/external/wpa_supplicant_8/hostapd/ |
H A D | ctrl_iface.c | 528 char *ssid, *auth, *encr = NULL, *key = NULL; local 536 auth = pos; 548 return hostapd_wps_config_ap(hapd, ssid, auth, encr, key); 655 /* <STA MAC Addr> <Code(0/1)> <Re-auth-Delay(sec)> [URL] */
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | drv_callbacks.c | 1073 hostapd_notif_auth(hapd, &data->auth);
|
H A D | ieee802_11.c | 269 rlen = IEEE80211_HDRLEN + sizeof(reply->u.auth) + ies_len; 281 reply->u.auth.auth_alg = host_to_le16(auth_alg); 282 reply->u.auth.auth_transaction = host_to_le16(auth_transaction); 283 reply->u.auth.status_code = host_to_le16(resp); 286 os_memcpy(reply->u.auth.variable, ies, ies_len); 465 resp = sae_parse_commit(sta->sae, mgmt->u.auth.variable, 467 mgmt->u.auth.variable, &token, 504 if (sae_check_confirm(sta->sae, mgmt->u.auth.variable, 506 mgmt->u.auth.variable) < 0) { 560 if (len < IEEE80211_HDRLEN + sizeof(mgmt->u.auth)) { [all...] |
H A D | wps_hostapd.c | 1608 const char *auth, const char *encr, const char *key) 1621 if (os_strncmp(auth, "OPEN", 4) == 0) 1623 else if (os_strncmp(auth, "WPAPSK", 6) == 0) 1625 else if (os_strncmp(auth, "WPA2PSK", 7) == 0) 1607 hostapd_wps_config_ap(struct hostapd_data *hapd, const char *ssid, const char *auth, const char *encr, const char *key) argument
|
H A D | wps_hostapd.h | 34 const char *auth, const char *encr, const char *key);
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | ieee802_11_defs.h | 442 } STRUCT_PACKED auth; member in union:ieee80211_mgmt::__anon33551
|
H A D | wpa_common.h | 207 } auth; member in union:wpa_ptk::__anon33579
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | aes-ccm.c | 117 static void aes_ccm_encr_auth(void *aes, size_t M, u8 *x, u8 *a, u8 *auth) argument 127 auth[i] = x[i] ^ tmp[i]; 128 wpa_hexdump_key(MSG_EXCESSIVE, "CCM U", auth, M); 132 static void aes_ccm_decr_auth(void *aes, size_t M, u8 *a, const u8 *auth, u8 *t) argument 137 wpa_hexdump_key(MSG_EXCESSIVE, "CCM U", auth, M); 142 t[i] = auth[i] ^ tmp[i]; 150 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) 169 aes_ccm_encr_auth(aes, M, x, a, auth); 180 const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) 196 aes_ccm_decr_auth(aes, M, a, auth, 148 aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) argument 178 aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) argument [all...] |
H A D | aes_wrap.h | 60 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth); 63 const u8 *aad, size_t aad_len, const u8 *auth,
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver.h | 945 unsigned int auth; member in struct:wpa_driver_capa 3180 * union wpa_event_data::auth. 3793 } auth; member in union:wpa_event_data
|
H A D | driver_atheros.c | 856 if (len - IEEE80211_HDRLEN < sizeof(mgmt->u.auth)) 859 os_memcpy(event.auth.peer, mgmt->sa, ETH_ALEN); 860 os_memcpy(event.auth.bssid, mgmt->bssid, ETH_ALEN); 861 event.auth.auth_type = le_to_host16(mgmt->u.auth.auth_alg); 862 event.auth.status_code = 863 le_to_host16(mgmt->u.auth.status_code); 864 event.auth.auth_transaction = 865 le_to_host16(mgmt->u.auth.auth_transaction); 866 event.auth [all...] |
H A D | driver_bsd.c | 1451 drv->capa.auth = WPA_DRIVER_AUTH_OPEN |
|
