/external/wpa_supplicant/ |
D | ms_funcs.h | 18 void generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, 19 const u8 *username, size_t username_len, 20 const u8 *password, size_t password_len, 21 u8 *response); 22 void generate_nt_response_pwhash(const u8 *auth_challenge, 23 const u8 *peer_challenge, 24 const u8 *username, size_t username_len, 25 const u8 *password_hash, 26 u8 *response); 27 void generate_authenticator_response(const u8 *password, size_t password_len, [all …]
|
D | ms_funcs.c | 32 static void challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, in challenge_hash() 33 const u8 *username, size_t username_len, in challenge_hash() 34 u8 *challenge) in challenge_hash() 36 u8 hash[SHA1_MAC_LEN]; in challenge_hash() 58 void nt_password_hash(const u8 *password, size_t password_len, in nt_password_hash() 59 u8 *password_hash) in nt_password_hash() 61 u8 buf[512], *pos; in nt_password_hash() 75 md4_vector(1, (const u8 **) &pos, &len, password_hash); in nt_password_hash() 84 void hash_nt_password_hash(const u8 *password_hash, u8 *password_hash_hash) in hash_nt_password_hash() 97 void challenge_response(const u8 *challenge, const u8 *password_hash, in challenge_response() [all …]
|
D | eap_sim_common.h | 73 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, 74 const u8 *nonce_mt, u16 selected_version, 75 const u8 *ver_list, size_t ver_list_len, 76 int num_chal, const u8 *kc, u8 *mk); 77 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, 78 const u8 *ik, const u8 *ck, u8 *mk); 79 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, 80 u8 *emsk); 82 const u8 *identity, size_t identity_len, 83 const u8 *nonce_s, const u8 *mk, u8 *msk, [all …]
|
D | eap_psk_common.h | 32 #define EAP_PSK_FLAGS_SET_T(t) ((u8) (t) << 6) 40 u8 code; 41 u8 identifier; 43 u8 type; /* EAP_TYPE_PSK */ 44 u8 flags; 49 u8 code; 50 u8 identifier; 52 u8 type; /* EAP_TYPE_PSK */ 53 u8 flags; 54 u8 rand_s[EAP_PSK_RAND_LEN]; [all …]
|
D | aes_wrap.h | 25 int aes_wrap(const u8 *kek, int n, const u8 *plain, u8 *cipher); 26 int aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain); 27 int omac1_aes_128_vector(const u8 *key, size_t num_elem, 28 const u8 *addr[], const size_t *len, u8 *mac); 29 int omac1_aes_128(const u8 *key, const u8 *data, size_t data_len, u8 *mac); 30 int aes_128_encrypt_block(const u8 *key, const u8 *in, u8 *out); 31 int aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, 32 u8 *data, size_t data_len); 33 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, 34 const u8 *hdr, size_t hdr_len, [all …]
|
D | eap_sake_common.h | 54 u8 code; 55 u8 identifier; 57 u8 type; /* EAP_TYPE_SAKE */ 58 u8 version; /* EAP_SAKE_VERSION */ 59 u8 session_id; 60 u8 subtype; 69 const u8 *rand_s; 70 const u8 *rand_p; 71 const u8 *mic_s; 72 const u8 *mic_p; [all …]
|
D | crypto.h | 37 void md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac); 46 void md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac); 55 void sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, 56 u8 *mac); 70 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen); 79 void sha256_vector(size_t num_elem, const u8 *addr[], const size_t *len, 80 u8 *mac); 88 void des_encrypt(const u8 *clear, const u8 *key, u8 *cypher); 96 void * aes_encrypt_init(const u8 *key, size_t len); 104 void aes_encrypt(void *ctx, const u8 *plain, u8 *crypt); [all …]
|
D | radius.h | 25 u8 code; 26 u8 identifier; 28 u8 authenticator[16]; 44 u8 type; 45 u8 length; /* including this header */ 148 u8 vendor_type; 149 u8 vendor_length; 167 u8 *send; 169 u8 *recv; 201 struct radius_msg *radius_msg_new(u8 code, u8 identifier); [all …]
|
D | eap_pax_common.h | 23 u8 code; 24 u8 identifier; 26 u8 type; /* EAP_TYPE_PAX */ 27 u8 op_code; 28 u8 flags; 29 u8 mac_id; 30 u8 dh_group_id; 31 u8 public_key_id; 89 int eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len, 91 const u8 *entropy, size_t entropy_len, [all …]
|
