/hostap-latest/src/rsn_supp/ |
D | wpa_ie.c | 54 u32 suite; in wpa_gen_wpa_ie_wpa() local 66 suite = wpa_cipher_to_suite(WPA_PROTO_WPA, group_cipher); in wpa_gen_wpa_ie_wpa() 67 if (suite == 0) { in wpa_gen_wpa_ie_wpa() 72 RSN_SELECTOR_PUT(pos, suite); in wpa_gen_wpa_ie_wpa() 77 suite = wpa_cipher_to_suite(WPA_PROTO_WPA, pairwise_cipher); in wpa_gen_wpa_ie_wpa() 78 if (suite == 0 || in wpa_gen_wpa_ie_wpa() 85 RSN_SELECTOR_PUT(pos, suite); in wpa_gen_wpa_ie_wpa() 143 u32 suite; in wpa_gen_wpa_ie_rsn() local 158 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, group_cipher); in wpa_gen_wpa_ie_rsn() 159 if (suite == 0) { in wpa_gen_wpa_ie_rsn() [all …]
|
/hostap-latest/src/tls/ |
D | tlsv1_record.c | 33 const struct tls_cipher_suite *suite; in tlsv1_record_set_cipher_suite() local 40 suite = tls_get_cipher_suite(cipher_suite); in tlsv1_record_set_cipher_suite() 41 if (suite == NULL) in tlsv1_record_set_cipher_suite() 44 if (suite->hash == TLS_HASH_MD5) { in tlsv1_record_set_cipher_suite() 47 } else if (suite->hash == TLS_HASH_SHA) { in tlsv1_record_set_cipher_suite() 50 } else if (suite->hash == TLS_HASH_SHA256) { in tlsv1_record_set_cipher_suite() 55 data = tls_get_cipher_data(suite->cipher); in tlsv1_record_set_cipher_suite()
|
D | tlsv1_common.c | 107 const struct tls_cipher_suite * tls_get_cipher_suite(u16 suite) in tls_get_cipher_suite() argument 111 if (tls_cipher_suites[i].suite == suite) in tls_get_cipher_suite() 129 const struct tls_cipher_suite *suite; in tls_server_key_exchange_allowed() local 132 suite = tls_get_cipher_suite(cipher); in tls_server_key_exchange_allowed() 133 if (suite == NULL) in tls_server_key_exchange_allowed() 136 switch (suite->key_exchange) { in tls_server_key_exchange_allowed()
|
D | tlsv1_server_read.c | 30 static int testing_cipher_suite_filter(struct tlsv1_server *conn, u16 suite) in testing_cipher_suite_filter() argument 37 suite != TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 && in testing_cipher_suite_filter() 38 suite != TLS_DHE_RSA_WITH_AES_256_CBC_SHA && in testing_cipher_suite_filter() 39 suite != TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 && in testing_cipher_suite_filter() 40 suite != TLS_DHE_RSA_WITH_AES_128_CBC_SHA && in testing_cipher_suite_filter() 41 suite != TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA) in testing_cipher_suite_filter() 814 const struct tls_cipher_suite *suite; in tls_process_client_key_exchange() local 862 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_process_client_key_exchange() 863 if (suite == NULL) in tls_process_client_key_exchange() 866 keyx = suite->key_exchange; in tls_process_client_key_exchange()
|
D | tlsv1_server_write.c | 195 const struct tls_cipher_suite *suite; in tls_write_server_certificate() local 197 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_write_server_certificate() 198 if (suite && suite->key_exchange == TLS_KEY_X_DH_anon) { in tls_write_server_certificate() 372 const struct tls_cipher_suite *suite; in tls_write_server_key_exchange() local 380 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_write_server_key_exchange() 381 if (suite == NULL) in tls_write_server_key_exchange() 384 keyx = suite->key_exchange; in tls_write_server_key_exchange()
|
D | tlsv1_common.h | 216 u16 suite; member 250 const struct tls_cipher_suite * tls_get_cipher_suite(u16 suite);
|
