (data->ssl.state == WAIT_FRAG_ACK) { in eap_tls_buildReq() 181 res = eap_server_tls_build_msg(&data->ssl, data->eap_type, 0, in eap_tls_buildReq() [all …]
|
D | eap_server_peap.c | 33 struct eap_ssl_data ssl; member 103 tls_connection_remove_session(data->ssl.conn); in eap_peap_state() 113 tls_connection_resumed(sm->cfg->ssl_ctx, data->ssl.conn)) in eap_peap_valid_session() 132 tls_connection_set_success_data(data->ssl.conn, buf); in eap_peap_valid_session() 189 if (eap_server_tls_ssl_init(sm, &data->ssl, 0, EAP_TYPE_PEAP)) { in eap_peap_init() 206 eap_server_tls_ssl_deinit(sm, &data->ssl); in eap_peap_reset() 264 encr_req = eap_server_tls_encrypt(sm, &data->ssl, &msgbuf); in eap_peap_build_phase2_req() 303 encr_req = eap_server_tls_encrypt(sm, &data->ssl, &msgbuf); in eap_peap_build_phase2_soh() 337 if (data->ssl.tls_v13) { in eap_peap_derive_cmk() 350 tk = eap_server_tls_derive_key(sm, &data->ssl, label, in eap_peap_derive_cmk() [all …]
|
D | eap_server_ttls.c | 28 struct eap_ssl_data ssl; member 75 tls_connection_remove_session(data->ssl.conn); in eap_ttls_state() 103 tls_connection_set_success_data(data->ssl.conn, buf); in eap_ttls_valid_session() 334 return eap_server_tls_derive_key(sm, &data->ssl, "ttls challenge", in eap_ttls_implicit_challenge() 349 if (eap_server_tls_ssl_init(sm, &data->ssl, 0, EAP_TYPE_TTLS)) { in eap_ttls_init() 366 eap_server_tls_ssl_deinit(sm, &data->ssl); in eap_ttls_reset() 417 encr_req = eap_server_tls_encrypt(sm, &data->ssl, buf); in eap_ttls_build_phase2_eap_req() 459 encr_req = eap_server_tls_encrypt(sm, &data->ssl, &msgbuf); in eap_ttls_build_phase2_mschapv2() 470 if (data->ssl.state == FRAG_ACK) { in eap_ttls_buildReq() 475 if (data->ssl.state == WAIT_FRAG_ACK) { in eap_ttls_buildReq() [all …]
|
D | eap_server_fast.c | 32 struct eap_ssl_data ssl; member 281 sks = eap_fast_derive_key(sm->cfg->ssl_ctx, data->ssl.conn, in eap_fast_derive_key_auth() 307 eap_fast_derive_key(sm->cfg->ssl_ctx, data->ssl.conn, in eap_fast_derive_key_provisioning() 426 if (eap_server_tls_ssl_init(sm, &data->ssl, 0, EAP_TYPE_FAST)) { in eap_fast_init() 432 if (tls_connection_set_cipher_list(sm->cfg->ssl_ctx, data->ssl.conn, in eap_fast_init() 441 data->ssl.conn, in eap_fast_init() 504 eap_server_tls_ssl_deinit(sm, &data->ssl); in eap_fast_reset() 546 if (tls_get_cipher(sm->cfg->ssl_ctx, data->ssl.conn, in eap_fast_phase1_done() 815 encr = eap_server_tls_encrypt(sm, &data->ssl, plain); in eap_fast_encrypt_phase2() 821 if (data->ssl.tls_out && piggyback) { in eap_fast_encrypt_phase2() [all …]
|
D | eap_server_teap.c | 30 struct eap_ssl_data ssl; member 298 res = tls_connection_export_key(sm->cfg->ssl_ctx, data->ssl.conn, in eap_teap_derive_key_auth() 372 if (eap_server_tls_ssl_init(sm, &data->ssl, in eap_teap_init() 384 data->ssl.conn, in eap_teap_init() 449 eap_server_tls_ssl_deinit(sm, &data->ssl); in eap_teap_reset() 514 subject = tls_connection_get_peer_subject(data->ssl.conn); in eap_teap_phase1_done() 524 data->tls_cs = tls_connection_get_cipher_suite(data->ssl.conn); in eap_teap_phase1_done() 528 if (tls_get_cipher(sm->cfg->ssl_ctx, data->ssl.conn, in eap_teap_phase1_done() 863 encr = eap_server_tls_encrypt(sm, &data->ssl, plain); in eap_teap_encrypt_phase2() 869 if (data->ssl.tls_out && piggyback) { in eap_teap_encrypt_phase2() [all …]
|
/hostap-latest/src/eap_peer/ |
D | eap_tls.c | 22 struct eap_ssl_data ssl; member 59 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_TLS)) { in eap_tls_init() 95 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, in eap_unauth_tls_init() 122 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, in eap_wfa_unauth_tls_init() 150 eap_peer_tls_ssl_deinit(sm, &data->ssl); in eap_tls_deinit() 190 if (data->ssl.tls_out) { in eap_tls_success() 195 if (data->ssl.tls_v13) { in eap_tls_success() 212 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, label, in eap_tls_success() 227 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, in eap_tls_success() 277 pos = eap_peer_tls_process_init(sm, &data->ssl, data->eap_type, ret, in eap_tls_process() [all …]
|
