Home
last modified time | relevance | path

Searched refs:authenticator (Results 1 – 25 of 25) sorted by relevance

/hostap-latest/tests/hwsim/
Dradius_das.py14 secret=None, authenticator=None, **attributes): argument
15 pyrad.packet.Packet.__init__(self, code, id, secret, authenticator,
28 self.authenticator = hashlib.md5(header[0:4] + 16 * b'\x00' + attr
30 return header + self.authenticator + attr
34 secret=None, authenticator=None, **attributes): argument
35 pyrad.packet.Packet.__init__(self, code, id, secret, authenticator,
45 self.authenticator = hashlib.md5(header[0:4] + 16 * b'\x00' + attr
47 return header + self.authenticator + attr
Dtest_radius.py814 req.authenticator = req.CreateAuthenticator()
1112 hmac_obj.update(pkt.authenticator)
1189 def build_tunnel_password(secret, authenticator, psk): argument
1197 b = hashlib.md5(secret + authenticator + a).digest()
1227 data = build_tunnel_password(reply.secret, pkt.authenticator,
1518 req.authenticator = req.CreateAuthenticator()
1530 hmac_obj.update(req.authenticator)
Dtest_eap_proto.py96 hmac_obj.update(pkt.authenticator)
/hostap-latest/src/radius/
Dradius.c497 os_memcpy(msg->hdr->authenticator, req_authenticator, in radius_msg_finish_srv()
498 sizeof(msg->hdr->authenticator)); in radius_msg_finish_srv()
512 md5_vector(4, addr, len, msg->hdr->authenticator); in radius_msg_finish_srv()
536 os_memcpy(msg->hdr->authenticator, req_hdr->authenticator, 16); in radius_msg_finish_das_resp()
546 if (md5_vector(2, addr, len, msg->hdr->authenticator) < 0) in radius_msg_finish_das_resp()
565 os_memset(msg->hdr->authenticator, 0, MD5_MAC_LEN); in radius_msg_finish_acct()
570 md5_vector(2, addr, len, msg->hdr->authenticator); in radius_msg_finish_acct()
586 os_memcpy(msg->hdr->authenticator, req_authenticator, MD5_MAC_LEN); in radius_msg_finish_acct_resp()
591 md5_vector(2, addr, len, msg->hdr->authenticator); in radius_msg_finish_acct_resp()
618 return os_memcmp_const(msg->hdr->authenticator, hash, MD5_MAC_LEN) != 0; in radius_msg_verify_acct_req()
[all …]
Dradius_server.c977 if (!radius_msg_add_mppe_keys(msg, hdr->authenticator, in radius_server_encapsulate_eap()
1149 hdr->authenticator) < 0) { in radius_server_encapsulate_eap()
1238 hdr->authenticator) < 0) { in radius_server_macacl()
1288 hdr->authenticator) < in radius_server_reject()
1407 radius_msg_get_hdr(msg)->authenticator, 16) == 0) { in radius_server_request()
1538 os_memcpy(sess->last_authenticator, hdr->authenticator, 16); in radius_server_request()
1909 hdr->authenticator); in radius_server_receive_acct()
Dradius.h22 u8 authenticator[16]; member
/hostap-latest/src/wps/
Dwps_attr_process.c16 int wps_process_authenticator(struct wps_data *wps, const u8 *authenticator, in wps_process_authenticator() argument
23 if (authenticator == NULL) { in wps_process_authenticator()
45 os_memcmp_const(hash, authenticator, WPS_AUTHENTICATOR_LEN) != 0) { in wps_process_authenticator()
Dwps_validate.c766 static int wps_validate_authenticator(const u8 *authenticator, int mandatory) in wps_validate_authenticator() argument
768 if (authenticator == NULL) { in wps_validate_authenticator()
1382 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m2()
1470 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m3()
1508 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m4()
1575 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m5()
1642 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m6()
1710 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m7()
1784 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m8()
Dwps_attr_parse.h35 const u8 *authenticator; /* WPS_AUTHENTICATOR_LEN (8) octets */ member
Dwps_enrollee.c997 wps_process_authenticator(wps, attr->authenticator, msg) || in wps_process_m2()
1112 wps_process_authenticator(wps, attr->authenticator, msg) || in wps_process_m4()
1167 wps_process_authenticator(wps, attr->authenticator, msg)) { in wps_process_m6()
1224 wps_process_authenticator(wps, attr->authenticator, msg)) { in wps_process_m8()
Dwps_i.h187 int wps_process_authenticator(struct wps_data *wps, const u8 *authenticator,
Dwps_attr_parse.c321 attr->authenticator = pos; in wps_set_attr()
Dwps_registrar.c2801 wps_process_authenticator(wps, attr->authenticator, msg) || in wps_process_m3()
2839 wps_process_authenticator(wps, attr->authenticator, msg)) { in wps_process_m5()
2990 wps_process_authenticator(wps, attr->authenticator, msg)) { in wps_process_m7()
/hostap-latest/doc/
Dp2p_arch.dot24 authenticator [label="Authenticator"];
36 mgmt_entity -> authenticator;
Dp2p_arch2.dot24 authenticator [label="Authenticator"];
34 mgmt_entity -> authenticator;
Ddirectories.doxygen41 \dir src/eapol_auth EAPOL authenticator
/hostap-latest/hostapd/
Dhostapd.sim_db1 # Example GSM authentication triplet file for EAP-SIM authenticator
Dhostapd.eap_user36 # Multiple methods can be configured to make the authenticator try them one by
42 # authenticator advertises the highest supported version and select the version
Dhlr_auc_gw.txt1 HLR/AuC testing gateway for hostapd EAP-SIM/AKA database/authenticator
DChangeLog1073 * added support for EAP-AKA in the integrated EAP authenticator
1150 using integrated EAP authenticator for EAP-TLS; new hostapd.conf
1163 authenticator
1205 * added support for EAP-PEAP in the integrated EAP authenticator
1206 * added support for EAP-GTC in the integrated EAP authenticator
1208 the integrated EAP authenticator can, e.g., use the wildcard entry
1210 * added support for EAP-TTLS in the integrated EAP authenticator
1211 * added support for EAP-SIM in the integrated EAP authenticator
1213 with the integrated EAP authenticator taking care of EAP
1222 * added support for EAP-MSCHAPv2 in the integrated EAP authenticator
[all …]
Dandroid.config15 # Driver interface for wired authenticator
Ddefconfig15 # Driver interface for wired authenticator
/hostap-latest/tests/hwsim/auth_serv/
Dhlr_auc_gw.gsm5 # GSM authentication triplet file for EAP-SIM authenticator
/hostap-latest/wpa_supplicant/
Dtodo.txt20 - test what happens if authenticator sends EAP-Success before real EAP
DChangeLog2421 a new password whenever a request from authenticator requires a