Home
last modified time | relevance | path

Searched refs:suite (Results 1 – 25 of 29) sorted by relevance

12

/hostap-latest/src/rsn_supp/
Dwpa_ie.c54 u32 suite; in wpa_gen_wpa_ie_wpa() local
66 suite = wpa_cipher_to_suite(WPA_PROTO_WPA, group_cipher); in wpa_gen_wpa_ie_wpa()
67 if (suite == 0) { in wpa_gen_wpa_ie_wpa()
72 RSN_SELECTOR_PUT(pos, suite); in wpa_gen_wpa_ie_wpa()
77 suite = wpa_cipher_to_suite(WPA_PROTO_WPA, pairwise_cipher); in wpa_gen_wpa_ie_wpa()
78 if (suite == 0 || in wpa_gen_wpa_ie_wpa()
85 RSN_SELECTOR_PUT(pos, suite); in wpa_gen_wpa_ie_wpa()
143 u32 suite; in wpa_gen_wpa_ie_rsn() local
158 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, group_cipher); in wpa_gen_wpa_ie_rsn()
159 if (suite == 0) { in wpa_gen_wpa_ie_rsn()
[all …]
/hostap-latest/src/tls/
Dtlsv1_record.c33 const struct tls_cipher_suite *suite; in tlsv1_record_set_cipher_suite() local
40 suite = tls_get_cipher_suite(cipher_suite); in tlsv1_record_set_cipher_suite()
41 if (suite == NULL) in tlsv1_record_set_cipher_suite()
44 if (suite->hash == TLS_HASH_MD5) { in tlsv1_record_set_cipher_suite()
47 } else if (suite->hash == TLS_HASH_SHA) { in tlsv1_record_set_cipher_suite()
50 } else if (suite->hash == TLS_HASH_SHA256) { in tlsv1_record_set_cipher_suite()
55 data = tls_get_cipher_data(suite->cipher); in tlsv1_record_set_cipher_suite()
Dtlsv1_common.c107 const struct tls_cipher_suite * tls_get_cipher_suite(u16 suite) in tls_get_cipher_suite() argument
111 if (tls_cipher_suites[i].suite == suite) in tls_get_cipher_suite()
129 const struct tls_cipher_suite *suite; in tls_server_key_exchange_allowed() local
132 suite = tls_get_cipher_suite(cipher); in tls_server_key_exchange_allowed()
133 if (suite == NULL) in tls_server_key_exchange_allowed()
136 switch (suite->key_exchange) { in tls_server_key_exchange_allowed()
Dtlsv1_server_read.c30 static int testing_cipher_suite_filter(struct tlsv1_server *conn, u16 suite) in testing_cipher_suite_filter() argument
37 suite != TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 && in testing_cipher_suite_filter()
38 suite != TLS_DHE_RSA_WITH_AES_256_CBC_SHA && in testing_cipher_suite_filter()
39 suite != TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 && in testing_cipher_suite_filter()
40 suite != TLS_DHE_RSA_WITH_AES_128_CBC_SHA && in testing_cipher_suite_filter()
41 suite != TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA) in testing_cipher_suite_filter()
814 const struct tls_cipher_suite *suite; in tls_process_client_key_exchange() local
862 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_process_client_key_exchange()
863 if (suite == NULL) in tls_process_client_key_exchange()
866 keyx = suite->key_exchange; in tls_process_client_key_exchange()
Dtlsv1_server_write.c195 const struct tls_cipher_suite *suite; in tls_write_server_certificate() local
197 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_write_server_certificate()
198 if (suite && suite->key_exchange == TLS_KEY_X_DH_anon) { in tls_write_server_certificate()
372 const struct tls_cipher_suite *suite; in tls_write_server_key_exchange() local
380 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_write_server_key_exchange()
381 if (suite == NULL) in tls_write_server_key_exchange()
384 keyx = suite->key_exchange; in tls_write_server_key_exchange()
Dtlsv1_common.h216 u16 suite; member
250 const struct tls_cipher_suite * tls_get_cipher_suite(u16 suite);
Dtlsv1_client_read.c1028 const struct tls_cipher_suite *suite; in tls_process_server_key_exchange() local
