Home
last modified time | relevance | path

Searched refs:key_id (Results 1 – 20 of 20) sorted by relevance

/hostap-latest/port/mbedtls/
Dsupp_psa_api.c127 mbedtls_svc_key_id_t key_id = MBEDTLS_SVC_KEY_ID_INIT; in aes_128_encrypt_block_psa() local
133 status = psa_import_key(&attributes, key, SUPP_PSA_BLOCK_SIZE_128, &key_id); in aes_128_encrypt_block_psa()
137 …status = psa_cipher_encrypt(key_id, alg, in, SUPP_PSA_BLOCK_SIZE_128, out, SUPP_PSA_BLOCK_SIZE_128… in aes_128_encrypt_block_psa()
141 if (key_id != MBEDTLS_SVC_KEY_ID_INIT) in aes_128_encrypt_block_psa()
143 psa_destroy_key(key_id); in aes_128_encrypt_block_psa()
152 mbedtls_svc_key_id_t key_id = MBEDTLS_SVC_KEY_ID_INIT; in aes_128_cbc_encrypt_psa() local
166 status = psa_import_key(&attributes, key, SUPP_PSA_BLOCK_SIZE_128, &key_id); in aes_128_cbc_encrypt_psa()
170 status = psa_cipher_encrypt_setup(&operation, key_id, alg); in aes_128_cbc_encrypt_psa()
184 if (key_id != MBEDTLS_SVC_KEY_ID_INIT) in aes_128_cbc_encrypt_psa()
186 psa_destroy_key(key_id); in aes_128_cbc_encrypt_psa()
[all …]
/hostap-latest/wlantest/
Drx_eapol.c622 unsigned int key_id; in learn_kde_keys_mlo() local
630 key_id = ie->mlo_gtk[link_id][0] & in learn_kde_keys_mlo()
635 key_id, tx); in learn_kde_keys_mlo()
641 bss->gtk_len[key_id] = key_len; in learn_kde_keys_mlo()
644 os_memcpy(bss->gtk[key_id], key, key_len); in learn_kde_keys_mlo()
647 bss->rsc[key_id][0] = pn[5]; in learn_kde_keys_mlo()
648 bss->rsc[key_id][1] = pn[4]; in learn_kde_keys_mlo()
649 bss->rsc[key_id][2] = pn[3]; in learn_kde_keys_mlo()
650 bss->rsc[key_id][3] = pn[2]; in learn_kde_keys_mlo()
651 bss->rsc[key_id][4] = pn[1]; in learn_kde_keys_mlo()
[all …]
Dtest_vectors.c179 int key_id = 0; in test_vector_ccmp_pv1() local
195 wpa_printf(MSG_INFO, "Key ID: %u", key_id); in test_vector_ccmp_pv1()
239 12, pn, key_id, &enc_len); in test_vector_ccmp_pv1()
288 frame2, sizeof(frame2), 18, pn, key_id, in test_vector_ccmp_pv1()
332 frame3, sizeof(frame3), 16, pn, key_id, in test_vector_ccmp_pv1()
/hostap-latest/wpa_supplicant/examples/
DopenCryptoki.conf34 key_id="4"
/hostap-latest/src/eap_peer/
Deap_config.h253 char *key_id; member
Deap_tls_common.c128 params->key_id = config->key_id; in eap_tls_cert_params_from_conf()
/hostap-latest/src/crypto/
Dtls_openssl.c1258 EVP_PKEY * EVP_PKEY_from_keystore(const char *key_id);
1262 const char *pin, const char *key_id, in tls_engine_init() argument
1269 if (!key_id) in tls_engine_init()
1272 conn->private_key = EVP_PKEY_from_keystore(key_id); in tls_engine_init()
1276 key_id, in tls_engine_init()
1314 if (key_id) { in tls_engine_init()
1326 key_id, NULL, in tls_engine_init()
1333 key_id, in tls_engine_init()
5333 const char *key_id = params->key_id; in tls_connection_set_params() local
5356 if (!key_id && params->private_key && can_pkcs11 && in tls_connection_set_params()
[all …]
Dtls.h214 const char *key_id; member
/hostap-latest/wpa_supplicant/
Dinterworking.c711 (!cred->key_id || cred->key_id[0] == '\0'))) { in nai_realm_find_eap()
717 cred->key_id ? cred->key_id : "NULL"); in nai_realm_find_eap()
727 (cred->key_id && cred->key_id[0])) && in nai_realm_find_eap()
1587 if (cred->key_id && cred->key_id[0] && in interworking_set_eap_params()
1588 wpa_config_set_quoted(ssid, "key_id", cred->key_id) < 0) in interworking_set_eap_params()
Dconfig.h227 char *key_id; member
Dconfig.c2583 { STRe(key_id, cert.key_id) },
2588 { STRe(key_id2, phase2_cert.key_id) },
2607 { STRe(machine_key_id, machine_cert.key_id) },
2881 os_free(cert->key_id); in eap_peer_config_free_cert()
2981 os_free(cred->key_id); in wpa_config_free_cred()
3874 os_free(cred->key_id); in wpa_config_set_cred()
3875 cred->key_id = val; in wpa_config_set_cred()
Dconfig_file.c742 STR(key_id); in wpa_config_write_network()
1064 if (cred->key_id) in wpa_config_write_cred()
1065 fprintf(f, "\tkey_id=\"%s\"\n", cred->key_id); in wpa_config_write_cred()
Dconfig_winreg.c925 STR(key_id); in wpa_config_write_network()
DREADME-HS20324 # key_id: The private key identifier when using an engine
DChangeLog2145 - network: engine, engine_id, key_id
/hostap-latest/src/common/
Dwpa_common.h236 u8 key_id[8]; /* Reserved in IEEE 802.11i/RSN */ member
665 const u8 *key_id; member
Dwpa_common.c3486 ie->key_id = p; in wpa_parse_generic()
/hostap-latest/src/rsn_supp/
Dwpa.c777 u16 key_id; in wpa_handle_ext_key_id() local
779 if (!kde->key_id) { in wpa_handle_ext_key_id()
787 key_id = kde->key_id[0] & 0x03; in wpa_handle_ext_key_id()
788 if (key_id > 1) { in wpa_handle_ext_key_id()
790 "RSN: Invalid Extended Key ID: %d", key_id); in wpa_handle_ext_key_id()
794 "RSN: Using Extended Key ID %d", key_id); in wpa_handle_ext_key_id()
795 sm->keyidx_active = key_id; in wpa_handle_ext_key_id()
798 if (kde->key_id && (kde->key_id[0] & 0x03)) { in wpa_handle_ext_key_id()
804 if (kde->key_id) { in wpa_handle_ext_key_id()
3653 wpa_hexdump(MSG_DEBUG, " key_id (reserved)", key->key_id, 8); in wpa_eapol_key_dump()
/hostap-latest/src/drivers/
Ddriver_nl80211_event.c1800 u8 key_id = nla_get_u8(tb[NL80211_ATTR_KEY_IDX]); in mlme_event_michael_mic_failure() local
1801 wpa_printf(MSG_DEBUG, "nl80211: Key Id %d", key_id); in mlme_event_michael_mic_failure()
/hostap-latest/tests/hwsim/
Dtest_ap_psk.py3386 key_id = msg3[146:162]
3395 msg3b += key_nonce + key_iv + key_rsc + key_id