H A D | driver_ndis.c | 1721 drv->capa.auth |= WPA_DRIVER_AUTH_SHARED; 1726 drv->capa.auth |= WPA_DRIVER_AUTH_OPEN; 1744 "enc 0x%x auth 0x%x", 1745 drv->capa.key_mgmt, drv->capa.enc, drv->capa.auth); 1781 wpa_printf(MSG_DEBUG, "NDIS: auth/encr pair list " 1785 wpa_printf(MSG_MSGDUMP, "NDIS: %d - auth %d encr %d", 1790 drv->capa.auth |= WPA_DRIVER_AUTH_OPEN; 1793 drv->capa.auth |= WPA_DRIVER_AUTH_SHARED; 1832 "enc 0x%x auth 0x%x", 1833 drv->capa.key_mgmt, drv->capa.enc, drv->capa.auth); [all...] |
H A D | driver_nl80211.c | 1466 "nl80211: Ignore auth event when using driver SME"); 1472 if (len < 24 + sizeof(mgmt->u.auth)) { 1481 os_memcpy(event.auth.peer, mgmt->sa, ETH_ALEN); 1482 event.auth.auth_type = le_to_host16(mgmt->u.auth.auth_alg); 1483 event.auth.auth_transaction = 1484 le_to_host16(mgmt->u.auth.auth_transaction); 1485 event.auth.status_code = le_to_host16(mgmt->u.auth.status_code); 1486 if (len > 24 + sizeof(mgmt->u.auth)) { [all...] |
H A D | driver_test.c | 2361 capa->auth = WPA_DRIVER_AUTH_OPEN |
|
H A D | driver_wext.c | 1565 drv->capa.auth = WPA_DRIVER_AUTH_OPEN |
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_eke_common.c | 719 const struct wpabuf *msgs, u8 *auth) 727 wpabuf_head(msgs), wpabuf_len(msgs), auth); 718 eap_eke_auth(struct eap_eke_session *sess, const char *label, const struct wpabuf *msgs, u8 *auth) argument
|
H A D | eap_eke_common.h | 112 const struct wpabuf *msgs, u8 *auth);
|
H A D | ikev2_common.c | 309 payloads->auth = pdata;
|
H A D | ikev2_common.h | 306 const u8 *auth; member in struct:ikev2_payloads
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_eke.c | 511 u8 *auth; local 595 auth = wpabuf_put(resp, data->sess.prf_len); 596 if (eap_eke_auth(&data->sess, "EAP-EKE peer", data->msgs, auth) < 0) { 601 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_P", auth, data->sess.prf_len);
|
H A D | eap_sake.c | 23 u8 auth[EAP_SAKE_TEK_AUTH_LEN]; member in struct:eap_sake_data::__anon33662 269 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 313 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 342 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
|
H A D | ikev2.c | 522 u8 method, const u8 *auth, size_t auth_len) 536 u8 method, const u8 *auth, 568 os_memcmp_const(auth, auth_data, auth_len) != 0) { 571 auth, auth_len); 587 const u8 *auth, size_t auth_len) 591 if (auth == NULL) { 602 auth_method = auth[0]; 603 auth += 4; 607 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 611 return ikev2_process_auth_cert(data, auth_method, auth, 521 ikev2_process_auth_cert(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument 535 ikev2_process_auth_secret(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument 586 ikev2_process_auth(struct ikev2_responder_data *data, const u8 *auth, size_t auth_len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_eke.c | 309 u8 *auth; local 349 auth = wpabuf_put(msg, data->sess.prf_len); 350 if (eap_eke_auth(&data->sess, "EAP-EKE server", data->msgs, auth) < 0) { 355 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_S", auth, data->sess.prf_len);
|
H A D | eap_server_sake.c | 22 u8 auth[EAP_SAKE_TEK_AUTH_LEN]; member in struct:eap_sake_data::__anon33695 200 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 349 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 386 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
|