Searched refs:auth (Results 1 - 25 of 409) sorted by last modified time

1234567891011>>

/external/wpa_supplicant_8/hostapd/
H A Dctrl_iface.c528 char *ssid, *auth, *encr = NULL, *key = NULL; local
536 auth = pos;
548 return hostapd_wps_config_ap(hapd, ssid, auth, encr, key);
655 /* <STA MAC Addr> <Code(0/1)> <Re-auth-Delay(sec)> [URL] */
/external/wpa_supplicant_8/hostapd/src/ap/
H A Ddrv_callbacks.c1073 hostapd_notif_auth(hapd, &data->auth);
H A Dieee802_11.c269 rlen = IEEE80211_HDRLEN + sizeof(reply->u.auth) + ies_len;
281 reply->u.auth.auth_alg = host_to_le16(auth_alg);
282 reply->u.auth.auth_transaction = host_to_le16(auth_transaction);
283 reply->u.auth.status_code = host_to_le16(resp);
286 os_memcpy(reply->u.auth.variable, ies, ies_len);
465 resp = sae_parse_commit(sta->sae, mgmt->u.auth.variable,
467 mgmt->u.auth.variable, &token,
504 if (sae_check_confirm(sta->sae, mgmt->u.auth.variable,
506 mgmt->u.auth.variable) < 0) {
560 if (len < IEEE80211_HDRLEN + sizeof(mgmt->u.auth)) {
[all...]
H A Dwps_hostapd.c1608 const char *auth, const char *encr, const char *key)
1621 if (os_strncmp(auth, "OPEN", 4) == 0)
1623 else if (os_strncmp(auth, "WPAPSK", 6) == 0)
1625 else if (os_strncmp(auth, "WPA2PSK", 7) == 0)
1607 hostapd_wps_config_ap(struct hostapd_data *hapd, const char *ssid, const char *auth, const char *encr, const char *key) argument
H A Dwps_hostapd.h34 const char *auth, const char *encr, const char *key);
/external/wpa_supplicant_8/hostapd/src/common/
H A Dieee802_11_defs.h442 } STRUCT_PACKED auth; member in union:ieee80211_mgmt::__anon33551
H A Dwpa_common.h207 } auth; member in union:wpa_ptk::__anon33579
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Daes-ccm.c117 static void aes_ccm_encr_auth(void *aes, size_t M, u8 *x, u8 *a, u8 *auth) argument
127 auth[i] = x[i] ^ tmp[i];
128 wpa_hexdump_key(MSG_EXCESSIVE, "CCM U", auth, M);
132 static void aes_ccm_decr_auth(void *aes, size_t M, u8 *a, const u8 *auth, u8 *t) argument
137 wpa_hexdump_key(MSG_EXCESSIVE, "CCM U", auth, M);
142 t[i] = auth[i] ^ tmp[i];
150 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth)
169 aes_ccm_encr_auth(aes, M, x, a, auth);
180 const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain)
196 aes_ccm_decr_auth(aes, M, a, auth,
148 aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) argument
178 aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) argument
[all...]
H A Daes_wrap.h60 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth);
63 const u8 *aad, size_t aad_len, const u8 *auth,
/external/wpa_supplicant_8/hostapd/src/drivers/
H A Ddriver.h945 unsigned int auth; member in struct:wpa_driver_capa
3180 * union wpa_event_data::auth.
3793 } auth; member in union:wpa_event_data
H A Ddriver_atheros.c856 if (len - IEEE80211_HDRLEN < sizeof(mgmt->u.auth))
859 os_memcpy(event.auth.peer, mgmt->sa, ETH_ALEN);
860 os_memcpy(event.auth.bssid, mgmt->bssid, ETH_ALEN);
861 event.auth.auth_type = le_to_host16(mgmt->u.auth.auth_alg);
862 event.auth.status_code =
863 le_to_host16(mgmt->u.auth.status_code);
864 event.auth.auth_transaction =
865 le_to_host16(mgmt->u.auth.auth_transaction);
866 event.auth
[all...]
H A Ddriver_bsd.c1451 drv->capa.auth = WPA_DRIVER_AUTH_OPEN |
H A Ddriver_ndis.c1721 drv->capa.auth |= WPA_DRIVER_AUTH_SHARED;
