Home
last modified time | relevance | path

Searched refs:keys (Results 1 – 25 of 55) sorted by relevance

123

/hostap-3.6.0/src/eap_common/
Dikev2_common.c371 struct ikev2_keys *keys, int initiator, in ikev2_derive_auth_data() argument
380 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr; in ikev2_derive_auth_data()
394 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, in ikev2_derive_auth_data()
429 struct ikev2_keys *keys, int initiator, in ikev2_decrypt_payload() argument
440 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; in ikev2_decrypt_payload()
441 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; in ikev2_decrypt_payload()
476 if (ikev2_integ_hash(integ_id, SK_a, keys->SK_integ_len, in ikev2_decrypt_payload()
499 if (ikev2_encr_decrypt(encr_alg->id, SK_e, keys->SK_encr_len, iv, pos, in ikev2_decrypt_payload()
530 int ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys, in ikev2_build_encrypted() argument
540 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; in ikev2_build_encrypted()
[all …]
Deap_ikev2_common.c18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, in eap_ikev2_derive_keymat() argument
27 if (keys->SK_d == NULL || i_nonce == NULL || r_nonce == NULL) in eap_ikev2_derive_keymat()
37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, in eap_ikev2_derive_keymat()
68 int eap_ikev2_validate_icv(int integ_alg, struct ikev2_keys *keys, in eap_ikev2_validate_icv() argument
75 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; in eap_ikev2_validate_icv()
96 if (ikev2_integ_hash(integ_alg, SK_a, keys->SK_integ_len, in eap_ikev2_validate_icv()
Dikev2_common.h245 int ikev2_keys_set(struct ikev2_keys *keys);
246 void ikev2_free_keys(struct ikev2_keys *keys);
288 struct ikev2_keys *keys, int initiator,
320 u8 * ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys,
325 int ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys,
332 struct ikev2_keys *keys);
Deap_ikev2_common.h20 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys,
25 int eap_ikev2_validate_icv(int integ_alg, struct ikev2_keys *keys,
Deap_sim_common.c280 u8 keys[EAP_SIM_K_ENCR_LEN + EAP_AKA_PRIME_K_AUT_LEN + in eap_aka_prime_derive_keys() local
297 keys, sizeof(keys)); in eap_aka_prime_derive_keys()
299 pos = keys; in eap_aka_prime_derive_keys()
329 u8 keys[EAP_MSK_LEN + EAP_EMSK_LEN]; in eap_aka_prime_derive_keys_reauth() local
343 keys, sizeof(keys)); in eap_aka_prime_derive_keys_reauth()
345 pos = keys; in eap_aka_prime_derive_keys_reauth()
353 os_memset(keys, 0, sizeof(keys)); in eap_aka_prime_derive_keys_reauth()
/hostap-3.6.0/wlantest/
Dwired.c109 struct radius_ms_mppe_keys *keys; in process_radius_access_accept() local
127 keys = radius_msg_get_ms_keys(msg, r->last_req, in process_radius_access_accept()
130 if (keys && keys->send && keys->recv) { in process_radius_access_accept()
135 keys->send, keys->send_len); in process_radius_access_accept()
137 keys->recv, keys->recv_len); in process_radius_access_accept()
138 pmk_len = keys->recv_len; in process_radius_access_accept()
141 os_memcpy(pmk, keys->recv, pmk_len); in process_radius_access_accept()
143 len2 = keys->send_len; in process_radius_access_accept()
146 os_memcpy(pmk + pmk_len, keys->send, len2); in process_radius_access_accept()
153 if (keys) { in process_radius_access_accept()
[all …]
/hostap-3.6.0/src/eap_server/
Deap_server_tls_common.c147 struct tls_random keys; in eap_server_tls_derive_session_id() local
174 if (tls_connection_get_random(sm->cfg->ssl_ctx, data->conn, &keys)) in eap_server_tls_derive_session_id()
177 if (keys.client_random == NULL || keys.server_random == NULL) in eap_server_tls_derive_session_id()
180 *len = 1 + keys.client_random_len + keys.server_random_len; in eap_server_tls_derive_session_id()
187 os_memcpy(out + 1, keys.client_random, keys.client_random_len); in eap_server_tls_derive_session_id()
188 os_memcpy(out + 1 + keys.client_random_len, keys.server_random, in eap_server_tls_derive_session_id()
189 keys.server_random_len); in eap_server_tls_derive_session_id()
Dikev2.c23 ikev2_free_keys(&data->keys); in ikev2_initiator_deinit()
114 &data->keys); in ikev2_derive_keys()
