• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /freebsd-13-stable/contrib/wpa/src/eap_peer/

Lines Matching refs:msg

547 	/* msg | Nr | prf(SK_pi,IDi') */
820 struct wpabuf *msg, u8 exchange_type,
828 hdr = wpabuf_put(msg, sizeof(*hdr));
840 struct wpabuf *msg, u8 next_payload)
850 phdr = wpabuf_put(msg, sizeof(*phdr));
854 p = wpabuf_put(msg, sizeof(*p));
859 t = wpabuf_put(msg, sizeof(*t));
865 wpabuf_put_be16(msg, 0x800e); /* AF=1, AttrType=14 */
866 wpabuf_put_be16(msg, 128); /* 128-bit key */
868 plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) t;
871 t = wpabuf_put(msg, sizeof(*t));
877 t = wpabuf_put(msg, sizeof(*t));
883 t = wpabuf_put(msg, sizeof(*t));
888 plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) p;
891 plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) phdr;
899 struct wpabuf *msg, u8 next_payload)
914 phdr = wpabuf_put(msg, sizeof(*phdr));
918 wpabuf_put_be16(msg, data->proposal.dh); /* DH Group # */
919 wpabuf_put(msg, 2); /* RESERVED */
924 wpabuf_put(msg, data->dh->prime_len - wpabuf_len(pv));
925 wpabuf_put_buf(msg, pv);
928 plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) phdr;
935 struct wpabuf *msg, u8 next_payload)
943 phdr = wpabuf_put(msg, sizeof(*phdr));
946 wpabuf_put_data(msg, data->r_nonce, data->r_nonce_len);
947 plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) phdr;
954 struct wpabuf *msg, u8 next_payload)
967 phdr = wpabuf_put(msg, sizeof(*phdr));
970 wpabuf_put_u8(msg, ID_KEY_ID);
971 wpabuf_put(msg, 3); /* RESERVED */
972 wpabuf_put_data(msg, data->IDr, data->IDr_len);
973 plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) phdr;
980 struct wpabuf *msg, u8 next_payload)
993 phdr = wpabuf_put(msg, sizeof(*phdr));
996 wpabuf_put_u8(msg, AUTH_SHARED_KEY_MIC);
997 wpabuf_put(msg, 3); /* RESERVED */
999 /* msg | Ni | prf(SK_pr,IDr') */
1006 wpabuf_put(msg, prf->hash_len)) < 0) {
1013 plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) phdr;
1020 struct wpabuf *msg, u8 next_payload)
1034 phdr = wpabuf_put(msg, sizeof(*phdr));
1037 wpabuf_put_u8(msg, 0); /* Protocol ID: no existing SA */
1038 wpabuf_put_u8(msg, 0); /* SPI Size */
1039 wpabuf_put_be16(msg, data->error_type);
1048 wpabuf_put_be16(msg, data->proposal.dh);
1061 plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) phdr;
1069 struct wpabuf *msg;
1083 msg = wpabuf_alloc(sizeof(struct ikev2_hdr) + data->IDr_len + 1500);
1084 if (msg == NULL)
1087 ikev2_build_hdr(data, msg, IKE_SA_INIT, IKEV2_PAYLOAD_SA, 0);
1088 if (ikev2_build_sar1(data, msg, IKEV2_PAYLOAD_KEY_EXCHANGE) ||
1089 ikev2_build_ker(data, msg, IKEV2_PAYLOAD_NONCE) ||
1090 ikev2_build_nr(data, msg, data->peer_auth == PEER_AUTH_SECRET ?
1093 wpabuf_free(msg);
1098 wpabuf_free(msg);
1110 wpabuf_free(msg);
1117 &data->keys, 0, msg, plain,
1120 wpabuf_free(msg);
1126 ikev2_update_hdr(msg);
1128 wpa_hexdump_buf(MSG_MSGDUMP, "IKEV2: Sending message (SA_INIT)", msg);
1133 data->r_sign_msg = wpabuf_dup(msg);
1135 return msg;
1141 struct wpabuf *msg, *plain;
1145 msg = wpabuf_alloc(sizeof(struct ikev2_hdr) + data->IDr_len + 1000);
1146 if (msg == NULL)
1148 ikev2_build_hdr(data, msg, IKE_SA_AUTH, IKEV2_PAYLOAD_ENCRYPTED, 1);
1152 wpabuf_free(msg);
1159 &data->keys, 0, msg, plain,
1162 wpabuf_free(msg);
1167 wpa_hexdump_buf(MSG_MSGDUMP, "IKEV2: Sending message (SA_AUTH)", msg);
1171 return msg;
1177 struct wpabuf *msg;
1179 msg = wpabuf_alloc(sizeof(struct ikev2_hdr) + 1000);
1180 if (msg == NULL)
1186 wpabuf_free(msg);
1189 ikev2_build_hdr(data, msg, IKE_SA_AUTH,
1195 &data->keys, 0, msg, plain,
1198 wpabuf_free(msg);
1205 ikev2_build_hdr(data, msg, IKE_SA_INIT,
1207 if (ikev2_build_notification(data, msg,
1209 wpabuf_free(msg);
1215 ikev2_update_hdr(msg);
1218 msg);
1220 return msg;