D | eap_peap.c | 33 struct eap_ssl_data ssl; member 174 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_PEAP)) { in eap_peap_init() 201 eap_peer_tls_ssl_deinit(sm, &data->ssl); in eap_peap_deinit() 282 resumed = tls_connection_resumed(sm->ssl_ctx, data->ssl.conn); in eap_peap_derive_cmk() 477 !tls_connection_resumed(sm->ssl_ctx, data->ssl.conn) && in peap_phase2_sufficient() 478 !data->ssl.client_cert_conf) || in peap_phase2_sufficient() 811 eap_peer_tls_reset_input(&data->ssl); in eap_peap_decrypt() 832 return eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_PEAP, in eap_peap_decrypt() 837 res = eap_peer_tls_decrypt(sm, &data->ssl, in_data, &in_decrypted); in eap_peap_decrypt() 1008 if (eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_PEAP, in eap_peap_decrypt() [all …]
|
D | eap_fast.c | 34 struct eap_ssl_data ssl; member 173 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_FAST)) { in eap_fast_init() 179 if (tls_connection_set_session_ticket_cb(sm->ssl_ctx, data->ssl.conn, in eap_fast_init() 193 if (tls_connection_enable_workaround(sm->ssl_ctx, data->ssl.conn)) { in eap_fast_init() 241 eap_peer_tls_ssl_deinit(sm, &data->ssl); in eap_fast_deinit() 278 sks = eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, in eap_fast_derive_key_auth() 305 eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, in eap_fast_derive_key_provisioning() 821 sm, &data->ssl, EAP_TYPE_FAST, &data->id_len); in eap_fast_process_crypto_binding() 1157 if (eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_FAST, in eap_fast_encrypt_response() 1315 eap_peer_tls_reset_input(&data->ssl); in eap_fast_decrypt() [all …]
|
D | eap_ttls.c | 30 struct eap_ssl_data ssl; member 184 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_TTLS)) { in eap_ttls_init() 221 eap_peer_tls_ssl_deinit(sm, &data->ssl); in eap_ttls_deinit() 301 if (data->ssl.tls_v13) { in eap_ttls_v0_derive_key() 310 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, label, in eap_ttls_v0_derive_key() 326 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, in eap_ttls_v0_derive_key() 344 return eap_peer_tls_derive_key(sm, &data->ssl, "ttls challenge", in eap_ttls_implicit_challenge() 1127 if (eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_TTLS, in eap_ttls_encrypt_response() 1432 tls_connection_resumed(sm->ssl_ctx, data->ssl.conn)) { in eap_ttls_phase2_start() 1467 eap_peer_tls_reset_input(&data->ssl); in eap_ttls_decrypt() [all …]
|
D | eap_teap.c | 28 struct eap_ssl_data ssl; member 193 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_TEAP)) { in eap_teap_init() 199 if (tls_connection_set_session_ticket_cb(sm->ssl_ctx, data->ssl.conn, in eap_teap_init() 263 eap_peer_tls_ssl_deinit(sm, &data->ssl); in eap_teap_deinit() 297 res = tls_connection_export_key(sm->ssl_ctx, data->ssl.conn, in eap_teap_derive_key_auth() 803 res = tls_get_tls_unique(data->ssl.conn, data->session_id + 1, in eap_teap_session_id() 1399 tls_connection_get_own_cert_used(data->ssl.conn) && in eap_teap_process_decrypted() 1489 if (eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_TEAP, in eap_teap_process_decrypted() 1517 eap_peer_tls_reset_input(&data->ssl); in eap_teap_decrypt() 1526 res = eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_TEAP, in eap_teap_decrypt() [all …]
|
/hostap-latest/src/utils/ |
D | http_curl.c | 980 SSL *ssl; in curl_cb_ssl_verify() local 983 ssl = X509_STORE_CTX_get_ex_data(x509_ctx, in curl_cb_ssl_verify() 985 ssl_ctx = SSL_get_SSL_CTX(ssl); in curl_cb_ssl_verify() 1021 res = check_ocsp_resp(ssl_ctx, ssl, cert, ctx->peer_issuer, in curl_cb_ssl_verify() 1277 SSL_CTX *ssl = SSL_get_SSL_CTX(s); in curl_patch_ssl_new() local 1280 ssl->method = real_ssl_method; in curl_patch_ssl_new() 1296 SSL_CTX *ssl = sslctx; in curl_cb_ssl() local 1299 SSL_CTX_set_app_data(ssl, ctx); in curl_cb_ssl() 1300 SSL_CTX_set_verify(ssl, SSL_VERIFY_PEER, curl_cb_ssl_verify); in curl_cb_ssl() 1304 SSL_CTX_set_tlsext_status_cb(ssl, ocsp_resp_cb); in curl_cb_ssl() [all …]
|
/hostap-latest/hs20/server/ |
D | hs20-osu-server.txt | 222 Edit /etc/apache2/sites-available/default-ssl 242 Enable default-ssl site and restart Apache2: 243 sudo a2ensite default-ssl 244 sudo a2enmod ssl
|
/hostap-latest/wpa_supplicant/ |
D | ChangeLog | 1939 to configure OpenSSL CA path, e.g., /etc/ssl/certs, for using the
|