/dragonfly/contrib/wpa_supplicant/src/rsn_supp/ |
H A D | wpa_ie.c | 47 u32 suite; in wpa_gen_wpa_ie_wpa() local 60 if (suite == 0) { in wpa_gen_wpa_ie_wpa() 65 RSN_SELECTOR_PUT(pos, suite); in wpa_gen_wpa_ie_wpa() 71 if (suite == 0 || in wpa_gen_wpa_ie_wpa() 78 RSN_SELECTOR_PUT(pos, suite); in wpa_gen_wpa_ie_wpa() 116 u32 suite; in wpa_gen_wpa_ie_rsn() local 132 if (suite == 0) { in wpa_gen_wpa_ie_rsn() 143 if (suite == 0 || in wpa_gen_wpa_ie_rsn() 269 u32 suite; in wpa_gen_wpa_ie_osen() local 284 if (suite == 0) { in wpa_gen_wpa_ie_osen() [all …]
|
/dragonfly/contrib/wpa_supplicant/src/tls/ |
H A D | tlsv1_record.c | 33 const struct tls_cipher_suite *suite; in tlsv1_record_set_cipher_suite() local 40 suite = tls_get_cipher_suite(cipher_suite); in tlsv1_record_set_cipher_suite() 41 if (suite == NULL) in tlsv1_record_set_cipher_suite() 44 if (suite->hash == TLS_HASH_MD5) { in tlsv1_record_set_cipher_suite() 47 } else if (suite->hash == TLS_HASH_SHA) { in tlsv1_record_set_cipher_suite() 50 } else if (suite->hash == TLS_HASH_SHA256) { in tlsv1_record_set_cipher_suite() 55 data = tls_get_cipher_data(suite->cipher); in tlsv1_record_set_cipher_suite()
|
H A D | tlsv1_common.c | 107 const struct tls_cipher_suite * tls_get_cipher_suite(u16 suite) in tls_get_cipher_suite() argument 111 if (tls_cipher_suites[i].suite == suite) in tls_get_cipher_suite() 129 const struct tls_cipher_suite *suite; in tls_server_key_exchange_allowed() local 132 suite = tls_get_cipher_suite(cipher); in tls_server_key_exchange_allowed() 133 if (suite == NULL) in tls_server_key_exchange_allowed() 136 switch (suite->key_exchange) { in tls_server_key_exchange_allowed()
|
H A D | tlsv1_server_read.c | 30 static int testing_cipher_suite_filter(struct tlsv1_server *conn, u16 suite) in testing_cipher_suite_filter() argument 37 suite != TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 && in testing_cipher_suite_filter() 38 suite != TLS_DHE_RSA_WITH_AES_256_CBC_SHA && in testing_cipher_suite_filter() 39 suite != TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 && in testing_cipher_suite_filter() 40 suite != TLS_DHE_RSA_WITH_AES_128_CBC_SHA && in testing_cipher_suite_filter() 41 suite != TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA) in testing_cipher_suite_filter() 814 const struct tls_cipher_suite *suite; in tls_process_client_key_exchange() local 862 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_process_client_key_exchange() 863 if (suite == NULL) in tls_process_client_key_exchange() 866 keyx = suite->key_exchange; in tls_process_client_key_exchange()
|
H A D | tlsv1_server_write.c | 195 const struct tls_cipher_suite *suite; in tls_write_server_certificate() local 197 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_write_server_certificate() 198 if (suite && suite->key_exchange == TLS_KEY_X_DH_anon) { in tls_write_server_certificate() 372 const struct tls_cipher_suite *suite; in tls_write_server_key_exchange() local 380 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_write_server_key_exchange() 381 if (suite == NULL) in tls_write_server_key_exchange() 384 keyx = suite->key_exchange; in tls_write_server_key_exchange()
|
H A D | tlsv1_common.h | 216 u16 suite; member 250 const struct tls_cipher_suite * tls_get_cipher_suite(u16 suite);
|
H A D | tlsv1_client_read.c | 1019 const struct tls_cipher_suite *suite; in tls_process_server_key_exchange() local 1086 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_process_server_key_exchange() 1087 if (suite && (suite->key_exchange == TLS_KEY_X_DH_anon || in tls_process_server_key_exchange() 1088 suite->key_exchange == TLS_KEY_X_DHE_RSA)) { in tls_process_server_key_exchange() 1090 suite->key_exchange) < 0) { in tls_process_server_key_exchange()
|
H A D | tlsv1_client_write.c | 524 const struct tls_cipher_suite *suite; in tls_write_client_key_exchange() local 526 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_write_client_key_exchange() 527 if (suite == NULL) in tls_write_client_key_exchange() 530 keyx = suite->key_exchange; in tls_write_client_key_exchange()
|
/dragonfly/test/libpthread/ |
H A D | README | 3 This test suite is meant to test general functionality of pthreads, as well as 4 provide a simple framework for regression tests. In general, this test suite
|
/dragonfly/contrib/wpa_supplicant/src/ap/ |
H A D | wpa_auth_ie.c | 32 u32 suite; in wpa_write_wpa_ie() local 40 suite = wpa_cipher_to_suite(WPA_PROTO_WPA, conf->wpa_group); in wpa_write_wpa_ie() 41 if (suite == 0) { in wpa_write_wpa_ie() 46 RSN_SELECTOR_PUT(pos, suite); in wpa_write_wpa_ie() 98 u32 suite; in wpa_write_rsn_ie() local 105 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, conf->wpa_group); in wpa_write_rsn_ie() 106 if (suite == 0) { in wpa_write_rsn_ie() 111 RSN_SELECTOR_PUT(pos, suite); in wpa_write_rsn_ie()
|
H A D | ieee802_1x.c | 373 u32 suite; in add_common_radius_sta_attr_rsn() local 378 suite = wpa_cipher_to_suite(ver, val); in add_common_radius_sta_attr_rsn() 383 suite)) { in add_common_radius_sta_attr_rsn() 388 suite = wpa_cipher_to_suite(((hapd->conf->wpa & 0x2) || in add_common_radius_sta_attr_rsn() 395 suite)) { in add_common_radius_sta_attr_rsn() 401 suite = wpa_akm_to_suite(val); in add_common_radius_sta_attr_rsn() 406 suite)) { in add_common_radius_sta_attr_rsn() 413 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, in add_common_radius_sta_attr_rsn() 418 msg, RADIUS_ATTR_WLAN_GROUP_MGMT_CIPHER, suite)) { in add_common_radius_sta_attr_rsn()
|
/dragonfly/test/stress/stress2/doc/ |
H A D | README | 4 generation of the test suite.
