| /hostap-latest/wpa_supplicant/ |
| D | wpas_kay.c | 277 size_t keylen; in ieee802_1x_auth_get_msk() local 285 keylen = EAP_MSK_LEN; in ieee802_1x_auth_get_msk() 286 res = eapol_sm_get_key(sm, key, keylen); in ieee802_1x_auth_get_msk() 293 if (keylen > *len) in ieee802_1x_auth_get_msk() 294 keylen = *len; in ieee802_1x_auth_get_msk() 295 os_memcpy(msk, key, keylen); in ieee802_1x_auth_get_msk() 296 *len = keylen; in ieee802_1x_auth_get_msk()
|
| D | wpas_glue.c | 242 const u8 *key, size_t keylen) in wpa_eapol_set_wep_key() argument 246 int cipher = (keylen == 5) ? WPA_CIPHER_WEP40 : in wpa_eapol_set_wep_key() 255 keyidx, unicast, NULL, 0, key, keylen, in wpa_eapol_set_wep_key()
|
| D | wpa_supplicant.c | 166 size_t keylen; in wpa_supplicant_set_wpa_none_key() local 189 keylen = 16; in wpa_supplicant_set_wpa_none_key() 194 keylen = 16; in wpa_supplicant_set_wpa_none_key() 201 keylen = 32; in wpa_supplicant_set_wpa_none_key() 213 ret = wpa_drv_set_key(wpa_s, -1, alg, NULL, 0, 1, seq, 6, key, keylen, in wpa_supplicant_set_wpa_none_key()
|
| /hostap-latest/src/ap/ |
| D | wpa_auth_kay.c | 360 size_t keylen; in ieee802_1x_auth_get_msk() local 365 key = ieee802_1x_get_key(sta->eapol_sm, &keylen); in ieee802_1x_auth_get_msk() 372 (unsigned long) keylen); in ieee802_1x_auth_get_msk() 373 wpa_hexdump_key(MSG_DEBUG, "MSK: ", key, keylen); in ieee802_1x_auth_get_msk() 375 if (keylen > *len) in ieee802_1x_auth_get_msk() 376 keylen = *len; in ieee802_1x_auth_get_msk() 377 os_memcpy(msk, key, keylen); in ieee802_1x_auth_get_msk() 378 *len = keylen; in ieee802_1x_auth_get_msk()
|
| D | wpa_auth_glue.c | 480 size_t keylen; in hostapd_wpa_auth_get_msk() local 489 key = ieee802_1x_get_key(sta->eapol_sm, &keylen); in hostapd_wpa_auth_get_msk() 496 if (keylen > *len) in hostapd_wpa_auth_get_msk() 497 keylen = *len; in hostapd_wpa_auth_get_msk() 498 os_memcpy(msk, key, keylen); in hostapd_wpa_auth_get_msk() 499 *len = keylen; in hostapd_wpa_auth_get_msk()
|
| /hostap-latest/src/crypto/ |
| D | crypto_internal-cipher.c | 23 size_t keylen; member 61 ctx->u.rc4.keylen = key_len; in crypto_cipher_init() 112 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, in crypto_cipher_encrypt() 176 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, in crypto_cipher_decrypt()
|
| D | rc4.c | 16 int rc4_skip(const u8 *key, size_t keylen, size_t skip, in rc4_skip() argument 31 if (kpos >= keylen) in rc4_skip()
|
| D | crypto_libtomcrypt.c | 295 size_t keylen; member 339 ctx->u.rc4.keylen = key_len; in crypto_cipher_init() 362 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, in crypto_cipher_encrypt() 386 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, in crypto_cipher_decrypt()
|
| D | tls_mbedtls_alt.c | 2033 size_t keylen, in tls_connection_export_keys_cb() argument 2043 conn->expkey_keyblock_size = maclen + keylen + ivlen; in tls_connection_export_keys_cb() 2108 size_t keylen = mbedtls_cipher_info_get_key_bitlen(cipher_info) / 8; in tls_mbedtls_ssl_keyblock_size() local 2111 size_t keylen = cipher_info->MBEDTLS_PRIVATE(key_bitlen) / 8; in tls_mbedtls_ssl_keyblock_size() local 2116 return keylen + 4; in tls_mbedtls_ssl_keyblock_size() 2118 return keylen + 12; in tls_mbedtls_ssl_keyblock_size() 2128 return keylen + mac_key_len + ivlen; in tls_mbedtls_ssl_keyblock_size()
|
| D | crypto_openssl.c | 363 int rc4_skip(const u8 *key, size_t keylen, size_t skip, in rc4_skip() argument 380 !EVP_CIPHER_CTX_set_key_length(ctx, keylen) || in rc4_skip() 446 static const EVP_CIPHER * aes_get_evp_cipher(size_t keylen) in aes_get_evp_cipher() argument 448 switch (keylen) { in aes_get_evp_cipher() 579 static const EVP_CIPHER * aes_get_evp_wrap_cipher(size_t keylen) in aes_get_evp_wrap_cipher() argument 581 switch (keylen) { in aes_get_evp_wrap_cipher() 1268 int keylen; in dh5_derive_shared() 1283 keylen = DH_compute_key(wpabuf_mhead(res), pub_key, dh); in dh5_derive_shared() 1284 if (keylen < 0) in dh5_derive_shared() 1286 wpabuf_put(res, keylen); in dh5_derive_shared()
