/hostap-latest/src/eap_common/ |
D | eap_eke_common.c | 303 int eap_eke_derive_key(struct eap_eke_session *sess, in eap_eke_derive_key() argument 314 os_memset(zeros, 0, sess->prf_len); in eap_eke_derive_key() 315 if (eap_eke_prf(sess->prf, zeros, sess->prf_len, in eap_eke_derive_key() 319 temp, sess->prf_len); in eap_eke_derive_key() 329 if (eap_eke_prfplus(sess->prf, temp, sess->prf_len, in eap_eke_derive_key() 342 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, in eap_eke_dhcomp() argument 349 dh_len = eap_eke_dh_len(sess->dhgroup); in eap_eke_dhcomp() 359 if (sess->encr != EAP_EKE_ENCR_AES128_CBC) in eap_eke_dhcomp() 377 int eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, in eap_eke_shared_secret() argument 386 dh = eap_eke_dh_group(sess->dhgroup); in eap_eke_shared_secret() [all …]
|
D | eap_eke_common.h | 81 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, 83 void eap_eke_session_clean(struct eap_eke_session *sess); 85 int eap_eke_derive_key(struct eap_eke_session *sess, 89 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, 91 int eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, 93 int eap_eke_derive_ke_ki(struct eap_eke_session *sess, 96 int eap_eke_derive_ka(struct eap_eke_session *sess, 100 int eap_eke_derive_msk(struct eap_eke_session *sess, 105 int eap_eke_prot(struct eap_eke_session *sess, 108 int eap_eke_decrypt_prot(struct eap_eke_session *sess, [all …]
|
/hostap-latest/src/radius/ |
D | radius_server.c | 284 void srv_log(struct radius_session *sess, const char *fmt, ...) 287 void srv_log(struct radius_session *sess, const char *fmt, ...) in srv_log() argument 304 RADIUS_DEBUG("[0x%x %s] %s", sess->sess_id, sess->nas_ip, buf); in srv_log() 307 if (sess->server->db) { in srv_log() 314 sess->sess_id, sess->nas_ip, in srv_log() 315 sess->username, buf); in srv_log() 317 if (sqlite3_exec(sess->server->db, sql, NULL, NULL, in srv_log() 320 sqlite3_errmsg(sess->server->db)); in srv_log() 373 struct radius_session *sess = client->sessions; in radius_server_get_session() local 375 while (sess) { in radius_server_get_session() [all …]
|
/hostap-latest/src/eap_server/ |
D | eap_server_eke.c | 29 struct eap_eke_session sess; member 104 eap_eke_session_clean(&data->sess); in eap_eke_reset() 253 if (eap_eke_derive_key(&data->sess, sm->user->password, in eap_eke_build_commit() 262 msg = eap_eke_build_msg(data, id, data->sess.dhcomp_len, in eap_eke_build_commit() 277 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { in eap_eke_build_commit() 284 if (eap_eke_dhcomp(&data->sess, data->key, pub, in eap_eke_build_commit() 285 wpabuf_put(msg, data->sess.dhcomp_len)) in eap_eke_build_commit() 314 plen = data->sess.pnonce_ps_len + data->sess.prf_len; in eap_eke_build_confirm() 321 if (random_get_bytes(data->nonce_s, data->sess.nonce_len)) { in eap_eke_build_confirm() 327 data->nonce_s, data->sess.nonce_len); in eap_eke_build_confirm() [all …]
|
D | eap_server.c | 1856 const struct eap_session_data *sess) in eap_server_sm_init() argument 1867 if (sess->assoc_wps_ie) in eap_server_sm_init() 1868 sm->assoc_wps_ie = wpabuf_dup(sess->assoc_wps_ie); in eap_server_sm_init() 1869 if (sess->assoc_p2p_ie) in eap_server_sm_init() 1870 sm->assoc_p2p_ie = wpabuf_dup(sess->assoc_p2p_ie); in eap_server_sm_init() 1871 if (sess->peer_addr) in eap_server_sm_init() 1872 os_memcpy(sm->peer_addr, sess->peer_addr, ETH_ALEN); in eap_server_sm_init() 1874 sm->tls_test_flags = sess->tls_test_flags; in eap_server_sm_init()
|
D | eap.h | 288 const struct eap_session_data *sess);
