/hostap-latest/tests/hwsim/ |
D | radius_das.py | 14 secret=None, authenticator=None, **attributes): argument 15 pyrad.packet.Packet.__init__(self, code, id, secret, authenticator, 28 self.authenticator = hashlib.md5(header[0:4] + 16 * b'\x00' + attr 30 return header + self.authenticator + attr 34 secret=None, authenticator=None, **attributes): argument 35 pyrad.packet.Packet.__init__(self, code, id, secret, authenticator, 45 self.authenticator = hashlib.md5(header[0:4] + 16 * b'\x00' + attr 47 return header + self.authenticator + attr
|
D | test_radius.py | 814 req.authenticator = req.CreateAuthenticator() 1112 hmac_obj.update(pkt.authenticator) 1189 def build_tunnel_password(secret, authenticator, psk): argument 1197 b = hashlib.md5(secret + authenticator + a).digest() 1227 data = build_tunnel_password(reply.secret, pkt.authenticator, 1518 req.authenticator = req.CreateAuthenticator() 1530 hmac_obj.update(req.authenticator)
|
D | test_eap_proto.py | 96 hmac_obj.update(pkt.authenticator)
|
/hostap-latest/src/radius/ |
D | radius.c | 497 os_memcpy(msg->hdr->authenticator, req_authenticator, in radius_msg_finish_srv() 498 sizeof(msg->hdr->authenticator)); in radius_msg_finish_srv() 512 md5_vector(4, addr, len, msg->hdr->authenticator); in radius_msg_finish_srv() 536 os_memcpy(msg->hdr->authenticator, req_hdr->authenticator, 16); in radius_msg_finish_das_resp() 546 if (md5_vector(2, addr, len, msg->hdr->authenticator) < 0) in radius_msg_finish_das_resp() 565 os_memset(msg->hdr->authenticator, 0, MD5_MAC_LEN); in radius_msg_finish_acct() 570 md5_vector(2, addr, len, msg->hdr->authenticator); in radius_msg_finish_acct() 586 os_memcpy(msg->hdr->authenticator, req_authenticator, MD5_MAC_LEN); in radius_msg_finish_acct_resp() 591 md5_vector(2, addr, len, msg->hdr->authenticator); in radius_msg_finish_acct_resp() 618 return os_memcmp_const(msg->hdr->authenticator, hash, MD5_MAC_LEN) != 0; in radius_msg_verify_acct_req() [all …]
|
D | radius_server.c | 977 if (!radius_msg_add_mppe_keys(msg, hdr->authenticator, in radius_server_encapsulate_eap() 1149 hdr->authenticator) < 0) { in radius_server_encapsulate_eap() 1238 hdr->authenticator) < 0) { in radius_server_macacl() 1288 hdr->authenticator) < in radius_server_reject() 1407 radius_msg_get_hdr(msg)->authenticator, 16) == 0) { in radius_server_request() 1538 os_memcpy(sess->last_authenticator, hdr->authenticator, 16); in radius_server_request() 1909 hdr->authenticator); in radius_server_receive_acct()
|
D | radius.h | 22 u8 authenticator[16]; member
|
/hostap-latest/src/wps/ |
D | wps_attr_process.c | 16 int wps_process_authenticator(struct wps_data *wps, const u8 *authenticator, in wps_process_authenticator() argument 23 if (authenticator == NULL) { in wps_process_authenticator() 45 os_memcmp_const(hash, authenticator, WPS_AUTHENTICATOR_LEN) != 0) { in wps_process_authenticator()
|
D | wps_validate.c | 766 static int wps_validate_authenticator(const u8 *authenticator, int mandatory) in wps_validate_authenticator() argument 768 if (authenticator == NULL) { in wps_validate_authenticator() 1382 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m2() 1470 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m3() 1508 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m4() 1575 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m5() 1642 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m6() 1710 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m7() 1784 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m8()
|
D | wps_attr_parse.h | 35 const u8 *authenticator; /* WPS_AUTHENTICATOR_LEN (8) octets */ member
|
D | wps_enrollee.c | 997 wps_process_authenticator(wps, attr->authenticator, msg) || in wps_process_m2() 1112 wps_process_authenticator(wps, attr->authenticator, msg) || in wps_process_m4() 1167 wps_process_authenticator(wps, attr->authenticator, msg)) { in wps_process_m6() 1224 wps_process_authenticator(wps, attr->authenticator, msg)) { in wps_process_m8()
|
D | wps_i.h | 187 int wps_process_authenticator(struct wps_data *wps, const u8 *authenticator,
|
D | wps_attr_parse.c | 321 attr->authenticator = pos; in wps_set_attr()
|
D | wps_registrar.c | 2801 wps_process_authenticator(wps, attr->authenticator, msg) || in wps_process_m3() 2839 wps_process_authenticator(wps, attr->authenticator, msg)) { in wps_process_m5() 2990 wps_process_authenticator(wps, attr->authenticator, msg)) { in wps_process_m7()
|
/hostap-latest/doc/ |
D | p2p_arch.dot | 24 authenticator [label="Authenticator"]; 36 mgmt_entity -> authenticator;
|
D | p2p_arch2.dot | 24 authenticator [label="Authenticator"]; 34 mgmt_entity -> authenticator;
|
D | directories.doxygen | 41 \dir src/eapol_auth EAPOL authenticator
|
/hostap-latest/hostapd/ |
D | hostapd.sim_db | 1 # Example GSM authentication triplet file for EAP-SIM authenticator
|
D | hostapd.eap_user | 36 # Multiple methods can be configured to make the authenticator try them one by 42 # authenticator advertises the highest supported version and select the version
|
D | hlr_auc_gw.txt | 1 HLR/AuC testing gateway for hostapd EAP-SIM/AKA database/authenticator
|
D | ChangeLog | 1073 * added support for EAP-AKA in the integrated EAP authenticator 1150 using integrated EAP authenticator for EAP-TLS; new hostapd.conf 1163 authenticator 1205 * added support for EAP-PEAP in the integrated EAP authenticator 1206 * added support for EAP-GTC in the integrated EAP authenticator 1208 the integrated EAP authenticator can, e.g., use the wildcard entry 1210 * added support for EAP-TTLS in the integrated EAP authenticator 1211 * added support for EAP-SIM in the integrated EAP authenticator 1213 with the integrated EAP authenticator taking care of EAP 1222 * added support for EAP-MSCHAPv2 in the integrated EAP authenticator [all …]
|
D | android.config | 15 # Driver interface for wired authenticator
|
D | defconfig | 15 # Driver interface for wired authenticator
|
/hostap-latest/tests/hwsim/auth_serv/ |
D | hlr_auc_gw.gsm | 5 # GSM authentication triplet file for EAP-SIM authenticator
|
/hostap-latest/wpa_supplicant/ |
D | todo.txt | 20 - test what happens if authenticator sends EAP-Success before real EAP
|
D | ChangeLog | 2421 a new password whenever a request from authenticator requires a
|