Searched refs:verify (Results 1 - 25 of 409) sorted by last modified time

1234567891011>>

/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_client.c453 if (tls_verify_hash_init(&conn->verify) < 0) {
454 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize verify "
492 tls_verify_hash_free(&conn->verify);
610 if (tls_verify_hash_init(&conn->verify) < 0) {
611 wpa_printf(MSG_DEBUG, "TLSv1: Failed to re-initialize verify "
H A Dtlsv1_client_i.h40 struct tls_verify_hash verify; member in struct:tlsv1_client
H A Dtlsv1_client_read.c914 if (conn->verify.sha256_server == NULL ||
915 crypto_hash_finish(conn->verify.sha256_server, hash, &hlen)
919 conn->verify.sha256_server = NULL;
922 conn->verify.sha256_server = NULL;
927 if (conn->verify.md5_server == NULL ||
928 crypto_hash_finish(conn->verify.md5_server, hash, &hlen) < 0) {
931 conn->verify.md5_server = NULL;
932 crypto_hash_finish(conn->verify.sha1_server, NULL, NULL);
933 conn->verify.sha1_server = NULL;
936 conn->verify
[all...]
H A Dtlsv1_client_write.c111 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start);
200 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start);
421 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start);
477 if (conn->verify.sha256_cert == NULL ||
478 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) <
480 conn->verify.sha256_cert = NULL;
485 conn->verify.sha256_cert = NULL;
510 if (conn->verify.md5_cert == NULL ||
511 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0)
515 conn->verify
[all...]
H A Dtlsv1_common.c182 * verify key usage (must allow encryption)
206 int tls_verify_hash_init(struct tls_verify_hash *verify) argument
208 tls_verify_hash_free(verify);
209 verify->md5_client = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0);
210 verify->md5_server = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0);
211 verify->md5_cert = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0);
212 verify->sha1_client = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0);
213 verify->sha1_server = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0);
214 verify->sha1_cert = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0);
215 if (verify
238 tls_verify_hash_add(struct tls_verify_hash *verify, const u8 *buf, size_t len) argument
264 tls_verify_hash_free(struct tls_verify_hash *verify) argument
[all...]
H A Dtlsv1_common.h252 int tls_verify_hash_init(struct tls_verify_hash *verify);
253 void tls_verify_hash_add(struct tls_verify_hash *verify, const u8 *buf,
255 void tls_verify_hash_free(struct tls_verify_hash *verify);
H A Dtlsv1_server.c388 if (tls_verify_hash_init(&conn->verify) < 0) {
389 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize verify "
420 tls_verify_hash_free(&conn->verify);
547 if (tls_verify_hash_init(&conn->verify) < 0) {
548 wpa_printf(MSG_DEBUG, "TLSv1: Failed to re-initialize verify "
H A Dtlsv1_server_i.h35 struct tls_verify_hash verify; member in struct:tlsv1_server
H A Dtlsv1_server_read.c874 if (conn->verify.sha256_cert == NULL ||
875 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) <
877 conn->verify.sha256_cert = NULL;
882 conn->verify.sha256_cert = NULL;
888 if (conn->verify.md5_cert == NULL ||
889 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0)
893 conn->verify.md5_cert = NULL;
894 crypto_hash_finish(conn->verify.sha1_cert, NULL, NULL);
895 conn->verify.sha1_cert = NULL;
900 crypto_hash_finish(conn->verify
[all...]
H A Dtlsv1_server_write.c137 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start);
234 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start);
560 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start);
626 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start);
663 tls_verify_hash_add(&conn->verify, payload, pos - payload);
721 if (conn->verify.sha256_server == NULL ||
722 crypto_hash_finish(conn->verify.sha256_server, hash, &hlen)
724 conn->verify.sha256_server = NULL;
729 conn->verify.sha256_server = NULL;
734 if (conn->verify
[all...]
/external/wpa_supplicant_8/hs20/server/ca/
H A Dsetup.sh122 $OPENSSL verify -CAfile rootCA/cacert.pem demoCA/cacert.pem
123 $OPENSSL verify -CAfile rootCA/cacert.pem -untrusted demoCA/cacert.pem *.pem
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_client.c453 if (tls_verify_hash_init(&conn->verify) < 0) {
454 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize verify "
492 tls_verify_hash_free(&conn->verify);
610 if (tls_verify_hash_init(&conn->verify) < 0) {
611 wpa_printf(MSG_DEBUG, "TLSv1: Failed to re-initialize verify "
H A Dtlsv1_client_i.h40 struct tls_verify_hash verify; member in struct:tlsv1_client
H A Dtlsv1_client_read.c914 if (conn->verify.sha256_server == NULL ||
915 crypto_hash_finish(conn->verify.sha256_server, hash, &hlen)
919 conn->verify.sha256_server = NULL;
