Home
last modified time | relevance | path

Searched +full:- +full:test_fuzz (Results 1 – 25 of 29) sorted by relevance

12

/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
Deap_sim.c2 * EAP peer method: EAP-SIM (RFC 4186)
3 * Copyright (c) 2004-2012, Jouni Malinen <j@w1.fi>
76 wpa_printf(MSG_DEBUG, "EAP-SIM: %s -> %s", in eap_sim_state()
77 eap_sim_state_txt(data->state), in eap_sim_state()
79 data->state = state; in eap_sim_state()
92 if (random_get_bytes(data->nonce_mt, EAP_SIM_NONCE_MT_LEN)) { in eap_sim_init()
93 wpa_printf(MSG_WARNING, "EAP-SIM: Failed to get random data " in eap_sim_init()
100 data->error_code = NO_EAP_METHOD_ERROR; in eap_sim_init()
102 data->min_num_chal = 2; in eap_sim_init()
103 if (config && config->phase1) { in eap_sim_init()
[all …]
Deap_aka.c2 * EAP peer method: EAP-AKA (RFC 4187) and EAP-AKA' (RFC 5448)
3 * Copyright (c) 2004-2012, Jouni Malinen <j@w1.fi>
29 u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; /* EAP-AKA' only */
85 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s", in eap_aka_state()
86 eap_aka_state_txt(data->state), in eap_aka_state()
88 data->state = state; in eap_aka_state()
102 data->eap_method = EAP_TYPE_AKA; in eap_aka_init()
105 data->error_code = NO_EAP_METHOD_ERROR; in eap_aka_init()
108 data->prev_id = -1; in eap_aka_init()
110 data->result_ind = phase1 && os_strstr(phase1, "result_ind=1") != NULL; in eap_aka_init()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
Deap_sim.c2 * EAP peer method: EAP-SIM (RFC 4186)
3 * Copyright (c) 2004-2012, Jouni Malinen <j@w1.fi>
78 wpa_printf(MSG_DEBUG, "EAP-SIM: %s -> %s", in eap_sim_state()
79 eap_sim_state_txt(data->state), in eap_sim_state()
81 data->state = state; in eap_sim_state()
94 if (random_get_bytes(data->nonce_mt, EAP_SIM_NONCE_MT_LEN)) { in eap_sim_init()
95 wpa_printf(MSG_WARNING, "EAP-SIM: Failed to get random data " in eap_sim_init()
102 data->error_code = NO_EAP_METHOD_ERROR; in eap_sim_init()
104 data->min_num_chal = 2; in eap_sim_init()
105 if (config && config->phase1) { in eap_sim_init()
[all …]
Deap_aka.c2 * EAP peer method: EAP-AKA (RFC 4187) and EAP-AKA' (RFC 5448)
3 * Copyright (c) 2004-2012, Jouni Malinen <j@w1.fi>
29 u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; /* EAP-AKA' only */
85 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s", in eap_aka_state()
86 eap_aka_state_txt(data->state), in eap_aka_state()
88 data->state = state; in eap_aka_state()
102 data->eap_method = EAP_TYPE_AKA; in eap_aka_init()
105 data->error_code = NO_EAP_METHOD_ERROR; in eap_aka_init()
108 data->prev_id = -1; in eap_aka_init()
110 data->result_ind = phase1 && os_strstr(phase1, "result_ind=1") != NULL; in eap_aka_init()
[all …]
/third_party/openssl/test/
DREADME.md17 -------------
30 Verbosity on failed (sub-)tests only
35 Verbosity on failed (sub-)tests, in addition progress on succeeded (sub-)tests
54 $ make list-tests # Unix
55 $ mms list-tests ! OpenVMS
56 $ nmake list-tests # Windows
68 ----------------------
75 tests (as listed when you do 'make list-tests' or similar).
79 -xxx Removes 'xxx' from the current set of tests. If this is the
82 this token equivalent to TESTS="alltests -xxx".
[all …]
DREADME-dev.md5 ------------------
8 `test/recipes/`, named `{nn}-test_{name}.t`,
14 ["Changes to test/build.info"](README.md#changes-to-testbuildinfo) below.
