Home
last modified time | relevance | path

Searched refs:verify (Results 1 – 25 of 29) sorted by relevance

12

/hostap-latest/src/tls/
Dtlsv1_common.c206 int tls_verify_hash_init(struct tls_verify_hash *verify) in tls_verify_hash_init() argument
208 tls_verify_hash_free(verify); in tls_verify_hash_init()
209 verify->md5_client = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); in tls_verify_hash_init()
210 verify->md5_server = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); in tls_verify_hash_init()
211 verify->md5_cert = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); in tls_verify_hash_init()
212 verify->sha1_client = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); in tls_verify_hash_init()
213 verify->sha1_server = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); in tls_verify_hash_init()
214 verify->sha1_cert = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); in tls_verify_hash_init()
215 if (verify->md5_client == NULL || verify->md5_server == NULL || in tls_verify_hash_init()
216 verify->md5_cert == NULL || verify->sha1_client == NULL || in tls_verify_hash_init()
[all …]
Dtlsv1_client_write.c234 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_send_client_hello()
328 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_write_client_certificate()
556 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_write_client_key_exchange()
611 if (conn->verify.sha256_cert == NULL || in tls_write_client_certificate_verify()
612 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < in tls_write_client_certificate_verify()
614 conn->verify.sha256_cert = NULL; in tls_write_client_certificate_verify()
619 conn->verify.sha256_cert = NULL; in tls_write_client_certificate_verify()
643 if (conn->verify.md5_cert == NULL || in tls_write_client_certificate_verify()
644 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { in tls_write_client_certificate_verify()
647 conn->verify.md5_cert = NULL; in tls_write_client_certificate_verify()
[all …]
Dtlsv1_server_read.c987 if (conn->verify.sha256_cert == NULL || in tls_process_certificate_verify()
988 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < in tls_process_certificate_verify()
990 conn->verify.sha256_cert = NULL; in tls_process_certificate_verify()
995 conn->verify.sha256_cert = NULL; in tls_process_certificate_verify()
1000 if (conn->verify.md5_cert == NULL || in tls_process_certificate_verify()
1001 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { in tls_process_certificate_verify()
1004 conn->verify.md5_cert = NULL; in tls_process_certificate_verify()
1005 crypto_hash_finish(conn->verify.sha1_cert, NULL, NULL); in tls_process_certificate_verify()
1006 conn->verify.sha1_cert = NULL; in tls_process_certificate_verify()
1011 conn->verify.md5_cert = NULL; in tls_process_certificate_verify()
[all …]
Dtlsv1_server_write.c171 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_write_server_hello()
273 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_write_server_certificate()
360 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_write_server_certificate_status()
687 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_write_server_key_exchange()
753 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_write_server_certificate_request()
790 tls_verify_hash_add(&conn->verify, payload, pos - payload); in tls_write_server_hello_done()
848 if (conn->verify.sha256_server == NULL || in tls_write_server_finished()
849 crypto_hash_finish(conn->verify.sha256_server, hash, &hlen) in tls_write_server_finished()
851 conn->verify.sha256_server = NULL; in tls_write_server_finished()
856 conn->verify.sha256_server = NULL; in tls_write_server_finished()
[all …]
Dtlsv1_client_read.c1384 if (conn->verify.sha256_server == NULL || in tls_process_server_finished()
1385 crypto_hash_finish(conn->verify.sha256_server, hash, &hlen) in tls_process_server_finished()
1389 conn->verify.sha256_server = NULL; in tls_process_server_finished()
1392 conn->verify.sha256_server = NULL; in tls_process_server_finished()
1397 if (conn->verify.md5_server == NULL || in tls_process_server_finished()
