/hostap-latest/src/eap_peer/ |
D | eap_tls.c | 23 u8 *key_data; member 138 if (data->key_data) { in eap_tls_free_key() 139 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); in eap_tls_free_key() 140 data->key_data = NULL; in eap_tls_free_key() 212 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, label, in eap_tls_success() 216 if (data->key_data) { in eap_tls_success() 218 data->key_data, EAP_TLS_KEY_LEN); in eap_tls_success() 220 data->key_data + EAP_TLS_KEY_LEN, in eap_tls_success() 373 return data->key_data != NULL; in eap_tls_isKeyAvailable() 382 if (data->key_data == NULL) in eap_tls_getKey() [all …]
|
D | eap_peap.c | 57 u8 *key_data; member 186 if (data->key_data) { in eap_peap_free_key() 187 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); in eap_peap_free_key() 188 data->key_data = NULL; in eap_peap_free_key() 277 tk = data->key_data; in eap_peap_derive_cmk() 1151 data->key_data = in eap_peap_process() 1156 if (data->key_data) { in eap_peap_process() 1159 data->key_data, in eap_peap_process() 1163 data->key_data + in eap_peap_process() 1302 return data->key_data != NULL && data->phase2_success; in eap_peap_isKeyAvailable() [all …]
|
D | eap_ttls.c | 57 u8 *key_data; member 207 if (data->key_data) { in eap_ttls_free_key() 208 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); in eap_ttls_free_key() 209 data->key_data = NULL; in eap_ttls_free_key() 310 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, label, in eap_ttls_v0_derive_key() 314 if (!data->key_data) { in eap_ttls_v0_derive_key() 320 data->key_data, EAP_TLS_KEY_LEN); in eap_ttls_v0_derive_key() 322 data->key_data + EAP_TLS_KEY_LEN, in eap_ttls_v0_derive_key() 1823 return data->key_data != NULL && data->phase2_success; in eap_ttls_isKeyAvailable() 1832 if (data->key_data == NULL || !data->phase2_success) in eap_ttls_getKey() [all …]
|
D | eap_fast.c | 55 u8 key_data[EAP_FAST_KEY_LEN]; member 250 os_memset(data->key_data, 0, EAP_FAST_KEY_LEN); in eap_fast_deinit() 261 if (eap_fast_derive_eap_msk(data->simck, data->key_data) < 0 || in eap_fast_derive_msk() 1711 os_memset(data->key_data, 0, EAP_FAST_KEY_LEN); 1762 key = os_memdup(data->key_data, EAP_FAST_KEY_LEN); in eap_fast_getKey()
|
D | eap_teap.c | 55 u8 key_data[EAP_TEAP_KEY_LEN]; member 235 forced_memzero(data->key_data, EAP_TEAP_KEY_LEN); in eap_teap_clear() 282 data->key_data) < 0 || in eap_teap_derive_msk() 2083 key = os_memdup(data->key_data, EAP_TEAP_KEY_LEN); in eap_teap_getKey()
|
/hostap-latest/wlantest/ |
D | rx_eapol.c | 95 const u8 *key_data, *mic; in rx_data_eapol_key_1_of_4() local 146 key_data = mic + mic_len + 2; in rx_data_eapol_key_1_of_4() 155 if (wpa_parse_kde_ies(key_data, key_data_len, &ie) < 0) { in rx_data_eapol_key_1_of_4() 361 const u8 *key_data, *kck, *mic; in rx_data_eapol_key_2_of_4() local 410 key_data = mic + mic_len + 2; in rx_data_eapol_key_2_of_4() 419 if (wpa_parse_kde_ies(key_data, key_data_len, &ie) < 0) { in rx_data_eapol_key_2_of_4() 937 const u8 *key_data, *kck, *kek, *mic; in rx_data_eapol_key_3_of_4() local 1011 key_data = mic + mic_len + 2; in rx_data_eapol_key_3_of_4() 1016 decrypted = key_data; in rx_data_eapol_key_3_of_4() 1033 if ((wt->write_pcap_dumper || wt->pcapng) && decrypted != key_data) { in rx_data_eapol_key_3_of_4() [all …]
