Home
last modified time | relevance | path

Searched refs:suite (Results 1 – 25 of 41) sorted by relevance

12

/dragonfly/contrib/wpa_supplicant/src/rsn_supp/
H A Dwpa_ie.c47 u32 suite; in wpa_gen_wpa_ie_wpa() local
60 if (suite == 0) { in wpa_gen_wpa_ie_wpa()
65 RSN_SELECTOR_PUT(pos, suite); in wpa_gen_wpa_ie_wpa()
71 if (suite == 0 || in wpa_gen_wpa_ie_wpa()
78 RSN_SELECTOR_PUT(pos, suite); in wpa_gen_wpa_ie_wpa()
116 u32 suite; in wpa_gen_wpa_ie_rsn() local
132 if (suite == 0) { in wpa_gen_wpa_ie_rsn()
143 if (suite == 0 || in wpa_gen_wpa_ie_rsn()
269 u32 suite; in wpa_gen_wpa_ie_osen() local
284 if (suite == 0) { in wpa_gen_wpa_ie_osen()
[all …]
/dragonfly/contrib/wpa_supplicant/src/tls/
H A Dtlsv1_record.c33 const struct tls_cipher_suite *suite; in tlsv1_record_set_cipher_suite() local
40 suite = tls_get_cipher_suite(cipher_suite); in tlsv1_record_set_cipher_suite()
41 if (suite == NULL) in tlsv1_record_set_cipher_suite()
44 if (suite->hash == TLS_HASH_MD5) { in tlsv1_record_set_cipher_suite()
47 } else if (suite->hash == TLS_HASH_SHA) { in tlsv1_record_set_cipher_suite()
50 } else if (suite->hash == TLS_HASH_SHA256) { in tlsv1_record_set_cipher_suite()
55 data = tls_get_cipher_data(suite->cipher); in tlsv1_record_set_cipher_suite()
H A Dtlsv1_common.c107 const struct tls_cipher_suite * tls_get_cipher_suite(u16 suite) in tls_get_cipher_suite() argument
111 if (tls_cipher_suites[i].suite == suite) in tls_get_cipher_suite()
129 const struct tls_cipher_suite *suite; in tls_server_key_exchange_allowed() local
132 suite = tls_get_cipher_suite(cipher); in tls_server_key_exchange_allowed()
133 if (suite == NULL) in tls_server_key_exchange_allowed()
136 switch (suite->key_exchange) { in tls_server_key_exchange_allowed()
H A Dtlsv1_server_read.c30 static int testing_cipher_suite_filter(struct tlsv1_server *conn, u16 suite) in testing_cipher_suite_filter() argument
37 suite != TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 && in testing_cipher_suite_filter()
38 suite != TLS_DHE_RSA_WITH_AES_256_CBC_SHA && in testing_cipher_suite_filter()
39 suite != TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 && in testing_cipher_suite_filter()
40 suite != TLS_DHE_RSA_WITH_AES_128_CBC_SHA && in testing_cipher_suite_filter()
41 suite != TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA) in testing_cipher_suite_filter()
814 const struct tls_cipher_suite *suite; in tls_process_client_key_exchange() local
862 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_process_client_key_exchange()
863 if (suite == NULL) in tls_process_client_key_exchange()
866 keyx = suite->key_exchange; in tls_process_client_key_exchange()
H A Dtlsv1_server_write.c195 const struct tls_cipher_suite *suite; in tls_write_server_certificate() local
197 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_write_server_certificate()
198 if (suite && suite->key_exchange == TLS_KEY_X_DH_anon) { in tls_write_server_certificate()
372 const struct tls_cipher_suite *suite; in tls_write_server_key_exchange() local
380 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_write_server_key_exchange()
381 if (suite == NULL) in tls_write_server_key_exchange()
384 keyx = suite->key_exchange; in tls_write_server_key_exchange()
H A Dtlsv1_common.h216 u16 suite; member
250 const struct tls_cipher_suite * tls_get_cipher_suite(u16 suite);
H A Dtlsv1_client_read.c1019 const struct tls_cipher_suite *suite; in tls_process_server_key_exchange() local
1086 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_process_server_key_exchange()
1087 if (suite && (suite->key_exchange == TLS_KEY_X_DH_anon || in tls_process_server_key_exchange()
1088 suite->key_exchange == TLS_KEY_X_DHE_RSA)) { in tls_process_server_key_exchange()
1090 suite->key_exchange) < 0) { in tls_process_server_key_exchange()
H A Dtlsv1_client_write.c524 const struct tls_cipher_suite *suite; in tls_write_client_key_exchange() local
526 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_write_client_key_exchange()
527 if (suite == NULL) in tls_write_client_key_exchange()
530 keyx = suite->key_exchange; in tls_write_client_key_exchange()
/dragonfly/test/libpthread/
H A DREADME3 This test suite is meant to test general functionality of pthreads, as well as
4 provide a simple framework for regression tests. In general, this test suite
/dragonfly/contrib/wpa_supplicant/src/ap/
H A Dwpa_auth_ie.c32 u32 suite; in wpa_write_wpa_ie() local
40 suite = wpa_cipher_to_suite(WPA_PROTO_WPA, conf->wpa_group); in wpa_write_wpa_ie()
41 if (suite == 0) { in wpa_write_wpa_ie()
46 RSN_SELECTOR_PUT(pos, suite); in wpa_write_wpa_ie()
98 u32 suite; in wpa_write_rsn_ie() local
