| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
| D | eap_sim.c | 2 * EAP peer method: EAP-SIM (RFC 4186) 3 * Copyright (c) 2004-2012, Jouni Malinen <j@w1.fi> 76 wpa_printf(MSG_DEBUG, "EAP-SIM: %s -> %s", in eap_sim_state() 77 eap_sim_state_txt(data->state), in eap_sim_state() 79 data->state = state; in eap_sim_state() 92 if (random_get_bytes(data->nonce_mt, EAP_SIM_NONCE_MT_LEN)) { in eap_sim_init() 93 wpa_printf(MSG_WARNING, "EAP-SIM: Failed to get random data " in eap_sim_init() 100 data->error_code = NO_EAP_METHOD_ERROR; in eap_sim_init() 102 data->min_num_chal = 2; in eap_sim_init() 103 if (config && config->phase1) { in eap_sim_init() [all …]
|
| D | eap_aka.c | 2 * EAP peer method: EAP-AKA (RFC 4187) and EAP-AKA' (RFC 5448) 3 * Copyright (c) 2004-2012, Jouni Malinen <j@w1.fi> 29 u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; /* EAP-AKA' only */ 85 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s", in eap_aka_state() 86 eap_aka_state_txt(data->state), in eap_aka_state() 88 data->state = state; in eap_aka_state() 102 data->eap_method = EAP_TYPE_AKA; in eap_aka_init() 105 data->error_code = NO_EAP_METHOD_ERROR; in eap_aka_init() 108 data->prev_id = -1; in eap_aka_init() 110 data->result_ind = phase1 && os_strstr(phase1, "result_ind=1") != NULL; in eap_aka_init() [all …]
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
| D | eap_sim.c | 2 * EAP peer method: EAP-SIM (RFC 4186) 3 * Copyright (c) 2004-2012, Jouni Malinen <j@w1.fi> 78 wpa_printf(MSG_DEBUG, "EAP-SIM: %s -> %s", in eap_sim_state() 79 eap_sim_state_txt(data->state), in eap_sim_state() 81 data->state = state; in eap_sim_state() 94 if (random_get_bytes(data->nonce_mt, EAP_SIM_NONCE_MT_LEN)) { in eap_sim_init() 95 wpa_printf(MSG_WARNING, "EAP-SIM: Failed to get random data " in eap_sim_init() 102 data->error_code = NO_EAP_METHOD_ERROR; in eap_sim_init() 104 data->min_num_chal = 2; in eap_sim_init() 105 if (config && config->phase1) { in eap_sim_init() [all …]
|
| D | eap_aka.c | 2 * EAP peer method: EAP-AKA (RFC 4187) and EAP-AKA' (RFC 5448) 3 * Copyright (c) 2004-2012, Jouni Malinen <j@w1.fi> 29 u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; /* EAP-AKA' only */ 85 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s", in eap_aka_state() 86 eap_aka_state_txt(data->state), in eap_aka_state() 88 data->state = state; in eap_aka_state() 102 data->eap_method = EAP_TYPE_AKA; in eap_aka_init() 105 data->error_code = NO_EAP_METHOD_ERROR; in eap_aka_init() 108 data->prev_id = -1; in eap_aka_init() 110 data->result_ind = phase1 && os_strstr(phase1, "result_ind=1") != NULL; in eap_aka_init() [all …]
|
| /third_party/openssl/test/ |
| D | README.md | 17 ------------- 30 Verbosity on failed (sub-)tests only 35 Verbosity on failed (sub-)tests, in addition progress on succeeded (sub-)tests 54 $ make list-tests # Unix 55 $ mms list-tests ! OpenVMS 56 $ nmake list-tests # Windows 68 ---------------------- 75 tests (as listed when you do 'make list-tests' or similar). 79 -xxx Removes 'xxx' from the current set of tests. If this is the 82 this token equivalent to TESTS="alltests -xxx". [all …]
