/dragonfly/contrib/wpa_supplicant/wpa_supplicant/ |
H A D | wpas_kay.c | 293 u8 *msk, size_t *len) in ieee802_1x_auth_get_msk() argument 314 os_memcpy(msk, key, keylen); in ieee802_1x_auth_get_msk() 328 struct mka_key *msk; in ieee802_1x_notify_create_actor() local 338 msk = os_zalloc(sizeof(*msk)); in ieee802_1x_notify_create_actor() 345 msk->len = DEFAULT_KEY_LEN; in ieee802_1x_notify_create_actor() 346 if (ieee802_1x_auth_get_msk(wpa_s, wpa_s->bssid, msk->key, &msk->len)) { in ieee802_1x_notify_create_actor() 360 if (ieee802_1x_cak_aes_cmac(msk->key, msk->len, wpa_s->own_addr, in ieee802_1x_notify_create_actor() 370 if (ieee802_1x_ckn_aes_cmac(msk->key, msk->len, wpa_s->own_addr, in ieee802_1x_notify_create_actor() 382 if (msk) { in ieee802_1x_notify_create_actor() 383 os_memset(msk, 0, sizeof(*msk)); in ieee802_1x_notify_create_actor() [all …]
|
/dragonfly/contrib/wpa_supplicant/src/ap/ |
H A D | wpa_auth_kay.c | 382 struct sta_info *sta, u8 *msk, size_t *len) in ieee802_1x_auth_get_msk() argument 402 os_memcpy(msk, key, keylen); in ieee802_1x_auth_get_msk() 416 struct mka_key *msk; in ieee802_1x_notify_create_actor_hapd() local 426 msk = os_zalloc(sizeof(*msk)); in ieee802_1x_notify_create_actor_hapd() 430 if (!msk || !sid || !ckn || !cak) in ieee802_1x_notify_create_actor_hapd() 433 msk->len = DEFAULT_KEY_LEN; in ieee802_1x_notify_create_actor_hapd() 434 if (ieee802_1x_auth_get_msk(hapd, sta, msk->key, &msk->len)) { in ieee802_1x_notify_create_actor_hapd() 451 if (ieee802_1x_cak_aes_cmac(msk->key, msk->len, hapd->own_addr, in ieee802_1x_notify_create_actor_hapd() 460 if (ieee802_1x_ckn_aes_cmac(msk->key, msk->len, hapd->own_addr, in ieee802_1x_notify_create_actor_hapd() 471 bin_clear_free(msk, sizeof(*msk)); in ieee802_1x_notify_create_actor_hapd()
|
/dragonfly/contrib/wpa_supplicant/src/eap_common/ |
H A D | eap_sim_common.h | 80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, 84 const u8 *nonce_s, const u8 *mk, u8 *msk, 94 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk); 97 const u8 *nonce_s, u8 *msk, u8 *emsk); 112 u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys() argument 119 const u8 *nonce_s, u8 *msk, in eap_aka_prime_derive_keys_reauth() argument
|
H A D | eap_gpsk_common.c | 112 u8 *msk, u8 *emsk, in eap_gpsk_derive_keys_helper() argument 169 os_memcpy(msk, pos, EAP_MSK_LEN); in eap_gpsk_derive_keys_helper() 191 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, in eap_gpsk_derive_keys_aes() argument 219 msk, emsk, sk, *sk_len, in eap_gpsk_derive_keys_aes() 227 u8 *msk, u8 *emsk, in eap_gpsk_derive_keys_sha256() argument 253 msk, emsk, sk, *sk_len, in eap_gpsk_derive_keys_sha256() 284 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, in eap_gpsk_derive_keys() argument 320 msk, emsk, sk, sk_len, in eap_gpsk_derive_keys() 327 msk, emsk, sk, sk_len); in eap_gpsk_derive_keys()
|