105 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, conf->wpa_group); in wpa_write_rsn_ie()
106 if (suite == 0) { in wpa_write_rsn_ie()
111 RSN_SELECTOR_PUT(pos, suite); in wpa_write_rsn_ie()
H A Dieee802_1x.c373 u32 suite; in add_common_radius_sta_attr_rsn() local
378 suite = wpa_cipher_to_suite(ver, val); in add_common_radius_sta_attr_rsn()
383 suite)) { in add_common_radius_sta_attr_rsn()
388 suite = wpa_cipher_to_suite(((hapd->conf->wpa & 0x2) || in add_common_radius_sta_attr_rsn()
395 suite)) { in add_common_radius_sta_attr_rsn()
401 suite = wpa_akm_to_suite(val); in add_common_radius_sta_attr_rsn()
406 suite)) { in add_common_radius_sta_attr_rsn()
413 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, in add_common_radius_sta_attr_rsn()
418 msg, RADIUS_ATTR_WLAN_GROUP_MGMT_CIPHER, suite)) { in add_common_radius_sta_attr_rsn()
/dragonfly/test/stress/stress2/doc/
H A DREADME4 generation of the test suite.
/dragonfly/contrib/wpa_supplicant/src/crypto/
H A Dtls_wolfssl.c1823 const char *suite; in tls_connection_set_cipher_list() local
1827 suite = "RC4-SHA"; in tls_connection_set_cipher_list()
1830 suite = "AES128-SHA"; in tls_connection_set_cipher_list()
1833 suite = "DHE-RSA-AES128-SHA"; in tls_connection_set_cipher_list()
1836 suite = "ADH-AES128-SHA"; in tls_connection_set_cipher_list()
1839 suite = "DHE-RSA-AES256-SHA"; in tls_connection_set_cipher_list()
1842 suite = "AES256-SHA"; in tls_connection_set_cipher_list()
1849 ret = os_snprintf(pos, end - pos, ":%s", suite); in tls_connection_set_cipher_list()
H A Dtls_openssl.c4473 const char *suite; in tls_connection_set_cipher_list() local
4477 suite = "RC4-SHA"; in tls_connection_set_cipher_list()
4480 suite = "AES128-SHA"; in tls_connection_set_cipher_list()
4483 suite = "DHE-RSA-AES128-SHA"; in tls_connection_set_cipher_list()
4486 suite = "ADH-AES128-SHA"; in tls_connection_set_cipher_list()
4489 suite = "DHE-RSA-AES256-SHA"; in tls_connection_set_cipher_list()
4492 suite = "AES256-SHA"; in tls_connection_set_cipher_list()
4499 ret = os_snprintf(pos, end - pos, ":%s", suite); in tls_connection_set_cipher_list()
/dragonfly/contrib/openpam/
H A DRELNOTES7 the GNU compiler suite installed.
/dragonfly/test/stress/stress2/
H A DREADME3 This is the FreeBSD kernel stress test suite. The purpose is to crash the
/dragonfly/test/stress/fsstress/
H A DREADME40 If you're interested I also ported fsstress from the XFS test suite to
/dragonfly/contrib/gcc-4.7/gcc/doc/
H A Dfrontends.texi25 generically to the complete suite of tools. The name historically stood
/dragonfly/contrib/expat/
H A DChanges709 #180 Windows: Fix compilation of test suite for Visual Studio 2008
746 #75 #106 Test suite: Resolve expected failure cases where xmlwf
748 #127 Windows: Fix test suite compilation
761 #160 Undefine NDEBUG in the test suite (rather than rejecting it)
794 Improve test suite error output
830 #23 Test suite: Fix memory leaks
1177 - Enhanced the regression test suite.
1259 Allows you to set a memory management suite to replace the
/dragonfly/contrib/awk/
H A DREADME.md79 * Please run the test suite and make sure that your changes pass before
/dragonfly/contrib/wpa_supplicant/src/drivers/
H A Ddriver_nl80211.c3057 u32 suite; in wpa_driver_nl80211_set_key() local
3059 suite = wpa_alg_to_cipher_suite(alg, key_len); in wpa_driver_nl80211_set_key()
3060 if (!suite) in wpa_driver_nl80211_set_key()
3065 nla_put_u32(msg, NL80211_ATTR_KEY_CIPHER, suite)) in wpa_driver_nl80211_set_key()
3167 u32 suite; in nl_add_key() local
3172 suite = wpa_alg_to_cipher_suite(alg, key_len); in nl_add_key()
3173 if (!suite) in nl_add_key()
3185 nla_put_u32(msg, NL80211_KEY_CIPHER, suite) || in nl_add_key()
4059 u32 suites[10], suite; in wpa_driver_nl80211_set_ap() local
4186 suite = wpa_cipher_to_cipher_suite(params->group_cipher); in wpa_driver_nl80211_set_ap()
[all …]
/dragonfly/crypto/openssh/
H A DPROTOCOL.mux40 to access basically the full suite of connection protocol features.
/dragonfly/contrib/wpa_supplicant/wpa_supplicant/
H A Deap_testing.txt15 The full automated test suite can now be run in couple of seconds, but
/dragonfly/crypto/libressl/
H A DChangeLog994 bettertls.com certificate validation check suite.
1056 * Expanded test coverage via the bettertls certificate test suite.
1275 * Improved cipher suite handling to automatically include TLSv1.3
1283 * Provided TLSv1.3 cipher suite aliases to match the names used
1975 * libtls now handles 4 cipher suite groups:
2528 * Added reworked GOST cipher suite support
/dragonfly/contrib/binutils-2.27/binutils/
H A DREADME218 be helpful if you would look at the test suite included in the release

12