/hostap-latest/port/mbedtls/ |
D | supp_psa_api.c | 127 mbedtls_svc_key_id_t key_id = MBEDTLS_SVC_KEY_ID_INIT; in aes_128_encrypt_block_psa() local 133 status = psa_import_key(&attributes, key, SUPP_PSA_BLOCK_SIZE_128, &key_id); in aes_128_encrypt_block_psa() 137 …status = psa_cipher_encrypt(key_id, alg, in, SUPP_PSA_BLOCK_SIZE_128, out, SUPP_PSA_BLOCK_SIZE_128… in aes_128_encrypt_block_psa() 141 if (key_id != MBEDTLS_SVC_KEY_ID_INIT) in aes_128_encrypt_block_psa() 143 psa_destroy_key(key_id); in aes_128_encrypt_block_psa() 152 mbedtls_svc_key_id_t key_id = MBEDTLS_SVC_KEY_ID_INIT; in aes_128_cbc_encrypt_psa() local 166 status = psa_import_key(&attributes, key, SUPP_PSA_BLOCK_SIZE_128, &key_id); in aes_128_cbc_encrypt_psa() 170 status = psa_cipher_encrypt_setup(&operation, key_id, alg); in aes_128_cbc_encrypt_psa() 184 if (key_id != MBEDTLS_SVC_KEY_ID_INIT) in aes_128_cbc_encrypt_psa() 186 psa_destroy_key(key_id); in aes_128_cbc_encrypt_psa() [all …]
|
/hostap-latest/wlantest/ |
D | rx_eapol.c | 622 unsigned int key_id; in learn_kde_keys_mlo() local 630 key_id = ie->mlo_gtk[link_id][0] & in learn_kde_keys_mlo() 635 key_id, tx); in learn_kde_keys_mlo() 641 bss->gtk_len[key_id] = key_len; in learn_kde_keys_mlo() 644 os_memcpy(bss->gtk[key_id], key, key_len); in learn_kde_keys_mlo() 647 bss->rsc[key_id][0] = pn[5]; in learn_kde_keys_mlo() 648 bss->rsc[key_id][1] = pn[4]; in learn_kde_keys_mlo() 649 bss->rsc[key_id][2] = pn[3]; in learn_kde_keys_mlo() 650 bss->rsc[key_id][3] = pn[2]; in learn_kde_keys_mlo() 651 bss->rsc[key_id][4] = pn[1]; in learn_kde_keys_mlo() [all …]
|
D | test_vectors.c | 179 int key_id = 0; in test_vector_ccmp_pv1() local 195 wpa_printf(MSG_INFO, "Key ID: %u", key_id); in test_vector_ccmp_pv1() 239 12, pn, key_id, &enc_len); in test_vector_ccmp_pv1() 288 frame2, sizeof(frame2), 18, pn, key_id, in test_vector_ccmp_pv1() 332 frame3, sizeof(frame3), 16, pn, key_id, in test_vector_ccmp_pv1()
|
/hostap-latest/wpa_supplicant/examples/ |
D | openCryptoki.conf | 34 key_id="4"
|
/hostap-latest/src/eap_peer/ |
D | eap_config.h | 253 char *key_id; member
|
D | eap_tls_common.c | 128 params->key_id = config->key_id; in eap_tls_cert_params_from_conf()
|
/hostap-latest/src/crypto/ |
D | tls_openssl.c | 1258 EVP_PKEY * EVP_PKEY_from_keystore(const char *key_id); 1262 const char *pin, const char *key_id, in tls_engine_init() argument 1269 if (!key_id) in tls_engine_init() 1272 conn->private_key = EVP_PKEY_from_keystore(key_id); in tls_engine_init() 1276 key_id, in tls_engine_init() 1314 if (key_id) { in tls_engine_init() 1326 key_id, NULL, in tls_engine_init() 1333 key_id, in tls_engine_init() 5333 const char *key_id = params->key_id; in tls_connection_set_params() local 5356 if (!key_id && params->private_key && can_pkcs11 && in tls_connection_set_params() [all …]
|
D | tls.h | 214 const char *key_id; member
|
/hostap-latest/wpa_supplicant/ |
D | interworking.c | 711 (!cred->key_id || cred->key_id[0] == '\0'))) { in nai_realm_find_eap() 717 cred->key_id ? cred->key_id : "NULL"); in nai_realm_find_eap() 727 (cred->key_id && cred->key_id[0])) && in nai_realm_find_eap() 1587 if (cred->key_id && cred->key_id[0] && in interworking_set_eap_params() 1588 wpa_config_set_quoted(ssid, "key_id", cred->key_id) < 0) in interworking_set_eap_params()
|
D | config.h | 227 char *key_id; member
|
D | config.c | 2583 { STRe(key_id, cert.key_id) }, 2588 { STRe(key_id2, phase2_cert.key_id) }, 2607 { STRe(machine_key_id, machine_cert.key_id) }, 2881 os_free(cert->key_id); in eap_peer_config_free_cert() 2981 os_free(cred->key_id); in wpa_config_free_cred() 3874 os_free(cred->key_id); in wpa_config_set_cred() 3875 cred->key_id = val; in wpa_config_set_cred()
|
D | config_file.c | 742 STR(key_id); in wpa_config_write_network() 1064 if (cred->key_id) in wpa_config_write_cred() 1065 fprintf(f, "\tkey_id=\"%s\"\n", cred->key_id); in wpa_config_write_cred()
|
D | config_winreg.c | 925 STR(key_id); in wpa_config_write_network()
|
D | README-HS20 | 324 # key_id: The private key identifier when using an engine
|
D | ChangeLog | 2145 - network: engine, engine_id, key_id
|
/hostap-latest/src/common/ |
D | wpa_common.h | 236 u8 key_id[8]; /* Reserved in IEEE 802.11i/RSN */ member 665 const u8 *key_id; member
|
D | wpa_common.c | 3486 ie->key_id = p; in wpa_parse_generic()
|
/hostap-latest/src/rsn_supp/ |
D | wpa.c | 777 u16 key_id; in wpa_handle_ext_key_id() local 779 if (!kde->key_id) { in wpa_handle_ext_key_id() 787 key_id = kde->key_id[0] & 0x03; in wpa_handle_ext_key_id() 788 if (key_id > 1) { in wpa_handle_ext_key_id() 790 "RSN: Invalid Extended Key ID: %d", key_id); in wpa_handle_ext_key_id() 794 "RSN: Using Extended Key ID %d", key_id); in wpa_handle_ext_key_id() 795 sm->keyidx_active = key_id; in wpa_handle_ext_key_id() 798 if (kde->key_id && (kde->key_id[0] & 0x03)) { in wpa_handle_ext_key_id() 804 if (kde->key_id) { in wpa_handle_ext_key_id() 3653 wpa_hexdump(MSG_DEBUG, " key_id (reserved)", key->key_id, 8); in wpa_eapol_key_dump()
|
/hostap-latest/src/drivers/ |
D | driver_nl80211_event.c | 1800 u8 key_id = nla_get_u8(tb[NL80211_ATTR_KEY_IDX]); in mlme_event_michael_mic_failure() local 1801 wpa_printf(MSG_DEBUG, "nl80211: Key Id %d", key_id); in mlme_event_michael_mic_failure()
|
/hostap-latest/tests/hwsim/ |
D | test_ap_psk.py | 3386 key_id = msg3[146:162] 3395 msg3b += key_nonce + key_iv + key_rsc + key_id
|