|
/dragonfly/contrib/wpa_supplicant/src/crypto/ |
H A D | tls_wolfssl.c | 1823 const char *suite; in tls_connection_set_cipher_list() local 1827 suite = "RC4-SHA"; in tls_connection_set_cipher_list() 1830 suite = "AES128-SHA"; in tls_connection_set_cipher_list() 1833 suite = "DHE-RSA-AES128-SHA"; in tls_connection_set_cipher_list() 1836 suite = "ADH-AES128-SHA"; in tls_connection_set_cipher_list() 1839 suite = "DHE-RSA-AES256-SHA"; in tls_connection_set_cipher_list() 1842 suite = "AES256-SHA"; in tls_connection_set_cipher_list() 1849 ret = os_snprintf(pos, end - pos, ":%s", suite); in tls_connection_set_cipher_list()
|
H A D | tls_openssl.c | 4473 const char *suite; in tls_connection_set_cipher_list() local 4477 suite = "RC4-SHA"; in tls_connection_set_cipher_list() 4480 suite = "AES128-SHA"; in tls_connection_set_cipher_list() 4483 suite = "DHE-RSA-AES128-SHA"; in tls_connection_set_cipher_list() 4486 suite = "ADH-AES128-SHA"; in tls_connection_set_cipher_list() 4489 suite = "DHE-RSA-AES256-SHA"; in tls_connection_set_cipher_list() 4492 suite = "AES256-SHA"; in tls_connection_set_cipher_list() 4499 ret = os_snprintf(pos, end - pos, ":%s", suite); in tls_connection_set_cipher_list()
|
/dragonfly/contrib/openpam/ |
H A D | RELNOTES | 7 the GNU compiler suite installed.
|
/dragonfly/test/stress/stress2/ |
H A D | README | 3 This is the FreeBSD kernel stress test suite. The purpose is to crash the
|
/dragonfly/test/stress/fsstress/ |
H A D | README | 40 If you're interested I also ported fsstress from the XFS test suite to
|
/dragonfly/contrib/gcc-4.7/gcc/doc/ |
H A D | frontends.texi | 25 generically to the complete suite of tools. The name historically stood
|
/dragonfly/contrib/expat/ |
H A D | Changes | 709 #180 Windows: Fix compilation of test suite for Visual Studio 2008 746 #75 #106 Test suite: Resolve expected failure cases where xmlwf 748 #127 Windows: Fix test suite compilation 761 #160 Undefine NDEBUG in the test suite (rather than rejecting it) 794 Improve test suite error output 830 #23 Test suite: Fix memory leaks 1177 - Enhanced the regression test suite. 1259 Allows you to set a memory management suite to replace the
|
/dragonfly/contrib/awk/ |
H A D | README.md | 79 * Please run the test suite and make sure that your changes pass before
|
/dragonfly/contrib/wpa_supplicant/src/drivers/ |
H A D | driver_nl80211.c | 3057 u32 suite; in wpa_driver_nl80211_set_key() local 3059 suite = wpa_alg_to_cipher_suite(alg, key_len); in wpa_driver_nl80211_set_key() 3060 if (!suite) in wpa_driver_nl80211_set_key() 3065 nla_put_u32(msg, NL80211_ATTR_KEY_CIPHER, suite)) in wpa_driver_nl80211_set_key() 3167 u32 suite; in nl_add_key() local 3172 suite = wpa_alg_to_cipher_suite(alg, key_len); in nl_add_key() 3173 if (!suite) in nl_add_key() 3185 nla_put_u32(msg, NL80211_KEY_CIPHER, suite) || in nl_add_key() 4059 u32 suites[10], suite; in wpa_driver_nl80211_set_ap() local 4186 suite = wpa_cipher_to_cipher_suite(params->group_cipher); in wpa_driver_nl80211_set_ap() [all …]
|
/dragonfly/crypto/openssh/ |
H A D | PROTOCOL.mux | 40 to access basically the full suite of connection protocol features.
|
/dragonfly/contrib/wpa_supplicant/wpa_supplicant/ |
H A D | eap_testing.txt | 15 The full automated test suite can now be run in couple of seconds, but
|
/dragonfly/crypto/libressl/ |
H A D | ChangeLog | 994 bettertls.com certificate validation check suite. 1056 * Expanded test coverage via the bettertls certificate test suite. 1275 * Improved cipher suite handling to automatically include TLSv1.3 1283 * Provided TLSv1.3 cipher suite aliases to match the names used 1975 * libtls now handles 4 cipher suite groups: 2528 * Added reworked GOST cipher suite support
|
/dragonfly/contrib/binutils-2.27/binutils/ |
H A D | README | 218 be helpful if you would look at the test suite included in the release
|