/hostap-latest/doc/ |
D | p2p_sm.dot | 6 start [label="Init",shape=none]; 10 label="Discovery"; 19 SEARCH -> SD_DURING_FIND [label="Peer SD capab\nand no info", weight=100]; 20 SD_DURING_FIND -> SEARCH [label="RX SD Resp\nor timeout", weight=100]; 21 SEARCH -> PROV_DISC_DURING_FIND [label="Prov Disc cmd\nand no Resp", weight=100]; 22 PROV_DISC_DURING_FIND -> SEARCH [label="RX Prov Disc Resp\nor timeout", weight=100]; 27 label="Group Formation"; 33 CONNECT -> WAIT_PEER_IDLE [label="RX GO Neg Resp\n(info unavail)"]; 37 CONNECT -> GO_NEG [label="RX GO Neg Resp\n(success)", weight=10]; 38 CONNECT_LISTEN -> GO_NEG [label="RX GO Neg Req or\nTX GO Neg Resp"]; [all …]
|
D | p2p_arch.dot | 8 label = "wpa_gui"; 17 gui_ctrl [label="ctrl i/f"]; 21 label = "wpa_supplicant" 23 ctrl_iface [label="ctrl i/f"]; 24 authenticator [label="Authenticator"]; 25 supplicant [label="Supplicant"]; 26 driver_iface [label="driver i/f"]; 27 p2p_module [label="P2P\nmodule"]; 28 wps_registrar [label="WPS\nRegistrar"]; 29 wps_enrollee [label="WPS\nEnrollee"]; [all …]
|
D | p2p_arch2.dot | 8 label = "wpa_gui"; 17 gui_ctrl [label="ctrl i/f"]; 21 label = "wpa_supplicant" 23 ctrl_iface [label="ctrl i/f"]; 24 authenticator [label="Authenticator"]; 25 supplicant [label="Supplicant"]; 26 driver_iface [label="driver i/f"]; 27 wps_registrar [label="WPS\nRegistrar"]; 28 wps_enrollee [label="WPS\nEnrollee"]; 29 mgmt_entity [label="Management\nentity"]; [all …]
|
/hostap-latest/src/crypto/ |
D | sha256-prf.c | 30 int sha256_prf(const u8 *key, size_t key_len, const char *label, in sha256_prf() argument 33 return sha256_prf_bits(key, key_len, label, data, data_len, buf, in sha256_prf() 54 int sha256_prf_bits(const u8 *key, size_t key_len, const char *label, in sha256_prf_bits() argument 68 addr[1] = (u8 *) label; in sha256_prf_bits() 69 len[1] = os_strlen(label); in sha256_prf_bits()
|
D | sha384-prf.c | 30 int sha384_prf(const u8 *key, size_t key_len, const char *label, in sha384_prf() argument 33 return sha384_prf_bits(key, key_len, label, data, data_len, buf, in sha384_prf() 54 int sha384_prf_bits(const u8 *key, size_t key_len, const char *label, in sha384_prf_bits() argument 68 addr[1] = (u8 *) label; in sha384_prf_bits() 69 len[1] = os_strlen(label); in sha384_prf_bits()
|
D | sha512-prf.c | 30 int sha512_prf(const u8 *key, size_t key_len, const char *label, in sha512_prf() argument 33 return sha512_prf_bits(key, key_len, label, data, data_len, buf, in sha512_prf() 54 int sha512_prf_bits(const u8 *key, size_t key_len, const char *label, in sha512_prf_bits() argument 68 addr[1] = (u8 *) label; in sha512_prf_bits() 69 len[1] = os_strlen(label); in sha512_prf_bits()
|
D | sha1-tlsprf.c | 30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha1_md5() argument 45 MD5_addr[1] = (unsigned char *) label; in tls_prf_sha1_md5() 46 MD5_len[1] = os_strlen(label); in tls_prf_sha1_md5() 52 SHA1_addr[1] = (unsigned char *) label; in tls_prf_sha1_md5() 53 SHA1_len[1] = os_strlen(label); in tls_prf_sha1_md5()
|
D | sha256.h | 18 int sha256_prf(const u8 *key, size_t key_len, const char *label, 20 int sha256_prf_bits(const u8 *key, size_t key_len, const char *label, 24 const char *label, const u8 *seed, size_t seed_len, 27 const char *label, const u8 *seed, size_t seed_len,
|
D | sha384.h | 18 int sha384_prf(const u8 *key, size_t key_len, const char *label, 20 int sha384_prf_bits(const u8 *key, size_t key_len, const char *label, 24 const char *label, const u8 *seed, size_t seed_len, 27 const char *label, const u8 *seed, size_t seed_len,
|
D | sha256-kdf.c | 33 const char *label, const u8 *seed, size_t seed_len, in hmac_sha256_kdf() argument 44 if (label) { in hmac_sha256_kdf() 45 addr[1] = (const unsigned char *) label; in hmac_sha256_kdf() 46 len[1] = os_strlen(label) + 1; in hmac_sha256_kdf()
|
D | sha384-kdf.c | 33 const char *label, const u8 *seed, size_t seed_len, in hmac_sha384_kdf() argument 44 if (label) { in hmac_sha384_kdf() 45 addr[1] = (const unsigned char *) label; in hmac_sha384_kdf() 46 len[1] = os_strlen(label) + 1; in hmac_sha384_kdf()
|
D | sha512-kdf.c | 33 const char *label, const u8 *seed, size_t seed_len, in hmac_sha512_kdf() argument 44 if (label) { in hmac_sha512_kdf() 45 addr[1] = (const unsigned char *) label; in hmac_sha512_kdf() 46 len[1] = os_strlen(label) + 1; in hmac_sha512_kdf()
|
D | sha512.h | 18 int sha512_prf(const u8 *key, size_t key_len, const char *label, 20 int sha512_prf_bits(const u8 *key, size_t key_len, const char *label, 24 const char *label, const u8 *seed, size_t seed_len,
|