|
| D | crypto_linux.c | 537 int rc4_skip(const u8 *key, size_t keylen, size_t skip, in rc4_skip() argument 552 skcipher = linux_af_alg_skcipher("ecb(arc4)", key, keylen); in rc4_skip()
|
| D | crypto.h | 486 int rc4_skip(const u8 *key, size_t keylen, size_t skip,
|
| D | crypto_wolfssl.c | 730 int rc4_skip(const u8 *key, size_t keylen, size_t skip, u8 *data, in rc4_skip() argument 737 wc_Arc4SetKey(&arc4, key, keylen); in rc4_skip()
|
| /hostap-latest/src/radius/ |
| D | radius.c | 1269 size_t keylen; in radius_msg_get_ms_keys() local 1281 &keylen); in radius_msg_get_ms_keys() 1283 keys->send = decrypt_ms_key(key, keylen, in radius_msg_get_ms_keys() 1296 &keylen); in radius_msg_get_ms_keys() 1298 keys->recv = decrypt_ms_key(key, keylen, in radius_msg_get_ms_keys() 1318 size_t keylen; in radius_msg_get_cisco_keys() local 1329 RADIUS_CISCO_AV_PAIR, &keylen); in radius_msg_get_cisco_keys() 1330 if (key && keylen == 51 && in radius_msg_get_cisco_keys() 1332 keys->recv = decrypt_ms_key(key + 17, keylen - 17, in radius_msg_get_cisco_keys() 1734 char * radius_msg_get_tunnel_password(struct radius_msg *msg, int *keylen, in radius_msg_get_tunnel_password() argument [all …]
|
| D | radius.h | 329 char * radius_msg_get_tunnel_password(struct radius_msg *msg, int *keylen,
|
| /hostap-latest/src/rsn_supp/ |
| D | wpa_ft.c | 494 int keylen; in wpa_ft_install_ptk() local 507 keylen = wpa_cipher_key_len(sm->pairwise_cipher); in wpa_ft_install_ptk() 511 (u8 *) sm->ptk.tk, keylen, in wpa_ft_install_ptk() 808 size_t gtk_len, keylen, rsc_len; in wpa_ft_process_gtk_subelem() local 841 keylen = wpa_cipher_key_len(sm->group_cipher); in wpa_ft_process_gtk_subelem() 850 if (gtk_len < keylen) { in wpa_ft_process_gtk_subelem() 859 if (gtk_elem[2] != keylen) { in wpa_ft_process_gtk_subelem() 862 gtk_elem[2], (unsigned long) keylen); in wpa_ft_process_gtk_subelem() 866 wpa_hexdump_key(MSG_DEBUG, "FT: GTK from Reassoc Resp", gtk, keylen); in wpa_ft_process_gtk_subelem() 875 gtk_elem + 3, rsc_len, gtk, keylen, in wpa_ft_process_gtk_subelem()
|
| D | wpa.c | 1224 int keylen, rsclen; in wpa_supplicant_install_ptk() local 1251 keylen = wpa_cipher_key_len(sm->pairwise_cipher); in wpa_supplicant_install_ptk() 1252 if (keylen <= 0 || (unsigned int) keylen != sm->ptk.tk_len) { in wpa_supplicant_install_ptk() 1254 keylen, (long unsigned int) sm->ptk.tk_len); in wpa_supplicant_install_ptk() 1268 keylen, KEY_FLAG_PAIRWISE | key_flag) < 0) { in wpa_supplicant_install_ptk() 1272 alg, keylen, MAC2STR(wpa_sm_get_auth_addr(sm)), in wpa_supplicant_install_ptk() 1330 int keylen, int maxkeylen, in wpa_supplicant_check_group_cipher() argument 1346 if (keylen != klen || maxkeylen < klen) { in wpa_supplicant_check_group_cipher() 1349 wpa_cipher_txt(group_cipher), keylen, maxkeylen); in wpa_supplicant_check_group_cipher() 2651 u16 key_info, keylen; in wpa_supplicant_process_3_of_4_wpa() local [all …]
|
| /hostap-latest/src/eap_common/ |
| D | eap_pwd_common.c | 45 static int eap_pwd_kdf(const u8 *key, size_t keylen, const u8 *label, in eap_pwd_kdf() argument 60 key, keylen); in eap_pwd_kdf()
|
| /hostap-latest/src/eapol_supp/ |
| D | eapol_supp_sm.h | 164 const u8 *key, size_t keylen);
|
| /hostap-latest/wlantest/ |
| D | rx_mgmt.c | 1790 size_t gtk_len, keylen; in process_gtk_subelem() local 1818 keylen = wpa_cipher_key_len(bss->group_cipher); in process_gtk_subelem() 1826 if (gtk_len < keylen) { in process_gtk_subelem() 1836 if (gtk_elem[hlen - 8 - 1] != keylen) { in process_gtk_subelem() 1839 gtk_elem[hlen - 8 - 1], keylen); in process_gtk_subelem() 1844 wpa_hexdump(MSG_DEBUG, "FT: GTK from Reassoc Resp", gtk, keylen); in process_gtk_subelem()
|