1095 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_process_server_key_exchange()
1096 if (suite && (suite->key_exchange == TLS_KEY_X_DH_anon || in tls_process_server_key_exchange()
1097 suite->key_exchange == TLS_KEY_X_DHE_RSA)) { in tls_process_server_key_exchange()
1099 suite->key_exchange) < 0) { in tls_process_server_key_exchange()
Dtlsv1_client_write.c512 const struct tls_cipher_suite *suite; in tls_write_client_key_exchange() local
514 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_write_client_key_exchange()
515 if (suite == NULL) in tls_write_client_key_exchange()
518 keyx = suite->key_exchange; in tls_write_client_key_exchange()
/hostap-latest/src/ap/
Dwpa_auth_ie.c33 u32 suite; in wpa_write_wpa_ie() local
41 suite = wpa_cipher_to_suite(WPA_PROTO_WPA, conf->wpa_group); in wpa_write_wpa_ie()
42 if (suite == 0) { in wpa_write_wpa_ie()
47 RSN_SELECTOR_PUT(pos, suite); in wpa_write_wpa_ie()
130 u32 suite; in rsne_write_data() local
132 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, group); in rsne_write_data()
133 if (suite == 0) { in rsne_write_data()
137 RSN_SELECTOR_PUT(pos, suite); in rsne_write_data()
1474 u32 cipher, suite, selector, mask; in wpa_auth_write_fd_rsn_info() local
1489 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, conf->wpa_group); in wpa_auth_write_fd_rsn_info()
[all …]
Dieee802_1x.c441 u32 suite; in add_common_radius_sta_attr_rsn() local
446 suite = wpa_cipher_to_suite(ver, val); in add_common_radius_sta_attr_rsn()
451 suite)) { in add_common_radius_sta_attr_rsn()
456 suite = wpa_cipher_to_suite(((hapd->conf->wpa & 0x2) || in add_common_radius_sta_attr_rsn()
463 suite)) { in add_common_radius_sta_attr_rsn()
469 suite = wpa_akm_to_suite(val); in add_common_radius_sta_attr_rsn()
474 suite)) { in add_common_radius_sta_attr_rsn()
480 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, in add_common_radius_sta_attr_rsn()
485 msg, RADIUS_ATTR_WLAN_GROUP_MGMT_CIPHER, suite)) { in add_common_radius_sta_attr_rsn()
/hostap-latest/src/crypto/
Dtls_wolfssl.c1879 const char *suite; in tls_connection_set_cipher_list() local
1883 suite = "RC4-SHA"; in tls_connection_set_cipher_list()
1886 suite = "AES128-SHA"; in tls_connection_set_cipher_list()
1889 suite = "DHE-RSA-AES128-SHA"; in tls_connection_set_cipher_list()
1892 suite = "ADH-AES128-SHA"; in tls_connection_set_cipher_list()
1895 suite = "DHE-RSA-AES256-SHA"; in tls_connection_set_cipher_list()
1898 suite = "AES256-SHA"; in tls_connection_set_cipher_list()
1905 ret = os_snprintf(pos, end - pos, ":%s", suite); in tls_connection_set_cipher_list()
Dcrypto_openssl.c5356 static bool hpke_set_suite(OSSL_HPKE_SUITE *suite, in hpke_set_suite() argument
5361 os_memset(suite, 0, sizeof(*suite)); in hpke_set_suite()
5365 suite->kem_id = OSSL_HPKE_KEM_ID_P256; in hpke_set_suite()
5368 suite->kem_id = OSSL_HPKE_KEM_ID_P384; in hpke_set_suite()
5371 suite->kem_id = OSSL_HPKE_KEM_ID_P521; in hpke_set_suite()
5379 suite->kdf_id = OSSL_HPKE_KDF_ID_HKDF_SHA256; in hpke_set_suite()
5382 suite->kdf_id = OSSL_HPKE_KDF_ID_HKDF_SHA384; in hpke_set_suite()
5385 suite->kdf_id = OSSL_HPKE_KDF_ID_HKDF_SHA512; in hpke_set_suite()
5393 suite->aead_id = OSSL_HPKE_AEAD_ID_AES_GCM_128; in hpke_set_suite()
5396 suite->aead_id = OSSL_HPKE_AEAD_ID_AES_GCM_256; in hpke_set_suite()
[all …]
Dtls_openssl.c4856 const char *suite; in tls_connection_set_cipher_list() local
4860 suite = "RC4-SHA"; in tls_connection_set_cipher_list()