457 data->proposal.integ, &data->keys, 0, in ikev2_process_sa_init_encr()
618 &data->keys, 0, data->shared_secret, in ikev2_process_auth_secret()
721 &data->keys, 0, hdr, pl->encrypted, in ikev2_process_sa_auth()
1068 &data->keys, 1, data->shared_secret, in ikev2_build_auth()
1171 &data->keys, 1, msg, plain, in ikev2_build_sa_auth()
Deap_server_ikev2.c187 data->ikev2.keys.SK_ai, in eap_ikev2_build_msg()
188 data->ikev2.keys.SK_integ_len, in eap_ikev2_build_msg()
263 data->ikev2.proposal.integ, &data->ikev2.keys, 0, in eap_ikev2_process_icv()
337 data->ikev2.proposal.prf, &data->ikev2.keys, in eap_ikev2_server_keymat()
/hostap-3.6.0/wpa_supplicant/
Deapol_test.c844 struct radius_ms_mppe_keys *keys; in ieee802_1x_get_keys() local
848 keys = radius_msg_get_ms_keys(msg, req, shared_secret, in ieee802_1x_get_keys()
850 if (keys && keys->send == NULL && keys->recv == NULL) { in ieee802_1x_get_keys()
851 os_free(keys); in ieee802_1x_get_keys()
852 keys = radius_msg_get_cisco_keys(msg, req, shared_secret, in ieee802_1x_get_keys()
856 if (keys) { in ieee802_1x_get_keys()
857 if (keys->send) { in ieee802_1x_get_keys()
859 keys->send, keys->send_len); in ieee802_1x_get_keys()
861 if (keys->recv) { in ieee802_1x_get_keys()
863 keys->recv, keys->recv_len); in ieee802_1x_get_keys()
[all …]
Deap_testing.txt24 certificates, and private keys for testing use. Other alternative
362 keys with outer EAP-Success message after this
368 keys with outer EAP-Success message after this
373 - uses TLV Success and Reply, sends MPPE keys with outer EAP-Success message
378 - sends tunneled EAP-Success with MPPE keys and expects the authentication to
384 - sends tunneled EAP-Success with MPPE keys and expects to receive TLS ACK
390 keys with outer EAP-Success message after this
/hostap-3.6.0/src/eap_peer/
Deap_tls_common.c413 struct tls_random keys; in eap_peer_tls_derive_session_id() local
440 if (tls_connection_get_random(sm->ssl_ctx, data->conn, &keys) || in eap_peer_tls_derive_session_id()
441 keys.client_random == NULL || keys.server_random == NULL) in eap_peer_tls_derive_session_id()
444 *len = 1 + keys.client_random_len + keys.server_random_len; in eap_peer_tls_derive_session_id()
451 os_memcpy(out + 1, keys.client_random, keys.client_random_len); in eap_peer_tls_derive_session_id()
452 os_memcpy(out + 1 + keys.client_random_len, keys.server_random, in eap_peer_tls_derive_session_id()
453 keys.server_random_len); in eap_peer_tls_derive_session_id()
Dikev2.c19 ikev2_free_keys(&data->keys); in ikev2_responder_deinit()
110 &data->keys); in ikev2_derive_keys()
552 &data->keys, 1, data->shared_secret, in ikev2_process_auth_secret()
657 &data->keys, 1, hdr, pl->encrypted, in ikev2_process_sa_auth()
1004 &data->keys, 0, data->shared_secret, in ikev2_build_auth()
1119 &data->keys, 0, msg, plain, in ikev2_build_sa_init()
1161 &data->keys, 0, msg, plain, in ikev2_build_sa_auth()
1197 &data->keys, 0, msg, plain, in ikev2_build_notify()
Deap_ikev2.c121 data->ikev2.proposal.prf, &data->ikev2.keys, in eap_ikev2_peer_keymat()
191 data->ikev2.keys.SK_ar, in eap_ikev2_build_msg()
192 data->ikev2.keys.SK_integ_len, in eap_ikev2_build_msg()
251 data->ikev2.proposal.integ, &data->ikev2.keys, 1, in eap_ikev2_process_icv()
/hostap-3.6.0/src/radius/
Dradius.c1113 struct radius_ms_mppe_keys *keys; in radius_msg_get_ms_keys() local
1118 keys = os_zalloc(sizeof(*keys)); in radius_msg_get_ms_keys()
1119 if (keys == NULL) in radius_msg_get_ms_keys()
1126 keys->send = decrypt_ms_key(key, keylen, in radius_msg_get_ms_keys()
1129 &keys->send_len); in radius_msg_get_ms_keys()
1130 if (!keys->send) { in radius_msg_get_ms_keys()
1141 keys->recv = decrypt_ms_key(key, keylen, in radius_msg_get_ms_keys()
1144 &keys->recv_len); in radius_msg_get_ms_keys()
1145 if (!keys->recv) { in radius_msg_get_ms_keys()
1152 return keys; in radius_msg_get_ms_keys()
[all …]
/hostap-3.6.0/src/crypto/
Ddes-internal.c318 static void desfunc(u32 *block, const u32 *keys) in desfunc() argument
350 work = RORc(right, 4) ^ *keys++; in desfunc()
355 work = right ^ *keys++; in desfunc()
361 work = RORc(leftt, 4) ^ *keys++; in desfunc()
366 work = leftt ^ *keys++; in desfunc()
