Home
last modified time | relevance | path

Searched refs:keylen (Results 1 – 20 of 20) sorted by relevance

/hostap-latest/wpa_supplicant/
Dwpas_kay.c277 size_t keylen; in ieee802_1x_auth_get_msk() local
285 keylen = EAP_MSK_LEN; in ieee802_1x_auth_get_msk()
286 res = eapol_sm_get_key(sm, key, keylen); in ieee802_1x_auth_get_msk()
293 if (keylen > *len) in ieee802_1x_auth_get_msk()
294 keylen = *len; in ieee802_1x_auth_get_msk()
295 os_memcpy(msk, key, keylen); in ieee802_1x_auth_get_msk()
296 *len = keylen; in ieee802_1x_auth_get_msk()
Dwpas_glue.c242 const u8 *key, size_t keylen) in wpa_eapol_set_wep_key() argument
246 int cipher = (keylen == 5) ? WPA_CIPHER_WEP40 : in wpa_eapol_set_wep_key()
255 keyidx, unicast, NULL, 0, key, keylen, in wpa_eapol_set_wep_key()
Dwpa_supplicant.c166 size_t keylen; in wpa_supplicant_set_wpa_none_key() local
189 keylen = 16; in wpa_supplicant_set_wpa_none_key()
194 keylen = 16; in wpa_supplicant_set_wpa_none_key()
201 keylen = 32; in wpa_supplicant_set_wpa_none_key()
213 ret = wpa_drv_set_key(wpa_s, -1, alg, NULL, 0, 1, seq, 6, key, keylen, in wpa_supplicant_set_wpa_none_key()
/hostap-latest/src/ap/
Dwpa_auth_kay.c360 size_t keylen; in ieee802_1x_auth_get_msk() local
365 key = ieee802_1x_get_key(sta->eapol_sm, &keylen); in ieee802_1x_auth_get_msk()
372 (unsigned long) keylen); in ieee802_1x_auth_get_msk()
373 wpa_hexdump_key(MSG_DEBUG, "MSK: ", key, keylen); in ieee802_1x_auth_get_msk()
375 if (keylen > *len) in ieee802_1x_auth_get_msk()
376 keylen = *len; in ieee802_1x_auth_get_msk()
377 os_memcpy(msk, key, keylen); in ieee802_1x_auth_get_msk()
378 *len = keylen; in ieee802_1x_auth_get_msk()
Dwpa_auth_glue.c480 size_t keylen; in hostapd_wpa_auth_get_msk() local
489 key = ieee802_1x_get_key(sta->eapol_sm, &keylen); in hostapd_wpa_auth_get_msk()
496 if (keylen > *len) in hostapd_wpa_auth_get_msk()
497 keylen = *len; in hostapd_wpa_auth_get_msk()
498 os_memcpy(msk, key, keylen); in hostapd_wpa_auth_get_msk()
499 *len = keylen; in hostapd_wpa_auth_get_msk()
/hostap-latest/src/crypto/
Dcrypto_internal-cipher.c23 size_t keylen; member
61 ctx->u.rc4.keylen = key_len; in crypto_cipher_init()
112 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, in crypto_cipher_encrypt()
176 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, in crypto_cipher_decrypt()
Drc4.c16 int rc4_skip(const u8 *key, size_t keylen, size_t skip, in rc4_skip() argument
31 if (kpos >= keylen) in rc4_skip()
Dcrypto_libtomcrypt.c295 size_t keylen; member
339 ctx->u.rc4.keylen = key_len; in crypto_cipher_init()
362 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, in crypto_cipher_encrypt()
386 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, in crypto_cipher_decrypt()
Dtls_mbedtls_alt.c2033 size_t keylen, in tls_connection_export_keys_cb() argument
2043 conn->expkey_keyblock_size = maclen + keylen + ivlen; in tls_connection_export_keys_cb()
2108 size_t keylen = mbedtls_cipher_info_get_key_bitlen(cipher_info) / 8; in tls_mbedtls_ssl_keyblock_size() local
2111 size_t keylen = cipher_info->MBEDTLS_PRIVATE(key_bitlen) / 8; in tls_mbedtls_ssl_keyblock_size() local
2116 return keylen + 4; in tls_mbedtls_ssl_keyblock_size()
2118 return keylen + 12; in tls_mbedtls_ssl_keyblock_size()
2128 return keylen + mac_key_len + ivlen; in tls_mbedtls_ssl_keyblock_size()
Dcrypto_openssl.c363 int rc4_skip(const u8 *key, size_t keylen, size_t skip, in rc4_skip() argument
380 !EVP_CIPHER_CTX_set_key_length(ctx, keylen) || in rc4_skip()
446 static const EVP_CIPHER * aes_get_evp_cipher(size_t keylen) in aes_get_evp_cipher() argument
448 switch (keylen) { in aes_get_evp_cipher()
579 static const EVP_CIPHER * aes_get_evp_wrap_cipher(size_t keylen) in aes_get_evp_wrap_cipher() argument
581 switch (keylen) { in aes_get_evp_wrap_cipher()