H A D | eap_sim_common.c | 90 os_memcpy(msk, pos, EAP_SIM_KEYING_DATA_LEN); in eap_sim_derive_keys() 99 msk, EAP_SIM_KEYING_DATA_LEN); in eap_sim_derive_keys() 109 const u8 *nonce_s, const u8 *mk, u8 *msk, in eap_sim_derive_keys_reauth() argument 150 if (msk) { in eap_sim_derive_keys_reauth() 151 os_memcpy(msk, buf, EAP_SIM_KEYING_DATA_LEN); in eap_sim_derive_keys_reauth() 153 msk, EAP_SIM_KEYING_DATA_LEN); in eap_sim_derive_keys_reauth() 277 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys() argument 315 os_memcpy(msk, pos, EAP_MSK_LEN); in eap_aka_prime_derive_keys() 316 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': MSK", msk, EAP_MSK_LEN); in eap_aka_prime_derive_keys() 326 const u8 *nonce_s, u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys_reauth() argument [all …]
|
H A D | eap_teap_common.c | 80 int eap_teap_derive_eap_msk(const u8 *simck, u8 *msk) in eap_teap_derive_eap_msk() argument 89 msk, EAP_TEAP_KEY_LEN) < 0) in eap_teap_derive_eap_msk() 92 msk, EAP_TEAP_KEY_LEN); in eap_teap_derive_eap_msk() 140 const u8 *msk, size_t msk_len, in eap_teap_derive_imck() argument 164 wpa_hexdump_key(MSG_DEBUG, "EAP-TEAP: MSK[j]", msk, msk_len); in eap_teap_derive_imck() 197 if (msk && msk_len > 0) { in eap_teap_derive_imck() 203 os_memcpy(imsk, msk, copy_len); in eap_teap_derive_imck()
|
H A D | eap_psk_common.c | 34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, in eap_psk_derive_keys() argument 52 if (aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size])) in eap_psk_derive_keys()
|
H A D | eap_fast_common.c | 113 int eap_fast_derive_eap_msk(const u8 *simck, u8 *msk) in eap_fast_derive_eap_msk() argument 122 msk, EAP_FAST_KEY_LEN) < 0) in eap_fast_derive_eap_msk() 125 msk, EAP_FAST_KEY_LEN); in eap_fast_derive_eap_msk()
|
H A D | eap_sake_common.c | 266 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, in eap_sake_derive_keys() argument 304 os_memcpy(msk, key_buf, EAP_MSK_LEN); in eap_sake_derive_keys() 306 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: MSK", msk, EAP_MSK_LEN); in eap_sake_derive_keys()
|
H A D | eap_teap_common.h | 198 int eap_teap_derive_eap_msk(const u8 *simck, u8 *msk); 202 const u8 *msk, size_t msk_len,
|
H A D | eap_eke_common.c | 525 u8 *msk, u8 *emsk) in eap_eke_derive_msk() argument 561 os_memcpy(msk, buf, EAP_MSK_LEN); in eap_eke_derive_msk() 565 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: MSK", msk, EAP_MSK_LEN); in eap_eke_derive_msk() 566 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: EMSK", msk, EAP_EMSK_LEN); in eap_eke_derive_msk()
|
H A D | eap_psk_common.h | 70 u8 *msk, u8 *emsk);
|
/dragonfly/contrib/wpa_supplicant/src/pae/ |
H A D | ieee802_1x_key.c | 91 int ieee802_1x_cak_aes_cmac(const u8 *msk, size_t msk_bytes, const u8 *mac1, in ieee802_1x_cak_aes_cmac() argument 97 return aes_kdf(msk, 8 * msk_bytes, "IEEE8021 EAP CAK", in ieee802_1x_cak_aes_cmac() 108 int ieee802_1x_ckn_aes_cmac(const u8 *msk, size_t msk_bytes, const u8 *mac1, in ieee802_1x_ckn_aes_cmac() argument 124 res = aes_kdf(msk, 8 * msk_bytes, "IEEE8021 EAP CKN", in ieee802_1x_ckn_aes_cmac()
|
H A D | ieee802_1x_key.h | 12 int ieee802_1x_cak_aes_cmac(const u8 *msk, size_t msk_bytes, const u8 *mac1, 14 int ieee802_1x_ckn_aes_cmac(const u8 *msk, size_t msk_bytes, const u8 *mac1,
|
H A D | ieee802_1x_kay_i.h | 69 int (*cak_trfm)(const u8 *msk, size_t msk_bytes, const u8 *mac1, 71 int (*ckn_trfm)(const u8 *msk, size_t msk_bytes, const u8 *mac1,
