/hostap-latest/src/tls/ |
D | tlsv1_common.c | 206 int tls_verify_hash_init(struct tls_verify_hash *verify) in tls_verify_hash_init() argument 208 tls_verify_hash_free(verify); in tls_verify_hash_init() 209 verify->md5_client = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); in tls_verify_hash_init() 210 verify->md5_server = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); in tls_verify_hash_init() 211 verify->md5_cert = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); in tls_verify_hash_init() 212 verify->sha1_client = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); in tls_verify_hash_init() 213 verify->sha1_server = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); in tls_verify_hash_init() 214 verify->sha1_cert = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); in tls_verify_hash_init() 215 if (verify->md5_client == NULL || verify->md5_server == NULL || in tls_verify_hash_init() 216 verify->md5_cert == NULL || verify->sha1_client == NULL || in tls_verify_hash_init() [all …]
|
D | tlsv1_client_write.c | 234 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_send_client_hello() 328 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_write_client_certificate() 556 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_write_client_key_exchange() 611 if (conn->verify.sha256_cert == NULL || in tls_write_client_certificate_verify() 612 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < in tls_write_client_certificate_verify() 614 conn->verify.sha256_cert = NULL; in tls_write_client_certificate_verify() 619 conn->verify.sha256_cert = NULL; in tls_write_client_certificate_verify() 643 if (conn->verify.md5_cert == NULL || in tls_write_client_certificate_verify() 644 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { in tls_write_client_certificate_verify() 647 conn->verify.md5_cert = NULL; in tls_write_client_certificate_verify() [all …]
|
D | tlsv1_server_read.c | 987 if (conn->verify.sha256_cert == NULL || in tls_process_certificate_verify() 988 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < in tls_process_certificate_verify() 990 conn->verify.sha256_cert = NULL; in tls_process_certificate_verify() 995 conn->verify.sha256_cert = NULL; in tls_process_certificate_verify() 1000 if (conn->verify.md5_cert == NULL || in tls_process_certificate_verify() 1001 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { in tls_process_certificate_verify() 1004 conn->verify.md5_cert = NULL; in tls_process_certificate_verify() 1005 crypto_hash_finish(conn->verify.sha1_cert, NULL, NULL); in tls_process_certificate_verify() 1006 conn->verify.sha1_cert = NULL; in tls_process_certificate_verify() 1011 conn->verify.md5_cert = NULL; in tls_process_certificate_verify() [all …]
|
D | tlsv1_server_write.c | 171 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_write_server_hello() 273 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_write_server_certificate() 360 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_write_server_certificate_status() 687 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_write_server_key_exchange() 753 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_write_server_certificate_request() 790 tls_verify_hash_add(&conn->verify, payload, pos - payload); in tls_write_server_hello_done() 848 if (conn->verify.sha256_server == NULL || in tls_write_server_finished() 849 crypto_hash_finish(conn->verify.sha256_server, hash, &hlen) in tls_write_server_finished() 851 conn->verify.sha256_server = NULL; in tls_write_server_finished() 856 conn->verify.sha256_server = NULL; in tls_write_server_finished() [all …]
|
D | tlsv1_client_read.c | 1384 if (conn->verify.sha256_server == NULL || in tls_process_server_finished() 1385 crypto_hash_finish(conn->verify.sha256_server, hash, &hlen) in tls_process_server_finished() 1389 conn->verify.sha256_server = NULL; in tls_process_server_finished() 1392 conn->verify.sha256_server = NULL; in tls_process_server_finished() 1397 if (conn->verify.md5_server == NULL || in tls_process_server_finished() 1398 crypto_hash_finish(conn->verify.md5_server, hash, &hlen) < 0) { in tls_process_server_finished() 1401 conn->verify.md5_server = NULL; in tls_process_server_finished() 1402 crypto_hash_finish(conn->verify.sha1_server, NULL, NULL); in tls_process_server_finished() 1403 conn->verify.sha1_server = NULL; in tls_process_server_finished() 1406 conn->verify.md5_server = NULL; in tls_process_server_finished() [all …]
