• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /freebsd-13-stable/contrib/wpa/src/eap_server/

Lines Matching refs:sess

29 	struct eap_eke_session sess;
104 eap_eke_session_clean(&data->sess);
253 if (eap_eke_derive_key(&data->sess, sm->user->password,
262 msg = eap_eke_build_msg(data, id, data->sess.dhcomp_len,
277 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) {
283 if (eap_eke_dhcomp(&data->sess, data->key, pub,
284 wpabuf_put(msg, data->sess.dhcomp_len))
313 plen = data->sess.pnonce_ps_len + data->sess.prf_len;
320 if (random_get_bytes(data->nonce_s, data->sess.nonce_len)) {
326 data->nonce_s, data->sess.nonce_len);
328 os_memcpy(nonces, data->nonce_p, data->sess.nonce_len);
329 os_memcpy(nonces + data->sess.nonce_len, data->nonce_s,
330 data->sess.nonce_len);
332 if (eap_eke_prot(&data->sess, nonces, 2 * data->sess.nonce_len,
340 if (eap_eke_derive_ka(&data->sess,
349 auth = wpabuf_put(msg, data->sess.prf_len);
350 if (eap_eke_auth(&data->sess, "EAP-EKE server", data->msgs, auth) < 0) {
355 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_S", auth, data->sess.prf_len);
461 if (eap_eke_session_init(&data->sess, pos[0], pos[1], pos[2], pos[3]) <
532 if (pos + data->sess.dhcomp_len + data->sess.pnonce_len > end) {
539 pos, data->sess.dhcomp_len);
541 pos += data->sess.dhcomp_len;
542 wpa_hexdump(MSG_DEBUG, "EAP-EKE: PNonce_P", pos, data->sess.pnonce_len);
544 pos += data->sess.pnonce_len;
547 if (eap_eke_shared_secret(&data->sess, data->key, data->dh_priv, dhcomp)
554 if (eap_eke_derive_ke_ki(&data->sess,
563 if (eap_eke_decrypt_prot(&data->sess, pnonce, data->sess.pnonce_len,
569 if (decrypt_len < (size_t) data->sess.nonce_len) {
575 data->nonce_p, data->sess.nonce_len);
605 if (payloadlen < (size_t) data->sess.pnonce_len + data->sess.prf_len) {
612 if (eap_eke_decrypt_prot(&data->sess, payload, data->sess.pnonce_len,
618 if (decrypt_len < (size_t) data->sess.nonce_len) {
624 nonce, data->sess.nonce_len);
625 if (os_memcmp(nonce, data->nonce_s, data->sess.nonce_len) != 0) {
631 if (eap_eke_auth(&data->sess, "EAP-EKE peer", data->msgs, auth_p) < 0) {
636 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_P", auth_p, data->sess.prf_len);
637 if (os_memcmp_const(auth_p, payload + data->sess.pnonce_len,
638 data->sess.prf_len) != 0) {
644 if (eap_eke_derive_msk(&data->sess, sm->server_id, sm->server_id_len,
655 eap_eke_session_clean(&data->sess);
775 sid_len = 1 + 2 * data->sess.nonce_len;
780 os_memcpy(sid + 1, data->nonce_p, data->sess.nonce_len);
781 os_memcpy(sid + 1 + data->sess.nonce_len, data->nonce_s,
782 data->sess.nonce_len);