HomeSort by relevance Sort by last modified time
    Searched refs:tek (Results 1 - 14 of 14) sorted by null

  /external/wpa_supplicant/
eap_psk_common.c 37 void eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk,
47 aes_128_encrypt_block(kdk, hash, tek);
eap_psk_common.h 100 void eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk,
eap_sake_common.c 258 * @tek: Buffer for Temporary EAK Keys (TEK-Auth[16] | TEK-Cipher[16])
265 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk,
283 tek, EAP_SAKE_TEK_LEN);
284 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: TEK-Auth",
285 tek, EAP_SAKE_TEK_AUTH_LEN);
286 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: TEK-Cipher",
287 tek + EAP_SAKE_TEK_AUTH_LEN, EAP_SAKE_TEK_CIPHER_LEN);
308 * @tek_auth: 16-byte TEK-Aut
    [all...]
eap_sake_common.h 96 u8 *tek, u8 *msk, u8 *emsk);
eap_psk.c 31 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data
243 eap_psk_derive_keys(data->kdk, data->rand_p, data->tek,
245 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN);
273 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce),
338 aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce), resp, 22,
eap_sake.c 31 } tek; member in struct:eap_sake_data
258 (u8 *) &data->tek, data->msk, data->emsk);
287 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
330 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
359 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_psk_common.c 40 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk,
51 if (aes_128_encrypt_block(kdk, hash, tek))
eap_psk_common.h 75 int __must_check eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek,
eap_sake_common.c 259 * @tek: Buffer for Temporary EAK Keys (TEK-Auth[16] | TEK-Cipher[16])
266 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk,
284 tek, EAP_SAKE_TEK_LEN);
285 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: TEK-Auth",
286 tek, EAP_SAKE_TEK_AUTH_LEN);
287 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: TEK-Cipher",
288 tek + EAP_SAKE_TEK_AUTH_LEN, EAP_SAKE_TEK_CIPHER_LEN);
309 * @tek_auth: 16-byte TEK-Aut
    [all...]
eap_sake_common.h 92 u8 *tek, u8 *msk, u8 *emsk);
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_psk.c 29 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data
252 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek,
258 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN);
287 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce),
351 if (aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce),
eap_sake.c 30 } tek; member in struct:eap_sake_data
248 (u8 *) &data->tek, data->msk, data->emsk);
274 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
318 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
347 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_psk.c 32 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data
131 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk,
134 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN);
145 if (aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce),
384 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce),
eap_sake.c 29 } tek; member in struct:eap_sake_data
220 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
367 (u8 *) &data->tek, data->msk, data->emsk);
369 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
406 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,

Completed in 358 milliseconds