/hostap-3.6.0/src/eap_common/ |
D | ikev2_common.c | 371 struct ikev2_keys *keys, int initiator, in ikev2_derive_auth_data() argument 380 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr; in ikev2_derive_auth_data() 394 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, in ikev2_derive_auth_data() 429 struct ikev2_keys *keys, int initiator, in ikev2_decrypt_payload() argument 440 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; in ikev2_decrypt_payload() 441 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; in ikev2_decrypt_payload() 476 if (ikev2_integ_hash(integ_id, SK_a, keys->SK_integ_len, in ikev2_decrypt_payload() 499 if (ikev2_encr_decrypt(encr_alg->id, SK_e, keys->SK_encr_len, iv, pos, in ikev2_decrypt_payload() 530 int ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys, in ikev2_build_encrypted() argument 540 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; in ikev2_build_encrypted() [all …]
|
D | eap_ikev2_common.c | 18 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, in eap_ikev2_derive_keymat() argument 27 if (keys->SK_d == NULL || i_nonce == NULL || r_nonce == NULL) in eap_ikev2_derive_keymat() 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, in eap_ikev2_derive_keymat() 68 int eap_ikev2_validate_icv(int integ_alg, struct ikev2_keys *keys, in eap_ikev2_validate_icv() argument 75 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; in eap_ikev2_validate_icv() 96 if (ikev2_integ_hash(integ_alg, SK_a, keys->SK_integ_len, in eap_ikev2_validate_icv()
|
D | ikev2_common.h | 245 int ikev2_keys_set(struct ikev2_keys *keys); 246 void ikev2_free_keys(struct ikev2_keys *keys); 288 struct ikev2_keys *keys, int initiator, 320 u8 * ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, 325 int ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys, 332 struct ikev2_keys *keys);
|
D | eap_ikev2_common.h | 20 int eap_ikev2_derive_keymat(int prf, struct ikev2_keys *keys, 25 int eap_ikev2_validate_icv(int integ_alg, struct ikev2_keys *keys,
|
D | eap_sim_common.c | 280 u8 keys[EAP_SIM_K_ENCR_LEN + EAP_AKA_PRIME_K_AUT_LEN + in eap_aka_prime_derive_keys() local 297 keys, sizeof(keys)); in eap_aka_prime_derive_keys() 299 pos = keys; in eap_aka_prime_derive_keys() 329 u8 keys[EAP_MSK_LEN + EAP_EMSK_LEN]; in eap_aka_prime_derive_keys_reauth() local 343 keys, sizeof(keys)); in eap_aka_prime_derive_keys_reauth() 345 pos = keys; in eap_aka_prime_derive_keys_reauth() 353 os_memset(keys, 0, sizeof(keys)); in eap_aka_prime_derive_keys_reauth()
|
/hostap-3.6.0/wlantest/ |
D | wired.c | 109 struct radius_ms_mppe_keys *keys; in process_radius_access_accept() local 127 keys = radius_msg_get_ms_keys(msg, r->last_req, in process_radius_access_accept() 130 if (keys && keys->send && keys->recv) { in process_radius_access_accept() 135 keys->send, keys->send_len); in process_radius_access_accept() 137 keys->recv, keys->recv_len); in process_radius_access_accept() 138 pmk_len = keys->recv_len; in process_radius_access_accept() 141 os_memcpy(pmk, keys->recv, pmk_len); in process_radius_access_accept() 143 len2 = keys->send_len; in process_radius_access_accept() 146 os_memcpy(pmk + pmk_len, keys->send, len2); in process_radius_access_accept() 153 if (keys) { in process_radius_access_accept() [all …]
|
/hostap-3.6.0/src/eap_server/ |
D | eap_server_tls_common.c | 147 struct tls_random keys; in eap_server_tls_derive_session_id() local 174 if (tls_connection_get_random(sm->cfg->ssl_ctx, data->conn, &keys)) in eap_server_tls_derive_session_id() 177 if (keys.client_random == NULL || keys.server_random == NULL) in eap_server_tls_derive_session_id() 180 *len = 1 + keys.client_random_len + keys.server_random_len; in eap_server_tls_derive_session_id() 187 os_memcpy(out + 1, keys.client_random, keys.client_random_len); in eap_server_tls_derive_session_id() 188 os_memcpy(out + 1 + keys.client_random_len, keys.server_random, in eap_server_tls_derive_session_id() 189 keys.server_random_len); in eap_server_tls_derive_session_id()
|