17 ------------------
21 A test recipe is named `test/recipes/{nn}-test_{name}.t`, where `{nn}` is a two
26 00-04 sanity, internal and essential API tests
27 05-09 individual symmetric cipher algorithms
28 10-14 math (bignum)
29 15-19 individual asymmetric cipher algorithms
30 20-24 openssl commands (some otherwise not tested)
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/
Dlib.rules3 CC=arm-himix410-linux-gcc
10 CFLAGS = -MMD -O2 -Wall -g
13 ifdef TEST_FUZZ
14 CFLAGS += -DCONFIG_NO_RANDOM_POOL
15 CFLAGS += -DTEST_FUZZ
19 CFLAGS += -I.. -I../utils
34 $(Q)$(CC) -c -o $@ $(CFLAGS) $<
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/
Dlib.rules3 CC=arm-himix410-linux-gcc
7 _LIBMK := $(lastword $(wordlist 1,$(shell expr $(words $(MAKEFILE_LIST)) - 1),$(MAKEFILE_LIST)))
14 ifdef TEST_FUZZ
15 CFLAGS += -DCONFIG_NO_RANDOM_POOL
16 CFLAGS += -DTEST_FUZZ
20 CFLAGS += -I.. -I../utils
29 install-default:
32 %: %-default
35 clean: common-clean
36 $(Q)rm -f *~ *.o *.d *.gcno *.gcda *.gcov $(ALL)
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
DMakefile1 CFLAGS += -DCONFIG_CRYPTO_INTERNAL
2 CFLAGS += -DCONFIG_TLS_INTERNAL_CLIENT
3 CFLAGS += -DCONFIG_TLS_INTERNAL_SERVER
4 #CFLAGS += -DALL_DH_GROUPS
5 CFLAGS += -DCONFIG_SHA256
6 CFLAGS += -DCONFIG_SHA384
7 CFLAGS += -DCONFIG_HMAC_SHA384_KDF
8 CFLAGS += -DCONFIG_INTERNAL_SHA384
11 aes-cbc.o \
12 aes-ccm.o \
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
DMakefile4 rm -f *~ *.o *.d *.gcno *.gcda *.gcov libcrypto.a
12 CFLAGS += -DCONFIG_CRYPTO_INTERNAL
13 CFLAGS += -DCONFIG_TLS_INTERNAL_CLIENT
14 CFLAGS += -DCONFIG_TLS_INTERNAL_SERVER
15 #CFLAGS += -DALL_DH_GROUPS
16 CFLAGS += -DCONFIG_SHA256
17 CFLAGS += -DCONFIG_SHA384
18 CFLAGS += -DCONFIG_HMAC_SHA384_KDF
19 CFLAGS += -DCONFIG_INTERNAL_SHA384
22 aes-cbc.o \
[all …]
/third_party/openssl/
Dappveyor.yml2 - Visual Studio 2017
5 - x64
6 - x86
11 - VSVER: 15
14 - shared
15 - minimal
18 -
21 - master
23 - shared
24 - plain
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/utils/
Dos_unix.c3 * Copyright (c) 2005-2019, Jouni Malinen <j@w1.fi>
70 t->sec = tv.tv_sec; in os_get_time()
71 t->usec = tv.tv_usec; in os_get_time()
90 return -1; in os_get_reltime()
95 t->sec = ts.tv_sec; in os_get_reltime()
96 t->usec = ts.tv_nsec / 1000; in os_get_reltime()
111 return -1; in os_get_reltime()
120 return -1; in os_get_reltime()
126 t->sec = nano / NSEC_PER_SEC; in os_get_reltime()
127 t->usec = (nano - (((uint64_t) t->sec) * NSEC_PER_SEC)) / NSEC_PER_USEC; in os_get_reltime()
[all …]
Dos_internal.c3 * Copyright (c) 2005-2006, Jouni Malinen <j@w1.fi>
46 t->sec = tv.tv_sec; in os_get_time()
47 t->usec = tv.tv_usec; in os_get_time()
57 t->sec = tv.tv_sec; in os_get_reltime()
58 t->usec = tv.tv_usec; in os_get_reltime()
71 return -1; in os_mktime()
74 tm.tm_year = year - 1900; in os_mktime()
75 tm.tm_mon = month - 1; in os_mktime()
93 return -1; in os_gmtime()
94 tm->sec = tm2->tm_sec; in os_gmtime()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/utils/
Dos_unix.c3 * Copyright (c) 2005-2019, Jouni Malinen <j@w1.fi>
64 t->sec = tv.tv_sec; in os_get_time()
65 t->usec = tv.tv_usec; in os_get_time()
84 return -1; in os_get_reltime()
89 t->sec = ts.tv_sec; in os_get_reltime()
90 t->usec = ts.tv_nsec / 1000; in os_get_reltime()
105 return -1; in os_get_reltime()
114 return -1; in os_get_reltime()
120 t->sec = nano / NSEC_PER_SEC; in os_get_reltime()
121 t->usec = (nano - (((uint64_t) t->sec) * NSEC_PER_SEC)) / NSEC_PER_USEC; in os_get_reltime()
[all …]
Dos_internal.c3 * Copyright (c) 2005-2006, Jouni Malinen <j@w1.fi>
40 t->sec = tv.tv_sec; in os_get_time()
41 t->usec = tv.tv_usec; in os_get_time()
51 t->sec = tv.tv_sec; in os_get_reltime()
52 t->usec = tv.tv_usec; in os_get_reltime()
65 return -1; in os_mktime()
68 tm.tm_year = year - 1900; in os_mktime()