|
/hostap-latest/src/eap_peer/ |
D | eap_eke.c | 27 struct eap_eke_session sess; member 136 eap_eke_session_clean(&data->sess); in eap_eke_deinit() 209 eap_eke_session_clean(&data->sess); in eap_eke_build_fail() 283 if (eap_eke_session_init(&data->sess, prop[0], prop[1], prop[2], in eap_eke_process_id() 387 if (pos + data->sess.dhcomp_len > end) { in eap_eke_process_commit() 394 pos, data->sess.dhcomp_len); in eap_eke_process_commit() 396 pos += data->sess.dhcomp_len; in eap_eke_process_commit() 403 if (eap_eke_derive_key(&data->sess, password, password_len, in eap_eke_process_commit() 415 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { in eap_eke_process_commit() 422 if (eap_eke_shared_secret(&data->sess, key, data->dh_priv, dhcomp) < 0) in eap_eke_process_commit() [all …]
|
/hostap-latest/src/crypto/ |
D | tls_wolfssl.c | 183 static void remove_session_cb(WOLFSSL_CTX *ctx, WOLFSSL_SESSION *sess) in remove_session_cb() argument 187 buf = wolfSSL_SESSION_get_ex_data(sess, tls_ex_idx_session); in remove_session_cb() 192 buf, sess); in remove_session_cb() 195 wolfSSL_SESSION_set_ex_data(sess, tls_ex_idx_session, NULL); in remove_session_cb() 2216 WOLFSSL_SESSION *sess; in tls_connection_remove_session() local 2218 sess = wolfSSL_get_session(conn->ssl); in tls_connection_remove_session() 2219 if (!sess) in tls_connection_remove_session() 2222 wolfSSL_SSL_SESSION_set_timeout(sess, 0); in tls_connection_remove_session() 2264 WOLFSSL_SESSION *sess; in tls_connection_set_success_data() local 2269 sess = wolfSSL_get_session(conn->ssl); in tls_connection_set_success_data() [all …]
|
D | tls_openssl.c | 957 static void remove_session_cb(SSL_CTX *ctx, SSL_SESSION *sess) in remove_session_cb() argument 964 "OpenSSL: Remove session %p (tls_ex_idx_session=%d)", sess, in remove_session_cb() 969 buf = SSL_SESSION_get_ex_data(sess, tls_ex_idx_session); in remove_session_cb() 974 SSL_SESSION_set_ex_data(sess, tls_ex_idx_session, NULL); in remove_session_cb() 979 buf, sess); in remove_session_cb() 987 buf, sess); in remove_session_cb() 4422 SSL_SESSION *sess; in tls_connection_get_eap_fast_key() local 4446 sess = SSL_get_session(ssl); in tls_connection_get_eap_fast_key() 4447 if (!ver || !sess) in tls_connection_get_eap_fast_key() 4466 master_key_len = SSL_SESSION_get_master_key(sess, master_key, in tls_connection_get_eap_fast_key() [all …]
|
D | tls_mbedtls_alt.c | 1855 mbedtls_ssl_session *sess = conn->ssl.MBEDTLS_PRIVATE(session_negotiate); in tls_mbedtls_clienthello_session_ticket_set() local 1856 if (sess->MBEDTLS_PRIVATE(ticket)) in tls_mbedtls_clienthello_session_ticket_set() 1858 mbedtls_platform_zeroize(sess->MBEDTLS_PRIVATE(ticket), sess->MBEDTLS_PRIVATE(ticket_len)); in tls_mbedtls_clienthello_session_ticket_set() 1859 mbedtls_free(sess->MBEDTLS_PRIVATE(ticket)); in tls_mbedtls_clienthello_session_ticket_set() 1861 sess->MBEDTLS_PRIVATE(ticket) = conn->clienthello_session_ticket; in tls_mbedtls_clienthello_session_ticket_set() 1862 sess->MBEDTLS_PRIVATE(ticket_len) = conn->clienthello_session_ticket_len; in tls_mbedtls_clienthello_session_ticket_set() 1863 sess->MBEDTLS_PRIVATE(ticket_lifetime) = 86400; /* XXX: can hint be 0? */ in tls_mbedtls_clienthello_session_ticket_set()
|
/hostap-latest/tests/hwsim/ |
D | test_eap_proto.py | 1010 sess, = struct.unpack('B', binascii.unhexlify(resp[20:22])) 1011 sess = binascii.hexlify(struct.pack('B', (sess + 1) % 256)).decode() 1012 msg = resp[0:4] + "0008" + resp[8:12] + "0008" + "3002" + sess + "00"
|