1726 drv->capa.auth |= WPA_DRIVER_AUTH_OPEN;
1744 "enc 0x%x auth 0x%x",
1745 drv->capa.key_mgmt, drv->capa.enc, drv->capa.auth);
1781 wpa_printf(MSG_DEBUG, "NDIS: auth/encr pair list "
1785 wpa_printf(MSG_MSGDUMP, "NDIS: %d - auth %d encr %d",
1790 drv->capa.auth |= WPA_DRIVER_AUTH_OPEN;
1793 drv->capa.auth |= WPA_DRIVER_AUTH_SHARED;
1832 "enc 0x%x auth 0x%x",
1833 drv->capa.key_mgmt, drv->capa.enc, drv->capa.auth);
[all...]
H A Ddriver_nl80211.c1466 "nl80211: Ignore auth event when using driver SME");
1472 if (len < 24 + sizeof(mgmt->u.auth)) {
1481 os_memcpy(event.auth.peer, mgmt->sa, ETH_ALEN);
1482 event.auth.auth_type = le_to_host16(mgmt->u.auth.auth_alg);
1483 event.auth.auth_transaction =
1484 le_to_host16(mgmt->u.auth.auth_transaction);
1485 event.auth.status_code = le_to_host16(mgmt->u.auth.status_code);
1486 if (len > 24 + sizeof(mgmt->u.auth)) {
[all...]
H A Ddriver_test.c2361 capa->auth = WPA_DRIVER_AUTH_OPEN |
H A Ddriver_wext.c1565 drv->capa.auth = WPA_DRIVER_AUTH_OPEN |
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_eke_common.c719 const struct wpabuf *msgs, u8 *auth)
727 wpabuf_head(msgs), wpabuf_len(msgs), auth);
718 eap_eke_auth(struct eap_eke_session *sess, const char *label, const struct wpabuf *msgs, u8 *auth) argument
H A Deap_eke_common.h112 const struct wpabuf *msgs, u8 *auth);
H A Dikev2_common.c309 payloads->auth = pdata;
H A Dikev2_common.h306 const u8 *auth; member in struct:ikev2_payloads
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_eke.c511 u8 *auth; local
595 auth = wpabuf_put(resp, data->sess.prf_len);
596 if (eap_eke_auth(&data->sess, "EAP-EKE peer", data->msgs, auth) < 0) {
601 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_P", auth, data->sess.prf_len);
H A Deap_sake.c23 u8 auth[EAP_SAKE_TEK_AUTH_LEN]; member in struct:eap_sake_data::__anon33662
269 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
313 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
342 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
H A Dikev2.c522 u8 method, const u8 *auth, size_t auth_len)
536 u8 method, const u8 *auth,
568 os_memcmp_const(auth, auth_data, auth_len) != 0) {
571 auth, auth_len);
587 const u8 *auth, size_t auth_len)
591 if (auth == NULL) {
602 auth_method = auth[0];
603 auth += 4;
607 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len);
611 return ikev2_process_auth_cert(data, auth_method, auth,
521 ikev2_process_auth_cert(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument
535 ikev2_process_auth_secret(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument
586 ikev2_process_auth(struct ikev2_responder_data *data, const u8 *auth, size_t auth_len) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_eke.c309 u8 *auth; local
349 auth = wpabuf_put(msg, data->sess.prf_len);
350 if (eap_eke_auth(&data->sess, "EAP-EKE server", data->msgs, auth) < 0) {
355 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_S", auth, data->sess.prf_len);
H A Deap_server_sake.c22 u8 auth[EAP_SAKE_TEK_AUTH_LEN]; member in struct:eap_sake_data::__anon33695
200 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
349 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
386 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,

Completed in 284 milliseconds

1234567891011>>