69 tm.tm_mon = month - 1; in os_mktime()
87 return -1; in os_gmtime()
88 tm->sec = tm2->tm_sec; in os_gmtime()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/
Dwpa.c2 * WPA Supplicant - WPA state machine and EAPOL-Key processing
3 * Copyright (c) 2003-2018, Jouni Malinen <j@w1.fi>
39 * wpa_eapol_key_send - Send WPA/RSN EAPOL-Key message
45 * @msg: EAPOL-Key message
47 * @key_mic: Pointer to the buffer to which the EAPOL-Key MIC is written
54 int ret = -1; in wpa_eapol_key_send()
55 size_t mic_len = wpa_mic_len(sm->key_mgmt, sm->pmk_len); in wpa_eapol_key_send()
57 wpa_printf(MSG_DEBUG, "WPA: Send EAPOL-Key frame to " MACSTR in wpa_eapol_key_send()
59 MAC2STR(dest), ver, (int) mic_len, sm->key_mgmt); in wpa_eapol_key_send()
60 if (is_zero_ether_addr(dest) && is_zero_ether_addr(sm->bssid)) { in wpa_eapol_key_send()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
Dwpa_auth.c3 * Copyright (c) 2004-2019, Jouni Malinen <j@w1.fi>
45 #define STATE_MACHINE_ADDR sm->addr
98 if (wpa_auth->cb->mic_failure_report) in wpa_auth_mic_failure_report()
99 return wpa_auth->cb->mic_failure_report(wpa_auth->cb_ctx, addr); in wpa_auth_mic_failure_report()
107 if (wpa_auth->cb->psk_failure_report) in wpa_auth_psk_failure_report()
108 wpa_auth->cb->psk_failure_report(wpa_auth->cb_ctx, addr); in wpa_auth_psk_failure_report()
116 if (wpa_auth->cb->set_eapol) in wpa_auth_set_eapol()
117 wpa_auth->cb->set_eapol(wpa_auth->cb_ctx, addr, var, value); in wpa_auth_set_eapol()
124 if (!wpa_auth->cb->get_eapol) in wpa_auth_get_eapol()
125 return -1; in wpa_auth_get_eapol()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
Dwpa_auth.c3 * Copyright (c) 2004-2019, Jouni Malinen <j@w1.fi>
36 #define STATE_MACHINE_ADDR sm->addr
82 if (wpa_auth->cb->mic_failure_report) in wpa_auth_mic_failure_report()
83 return wpa_auth->cb->mic_failure_report(wpa_auth->cb_ctx, addr); in wpa_auth_mic_failure_report()
91 if (wpa_auth->cb->psk_failure_report) in wpa_auth_psk_failure_report()
92 wpa_auth->cb->psk_failure_report(wpa_auth->cb_ctx, addr); in wpa_auth_psk_failure_report()
100 if (wpa_auth->cb->set_eapol) in wpa_auth_set_eapol()
101 wpa_auth->cb->set_eapol(wpa_auth->cb_ctx, addr, var, value); in wpa_auth_set_eapol()
108 if (wpa_auth->cb->get_eapol == NULL) in wpa_auth_get_eapol()
109 return -1; in wpa_auth_get_eapol()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
Deap_sim_common.c2 * EAP peer/server: EAP-SIM/AKA/AKA' shared routines
3 * Copyright (c) 2004-2008, Jouni Malinen <j@w1.fi>
52 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: MK", mk, EAP_SIM_MK_LEN); in eap_sim_derive_mk()
71 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN); in eap_aka_derive_mk()
72 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN); in eap_aka_derive_mk()
73 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: MK", mk, EAP_SIM_MK_LEN); in eap_aka_derive_mk()
82 wpa_printf(MSG_ERROR, "EAP-SIM: Failed to derive keys"); in eap_sim_derive_keys()
83 return -1; in eap_sim_derive_keys()
94 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_encr", in eap_sim_derive_keys()
96 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_aut", in eap_sim_derive_keys()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/
Dwpa.c2 * WPA Supplicant - WPA state machine and EAPOL-Key processing
3 * Copyright (c) 2003-2018, Jouni Malinen <j@w1.fi>
82 * wpa_eapol_key_send - Send WPA/RSN EAPOL-Key message
88 * @msg: EAPOL-Key message
90 * @key_mic: Pointer to the buffer to which the EAPOL-Key MIC is written
97 int ret = -1; in wpa_eapol_key_send()
98 size_t mic_len = wpa_mic_len(sm->key_mgmt, sm->pmk_len); in wpa_eapol_key_send()
100 wpa_printf(MSG_DEBUG, "WPA: Send EAPOL-Key frame to " MACSTR_SEC in wpa_eapol_key_send()
102 MAC2STR_SEC(dest), ver, (int) mic_len, sm->key_mgmt); in wpa_eapol_key_send()