1398 crypto_hash_finish(conn->verify.md5_server, hash, &hlen) < 0) { in tls_process_server_finished()
1401 conn->verify.md5_server = NULL; in tls_process_server_finished()
1402 crypto_hash_finish(conn->verify.sha1_server, NULL, NULL); in tls_process_server_finished()
1403 conn->verify.sha1_server = NULL; in tls_process_server_finished()
1406 conn->verify.md5_server = NULL; in tls_process_server_finished()
[all …]
Dtlsv1_common.h254 int tls_verify_hash_init(struct tls_verify_hash *verify);
255 void tls_verify_hash_add(struct tls_verify_hash *verify, const u8 *buf,
257 void tls_verify_hash_free(struct tls_verify_hash *verify);
Dtlsv1_server.c391 if (tls_verify_hash_init(&conn->verify) < 0) { in tlsv1_server_init()
423 tls_verify_hash_free(&conn->verify); in tlsv1_server_clear_data()
616 if (tls_verify_hash_init(&conn->verify) < 0) { in tlsv1_server_shutdown()
Dtlsv1_server_i.h37 struct tls_verify_hash verify; member
Dtlsv1_client.c477 if (tls_verify_hash_init(&conn->verify) < 0) { in tlsv1_client_init()
516 tls_verify_hash_free(&conn->verify); in tlsv1_client_deinit()
692 if (tls_verify_hash_init(&conn->verify) < 0) { in tlsv1_client_shutdown()
Dtlsv1_client_i.h43 struct tls_verify_hash verify; member
/hostap-latest/tests/hwsim/auth_serv/
Dica-generate.sh82 $OPENSSL verify -CAfile ca.pem iCA-server/cacert.pem
83 $OPENSSL verify -CAfile ca.pem iCA-user/cacert.pem
84 $OPENSSL verify -CAfile ca.pem -untrusted iCA-server/cacert.pem iCA-server/server.pem
85 $OPENSSL verify -CAfile ca.pem -untrusted iCA-server/cacert.pem iCA-server/server-revoked.pem
86 $OPENSSL verify -CAfile ca.pem iCA-user/cacert.pem
87 $OPENSSL verify -CAfile ca.pem -untrusted iCA-user/cacert.pem iCA-user/user.pem
Dsha512-generate.sh72 $OPENSSL verify -CAfile sha512-ca.pem sha512-server.pem
73 $OPENSSL verify -CAfile sha512-ca.pem sha384-server.pem
74 $OPENSSL verify -CAfile sha512-ca.pem sha512-user.pem
75 $OPENSSL verify -CAfile sha512-ca.pem sha384-user.pem
Dec2-generate.sh65 $OPENSSL verify -CAfile ec2-ca.pem ec2-server.pem
66 $OPENSSL verify -CAfile ec2-ca.pem ec2-user.pem
67 $OPENSSL verify -CAfile ec2-ca.pem ec2-user-p256.pem
Drsa3072-generate.sh81 $OPENSSL verify -CAfile rsa3072-ca.pem rsa3072-server.pem
82 $OPENSSL verify -CAfile rsa3072-ca.pem rsa3072-user.pem
83 $OPENSSL verify -CAfile rsa3072-ca.pem rsa3072-user-rsa2048.pem
Dec-generate.sh52 $OPENSSL verify -CAfile ec-ca.pem ec-server.pem
53 $OPENSSL verify -CAfile ec-ca.pem ec-user.pem
/hostap-latest/tests/
Dcipher-and-key-mgmt-testing.txt7 to be modified and invalid operations to be performed to verify behavior
28 traffic is used to verify reaction of the tested device to such
35 sniffer captures and verify that the test tools are behaving correctly.
361 - verify unicast traffic from the AP to test station (either ping from
364 - verify unicast traffic from the AP to test station (either ping from
DREADME17 verify that various combinations do not break the builds. More
/hostap-latest/src/pasn/
Dpasn_initiator.c523 bool verify) in wpas_pasn_build_auth_1() argument
574 if (!verify) in wpas_pasn_build_auth_1()
879 const struct wpabuf *comeback, bool verify) in wpas_pasn_send_auth_1() argument
917 verify ? " (verify)" : "", in wpas_pasn_send_auth_1()
921 frame = wpas_pasn_build_auth_1(pasn, comeback, verify); in wpas_pasn_send_auth_1()
/hostap-latest/hs20/server/ca/
Dsetup.sh206 $OPENSSL verify -CAfile rootCA/cacert.pem demoCA/cacert.pem
207 $OPENSSL verify -CAfile rootCA/cacert.pem -untrusted demoCA/cacert.pem *.pem
/hostap-latest/tests/hwsim/
DREADME19 is used to verify that data connection (both unicast and broadcast)
25 to verify that operations have been performed correctly and that the
Dexample-setup.txt98 # following command can be used to verify that the new version is trusted
/hostap-latest/wpa_supplicant/doc/docbook/
Dwpa_background.sgml66 also used to verify that both Authenticator and Supplicant know
/hostap-latest/wpa_supplicant/
Dtodo.txt77 - test EAP-FAST peer with OpenSSL and verify that fallback to full handshake
DREADME-WPS103 remove non-digit characters and potentially, to verify the checksum
/hostap-latest/hostapd/
DREADME-WPS126 remove non-digit characters and potentially, to verify the checksum

12