922 conn->verify.sha256_server = NULL;
927 if (conn->verify.md5_server == NULL ||
928 crypto_hash_finish(conn->verify.md5_server, hash, &hlen) < 0) {
931 conn->verify.md5_server = NULL;
932 crypto_hash_finish(conn->verify.sha1_server, NULL, NULL);
933 conn->verify.sha1_server = NULL;
936 conn->verify
[all...]
H A Dtlsv1_client_write.c111 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start);
200 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start);
421 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start);
477 if (conn->verify.sha256_cert == NULL ||
478 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) <
480 conn->verify.sha256_cert = NULL;
485 conn->verify.sha256_cert = NULL;
510 if (conn->verify.md5_cert == NULL ||
511 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0)
515 conn->verify
[all...]
H A Dtlsv1_common.c182 * verify key usage (must allow encryption)
206 int tls_verify_hash_init(struct tls_verify_hash *verify) argument
208 tls_verify_hash_free(verify);
209 verify->md5_client = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0);
210 verify->md5_server = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0);
211 verify->md5_cert = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0);
212 verify->sha1_client = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0);
213 verify->sha1_server = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0);
214 verify->sha1_cert = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0);
215 if (verify
238 tls_verify_hash_add(struct tls_verify_hash *verify, const u8 *buf, size_t len) argument
264 tls_verify_hash_free(struct tls_verify_hash *verify) argument
[all...]
H A Dtlsv1_common.h252 int tls_verify_hash_init(struct tls_verify_hash *verify);
253 void tls_verify_hash_add(struct tls_verify_hash *verify, const u8 *buf,
255 void tls_verify_hash_free(struct tls_verify_hash *verify);
H A Dtlsv1_server.c388 if (tls_verify_hash_init(&conn->verify) < 0) {
389 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize verify "
420 tls_verify_hash_free(&conn->verify);
547 if (tls_verify_hash_init(&conn->verify) < 0) {
548 wpa_printf(MSG_DEBUG, "TLSv1: Failed to re-initialize verify "
H A Dtlsv1_server_i.h35 struct tls_verify_hash verify; member in struct:tlsv1_server
H A Dtlsv1_server_read.c874 if (conn->verify.sha256_cert == NULL ||
875 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) <
877 conn->verify.sha256_cert = NULL;
882 conn->verify.sha256_cert = NULL;
888 if (conn->verify.md5_cert == NULL ||
889 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0)
893 conn->verify.md5_cert = NULL;
894 crypto_hash_finish(conn->verify.sha1_cert, NULL, NULL);
895 conn->verify.sha1_cert = NULL;
900 crypto_hash_finish(conn->verify
[all...]
H A Dtlsv1_server_write.c137 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start);
234 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start);
560 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start);
626 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start);
663 tls_verify_hash_add(&conn->verify, payload, pos - payload);
721 if (conn->verify.sha256_server == NULL ||
722 crypto_hash_finish(conn->verify.sha256_server, hash, &hlen)
724 conn->verify.sha256_server = NULL;
729 conn->verify.sha256_server = NULL;
734 if (conn->verify
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_client.c453 if (tls_verify_hash_init(&conn->verify) < 0) {
454 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize verify "
492 tls_verify_hash_free(&conn->verify);
610 if (tls_verify_hash_init(&conn->verify) < 0) {
611 wpa_printf(MSG_DEBUG, "TLSv1: Failed to re-initialize verify "
H A Dtlsv1_client_i.h40 struct tls_verify_hash verify; member in struct:tlsv1_client
H A Dtlsv1_client_read.c914 if (conn->verify.sha256_server == NULL ||
915 crypto_hash_finish(conn->verify.sha256_server, hash, &hlen)
919 conn->verify.sha256_server = NULL;
922 conn->verify.sha256_server = NULL;
927 if (conn->verify.md5_server == NULL ||
928 crypto_hash_finish(conn->verify.md5_server, hash, &hlen) < 0) {
931 conn->verify.md5_server = NULL;
932 crypto_hash_finish(conn->verify.sha1_server, NULL, NULL);
933 conn->verify.sha1_server = NULL;
936 conn->verify
[all...]
H A Dtlsv1_client_write.c111 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start);
200 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start);
421 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start);
477 if (conn->verify.sha256_cert == NULL ||
478 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) <
480 conn->verify.sha256_cert = NULL;
485 conn->verify.sha256_cert = NULL;
510 if (conn->verify.md5_cert == NULL ||
511 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0)
515 conn->verify
[all...]

Completed in 197 milliseconds

1234567891011>>