103 if (is_zero_ether_addr(dest) && is_zero_ether_addr(sm->bssid)) { in wpa_eapol_key_send()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
Deap_sim_common.c2 * EAP peer/server: EAP-SIM/AKA/AKA' shared routines
3 * Copyright (c) 2004-2008, Jouni Malinen <j@w1.fi>
56 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: MK", mk, EAP_SIM_MK_LEN); in eap_sim_derive_mk()
75 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN); in eap_aka_derive_mk()
76 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN); in eap_aka_derive_mk()
77 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: MK", mk, EAP_SIM_MK_LEN); in eap_aka_derive_mk()
86 wpa_printf(MSG_ERROR, "EAP-SIM: Failed to derive keys"); in eap_sim_derive_keys()
87 return -1; in eap_sim_derive_keys()
98 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_encr", in eap_sim_derive_keys()
100 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_aut", in eap_sim_derive_keys()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
Dtlsv1_client_write.c2 * TLSv1 client - write handshake message
3 * Copyright (c) 2006-2015, Jouni Malinen <j@w1.fi>
29 if (conn->cred == NULL) in tls_client_cert_chain_der_len()
32 cert = conn->cred->cert; in tls_client_cert_chain_der_len()
34 len += 3 + cert->cert_len; in tls_client_cert_chain_der_len()
37 cert = x509_certificate_get_subject(conn->cred->trusted_certs, in tls_client_cert_chain_der_len()
38 &cert->issuer); in tls_client_cert_chain_der_len()
55 if ((conn->flags & TLS_CONN_DISABLE_TLSv1_2) && in tls_send_client_hello()
60 if ((conn->flags & TLS_CONN_DISABLE_TLSv1_1) && in tls_send_client_hello()
64 if ((conn->flags & TLS_CONN_DISABLE_TLSv1_0) && in tls_send_client_hello()
[all …]
Dtlsv1_server_write.c2 * TLSv1 server - write handshake message
3 * Copyright (c) 2006-2014, Jouni Malinen <j@w1.fi>
29 cert = conn->cred ? conn->cred->cert : NULL; in tls_server_cert_chain_der_len()
31 len += 3 + cert->cert_len; in tls_server_cert_chain_der_len()
34 cert = x509_certificate_get_subject(conn->cred->trusted_certs, in tls_server_cert_chain_der_len()
35 &cert->issuer); in tls_server_cert_chain_der_len()
56 #ifdef TEST_FUZZ in tls_write_server_hello()
58 #endif /* TEST_FUZZ */ in tls_write_server_hello()
59 WPA_PUT_BE32(conn->server_random, now.sec); in tls_write_server_hello()
60 if (random_get_bytes(conn->server_random + 4, TLS_RANDOM_LEN - 4)) { in tls_write_server_hello()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
Dtlsv1_client_write.c2 * TLSv1 client - write handshake message
3 * Copyright (c) 2006-2015, Jouni Malinen <j@w1.fi>
29 if (conn->cred == NULL) in tls_client_cert_chain_der_len()
32 cert = conn->cred->cert; in tls_client_cert_chain_der_len()
34 len += 3 + cert->cert_len; in tls_client_cert_chain_der_len()
37 cert = x509_certificate_get_subject(conn->cred->trusted_certs, in tls_client_cert_chain_der_len()
38 &cert->issuer); in tls_client_cert_chain_der_len()
63 #ifdef TEST_FUZZ in tls_send_client_hello()
65 #endif /* TEST_FUZZ */ in tls_send_client_hello()
66 WPA_PUT_BE32(conn->client_random, now.sec); in tls_send_client_hello()
[all …]
Dtlsv1_server_write.c2 * TLSv1 server - write handshake message
3 * Copyright (c) 2006-2014, Jouni Malinen <j@w1.fi>
29 cert = conn->cred ? conn->cred->cert : NULL; in tls_server_cert_chain_der_len()
31 len += 3 + cert->cert_len; in tls_server_cert_chain_der_len()
34 cert = x509_certificate_get_subject(conn->cred->trusted_certs, in tls_server_cert_chain_der_len()
35 &cert->issuer); in tls_server_cert_chain_der_len()
56 #ifdef TEST_FUZZ in tls_write_server_hello()
58 #endif /* TEST_FUZZ */ in tls_write_server_hello()
59 WPA_PUT_BE32(conn->server_random, now.sec); in tls_write_server_hello()
60 if (random_get_bytes(conn->server_random + 4, TLS_RANDOM_LEN - 4)) { in tls_write_server_hello()
[all …]

12