|
/dragonfly/sbin/udevd/ |
H A D | udevd_socket.c | 132 mode_t msk; in init_local_server() local 155 msk = umask(S_IXUSR|S_IXGRP|S_IXOTH); in init_local_server() 160 umask(msk); /* Restore the original mask */ in init_local_server()
|
/dragonfly/usr.bin/localedef/ |
H A D | wide.c | 268 uint8_t msk; in tomb_utf8() local 279 msk = 0xc0; in tomb_utf8() 282 msk = 0xe0; in tomb_utf8() 285 msk = 0xf0; in tomb_utf8() 294 s[0] = (msk) | wc; in tomb_utf8()
|
/dragonfly/usr.sbin/ppp/ |
H A D | ncpaddr.c | 104 u_int32_t msk = ntohl(mask.s_addr); in mask42bits() local 109 if (msk & tst) in mask42bits() 113 if (!(msk & tst)) in mask42bits() 682 ncprange_setip4(struct ncprange *range, struct in_addr from, struct in_addr msk) in ncprange_setip4() argument 686 range->ncprange_ip4mask = msk; in ncprange_setip4() 687 range->ncprange_ip4width = mask42bits(msk); in ncprange_setip4()
|
/dragonfly/contrib/wpa_supplicant/src/eap_peer/ |
H A D | eap_psk.c | 28 u8 msk[EAP_MSK_LEN]; member 249 data->msk, data->emsk)) { in eap_psk_process_3() 255 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: MSK", data->msk, EAP_MSK_LEN); in eap_psk_process_3() 426 key = os_memdup(data->msk, EAP_MSK_LEN); in eap_psk_getKey()
|
/dragonfly/contrib/wpa_supplicant/src/eap_server/ |
H A D | eap_server_psk.c | 28 u8 msk[EAP_MSK_LEN]; member 126 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk, in eap_psk_build_3() 130 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: MSK", data->msk, EAP_MSK_LEN); in eap_psk_build_3() 451 key = os_memdup(data->msk, EAP_MSK_LEN); in eap_psk_getKey()
|
H A D | eap_server_aka.c | 26 u8 msk[EAP_SIM_KEYING_DATA_LEN]; member 566 data->msk, data->emsk); in eap_aka_build_reauth() 569 data->msk, data->emsk); in eap_aka_build_reauth() 572 data->mk, data->msk, data->emsk); in eap_aka_build_reauth() 859 data->k_re, data->msk, data->emsk); in eap_aka_fullauth() 864 data->msk, data->emsk); in eap_aka_fullauth() 1285 key = os_memdup(data->msk, EAP_SIM_KEYING_DATA_LEN); in eap_aka_getKey()
|
H A D | eap_server_sim.c | 24 u8 msk[EAP_SIM_KEYING_DATA_LEN]; member 268 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_build_reauth() 272 data->msk, data->emsk); in eap_sim_build_reauth() 572 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_process_start() 810 key = os_memdup(data->msk, EAP_SIM_KEYING_DATA_LEN); in eap_sim_getKey()
|
/dragonfly/sys/dev/netif/ |
H A D | Makefile | 4 mii_layer my msk mxge nfe nge oce pcn \
|
/dragonfly/contrib/wpa_supplicant/src/common/ |
H A D | hw_features_common.c | 478 le16 msk = host_to_le16(HT_CAP_INFO_SUPP_CHANNEL_WIDTH_SET | in set_disable_ht40() local 482 htcaps->ht_capabilities_info &= ~msk; in set_disable_ht40() 484 htcaps->ht_capabilities_info |= msk; in set_disable_ht40()
|
/dragonfly/contrib/wpa_supplicant/src/crypto/ |
H A D | crypto_module_tests.c | 904 const u8 msk[] = { in test_eap_fast() local 979 (u8 *) "", 0, buf, sizeof(msk)) < 0 || in test_eap_fast() 980 os_memcmp(msk, buf, sizeof(msk)) != 0) { in test_eap_fast() 987 (u8 *) "", 0, buf, sizeof(msk)) < 0 || in test_eap_fast()
|