|
| D | README-dev.md | 5 ------------------ 8 `test/recipes/`, named `{nn}-test_{name}.t`, 14 ["Changes to test/build.info"](README.md#changes-to-testbuildinfo) below. 17 ------------------ 21 A test recipe is named `test/recipes/{nn}-test_{name}.t`, where `{nn}` is a two 26 00-04 sanity, internal and essential API tests 27 05-09 individual symmetric cipher algorithms 28 10-14 math (bignum) 29 15-19 individual asymmetric cipher algorithms 30 20-24 openssl commands (some otherwise not tested) [all …]
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/ |
| D | lib.rules | 3 CC=arm-himix410-linux-gcc 10 CFLAGS = -MMD -O2 -Wall -g 13 ifdef TEST_FUZZ 14 CFLAGS += -DCONFIG_NO_RANDOM_POOL 15 CFLAGS += -DTEST_FUZZ 19 CFLAGS += -I.. -I../utils 34 $(Q)$(CC) -c -o $@ $(CFLAGS) $<
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ |
| D | lib.rules | 3 CC=arm-himix410-linux-gcc 7 _LIBMK := $(lastword $(wordlist 1,$(shell expr $(words $(MAKEFILE_LIST)) - 1),$(MAKEFILE_LIST))) 14 ifdef TEST_FUZZ 15 CFLAGS += -DCONFIG_NO_RANDOM_POOL 16 CFLAGS += -DTEST_FUZZ 20 CFLAGS += -I.. -I../utils 29 install-default: 32 %: %-default 35 clean: common-clean 36 $(Q)rm -f *~ *.o *.d *.gcno *.gcda *.gcov $(ALL)
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
| D | Makefile | 1 CFLAGS += -DCONFIG_CRYPTO_INTERNAL 2 CFLAGS += -DCONFIG_TLS_INTERNAL_CLIENT 3 CFLAGS += -DCONFIG_TLS_INTERNAL_SERVER 4 #CFLAGS += -DALL_DH_GROUPS 5 CFLAGS += -DCONFIG_SHA256 6 CFLAGS += -DCONFIG_SHA384 7 CFLAGS += -DCONFIG_HMAC_SHA384_KDF 8 CFLAGS += -DCONFIG_INTERNAL_SHA384 11 aes-cbc.o \ 12 aes-ccm.o \ [all …]
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
| D | Makefile | 4 rm -f *~ *.o *.d *.gcno *.gcda *.gcov libcrypto.a 12 CFLAGS += -DCONFIG_CRYPTO_INTERNAL 13 CFLAGS += -DCONFIG_TLS_INTERNAL_CLIENT 14 CFLAGS += -DCONFIG_TLS_INTERNAL_SERVER 15 #CFLAGS += -DALL_DH_GROUPS 16 CFLAGS += -DCONFIG_SHA256 17 CFLAGS += -DCONFIG_SHA384 18 CFLAGS += -DCONFIG_HMAC_SHA384_KDF 19 CFLAGS += -DCONFIG_INTERNAL_SHA384 22 aes-cbc.o \ [all …]
|
| /third_party/openssl/ |
| D | appveyor.yml | 2 - Visual Studio 2017 5 - x64 6 - x86 11 - VSVER: 15 14 - shared 15 - minimal 18 - 21 - master 23 - shared 24 - plain [all …]
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/utils/ |
| D | os_unix.c | 3 * Copyright (c) 2005-2019, Jouni Malinen <j@w1.fi> 70 t->sec = tv.tv_sec; in os_get_time() 71 t->usec = tv.tv_usec; in os_get_time() 90 return -1; in os_get_reltime() 95 t->sec = ts.tv_sec; in os_get_reltime() 96 t->usec = ts.tv_nsec / 1000; in os_get_reltime() 111 return -1; in os_get_reltime() 120 return -1; in os_get_reltime() 126 t->sec = nano / NSEC_PER_SEC; in os_get_reltime() 127 t->usec = (nano - (((uint64_t) t->sec) * NSEC_PER_SEC)) / NSEC_PER_USEC; in os_get_reltime() [all …]
|