4863 suite = "AES128-SHA"; in tls_connection_set_cipher_list()
4866 suite = "DHE-RSA-AES128-SHA"; in tls_connection_set_cipher_list()
4869 suite = "ADH-AES128-SHA"; in tls_connection_set_cipher_list()
4872 suite = "DHE-RSA-AES256-SHA"; in tls_connection_set_cipher_list()
4875 suite = "AES256-SHA"; in tls_connection_set_cipher_list()
4882 ret = os_snprintf(pos, end - pos, ":%s", suite); in tls_connection_set_cipher_list()
/hostap-latest/wpa_supplicant/doc/docbook/
Deapol_test.sgml66 test suite for a RADIUS authentication server.</para>
/hostap-latest/wpa_supplicant/
Dsme.c1499 static bool is_sae_key_mgmt_suite(struct wpa_supplicant *wpa_s, u32 suite) in is_sae_key_mgmt_suite() argument
1507 if (RSN_SELECTOR_GET(&suite) == RSN_AUTH_KEY_MGMT_SAE) { in is_sae_key_mgmt_suite()
1515 if (suite == RSN_AUTH_KEY_MGMT_SAE) in is_sae_key_mgmt_suite()
1517 else if (suite == RSN_AUTH_KEY_MGMT_FT_SAE) in is_sae_key_mgmt_suite()
1519 else if (suite == RSN_AUTH_KEY_MGMT_SAE_EXT_KEY) in is_sae_key_mgmt_suite()
1521 else if (suite == RSN_AUTH_KEY_MGMT_FT_SAE_EXT_KEY) in is_sae_key_mgmt_suite()
Deap_testing.txt15 The full automated test suite can now be run in couple of seconds, but
/hostap-latest/src/common/
Dsae.c1751 u32 suite = wpa_akm_to_suite(sae->akmp); in sae_write_commit() local
1756 RSN_SELECTOR_PUT(wpabuf_put(buf, RSN_SELECTOR_LEN), suite); in sae_write_commit()
1757 wpa_printf(MSG_DEBUG, "SAE: AKM Suite Selector: %08x", suite); in sae_write_commit()
1758 sae->own_akm_suite_selector = suite; in sae_write_commit()
Dwpa_common.c3886 u32 suite; in wpa_pasn_add_rsne() local
3912 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, cipher); in wpa_pasn_add_rsne()
3913 RSN_SELECTOR_PUT(pos, suite); in wpa_pasn_add_rsne()
/hostap-latest/hostapd/
Dandroid.config92 # Include support for optional SHA256 cipher suite in EAP-GPSK
Ddefconfig101 # Include support for optional SHA256 cipher suite in EAP-GPSK
/hostap-latest/doc/
Dtesting_tools.doxygen33 could be used to implement an automated regression test suite for a
Ddriver_wrapper.doxygen68 WPA requires that the pairwise cipher suite (encryption algorithm for
Ddbus.doxygen2173 …<tr><td>KeyMgmt</td><td>as</td><td>Key management suite. Possible array elements: "wpa-psk", "wpa-…
2175 …<tr><td>Group</td><td>s</td><td>Group cipher suite. Possible values are: "ccmp", "tkip", "wep104",…
2182suite. Possible array elements: "wpa-psk", "wpa-ft-psk", "wpa-psk-sha256", "wpa-eap", "wpa-ft-eap…
2184 …<tr><td>Group</td><td>s</td><td>Group cipher suite. Possible values are: "ccmp", "tkip", "wep104",…
2185 …<tr><td>MgmtGroup</td><td>s</td><td>Management frames cipher suite. Possible values are: "aes128cm…
/hostap-latest/src/drivers/
Ddriver_nl80211.c3519 u32 suite; in wpa_driver_nl80211_set_key() local
3521 suite = wpa_alg_to_cipher_suite(alg, key_len); in wpa_driver_nl80211_set_key()
3522 if (!suite) { in wpa_driver_nl80211_set_key()
3531 nla_put_u32(key_msg, NL80211_KEY_CIPHER, suite)) in wpa_driver_nl80211_set_key()
3696 u32 suite; in nl_add_key() local
3701 suite = wpa_alg_to_cipher_suite(alg, key_len); in nl_add_key()
3702 if (!suite) in nl_add_key()
3714 nla_put_u32(msg, NL80211_KEY_CIPHER, suite) || in nl_add_key()
5057 u32 suites[20], suite; in wpa_driver_nl80211_set_ap() local
5247 suite = wpa_cipher_to_cipher_suite(params->group_cipher); in wpa_driver_nl80211_set_ap()
[all …]
/hostap-latest/tests/
Dcipher-and-key-mgmt-testing.txt1 Cipher suite (CCMP, TKIP, GCMP, ..) and key management testing

12