D | ikev2.c | 23 ikev2_free_keys(&data->keys); in ikev2_initiator_deinit() 114 &data->keys); in ikev2_derive_keys() 457 data->proposal.integ, &data->keys, 0, in ikev2_process_sa_init_encr() 618 &data->keys, 0, data->shared_secret, in ikev2_process_auth_secret() 721 &data->keys, 0, hdr, pl->encrypted, in ikev2_process_sa_auth() 1068 &data->keys, 1, data->shared_secret, in ikev2_build_auth() 1171 &data->keys, 1, msg, plain, in ikev2_build_sa_auth()
|
D | eap_server_ikev2.c | 187 data->ikev2.keys.SK_ai, in eap_ikev2_build_msg() 188 data->ikev2.keys.SK_integ_len, in eap_ikev2_build_msg() 263 data->ikev2.proposal.integ, &data->ikev2.keys, 0, in eap_ikev2_process_icv() 337 data->ikev2.proposal.prf, &data->ikev2.keys, in eap_ikev2_server_keymat()
|
/hostap-3.6.0/wpa_supplicant/ |
D | eapol_test.c | 844 struct radius_ms_mppe_keys *keys; in ieee802_1x_get_keys() local 848 keys = radius_msg_get_ms_keys(msg, req, shared_secret, in ieee802_1x_get_keys() 850 if (keys && keys->send == NULL && keys->recv == NULL) { in ieee802_1x_get_keys() 851 os_free(keys); in ieee802_1x_get_keys() 852 keys = radius_msg_get_cisco_keys(msg, req, shared_secret, in ieee802_1x_get_keys() 856 if (keys) { in ieee802_1x_get_keys() 857 if (keys->send) { in ieee802_1x_get_keys() 859 keys->send, keys->send_len); in ieee802_1x_get_keys() 861 if (keys->recv) { in ieee802_1x_get_keys() 863 keys->recv, keys->recv_len); in ieee802_1x_get_keys() [all …]
|
D | eap_testing.txt | 24 certificates, and private keys for testing use. Other alternative 362 keys with outer EAP-Success message after this 368 keys with outer EAP-Success message after this 373 - uses TLV Success and Reply, sends MPPE keys with outer EAP-Success message 378 - sends tunneled EAP-Success with MPPE keys and expects the authentication to 384 - sends tunneled EAP-Success with MPPE keys and expects to receive TLS ACK 390 keys with outer EAP-Success message after this
|
/hostap-3.6.0/src/eap_peer/ |
D | eap_tls_common.c | 413 struct tls_random keys; in eap_peer_tls_derive_session_id() local 440 if (tls_connection_get_random(sm->ssl_ctx, data->conn, &keys) || in eap_peer_tls_derive_session_id() 441 keys.client_random == NULL || keys.server_random == NULL) in eap_peer_tls_derive_session_id() 444 *len = 1 + keys.client_random_len + keys.server_random_len; in eap_peer_tls_derive_session_id() 451 os_memcpy(out + 1, keys.client_random, keys.client_random_len); in eap_peer_tls_derive_session_id() 452 os_memcpy(out + 1 + keys.client_random_len, keys.server_random, in eap_peer_tls_derive_session_id() 453 keys.server_random_len); in eap_peer_tls_derive_session_id()
|
D | ikev2.c | 19 ikev2_free_keys(&data->keys); in ikev2_responder_deinit() 110 &data->keys); in ikev2_derive_keys() 552 &data->keys, 1, data->shared_secret, in ikev2_process_auth_secret() 657 &data->keys, 1, hdr, pl->encrypted, in ikev2_process_sa_auth() 1004 &data->keys, 0, data->shared_secret, in ikev2_build_auth() 1119 &data->keys, 0, msg, plain, in ikev2_build_sa_init() 1161 &data->keys, 0, msg, plain, in ikev2_build_sa_auth() 1197 &data->keys, 0, msg, plain, in ikev2_build_notify()
|
D | eap_ikev2.c | 121 data->ikev2.proposal.prf, &data->ikev2.keys, in eap_ikev2_peer_keymat() 191 data->ikev2.keys.SK_ar, in eap_ikev2_build_msg() 192 data->ikev2.keys.SK_integ_len, in eap_ikev2_build_msg() 251 data->ikev2.proposal.integ, &data->ikev2.keys, 1, in eap_ikev2_process_icv()
|
/hostap-3.6.0/src/radius/ |
D | radius.c | 1113 struct radius_ms_mppe_keys *keys; in radius_msg_get_ms_keys() local 1118 keys = os_zalloc(sizeof(*keys)); in radius_msg_get_ms_keys() 1119 if (keys == NULL) in radius_msg_get_ms_keys() 1126 keys->send = decrypt_ms_key(key, keylen, in radius_msg_get_ms_keys() 1129 &keys->send_len); in radius_msg_get_ms_keys() 1130 if (!keys->send) { in radius_msg_get_ms_keys() 1141 keys->recv = decrypt_ms_key(key, keylen, in radius_msg_get_ms_keys() 1144 &keys->recv_len); in radius_msg_get_ms_keys() 1145 if (!keys->recv) { in radius_msg_get_ms_keys() 1152 return keys; in radius_msg_get_ms_keys() [all …]
|
/hostap-3.6.0/src/crypto/ |
D | des-internal.c | 318 static void desfunc(u32 *block, const u32 *keys) in desfunc() argument 350 work = RORc(right, 4) ^ *keys++; in desfunc() 355 work = right ^ *keys++; in desfunc() 361 work = RORc(leftt, 4) ^ *keys++; in desfunc() 366 work = leftt ^ *keys++; in desfunc()
|