Dtls_gnutls.c878 struct tls_random *keys) in tls_connection_get_random() argument
883 if (conn == NULL || conn->session == NULL || keys == NULL) in tls_connection_get_random()
886 os_memset(keys, 0, sizeof(*keys)); in tls_connection_get_random()
888 keys->client_random = client.data; in tls_connection_get_random()
889 keys->server_random = server.data; in tls_connection_get_random()
890 keys->client_random_len = client.size; in tls_connection_get_random()
891 keys->server_random_len = client.size; in tls_connection_get_random()
/hostap-3.6.0/src/tls/
Dtlsv1_server.c645 int tlsv1_server_get_random(struct tlsv1_server *conn, struct tls_random *keys) in tlsv1_server_get_random() argument
647 os_memset(keys, 0, sizeof(*keys)); in tlsv1_server_get_random()
651 keys->client_random = conn->client_random; in tlsv1_server_get_random()
652 keys->client_random_len = TLS_RANDOM_LEN; in tlsv1_server_get_random()
655 keys->server_random = conn->server_random; in tlsv1_server_get_random()
656 keys->server_random_len = TLS_RANDOM_LEN; in tlsv1_server_get_random()
Dtlsv1_client.c769 int tlsv1_client_get_random(struct tlsv1_client *conn, struct tls_random *keys) in tlsv1_client_get_random() argument
771 os_memset(keys, 0, sizeof(*keys)); in tlsv1_client_get_random()
775 keys->client_random = conn->client_random; in tlsv1_client_get_random()
776 keys->client_random_len = TLS_RANDOM_LEN; in tlsv1_client_get_random()
779 keys->server_random = conn->server_random; in tlsv1_client_get_random()
780 keys->server_random_len = TLS_RANDOM_LEN; in tlsv1_client_get_random()
/hostap-3.6.0/src/ap/
Dieee802_1x.c1489 struct radius_ms_mppe_keys *keys; in ieee802_1x_get_keys() local
1497 keys = radius_msg_get_ms_keys(msg, req, shared_secret, in ieee802_1x_get_keys()
1500 if (keys && keys->send && keys->recv) { in ieee802_1x_get_keys()
1501 len = keys->send_len + keys->recv_len; in ieee802_1x_get_keys()
1503 keys->send, keys->send_len); in ieee802_1x_get_keys()
1505 keys->recv, keys->recv_len); in ieee802_1x_get_keys()
1510 os_memcpy(sm->eap_if->aaaEapKeyData, keys->recv, in ieee802_1x_get_keys()
1511 keys->recv_len); in ieee802_1x_get_keys()
1512 os_memcpy(sm->eap_if->aaaEapKeyData + keys->recv_len, in ieee802_1x_get_keys()
1513 keys->send, keys->send_len); in ieee802_1x_get_keys()
[all …]
/hostap-3.6.0/hostapd/
DREADME199 EAP/TLS generates a session key that can be used to send WEP keys from
205 keys for stations. This requires support for individual keys in the
208 WEP keys can be automatically updated by configuring rekeying. This
246 for protecting wireless networks. WEP uses RC4 with 40-bit keys,
259 per-packet RC4 keys. In addition, it implements replay protection,
264 IEEE 802.1X is using or pre-shared keys without need for additional
270 Handshake) for generating and exchanging data encryption keys between
304 # For WPA-RADIUS/EAP, ieee8021x must be set (but without dynamic WEP keys),
313 # WPA pre-shared keys for WPA-PSK. This can be either entered as a 256-bit
324 # Set of accepted cipher suites (encryption algorithms) for pairwise keys
[all …]
/hostap-3.6.0/wpa_supplicant/doc/docbook/
Dwpa_background.sgml39 40-bit keys, 24-bit initialization vector (IV), and CRC32 to
52 per-packet RC4 keys. In addition, it implements replay protection,
57 EAP just like IEEE 802.1X is using or pre-shared keys without need
65 keys between the Authenticator and Supplicant. This handshake is
/hostap-3.6.0/hs20/server/www/
Dspp.php35 $keys = implode('|', array_keys($needed)); variable
36 preg_match_all('@(' . $keys . ')=(?:([\'"])([^\2]+?)\2|([^\s,]+))@',
Dest.php23 $keys = implode('|', array_keys($needed)); variable
24 preg_match_all('@(' . $keys . ')=(?:([\'"])([^\2]+?)\2|([^\s,]+))@',
/hostap-3.6.0/src/wps/
Dwps_common.c68 u8 keys[WPS_AUTHKEY_LEN + WPS_KEYWRAPKEY_LEN + WPS_EMSK_LEN]; in wps_derive_keys() local
116 keys, sizeof(keys)); in wps_derive_keys()
117 os_memcpy(wps->authkey, keys, WPS_AUTHKEY_LEN); in wps_derive_keys()
118 os_memcpy(wps->keywrapkey, keys + WPS_AUTHKEY_LEN, WPS_KEYWRAPKEY_LEN); in wps_derive_keys()
119 os_memcpy(wps->emsk, keys + WPS_AUTHKEY_LEN + WPS_KEYWRAPKEY_LEN, in wps_derive_keys()

123