Home
last modified time | relevance | path

Searched refs:label (Results 1 – 25 of 73) sorted by relevance

123

/hostap-latest/doc/
Dp2p_sm.dot6 start [label="Init",shape=none];
10 label="Discovery";
19 SEARCH -> SD_DURING_FIND [label="Peer SD capab\nand no info", weight=100];
20 SD_DURING_FIND -> SEARCH [label="RX SD Resp\nor timeout", weight=100];
21 SEARCH -> PROV_DISC_DURING_FIND [label="Prov Disc cmd\nand no Resp", weight=100];
22 PROV_DISC_DURING_FIND -> SEARCH [label="RX Prov Disc Resp\nor timeout", weight=100];
27 label="Group Formation";
33 CONNECT -> WAIT_PEER_IDLE [label="RX GO Neg Resp\n(info unavail)"];
37 CONNECT -> GO_NEG [label="RX GO Neg Resp\n(success)", weight=10];
38 CONNECT_LISTEN -> GO_NEG [label="RX GO Neg Req or\nTX GO Neg Resp"];
[all …]
Dp2p_arch.dot8 label = "wpa_gui";
17 gui_ctrl [label="ctrl i/f"];
21 label = "wpa_supplicant"
23 ctrl_iface [label="ctrl i/f"];
24 authenticator [label="Authenticator"];
25 supplicant [label="Supplicant"];
26 driver_iface [label="driver i/f"];
27 p2p_module [label="P2P\nmodule"];
28 wps_registrar [label="WPS\nRegistrar"];
29 wps_enrollee [label="WPS\nEnrollee"];
[all …]
Dp2p_arch2.dot8 label = "wpa_gui";
17 gui_ctrl [label="ctrl i/f"];
21 label = "wpa_supplicant"
23 ctrl_iface [label="ctrl i/f"];
24 authenticator [label="Authenticator"];
25 supplicant [label="Supplicant"];
26 driver_iface [label="driver i/f"];
27 wps_registrar [label="WPS\nRegistrar"];
28 wps_enrollee [label="WPS\nEnrollee"];
29 mgmt_entity [label="Management\nentity"];
[all …]
/hostap-latest/src/crypto/
Dsha256-prf.c30 int sha256_prf(const u8 *key, size_t key_len, const char *label, in sha256_prf() argument
33 return sha256_prf_bits(key, key_len, label, data, data_len, buf, in sha256_prf()
54 int sha256_prf_bits(const u8 *key, size_t key_len, const char *label, in sha256_prf_bits() argument
68 addr[1] = (u8 *) label; in sha256_prf_bits()
69 len[1] = os_strlen(label); in sha256_prf_bits()
Dsha384-prf.c30 int sha384_prf(const u8 *key, size_t key_len, const char *label, in sha384_prf() argument
33 return sha384_prf_bits(key, key_len, label, data, data_len, buf, in sha384_prf()
54 int sha384_prf_bits(const u8 *key, size_t key_len, const char *label, in sha384_prf_bits() argument
68 addr[1] = (u8 *) label; in sha384_prf_bits()
69 len[1] = os_strlen(label); in sha384_prf_bits()
Dsha512-prf.c30 int sha512_prf(const u8 *key, size_t key_len, const char *label, in sha512_prf() argument
33 return sha512_prf_bits(key, key_len, label, data, data_len, buf, in sha512_prf()
54 int sha512_prf_bits(const u8 *key, size_t key_len, const char *label, in sha512_prf_bits() argument
68 addr[1] = (u8 *) label; in sha512_prf_bits()
69 len[1] = os_strlen(label); in sha512_prf_bits()
Dsha1-tlsprf.c30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha1_md5() argument
45 MD5_addr[1] = (unsigned char *) label; in tls_prf_sha1_md5()
46 MD5_len[1] = os_strlen(label); in tls_prf_sha1_md5()
52 SHA1_addr[1] = (unsigned char *) label; in tls_prf_sha1_md5()
53 SHA1_len[1] = os_strlen(label); in tls_prf_sha1_md5()
Dsha256.h18 int sha256_prf(const u8 *key, size_t key_len, const char *label,
20 int sha256_prf_bits(const u8 *key, size_t key_len, const char *label,
24 const char *label, const u8 *seed, size_t seed_len,
27 const char *label, const u8 *seed, size_t seed_len,
Dsha384.h18 int sha384_prf(const u8 *key, size_t key_len, const char *label,
20 int sha384_prf_bits(const u8 *key, size_t key_len, const char *label,
24 const char *label, const u8 *seed, size_t seed_len,
27 const char *label, const u8 *seed, size_t seed_len,
Dsha256-kdf.c33 const char *label, const u8 *seed, size_t seed_len, in hmac_sha256_kdf() argument
44 if (label) { in hmac_sha256_kdf()
45 addr[1] = (const unsigned char *) label; in hmac_sha256_kdf()
46 len[1] = os_strlen(label) + 1; in hmac_sha256_kdf()
Dsha384-kdf.c33 const char *label, const u8 *seed, size_t seed_len, in hmac_sha384_kdf() argument
44 if (label) { in hmac_sha384_kdf()
45 addr[1] = (const unsigned char *) label; in hmac_sha384_kdf()
46 len[1] = os_strlen(label) + 1; in hmac_sha384_kdf()
Dsha512-kdf.c33 const char *label, const u8 *seed, size_t seed_len, in hmac_sha512_kdf() argument
44 if (label) { in hmac_sha512_kdf()
45 addr[1] = (const unsigned char *) label; in hmac_sha512_kdf()
46 len[1] = os_strlen(label) + 1; in hmac_sha512_kdf()
Dsha512.h18 int sha512_prf(const u8 *key, size_t key_len, const char *label,
20 int sha512_prf_bits(const u8 *key, size_t key_len, const char *label,
24 const char *label, const u8 *seed, size_t seed_len,