1268 int keylen; in dh5_derive_shared()
1283 keylen = DH_compute_key(wpabuf_mhead(res), pub_key, dh); in dh5_derive_shared()
1284 if (keylen < 0) in dh5_derive_shared()
1286 wpabuf_put(res, keylen); in dh5_derive_shared()
Dcrypto_linux.c537 int rc4_skip(const u8 *key, size_t keylen, size_t skip, in rc4_skip() argument
552 skcipher = linux_af_alg_skcipher("ecb(arc4)", key, keylen); in rc4_skip()
Dcrypto.h486 int rc4_skip(const u8 *key, size_t keylen, size_t skip,
Dcrypto_wolfssl.c730 int rc4_skip(const u8 *key, size_t keylen, size_t skip, u8 *data, in rc4_skip() argument
737 wc_Arc4SetKey(&arc4, key, keylen); in rc4_skip()
/hostap-latest/src/radius/
Dradius.c1269 size_t keylen; in radius_msg_get_ms_keys() local
1281 &keylen); in radius_msg_get_ms_keys()
1283 keys->send = decrypt_ms_key(key, keylen, in radius_msg_get_ms_keys()
1296 &keylen); in radius_msg_get_ms_keys()
1298 keys->recv = decrypt_ms_key(key, keylen, in radius_msg_get_ms_keys()
1318 size_t keylen; in radius_msg_get_cisco_keys() local
1329 RADIUS_CISCO_AV_PAIR, &keylen); in radius_msg_get_cisco_keys()
1330 if (key && keylen == 51 && in radius_msg_get_cisco_keys()
1332 keys->recv = decrypt_ms_key(key + 17, keylen - 17, in radius_msg_get_cisco_keys()
1734 char * radius_msg_get_tunnel_password(struct radius_msg *msg, int *keylen, in radius_msg_get_tunnel_password() argument
[all …]
Dradius.h329 char * radius_msg_get_tunnel_password(struct radius_msg *msg, int *keylen,
/hostap-latest/src/rsn_supp/
Dwpa_ft.c494 int keylen; in wpa_ft_install_ptk() local
507 keylen = wpa_cipher_key_len(sm->pairwise_cipher); in wpa_ft_install_ptk()
511 (u8 *) sm->ptk.tk, keylen, in wpa_ft_install_ptk()
808 size_t gtk_len, keylen, rsc_len; in wpa_ft_process_gtk_subelem() local
841 keylen = wpa_cipher_key_len(sm->group_cipher); in wpa_ft_process_gtk_subelem()
850 if (gtk_len < keylen) { in wpa_ft_process_gtk_subelem()
859 if (gtk_elem[2] != keylen) { in wpa_ft_process_gtk_subelem()
862 gtk_elem[2], (unsigned long) keylen); in wpa_ft_process_gtk_subelem()
866 wpa_hexdump_key(MSG_DEBUG, "FT: GTK from Reassoc Resp", gtk, keylen); in wpa_ft_process_gtk_subelem()
875 gtk_elem + 3, rsc_len, gtk, keylen, in wpa_ft_process_gtk_subelem()
Dwpa.c1224 int keylen, rsclen; in wpa_supplicant_install_ptk() local
1251 keylen = wpa_cipher_key_len(sm->pairwise_cipher); in wpa_supplicant_install_ptk()
1252 if (keylen <= 0 || (unsigned int) keylen != sm->ptk.tk_len) { in wpa_supplicant_install_ptk()
1254 keylen, (long unsigned int) sm->ptk.tk_len); in wpa_supplicant_install_ptk()
1268 keylen, KEY_FLAG_PAIRWISE | key_flag) < 0) { in wpa_supplicant_install_ptk()
1272 alg, keylen, MAC2STR(wpa_sm_get_auth_addr(sm)), in wpa_supplicant_install_ptk()
1330 int keylen, int maxkeylen, in wpa_supplicant_check_group_cipher() argument
1346 if (keylen != klen || maxkeylen < klen) { in wpa_supplicant_check_group_cipher()
1349 wpa_cipher_txt(group_cipher), keylen, maxkeylen); in wpa_supplicant_check_group_cipher()
2651 u16 key_info, keylen; in wpa_supplicant_process_3_of_4_wpa() local
[all …]
/hostap-latest/src/eap_common/
Deap_pwd_common.c45 static int eap_pwd_kdf(const u8 *key, size_t keylen, const u8 *label, in eap_pwd_kdf() argument
60 key, keylen); in eap_pwd_kdf()
/hostap-latest/src/eapol_supp/
Deapol_supp_sm.h164 const u8 *key, size_t keylen);
/hostap-latest/wlantest/
Drx_mgmt.c1790 size_t gtk_len, keylen; in process_gtk_subelem() local
1818 keylen = wpa_cipher_key_len(bss->group_cipher); in process_gtk_subelem()
1826 if (gtk_len < keylen) { in process_gtk_subelem()
1836 if (gtk_elem[hlen - 8 - 1] != keylen) { in process_gtk_subelem()
1839 gtk_elem[hlen - 8 - 1], keylen); in process_gtk_subelem()
1844 wpa_hexdump(MSG_DEBUG, "FT: GTK from Reassoc Resp", gtk, keylen); in process_gtk_subelem()