| D | os_internal.c | 3 * Copyright (c) 2005-2006, Jouni Malinen <j@w1.fi> 46 t->sec = tv.tv_sec; in os_get_time() 47 t->usec = tv.tv_usec; in os_get_time() 57 t->sec = tv.tv_sec; in os_get_reltime() 58 t->usec = tv.tv_usec; in os_get_reltime() 71 return -1; in os_mktime() 74 tm.tm_year = year - 1900; in os_mktime() 75 tm.tm_mon = month - 1; in os_mktime() 93 return -1; in os_gmtime() 94 tm->sec = tm2->tm_sec; in os_gmtime() [all …]
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/utils/ |
| D | os_unix.c | 3 * Copyright (c) 2005-2019, Jouni Malinen <j@w1.fi> 64 t->sec = tv.tv_sec; in os_get_time() 65 t->usec = tv.tv_usec; in os_get_time() 84 return -1; in os_get_reltime() 89 t->sec = ts.tv_sec; in os_get_reltime() 90 t->usec = ts.tv_nsec / 1000; in os_get_reltime() 105 return -1; in os_get_reltime() 114 return -1; in os_get_reltime() 120 t->sec = nano / NSEC_PER_SEC; in os_get_reltime() 121 t->usec = (nano - (((uint64_t) t->sec) * NSEC_PER_SEC)) / NSEC_PER_USEC; in os_get_reltime() [all …]
|
| D | os_internal.c | 3 * Copyright (c) 2005-2006, Jouni Malinen <j@w1.fi> 40 t->sec = tv.tv_sec; in os_get_time() 41 t->usec = tv.tv_usec; in os_get_time() 51 t->sec = tv.tv_sec; in os_get_reltime() 52 t->usec = tv.tv_usec; in os_get_reltime() 65 return -1; in os_mktime() 68 tm.tm_year = year - 1900; in os_mktime() 69 tm.tm_mon = month - 1; in os_mktime() 87 return -1; in os_gmtime() 88 tm->sec = tm2->tm_sec; in os_gmtime() [all …]
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/ |
| D | wpa.c | 2 * WPA Supplicant - WPA state machine and EAPOL-Key processing 3 * Copyright (c) 2003-2018, Jouni Malinen <j@w1.fi> 39 * wpa_eapol_key_send - Send WPA/RSN EAPOL-Key message 45 * @msg: EAPOL-Key message 47 * @key_mic: Pointer to the buffer to which the EAPOL-Key MIC is written 54 int ret = -1; in wpa_eapol_key_send() 55 size_t mic_len = wpa_mic_len(sm->key_mgmt, sm->pmk_len); in wpa_eapol_key_send() 57 wpa_printf(MSG_DEBUG, "WPA: Send EAPOL-Key frame to " MACSTR in wpa_eapol_key_send() 59 MAC2STR(dest), ver, (int) mic_len, sm->key_mgmt); in wpa_eapol_key_send() 60 if (is_zero_ether_addr(dest) && is_zero_ether_addr(sm->bssid)) { in wpa_eapol_key_send() [all …]
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
| D | wpa_auth.c | 3 * Copyright (c) 2004-2019, Jouni Malinen <j@w1.fi> 45 #define STATE_MACHINE_ADDR sm->addr 98 if (wpa_auth->cb->mic_failure_report) in wpa_auth_mic_failure_report() 99 return wpa_auth->cb->mic_failure_report(wpa_auth->cb_ctx, addr); in wpa_auth_mic_failure_report() 107 if (wpa_auth->cb->psk_failure_report) in wpa_auth_psk_failure_report() 108 wpa_auth->cb->psk_failure_report(wpa_auth->cb_ctx, addr); in wpa_auth_psk_failure_report() 116 if (wpa_auth->cb->set_eapol) in wpa_auth_set_eapol() 117 wpa_auth->cb->set_eapol(wpa_auth->cb_ctx, addr, var, value); in wpa_auth_set_eapol() 124 if (!wpa_auth->cb->get_eapol) in wpa_auth_get_eapol() 125 return -1; in wpa_auth_get_eapol() [all …]
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