D | tls_gnutls.c | 878 struct tls_random *keys) in tls_connection_get_random() argument 883 if (conn == NULL || conn->session == NULL || keys == NULL) in tls_connection_get_random() 886 os_memset(keys, 0, sizeof(*keys)); in tls_connection_get_random() 888 keys->client_random = client.data; in tls_connection_get_random() 889 keys->server_random = server.data; in tls_connection_get_random() 890 keys->client_random_len = client.size; in tls_connection_get_random() 891 keys->server_random_len = client.size; in tls_connection_get_random()
|
/hostap-3.6.0/src/tls/ |
D | tlsv1_server.c | 645 int tlsv1_server_get_random(struct tlsv1_server *conn, struct tls_random *keys) in tlsv1_server_get_random() argument 647 os_memset(keys, 0, sizeof(*keys)); in tlsv1_server_get_random() 651 keys->client_random = conn->client_random; in tlsv1_server_get_random() 652 keys->client_random_len = TLS_RANDOM_LEN; in tlsv1_server_get_random() 655 keys->server_random = conn->server_random; in tlsv1_server_get_random() 656 keys->server_random_len = TLS_RANDOM_LEN; in tlsv1_server_get_random()
|
D | tlsv1_client.c | 769 int tlsv1_client_get_random(struct tlsv1_client *conn, struct tls_random *keys) in tlsv1_client_get_random() argument 771 os_memset(keys, 0, sizeof(*keys)); in tlsv1_client_get_random() 775 keys->client_random = conn->client_random; in tlsv1_client_get_random() 776 keys->client_random_len = TLS_RANDOM_LEN; in tlsv1_client_get_random() 779 keys->server_random = conn->server_random; in tlsv1_client_get_random() 780 keys->server_random_len = TLS_RANDOM_LEN; in tlsv1_client_get_random()
|
/hostap-3.6.0/src/ap/ |
D | ieee802_1x.c | 1489 struct radius_ms_mppe_keys *keys; in ieee802_1x_get_keys() local 1497 keys = radius_msg_get_ms_keys(msg, req, shared_secret, in ieee802_1x_get_keys() 1500 if (keys && keys->send && keys->recv) { in ieee802_1x_get_keys() 1501 len = keys->send_len + keys->recv_len; in ieee802_1x_get_keys() 1503 keys->send, keys->send_len); in ieee802_1x_get_keys() 1505 keys->recv, keys->recv_len); in ieee802_1x_get_keys() 1510 os_memcpy(sm->eap_if->aaaEapKeyData, keys->recv, in ieee802_1x_get_keys() 1511 keys->recv_len); in ieee802_1x_get_keys() 1512 os_memcpy(sm->eap_if->aaaEapKeyData + keys->recv_len, in ieee802_1x_get_keys() 1513 keys->send, keys->send_len); in ieee802_1x_get_keys() [all …]
|
/hostap-3.6.0/hostapd/ |
D | README | 199 EAP/TLS generates a session key that can be used to send WEP keys from 205 keys for stations. This requires support for individual keys in the 208 WEP keys can be automatically updated by configuring rekeying. This 246 for protecting wireless networks. WEP uses RC4 with 40-bit keys, 259 per-packet RC4 keys. In addition, it implements replay protection, 264 IEEE 802.1X is using or pre-shared keys without need for additional 270 Handshake) for generating and exchanging data encryption keys between 304 # For WPA-RADIUS/EAP, ieee8021x must be set (but without dynamic WEP keys), 313 # WPA pre-shared keys for WPA-PSK. This can be either entered as a 256-bit 324 # Set of accepted cipher suites (encryption algorithms) for pairwise keys [all …]
|
/hostap-3.6.0/wpa_supplicant/doc/docbook/ |
D | wpa_background.sgml | 39 40-bit keys, 24-bit initialization vector (IV), and CRC32 to 52 per-packet RC4 keys. In addition, it implements replay protection, 57 EAP just like IEEE 802.1X is using or pre-shared keys without need 65 keys between the Authenticator and Supplicant. This handshake is
|
/hostap-3.6.0/hs20/server/www/ |
D | spp.php | 35 $keys = implode('|', array_keys($needed)); variable 36 preg_match_all('@(' . $keys . ')=(?:([\'"])([^\2]+?)\2|([^\s,]+))@',
|
D | est.php | 23 $keys = implode('|', array_keys($needed)); variable 24 preg_match_all('@(' . $keys . ')=(?:([\'"])([^\2]+?)\2|([^\s,]+))@',
|
/hostap-3.6.0/src/wps/ |
D | wps_common.c | 68 u8 keys[WPS_AUTHKEY_LEN + WPS_KEYWRAPKEY_LEN + WPS_EMSK_LEN]; in wps_derive_keys() local 116 keys, sizeof(keys)); in wps_derive_keys() 117 os_memcpy(wps->authkey, keys, WPS_AUTHKEY_LEN); in wps_derive_keys() 118 os_memcpy(wps->keywrapkey, keys + WPS_AUTHKEY_LEN, WPS_KEYWRAPKEY_LEN); in wps_derive_keys() 119 os_memcpy(wps->emsk, keys + WPS_AUTHKEY_LEN + WPS_KEYWRAPKEY_LEN, in wps_derive_keys()
|