|
/hostap-latest/src/rsn_supp/ |
D | wpa.c | 141 u8 *buf, *s_key_data, *key_data; in wpa_eapol_key_send() local 161 key_data = ((u8 *) (key + 1)) + 2; in wpa_eapol_key_send() 182 aad_len[0] = key_data - buf; in wpa_eapol_key_send() 185 1, aad, aad_len, key_data) < 0) { in wpa_eapol_key_send() 191 key_data, AES_BLOCK_SIZE + key_data_len); in wpa_eapol_key_send() 887 u16 ver, const u8 *key_data, in wpa_supplicant_process_1_of_4_wpa() argument 954 u16 ver, const u8 *key_data, in wpa_supplicant_process_1_of_4() argument 992 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data", key_data, key_data_len); in wpa_supplicant_process_1_of_4() 993 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0) { in wpa_supplicant_process_1_of_4() 2648 u16 ver, const u8 *key_data, in wpa_supplicant_process_3_of_4_wpa() argument [all …]
|
/hostap-latest/tests/hwsim/ |
D | test_ocv.py | 44 def build_eapol_key_1_2(kck, key_data, replay_counter=3, key_info=0x1382, argument 49 msg['length'] = 95 + len(key_data) + extra_len 59 msg['rsn_key_data_len'] = len(key_data) 60 msg['rsn_key_data'] = key_data 64 def build_eapol_key_2_2(kck, key_data, replay_counter=3, key_info=0x0302, argument 66 return build_eapol_key_1_2(kck, key_data, replay_counter, key_info,
|
D | test_ap_psk.py | 1782 key_data = 24*b'1' 1783 rsn_eapol_key_set(msg, 0x130a, 0, snonce, key_data) 1787 rsn_eapol_key_set(msg, 0x1309, 0, snonce, key_data) 1794 def build_eapol_key_1_4(anonce, replay_counter=1, key_data=b'', key_len=16): argument 1798 msg['length'] = 95 + len(key_data) 1809 msg['rsn_key_data_len'] = len(key_data) 1810 msg['rsn_key_data'] = key_data 1813 def build_eapol_key_3_4(anonce, kck, key_data, replay_counter=2, argument 1818 msg['length'] = 95 + len(key_data) + extra_len 1828 msg['rsn_key_data_len'] = len(key_data) [all …]
|
/hostap-latest/src/ap/ |
D | wpa_auth.c | 1544 const u8 *key_data; local 1567 key_data = mic + mic_len + 2; 1637 key_data_length / 8, key_data, key_data_buf)) { 1642 key_data = key_data_buf; 1644 key_data, key_data_length); 1658 !get_ie(key_data, key_data_length, WLAN_EID_RSN)) || 1981 u8 *key_mic, *key_data; local 2033 key_data = ((u8 *) (hdr + 1)) + keyhdrlen; 2070 os_memcpy(key_data, kde, kde_len); 2118 (key_data_len - 8) / 8, buf, key_data)) { [all …]
|
D | ieee802_1x.c | 212 u8 *key_data, size_t key_len) in ieee802_1x_tx_key_one() argument 272 os_memcpy((u8 *) (key + 1), key_data, key_len); in ieee802_1x_tx_key_one()
|
/hostap-latest/wpa_supplicant/ |
D | config.c | 60 int key_data; member 83 data->key_data ? "[KEY DATA REMOVED]" : value); in wpa_config_parse_str() 87 if (data->key_data) { in wpa_config_parse_str() 3427 if (field->key_data && !get_keys) in wpa_config_get_all() 3528 if (field->key_data) { in wpa_config_get_no_key()
|