| D | wpa_auth.c | 3 * Copyright (c) 2004-2019, Jouni Malinen <j@w1.fi> 36 #define STATE_MACHINE_ADDR sm->addr 82 if (wpa_auth->cb->mic_failure_report) in wpa_auth_mic_failure_report() 83 return wpa_auth->cb->mic_failure_report(wpa_auth->cb_ctx, addr); in wpa_auth_mic_failure_report() 91 if (wpa_auth->cb->psk_failure_report) in wpa_auth_psk_failure_report() 92 wpa_auth->cb->psk_failure_report(wpa_auth->cb_ctx, addr); in wpa_auth_psk_failure_report() 100 if (wpa_auth->cb->set_eapol) in wpa_auth_set_eapol() 101 wpa_auth->cb->set_eapol(wpa_auth->cb_ctx, addr, var, value); in wpa_auth_set_eapol() 108 if (wpa_auth->cb->get_eapol == NULL) in wpa_auth_get_eapol() 109 return -1; in wpa_auth_get_eapol() [all …]
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
| D | eap_sim_common.c | 2 * EAP peer/server: EAP-SIM/AKA/AKA' shared routines 3 * Copyright (c) 2004-2008, Jouni Malinen <j@w1.fi> 52 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: MK", mk, EAP_SIM_MK_LEN); in eap_sim_derive_mk() 71 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN); in eap_aka_derive_mk() 72 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN); in eap_aka_derive_mk() 73 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: MK", mk, EAP_SIM_MK_LEN); in eap_aka_derive_mk() 82 wpa_printf(MSG_ERROR, "EAP-SIM: Failed to derive keys"); in eap_sim_derive_keys() 83 return -1; in eap_sim_derive_keys() 94 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_encr", in eap_sim_derive_keys() 96 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_aut", in eap_sim_derive_keys() [all …]
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/ |
| D | wpa.c | 2 * WPA Supplicant - WPA state machine and EAPOL-Key processing 3 * Copyright (c) 2003-2018, Jouni Malinen <j@w1.fi> 82 * wpa_eapol_key_send - Send WPA/RSN EAPOL-Key message 88 * @msg: EAPOL-Key message 90 * @key_mic: Pointer to the buffer to which the EAPOL-Key MIC is written 97 int ret = -1; in wpa_eapol_key_send() 98 size_t mic_len = wpa_mic_len(sm->key_mgmt, sm->pmk_len); in wpa_eapol_key_send() 100 wpa_printf(MSG_DEBUG, "WPA: Send EAPOL-Key frame to " MACSTR_SEC in wpa_eapol_key_send() 102 MAC2STR_SEC(dest), ver, (int) mic_len, sm->key_mgmt); in wpa_eapol_key_send() 103 if (is_zero_ether_addr(dest) && is_zero_ether_addr(sm->bssid)) { in wpa_eapol_key_send() [all …]
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
| D | eap_sim_common.c | 2 * EAP peer/server: EAP-SIM/AKA/AKA' shared routines 3 * Copyright (c) 2004-2008, Jouni Malinen <j@w1.fi> 56 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: MK", mk, EAP_SIM_MK_LEN); in eap_sim_derive_mk() 75 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN); in eap_aka_derive_mk() 76 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN); in eap_aka_derive_mk() 77 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: MK", mk, EAP_SIM_MK_LEN); in eap_aka_derive_mk() 86 wpa_printf(MSG_ERROR, "EAP-SIM: Failed to derive keys"); in eap_sim_derive_keys() 87 return -1; in eap_sim_derive_keys() 98 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_encr", in eap_sim_derive_keys() 100 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_aut", in eap_sim_derive_keys() [all …]