|
D | tlsv1_common.h | 254 int tls_verify_hash_init(struct tls_verify_hash *verify); 255 void tls_verify_hash_add(struct tls_verify_hash *verify, const u8 *buf, 257 void tls_verify_hash_free(struct tls_verify_hash *verify);
|
D | tlsv1_server.c | 391 if (tls_verify_hash_init(&conn->verify) < 0) { in tlsv1_server_init() 423 tls_verify_hash_free(&conn->verify); in tlsv1_server_clear_data() 616 if (tls_verify_hash_init(&conn->verify) < 0) { in tlsv1_server_shutdown()
|
D | tlsv1_server_i.h | 37 struct tls_verify_hash verify; member
|
D | tlsv1_client.c | 477 if (tls_verify_hash_init(&conn->verify) < 0) { in tlsv1_client_init() 516 tls_verify_hash_free(&conn->verify); in tlsv1_client_deinit() 692 if (tls_verify_hash_init(&conn->verify) < 0) { in tlsv1_client_shutdown()
|
D | tlsv1_client_i.h | 43 struct tls_verify_hash verify; member
|
/hostap-latest/tests/hwsim/auth_serv/ |
D | ica-generate.sh | 82 $OPENSSL verify -CAfile ca.pem iCA-server/cacert.pem 83 $OPENSSL verify -CAfile ca.pem iCA-user/cacert.pem 84 $OPENSSL verify -CAfile ca.pem -untrusted iCA-server/cacert.pem iCA-server/server.pem 85 $OPENSSL verify -CAfile ca.pem -untrusted iCA-server/cacert.pem iCA-server/server-revoked.pem 86 $OPENSSL verify -CAfile ca.pem iCA-user/cacert.pem 87 $OPENSSL verify -CAfile ca.pem -untrusted iCA-user/cacert.pem iCA-user/user.pem
|
D | sha512-generate.sh | 72 $OPENSSL verify -CAfile sha512-ca.pem sha512-server.pem 73 $OPENSSL verify -CAfile sha512-ca.pem sha384-server.pem 74 $OPENSSL verify -CAfile sha512-ca.pem sha512-user.pem 75 $OPENSSL verify -CAfile sha512-ca.pem sha384-user.pem
|
D | ec2-generate.sh | 65 $OPENSSL verify -CAfile ec2-ca.pem ec2-server.pem 66 $OPENSSL verify -CAfile ec2-ca.pem ec2-user.pem 67 $OPENSSL verify -CAfile ec2-ca.pem ec2-user-p256.pem
|
D | rsa3072-generate.sh | 81 $OPENSSL verify -CAfile rsa3072-ca.pem rsa3072-server.pem 82 $OPENSSL verify -CAfile rsa3072-ca.pem rsa3072-user.pem 83 $OPENSSL verify -CAfile rsa3072-ca.pem rsa3072-user-rsa2048.pem
|
D | ec-generate.sh | 52 $OPENSSL verify -CAfile ec-ca.pem ec-server.pem 53 $OPENSSL verify -CAfile ec-ca.pem ec-user.pem
|
/hostap-latest/tests/ |
D | cipher-and-key-mgmt-testing.txt | 7 to be modified and invalid operations to be performed to verify behavior 28 traffic is used to verify reaction of the tested device to such 35 sniffer captures and verify that the test tools are behaving correctly. 361 - verify unicast traffic from the AP to test station (either ping from 364 - verify unicast traffic from the AP to test station (either ping from
|
D | README | 17 verify that various combinations do not break the builds. More
|
/hostap-latest/src/pasn/ |
D | pasn_initiator.c | 523 bool verify) in wpas_pasn_build_auth_1() argument 574 if (!verify) in wpas_pasn_build_auth_1() 879 const struct wpabuf *comeback, bool verify) in wpas_pasn_send_auth_1() argument 917 verify ? " (verify)" : "", in wpas_pasn_send_auth_1() 921 frame = wpas_pasn_build_auth_1(pasn, comeback, verify); in wpas_pasn_send_auth_1()
|
/hostap-latest/hs20/server/ca/ |
D | setup.sh | 206 $OPENSSL verify -CAfile rootCA/cacert.pem demoCA/cacert.pem 207 $OPENSSL verify -CAfile rootCA/cacert.pem -untrusted demoCA/cacert.pem *.pem
|
/hostap-latest/tests/hwsim/ |
D | README | 19 is used to verify that data connection (both unicast and broadcast) 25 to verify that operations have been performed correctly and that the
|
D | example-setup.txt | 98 # following command can be used to verify that the new version is trusted
|
/hostap-latest/wpa_supplicant/doc/docbook/ |
D | wpa_background.sgml | 66 also used to verify that both Authenticator and Supplicant know
|
/hostap-latest/wpa_supplicant/ |
D | todo.txt | 77 - test EAP-FAST peer with OpenSSL and verify that fallback to full handshake
|
D | README-WPS | 103 remove non-digit characters and potentially, to verify the checksum
|
/hostap-latest/hostapd/ |
D | README-WPS | 126 remove non-digit characters and potentially, to verify the checksum
|