D | eap_gpsk_common.c | 47 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */, in eap_gpsk_gkdf_cmac() 48 const u8 *data /* Z */, size_t data_len, in eap_gpsk_gkdf_cmac() 49 u8 *buf, size_t len /* X */) in eap_gpsk_gkdf_cmac() 51 u8 *opos; in eap_gpsk_gkdf_cmac() 53 u8 ibuf[2], hash[16]; in eap_gpsk_gkdf_cmac() 54 const u8 *addr[2]; in eap_gpsk_gkdf_cmac() 81 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */, in eap_gpsk_gkdf_sha256() 82 const u8 *data /* Z */, size_t data_len, in eap_gpsk_gkdf_sha256() 83 u8 *buf, size_t len /* X */) in eap_gpsk_gkdf_sha256() 85 u8 *opos; in eap_gpsk_gkdf_sha256() [all …]
|
D | wpa_i.h | 29 u8 kck[16]; /* EAPOL-Key Key Confirmation Key (KCK) */ 30 u8 kek[16]; /* EAPOL-Key Key Encryption Key (KEK) */ 31 u8 tk1[16]; /* Temporal Key 1 (TK1) */ 33 u8 tk2[16]; /* Temporal Key 2 (TK2) */ 35 u8 tx_mic_key[8]; 36 u8 rx_mic_key[8]; 51 u8 addr[ETH_ALEN]; /* other end MAC address */ 52 u8 inonce[WPA_NONCE_LEN]; /* Initiator Nonce */ 53 u8 pnonce[WPA_NONCE_LEN]; /* Peer Nonce */ 54 u8 rsnie_i[PEERKEY_MAX_IE_LEN]; /* Initiator RSN IE */ [all …]
|
D | config_ssid.h | 126 u8 *ssid; 139 u8 bssid[ETH_ALEN]; 149 u8 psk[PMK_LEN]; 208 u8 *identity; 222 u8 *anonymous_identity; 232 u8 *eappsk; 245 u8 *nai; 255 u8 *password; 282 u8 *ca_cert; 293 u8 *ca_path; [all …]
|
D | driver.h | 55 u8 bssid[ETH_ALEN]; 56 u8 ssid[32]; 58 u8 wpa_ie[SSID_MAX_WPA_IE_LEN]; 60 u8 rsn_ie[SSID_MAX_WPA_IE_LEN]; 79 const u8 *bssid; 84 const u8 *ssid; 109 const u8 *wpa_ie; 135 const u8 *wep_key[4]; 256 int (*get_bssid)(void *priv, u8 *bssid); 273 int (*get_ssid)(void *priv, u8 *ssid); [all …]
|
D | wpa.h | 65 const u8 *addr, int key_idx, int set_tx, 66 const u8 *seq, size_t seq_len, 67 const u8 *key, size_t key_len); 70 int (*get_bssid)(void *ctx, u8 *bssid); 71 int (*ether_send)(void *ctx, const u8 *dest, u16 proto, const u8 *buf, 75 u8 * (*alloc_eapol)(void *ctx, u8 type, const void *data, u16 data_len, 77 int (*add_pmkid)(void *ctx, const u8 *bssid, const u8 *pmkid); 78 int (*remove_pmkid)(void *ctx, const u8 *bssid, const u8 *pmkid); 82 int (*mlme_setprotection)(void *ctx, const u8 *addr, 105 const u8 *pmkid; [all …]
|
D | aes_wrap.c | 44 int aes_wrap(const u8 *kek, int n, const u8 *plain, u8 *cipher) in aes_wrap() 46 u8 *a, *r, b[16]; in aes_wrap() 103 int aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain) in aes_unwrap() 105 u8 a[8], *r, b[16]; in aes_unwrap() 158 static void gf_mulx(u8 *pad) in gf_mulx() 180 int omac1_aes_128_vector(const u8 *key, size_t num_elem, in omac1_aes_128_vector() 181 const u8 *addr[], const size_t *len, u8 *mac) in omac1_aes_128_vector() 184 u8 cbc[BLOCK_SIZE], pad[BLOCK_SIZE]; in omac1_aes_128_vector() 185 const u8 *pos, *end; in omac1_aes_128_vector() 253 int omac1_aes_128(const u8 *key, const u8 *data, size_t data_len, u8 *mac) in omac1_aes_128() [all …]
|
D | eap_pax_common.c | 36 int eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len, in eap_pax_kdf() 38 const u8 *entropy, size_t entropy_len, in eap_pax_kdf() 39 size_t output_len, u8 *output) in eap_pax_kdf() 41 u8 mac[SHA1_MAC_LEN]; in eap_pax_kdf() 42 u8 counter, *pos; in eap_pax_kdf() 43 const u8 *addr[3]; in eap_pax_kdf() 55 addr[0] = (const u8 *) identifier; in eap_pax_kdf() 64 for (counter = 1; counter <= (u8) num_blocks; counter++) { in eap_pax_kdf() 92 int eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len, in eap_pax_mac() 93 const u8 *data1, size_t data1_len, in eap_pax_mac() [all …]
|
D | eap_sim_common.c | 25 static int eap_sim_prf(const u8 *key, u8 *x, size_t xlen) in eap_sim_prf() 31 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, in eap_sim_derive_mk() 32 const u8 *nonce_mt, u16 selected_version, in eap_sim_derive_mk() 33 const u8 *ver_list, size_t ver_list_len, in eap_sim_derive_mk() 34 int num_chal, const u8 *kc, u8 *mk) in eap_sim_derive_mk() 36 u8 sel_ver[2]; in eap_sim_derive_mk() 59 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, in eap_aka_derive_mk() 60 const u8 *ik, const u8 *ck, u8 *mk) in eap_aka_derive_mk() 62 const u8 *addr[3]; in eap_aka_derive_mk() 80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) in eap_sim_derive_keys() [all …]
