Home
last modified time | relevance | path

Searched refs:key_data (Results 1 – 12 of 12) sorted by relevance

/hostap-latest/src/eap_peer/
Deap_tls.c23 u8 *key_data; member
138 if (data->key_data) { in eap_tls_free_key()
139 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); in eap_tls_free_key()
140 data->key_data = NULL; in eap_tls_free_key()
212 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, label, in eap_tls_success()
216 if (data->key_data) { in eap_tls_success()
218 data->key_data, EAP_TLS_KEY_LEN); in eap_tls_success()
220 data->key_data + EAP_TLS_KEY_LEN, in eap_tls_success()
373 return data->key_data != NULL; in eap_tls_isKeyAvailable()
382 if (data->key_data == NULL) in eap_tls_getKey()
[all …]
Deap_peap.c57 u8 *key_data; member
186 if (data->key_data) { in eap_peap_free_key()
187 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); in eap_peap_free_key()
188 data->key_data = NULL; in eap_peap_free_key()
277 tk = data->key_data; in eap_peap_derive_cmk()
1151 data->key_data = in eap_peap_process()
1156 if (data->key_data) { in eap_peap_process()
1159 data->key_data, in eap_peap_process()
1163 data->key_data + in eap_peap_process()
1302 return data->key_data != NULL && data->phase2_success; in eap_peap_isKeyAvailable()
[all …]
Deap_ttls.c57 u8 *key_data; member
207 if (data->key_data) { in eap_ttls_free_key()
208 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); in eap_ttls_free_key()
209 data->key_data = NULL; in eap_ttls_free_key()
310 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, label, in eap_ttls_v0_derive_key()
314 if (!data->key_data) { in eap_ttls_v0_derive_key()
320 data->key_data, EAP_TLS_KEY_LEN); in eap_ttls_v0_derive_key()
322 data->key_data + EAP_TLS_KEY_LEN, in eap_ttls_v0_derive_key()
1823 return data->key_data != NULL && data->phase2_success; in eap_ttls_isKeyAvailable()
1832 if (data->key_data == NULL || !data->phase2_success) in eap_ttls_getKey()
[all …]
Deap_fast.c55 u8 key_data[EAP_FAST_KEY_LEN]; member
250 os_memset(data->key_data, 0, EAP_FAST_KEY_LEN); in eap_fast_deinit()
261 if (eap_fast_derive_eap_msk(data->simck, data->key_data) < 0 || in eap_fast_derive_msk()
1711 os_memset(data->key_data, 0, EAP_FAST_KEY_LEN);
1762 key = os_memdup(data->key_data, EAP_FAST_KEY_LEN); in eap_fast_getKey()
Deap_teap.c55 u8 key_data[EAP_TEAP_KEY_LEN]; member
235 forced_memzero(data->key_data, EAP_TEAP_KEY_LEN); in eap_teap_clear()
282 data->key_data) < 0 || in eap_teap_derive_msk()
2083 key = os_memdup(data->key_data, EAP_TEAP_KEY_LEN); in eap_teap_getKey()
/hostap-latest/wlantest/
Drx_eapol.c95 const u8 *key_data, *mic; in rx_data_eapol_key_1_of_4() local
146 key_data = mic + mic_len + 2; in rx_data_eapol_key_1_of_4()
155 if (wpa_parse_kde_ies(key_data, key_data_len, &ie) < 0) { in rx_data_eapol_key_1_of_4()
361 const u8 *key_data, *kck, *mic; in rx_data_eapol_key_2_of_4() local
410 key_data = mic + mic_len + 2; in rx_data_eapol_key_2_of_4()
419 if (wpa_parse_kde_ies(key_data, key_data_len, &ie) < 0) { in rx_data_eapol_key_2_of_4()
937 const u8 *key_data, *kck, *kek, *mic; in rx_data_eapol_key_3_of_4() local
1011 key_data = mic + mic_len + 2; in rx_data_eapol_key_3_of_4()
1016 decrypted = key_data; in rx_data_eapol_key_3_of_4()
1033 if ((wt->write_pcap_dumper || wt->pcapng) && decrypted != key_data) { in rx_data_eapol_key_3_of_4()
[all …]
/hostap-latest/src/rsn_supp/
Dwpa.c141 u8 *buf, *s_key_data, *key_data; in wpa_eapol_key_send() local
161 key_data = ((u8 *) (key + 1)) + 2; in wpa_eapol_key_send()
182 aad_len[0] = key_data - buf; in wpa_eapol_key_send()
185 1, aad, aad_len, key_data) < 0) { in wpa_eapol_key_send()
191 key_data, AES_BLOCK_SIZE + key_data_len); in wpa_eapol_key_send()
887 u16 ver, const u8 *key_data, in wpa_supplicant_process_1_of_4_wpa() argument
954 u16 ver, const u8 *key_data, in wpa_supplicant_process_1_of_4() argument
992 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data", key_data, key_data_len); in wpa_supplicant_process_1_of_4()
993 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0) { in wpa_supplicant_process_1_of_4()
2648 u16 ver, const u8 *key_data, in wpa_supplicant_process_3_of_4_wpa() argument
[all …]
/hostap-latest/tests/hwsim/
Dtest_ocv.py44 def build_eapol_key_1_2(kck, key_data, replay_counter=3, key_info=0x1382, argument
49 msg['length'] = 95 + len(key_data) + extra_len
59 msg['rsn_key_data_len'] = len(key_data)
60 msg['rsn_key_data'] = key_data
64 def build_eapol_key_2_2(kck, key_data, replay_counter=3, key_info=0x0302, argument
66 return build_eapol_key_1_2(kck, key_data, replay_counter, key_info,
Dtest_ap_psk.py1782 key_data = 24*b'1'
1783 rsn_eapol_key_set(msg, 0x130a, 0, snonce, key_data)
1787 rsn_eapol_key_set(msg, 0x1309, 0, snonce, key_data)
1794 def build_eapol_key_1_4(anonce, replay_counter=1, key_data=b'', key_len=16): argument
1798 msg['length'] = 95 + len(key_data)
1809 msg['rsn_key_data_len'] = len(key_data)
1810 msg['rsn_key_data'] = key_data
1813 def build_eapol_key_3_4(anonce, kck, key_data, replay_counter=2, argument
1818 msg['length'] = 95 + len(key_data) + extra_len
1828 msg['rsn_key_data_len'] = len(key_data)
[all …]
/hostap-latest/src/ap/
Dwpa_auth.c1544 const u8 *key_data; local
1567 key_data = mic + mic_len + 2;
1637 key_data_length / 8, key_data, key_data_buf)) {
1642 key_data = key_data_buf;
1644 key_data, key_data_length);
1658 !get_ie(key_data, key_data_length, WLAN_EID_RSN)) ||
1981 u8 *key_mic, *key_data; local
2033 key_data = ((u8 *) (hdr + 1)) + keyhdrlen;
2070 os_memcpy(key_data, kde, kde_len);
2118 (key_data_len - 8) / 8, buf, key_data)) {
[all …]
Dieee802_1x.c212 u8 *key_data, size_t key_len) in ieee802_1x_tx_key_one() argument
272 os_memcpy((u8 *) (key + 1), key_data, key_len); in ieee802_1x_tx_key_one()
/hostap-latest/wpa_supplicant/
Dconfig.c60 int key_data; member
83 data->key_data ? "[KEY DATA REMOVED]" : value); in wpa_config_parse_str()
87 if (data->key_data) { in wpa_config_parse_str()
3427 if (field->key_data && !get_keys) in wpa_config_get_all()
3528 if (field->key_data) { in wpa_config_get_no_key()