D | tlsv1_client_read.c | 1028 const struct tls_cipher_suite *suite; in tls_process_server_key_exchange() local 1095 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_process_server_key_exchange() 1096 if (suite && (suite->key_exchange == TLS_KEY_X_DH_anon || in tls_process_server_key_exchange() 1097 suite->key_exchange == TLS_KEY_X_DHE_RSA)) { in tls_process_server_key_exchange() 1099 suite->key_exchange) < 0) { in tls_process_server_key_exchange()
|
D | tlsv1_client_write.c | 512 const struct tls_cipher_suite *suite; in tls_write_client_key_exchange() local 514 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_write_client_key_exchange() 515 if (suite == NULL) in tls_write_client_key_exchange() 518 keyx = suite->key_exchange; in tls_write_client_key_exchange()
|
/hostap-latest/src/ap/ |
D | wpa_auth_ie.c | 33 u32 suite; in wpa_write_wpa_ie() local 41 suite = wpa_cipher_to_suite(WPA_PROTO_WPA, conf->wpa_group); in wpa_write_wpa_ie() 42 if (suite == 0) { in wpa_write_wpa_ie() 47 RSN_SELECTOR_PUT(pos, suite); in wpa_write_wpa_ie() 130 u32 suite; in rsne_write_data() local 132 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, group); in rsne_write_data() 133 if (suite == 0) { in rsne_write_data() 137 RSN_SELECTOR_PUT(pos, suite); in rsne_write_data() 1474 u32 cipher, suite, selector, mask; in wpa_auth_write_fd_rsn_info() local 1489 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, conf->wpa_group); in wpa_auth_write_fd_rsn_info() [all …]
|
D | ieee802_1x.c | 441 u32 suite; in add_common_radius_sta_attr_rsn() local 446 suite = wpa_cipher_to_suite(ver, val); in add_common_radius_sta_attr_rsn() 451 suite)) { in add_common_radius_sta_attr_rsn() 456 suite = wpa_cipher_to_suite(((hapd->conf->wpa & 0x2) || in add_common_radius_sta_attr_rsn() 463 suite)) { in add_common_radius_sta_attr_rsn() 469 suite = wpa_akm_to_suite(val); in add_common_radius_sta_attr_rsn() 474 suite)) { in add_common_radius_sta_attr_rsn() 480 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, in add_common_radius_sta_attr_rsn() 485 msg, RADIUS_ATTR_WLAN_GROUP_MGMT_CIPHER, suite)) { in add_common_radius_sta_attr_rsn()
|
/hostap-latest/src/crypto/ |
D | tls_wolfssl.c | 1879 const char *suite; in tls_connection_set_cipher_list() local 1883 suite = "RC4-SHA"; in tls_connection_set_cipher_list() 1886 suite = "AES128-SHA"; in tls_connection_set_cipher_list() 1889 suite = "DHE-RSA-AES128-SHA"; in tls_connection_set_cipher_list() 1892 suite = "ADH-AES128-SHA"; in tls_connection_set_cipher_list() 1895 suite = "DHE-RSA-AES256-SHA"; in tls_connection_set_cipher_list() 1898 suite = "AES256-SHA"; in tls_connection_set_cipher_list() 1905 ret = os_snprintf(pos, end - pos, ":%s", suite); in tls_connection_set_cipher_list()
|
D | crypto_openssl.c | 5356 static bool hpke_set_suite(OSSL_HPKE_SUITE *suite, in hpke_set_suite() argument 5361 os_memset(suite, 0, sizeof(*suite)); in hpke_set_suite() 5365 suite->kem_id = OSSL_HPKE_KEM_ID_P256; in hpke_set_suite() 5368 suite->kem_id = OSSL_HPKE_KEM_ID_P384; in hpke_set_suite() 5371 suite->kem_id = OSSL_HPKE_KEM_ID_P521; in hpke_set_suite() 5379 suite->kdf_id = OSSL_HPKE_KDF_ID_HKDF_SHA256; in hpke_set_suite() 5382 suite->kdf_id = OSSL_HPKE_KDF_ID_HKDF_SHA384; in hpke_set_suite() 5385 suite->kdf_id = OSSL_HPKE_KDF_ID_HKDF_SHA512; in hpke_set_suite() 5393 suite->aead_id = OSSL_HPKE_AEAD_ID_AES_GCM_128; in hpke_set_suite() 5396 suite->aead_id = OSSL_HPKE_AEAD_ID_AES_GCM_256; in hpke_set_suite() [all …]
|