|
D | eap_gpsk.c | 24 u8 rand_server[EAP_GPSK_RAND_LEN]; 25 u8 rand_peer[EAP_GPSK_RAND_LEN]; 26 u8 msk[EAP_MSK_LEN]; 27 u8 emsk[EAP_EMSK_LEN]; 28 u8 sk[EAP_GPSK_MAX_SK_LEN]; 30 u8 pk[EAP_GPSK_MAX_PK_LEN]; 32 u8 session_id; 34 u8 *id_peer; 36 u8 *id_server; 40 u8 *psk; [all …]
|
D | sha1.h | 20 void hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, 21 const u8 *addr[], const size_t *len, u8 *mac); 22 void hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, 23 u8 *mac); 24 void sha1_prf(const u8 *key, size_t key_len, const char *label, 25 const u8 *data, size_t data_len, u8 *buf, size_t buf_len); 26 void sha1_t_prf(const u8 *key, size_t key_len, const char *label, 27 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len); 28 int tls_prf(const u8 *secret, size_t secret_len, const char *label, 29 const u8 *seed, size_t seed_len, u8 *out, size_t outlen); [all …]
|
D | tls.h | 21 const u8 *master_key; /* TLS master secret */ 23 const u8 *client_random; 25 const u8 *server_random; 27 const u8 *inner_secret; /* TLS/IA inner secret */ 79 const u8 *ca_cert_blob; 85 const u8 *client_cert_blob; 88 const u8 *private_key_blob; 92 const u8 *dh_blob; 272 u8 *out, size_t out_len); 304 u8 * tls_connection_handshake(void *tls_ctx, struct tls_connection *conn, [all …]
|
D | pmksa_cache.h | 23 u8 pmkid[PMKID_LEN]; 24 u8 pmk[PMK_LEN]; 28 u8 aa[ETH_ALEN]; 45 const u8 *aa, const u8 *pmkid); 48 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 49 const u8 *aa, const u8 *spa, struct wpa_ssid *ssid); 53 int pmksa_cache_set_current(struct wpa_sm *sm, const u8 *pmkid, 54 const u8 *bssid, struct wpa_ssid *ssid, 58 struct wpa_ssid *ssid, const u8 *aa); 75 pmksa_cache_get(struct rsn_pmksa_cache *pmksa, const u8 *aa, const u8 *pmkid) in pmksa_cache_get() [all …]
|
D | eap_gpsk_common.h | 46 u8 vendor[4]; 47 u8 specifier[2]; 55 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, 57 const u8 *rand_client, const u8 *rand_server, 58 const u8 *id_client, size_t id_client_len, 59 const u8 *id_server, size_t id_server_len, 60 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 61 u8 *pk, size_t *pk_len); 63 int eap_gpsk_compute_mic(const u8 *sk, size_t sk_len, int vendor, 64 int specifier, const u8 *data, size_t len, u8 *mic);
|
D | eap_sake_common.c | 24 const u8 *pos) in eap_sake_parse_add_attr() 165 int eap_sake_parse_attributes(const u8 *buf, size_t len, in eap_sake_parse_attributes() 168 const u8 *pos = buf, *end = buf + len; in eap_sake_parse_attributes() 213 static void eap_sake_kdf(const u8 *key, size_t key_len, const char *label, in eap_sake_kdf() 214 const u8 *data, size_t data_len, in eap_sake_kdf() 215 const u8 *data2, size_t data2_len, in eap_sake_kdf() 216 u8 *buf, size_t buf_len) in eap_sake_kdf() 218 u8 counter = 0; in eap_sake_kdf() 220 u8 hash[SHA1_MAC_LEN]; in eap_sake_kdf() 225 addr[0] = (u8 *) label; /* Label | Y */ in eap_sake_kdf() [all …]
|
D | eap_mschapv2.c | 39 u8 op_code; /* MSCHAPV2_OP_* */ 40 u8 mschapv2_id; /* usually same as EAP identifier; must be changed 42 u8 ms_length[2]; /* Note: misaligned; length - 5 */ 48 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; 49 u8 reserved[8]; 50 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; 51 u8 flags; 56 u8 encr_password[516]; 57 u8 encr_hash[16]; 58 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; [all …]
|
/external/wpa_supplicant/tests/ |
D | test_sha1.c | 26 const u8 pac_key[] = { in test_eap_fast() 32 const u8 seed[] = { in test_eap_fast() 42 const u8 master_secret[] = { in test_eap_fast() 50 const u8 key_block[] = { in test_eap_fast() 66 const u8 sks[] = { in test_eap_fast() 73 const u8 isk[] = { in test_eap_fast() 79 const u8 imck[] = { in test_eap_fast() 89 const u8 msk[] = { in test_eap_fast() 99 u8 tlv[] = { in test_eap_fast() 109 const u8 compound_mac[] = { in test_eap_fast() [all …]
|