D | sha1-prf.c | 30 int sha1_prf(const u8 *key, size_t key_len, const char *label, in sha1_prf() argument 36 size_t label_len = os_strlen(label) + 1; in sha1_prf() 40 addr[0] = (u8 *) label; in sha1_prf()
|
D | sha256-tlsprf.c | 29 int tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha256() argument 41 addr[1] = (unsigned char *) label; in tls_prf_sha256() 42 len[1] = os_strlen(label); in tls_prf_sha256()
|
D | sha384-tlsprf.c | 29 int tls_prf_sha384(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha384() argument 41 addr[1] = (unsigned char *) label; in tls_prf_sha384() 42 len[1] = os_strlen(label); in tls_prf_sha384()
|
D | sha1-tprf.c | 29 int sha1_t_prf(const u8 *key, size_t key_len, const char *label, in sha1_t_prf() argument 35 size_t label_len = os_strlen(label); in sha1_t_prf() 42 addr[1] = (unsigned char *) label; in sha1_t_prf()
|
D | sha1.h | 18 int sha1_prf(const u8 *key, size_t key_len, const char *label, 20 int sha1_t_prf(const u8 *key, size_t key_len, const char *label, 23 const char *label, const u8 *seed,
|
D | crypto_mbedtls_alt.c | 483 const char *label, in hmac_kdf_expand() argument 494 if (label == NULL) /* RFC 5869 HKDF-Expand when (label == NULL) */ in hmac_kdf_expand() 512 const u8 *addr[4] = {okm, (const u8 *)label, info, &iter}; in hmac_kdf_expand() 513 size_t len[4] = {0, label ? os_strlen(label) + 1 : 0, info_len, 1}; in hmac_kdf_expand() 541 …const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, … in hmac_sha512_kdf() argument 543 … return hmac_kdf_expand(secret, secret_len, label, seed, seed_len, out, outlen, MBEDTLS_MD_SHA512); in hmac_sha512_kdf() 547 …const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, … in hmac_sha384_kdf() argument 549 … return hmac_kdf_expand(secret, secret_len, label, seed, seed_len, out, outlen, MBEDTLS_MD_SHA384); in hmac_sha384_kdf() 553 …const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, … in hmac_sha256_kdf() argument 555 … return hmac_kdf_expand(secret, secret_len, label, seed, seed_len, out, outlen, MBEDTLS_MD_SHA256); in hmac_sha256_kdf() [all …]
|
/hostap-latest/src/eap_common/ |
D | eap_eke_common.c | 430 const char *label = "EAP-EKE Keys"; in eap_eke_derive_ke_ki() local 452 label_len = os_strlen(label); in eap_eke_derive_ke_ki() 457 os_memcpy(data, label, label_len); in eap_eke_derive_ke_ki() 483 const char *label = "EAP-EKE Ka"; in eap_eke_derive_ka() local 493 label_len = os_strlen(label); in eap_eke_derive_ka() 499 os_memcpy(pos, label, label_len); in eap_eke_derive_ka() 529 const char *label = "EAP-EKE Exported Keys"; in eap_eke_derive_msk() local 538 label_len = os_strlen(label); in eap_eke_derive_msk() 544 os_memcpy(pos, label, label_len); in eap_eke_derive_msk() 686 int eap_eke_auth(struct eap_eke_session *sess, const char *label, in eap_eke_auth() argument [all …]
|
D | eap_peap_common.c | 16 const char *label, const u8 *seed, size_t seed_len, in peap_prfplus() argument 22 size_t label_len = os_strlen(label); in peap_prfplus() 29 addr[1] = (unsigned char *) label; in peap_prfplus()
|
/hostap-latest/src/eap_server/ |
D | eap_server_tls.c | 335 const char *label; in eap_tls_getKey() local 344 label = "EXPORTER_EAP_TLS_Key_Material"; in eap_tls_getKey() 348 label = "client EAP encryption"; in eap_tls_getKey() 350 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, label, in eap_tls_getKey() 370 const char *label; in eap_tls_get_emsk() local 379 label = "EXPORTER_EAP_TLS_Key_Material"; in eap_tls_get_emsk() 383 label = "client EAP encryption"; in eap_tls_get_emsk() 385 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, label, in eap_tls_get_emsk()
|
/hostap-latest/wpa_supplicant/ |
D | eap_testing.txt | 120 1) PEAPv1 required new label, "client PEAP encryption" instead of "client EAP 125 label in key deriviation 175 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 202 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 224 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 294 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 363 - uses label "client EAP encryption" 369 - uses label "client EAP encryption" 375 - uses label "client PEAP encryption" 380 - uses label "client PEAP encryption" [all …]
|
/hostap-latest/wpa_supplicant/wpa_gui-qt4/ |
D | stringquery.cpp | 15 StringQuery::StringQuery(QString label) in StringQuery() argument 20 layout->addWidget(new QLabel(label), 0, 0); in StringQuery()
|
/hostap-latest/src/pae/ |
D | ieee802_1x_key.c | 35 const char *label, const u8 *context, in aes_kdf() argument 47 lab_len = os_strlen(label); in aes_kdf() 62 os_memcpy(buf + 1, label, lab_len); in aes_kdf()
|