D | tls_openssl.c | 4856 const char *suite; in tls_connection_set_cipher_list() local 4860 suite = "RC4-SHA"; in tls_connection_set_cipher_list() 4863 suite = "AES128-SHA"; in tls_connection_set_cipher_list() 4866 suite = "DHE-RSA-AES128-SHA"; in tls_connection_set_cipher_list() 4869 suite = "ADH-AES128-SHA"; in tls_connection_set_cipher_list() 4872 suite = "DHE-RSA-AES256-SHA"; in tls_connection_set_cipher_list() 4875 suite = "AES256-SHA"; in tls_connection_set_cipher_list() 4882 ret = os_snprintf(pos, end - pos, ":%s", suite); in tls_connection_set_cipher_list()
|
/hostap-latest/wpa_supplicant/doc/docbook/ |
D | eapol_test.sgml | 66 test suite for a RADIUS authentication server.</para>
|
/hostap-latest/wpa_supplicant/ |
D | sme.c | 1499 static bool is_sae_key_mgmt_suite(struct wpa_supplicant *wpa_s, u32 suite) in is_sae_key_mgmt_suite() argument 1507 if (RSN_SELECTOR_GET(&suite) == RSN_AUTH_KEY_MGMT_SAE) { in is_sae_key_mgmt_suite() 1515 if (suite == RSN_AUTH_KEY_MGMT_SAE) in is_sae_key_mgmt_suite() 1517 else if (suite == RSN_AUTH_KEY_MGMT_FT_SAE) in is_sae_key_mgmt_suite() 1519 else if (suite == RSN_AUTH_KEY_MGMT_SAE_EXT_KEY) in is_sae_key_mgmt_suite() 1521 else if (suite == RSN_AUTH_KEY_MGMT_FT_SAE_EXT_KEY) in is_sae_key_mgmt_suite()
|
D | eap_testing.txt | 15 The full automated test suite can now be run in couple of seconds, but
|
/hostap-latest/src/common/ |
D | sae.c | 1751 u32 suite = wpa_akm_to_suite(sae->akmp); in sae_write_commit() local 1756 RSN_SELECTOR_PUT(wpabuf_put(buf, RSN_SELECTOR_LEN), suite); in sae_write_commit() 1757 wpa_printf(MSG_DEBUG, "SAE: AKM Suite Selector: %08x", suite); in sae_write_commit() 1758 sae->own_akm_suite_selector = suite; in sae_write_commit()
|
D | wpa_common.c | 3886 u32 suite; in wpa_pasn_add_rsne() local 3912 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, cipher); in wpa_pasn_add_rsne() 3913 RSN_SELECTOR_PUT(pos, suite); in wpa_pasn_add_rsne()
|
/hostap-latest/hostapd/ |
D | android.config | 92 # Include support for optional SHA256 cipher suite in EAP-GPSK
|
D | defconfig | 101 # Include support for optional SHA256 cipher suite in EAP-GPSK
|
/hostap-latest/doc/ |
D | testing_tools.doxygen | 33 could be used to implement an automated regression test suite for a
|
D | driver_wrapper.doxygen | 68 WPA requires that the pairwise cipher suite (encryption algorithm for
|
D | dbus.doxygen | 2173 …<tr><td>KeyMgmt</td><td>as</td><td>Key management suite. Possible array elements: "wpa-psk", "wpa-… 2175 …<tr><td>Group</td><td>s</td><td>Group cipher suite. Possible values are: "ccmp", "tkip", "wep104",… 2182 … suite. Possible array elements: "wpa-psk", "wpa-ft-psk", "wpa-psk-sha256", "wpa-eap", "wpa-ft-eap… 2184 …<tr><td>Group</td><td>s</td><td>Group cipher suite. Possible values are: "ccmp", "tkip", "wep104",… 2185 …<tr><td>MgmtGroup</td><td>s</td><td>Management frames cipher suite. Possible values are: "aes128cm…
|
/hostap-latest/src/drivers/ |
D | driver_nl80211.c | 3519 u32 suite; in wpa_driver_nl80211_set_key() local 3521 suite = wpa_alg_to_cipher_suite(alg, key_len); in wpa_driver_nl80211_set_key() 3522 if (!suite) { in wpa_driver_nl80211_set_key() 3531 nla_put_u32(key_msg, NL80211_KEY_CIPHER, suite)) in wpa_driver_nl80211_set_key() 3696 u32 suite; in nl_add_key() local 3701 suite = wpa_alg_to_cipher_suite(alg, key_len); in nl_add_key() 3702 if (!suite) in nl_add_key() 3714 nla_put_u32(msg, NL80211_KEY_CIPHER, suite) || in nl_add_key() 5057 u32 suites[20], suite; in wpa_driver_nl80211_set_ap() local 5247 suite = wpa_cipher_to_cipher_suite(params->group_cipher); in wpa_driver_nl80211_set_ap() [all …]
|
/hostap-latest/tests/ |
D | cipher-and-key-mgmt-testing.txt | 1 Cipher suite (CCMP, TKIP, GCMP, ..) and key management testing
|