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
| D | tlsv1_client_write.c | 2 * TLSv1 client - write handshake message 3 * Copyright (c) 2006-2015, Jouni Malinen <j@w1.fi> 29 if (conn->cred == NULL) in tls_client_cert_chain_der_len() 32 cert = conn->cred->cert; in tls_client_cert_chain_der_len() 34 len += 3 + cert->cert_len; in tls_client_cert_chain_der_len() 37 cert = x509_certificate_get_subject(conn->cred->trusted_certs, in tls_client_cert_chain_der_len() 38 &cert->issuer); in tls_client_cert_chain_der_len() 55 if ((conn->flags & TLS_CONN_DISABLE_TLSv1_2) && in tls_send_client_hello() 60 if ((conn->flags & TLS_CONN_DISABLE_TLSv1_1) && in tls_send_client_hello() 64 if ((conn->flags & TLS_CONN_DISABLE_TLSv1_0) && in tls_send_client_hello() [all …]
|
| D | tlsv1_server_write.c | 2 * TLSv1 server - write handshake message 3 * Copyright (c) 2006-2014, Jouni Malinen <j@w1.fi> 29 cert = conn->cred ? conn->cred->cert : NULL; in tls_server_cert_chain_der_len() 31 len += 3 + cert->cert_len; in tls_server_cert_chain_der_len() 34 cert = x509_certificate_get_subject(conn->cred->trusted_certs, in tls_server_cert_chain_der_len() 35 &cert->issuer); in tls_server_cert_chain_der_len() 56 #ifdef TEST_FUZZ in tls_write_server_hello() 58 #endif /* TEST_FUZZ */ in tls_write_server_hello() 59 WPA_PUT_BE32(conn->server_random, now.sec); in tls_write_server_hello() 60 if (random_get_bytes(conn->server_random + 4, TLS_RANDOM_LEN - 4)) { in tls_write_server_hello() [all …]
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
| D | tlsv1_client_write.c | 2 * TLSv1 client - write handshake message 3 * Copyright (c) 2006-2015, Jouni Malinen <j@w1.fi> 29 if (conn->cred == NULL) in tls_client_cert_chain_der_len() 32 cert = conn->cred->cert; in tls_client_cert_chain_der_len() 34 len += 3 + cert->cert_len; in tls_client_cert_chain_der_len() 37 cert = x509_certificate_get_subject(conn->cred->trusted_certs, in tls_client_cert_chain_der_len() 38 &cert->issuer); in tls_client_cert_chain_der_len() 63 #ifdef TEST_FUZZ in tls_send_client_hello() 65 #endif /* TEST_FUZZ */ in tls_send_client_hello() 66 WPA_PUT_BE32(conn->client_random, now.sec); in tls_send_client_hello() [all …]
|
| D | tlsv1_server_write.c | 2 * TLSv1 server - write handshake message 3 * Copyright (c) 2006-2014, Jouni Malinen <j@w1.fi> 29 cert = conn->cred ? conn->cred->cert : NULL; in tls_server_cert_chain_der_len() 31 len += 3 + cert->cert_len; in tls_server_cert_chain_der_len() 34 cert = x509_certificate_get_subject(conn->cred->trusted_certs, in tls_server_cert_chain_der_len() 35 &cert->issuer); in tls_server_cert_chain_der_len() 56 #ifdef TEST_FUZZ in tls_write_server_hello() 58 #endif /* TEST_FUZZ */ in tls_write_server_hello() 59 WPA_PUT_BE32(conn->server_random, now.sec); in tls_write_server_hello() 60 if (random_get_bytes(conn->server_random + 4, TLS_RANDOM_LEN - 4)) { in tls_write_server_hello() [all …]
|