Dsha1-prf.c30 int sha1_prf(const u8 *key, size_t key_len, const char *label, in sha1_prf() argument
36 size_t label_len = os_strlen(label) + 1; in sha1_prf()
40 addr[0] = (u8 *) label; in sha1_prf()
Dsha256-tlsprf.c29 int tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha256() argument
41 addr[1] = (unsigned char *) label; in tls_prf_sha256()
42 len[1] = os_strlen(label); in tls_prf_sha256()
Dsha384-tlsprf.c29 int tls_prf_sha384(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha384() argument
41 addr[1] = (unsigned char *) label; in tls_prf_sha384()
42 len[1] = os_strlen(label); in tls_prf_sha384()
Dsha1-tprf.c29 int sha1_t_prf(const u8 *key, size_t key_len, const char *label, in sha1_t_prf() argument
35 size_t label_len = os_strlen(label); in sha1_t_prf()
42 addr[1] = (unsigned char *) label; in sha1_t_prf()
Dsha1.h18 int sha1_prf(const u8 *key, size_t key_len, const char *label,
20 int sha1_t_prf(const u8 *key, size_t key_len, const char *label,
23 const char *label, const u8 *seed,
Dcrypto_mbedtls_alt.c483 const char *label, in hmac_kdf_expand() argument
494 if (label == NULL) /* RFC 5869 HKDF-Expand when (label == NULL) */ in hmac_kdf_expand()
512 const u8 *addr[4] = {okm, (const u8 *)label, info, &iter}; in hmac_kdf_expand()
513 size_t len[4] = {0, label ? os_strlen(label) + 1 : 0, info_len, 1}; in hmac_kdf_expand()
541 …const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, … in hmac_sha512_kdf() argument
543 … return hmac_kdf_expand(secret, secret_len, label, seed, seed_len, out, outlen, MBEDTLS_MD_SHA512); in hmac_sha512_kdf()
547 …const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, … in hmac_sha384_kdf() argument
549 … return hmac_kdf_expand(secret, secret_len, label, seed, seed_len, out, outlen, MBEDTLS_MD_SHA384); in hmac_sha384_kdf()
553 …const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, … in hmac_sha256_kdf() argument
555 … return hmac_kdf_expand(secret, secret_len, label, seed, seed_len, out, outlen, MBEDTLS_MD_SHA256); in hmac_sha256_kdf()
[all …]
/hostap-latest/src/eap_common/
Deap_eke_common.c430 const char *label = "EAP-EKE Keys"; in eap_eke_derive_ke_ki() local
452 label_len = os_strlen(label); in eap_eke_derive_ke_ki()
457 os_memcpy(data, label, label_len); in eap_eke_derive_ke_ki()
483 const char *label = "EAP-EKE Ka"; in eap_eke_derive_ka() local
493 label_len = os_strlen(label); in eap_eke_derive_ka()
499 os_memcpy(pos, label, label_len); in eap_eke_derive_ka()
529 const char *label = "EAP-EKE Exported Keys"; in eap_eke_derive_msk() local
538 label_len = os_strlen(label); in eap_eke_derive_msk()
544 os_memcpy(pos, label, label_len); in eap_eke_derive_msk()
686 int eap_eke_auth(struct eap_eke_session *sess, const char *label, in eap_eke_auth() argument
[all …]
Deap_peap_common.c16 const char *label, const u8 *seed, size_t seed_len, in peap_prfplus() argument
22 size_t label_len = os_strlen(label); in peap_prfplus()
29 addr[1] = (unsigned char *) label; in peap_prfplus()
/hostap-latest/src/eap_server/
Deap_server_tls.c335 const char *label; in eap_tls_getKey() local
344 label = "EXPORTER_EAP_TLS_Key_Material"; in eap_tls_getKey()
348 label = "client EAP encryption"; in eap_tls_getKey()
350 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, label, in eap_tls_getKey()
370 const char *label; in eap_tls_get_emsk() local
379 label = "EXPORTER_EAP_TLS_Key_Material"; in eap_tls_get_emsk()
383 label = "client EAP encryption"; in eap_tls_get_emsk()
385 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, label, in eap_tls_get_emsk()
/hostap-latest/wpa_supplicant/
Deap_testing.txt120 1) PEAPv1 required new label, "client PEAP encryption" instead of "client EAP
125 label in key deriviation
175 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
202 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
224 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
294 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
363 - uses label "client EAP encryption"
369 - uses label "client EAP encryption"
375 - uses label "client PEAP encryption"
380 - uses label "client PEAP encryption"
[all …]
/hostap-latest/wpa_supplicant/wpa_gui-qt4/
Dstringquery.cpp15 StringQuery::StringQuery(QString label) in StringQuery() argument
20 layout->addWidget(new QLabel(label), 0, 0); in StringQuery()
/hostap-latest/src/pae/
Dieee802_1x_key.c35 const char *label, const u8 *context, in aes_kdf() argument
47 lab_len = os_strlen(label); in aes_kdf()
62 os_memcpy(buf + 1, label, lab_len); in aes_kdf()

123