/external/wpa_supplicant/ |
eap_psk_common.c | 37 void eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, 47 aes_128_encrypt_block(kdk, hash, tek);
|
eap_psk_common.h | 100 void eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk,
|
eap_sake_common.c | 258 * @tek: Buffer for Temporary EAK Keys (TEK-Auth[16] | TEK-Cipher[16]) 265 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, 283 tek, EAP_SAKE_TEK_LEN); 284 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: TEK-Auth", 285 tek, EAP_SAKE_TEK_AUTH_LEN); 286 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: TEK-Cipher", 287 tek + EAP_SAKE_TEK_AUTH_LEN, EAP_SAKE_TEK_CIPHER_LEN); 308 * @tek_auth: 16-byte TEK-Aut [all...] |
eap_sake_common.h | 96 u8 *tek, u8 *msk, u8 *emsk);
|
eap_psk.c | 31 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data 243 eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, 245 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN); 273 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce), 338 aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce), resp, 22,
|
eap_sake.c | 31 } tek; member in struct:eap_sake_data 258 (u8 *) &data->tek, data->msk, data->emsk); 287 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 330 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 359 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_psk_common.c | 40 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, 51 if (aes_128_encrypt_block(kdk, hash, tek))
|
eap_psk_common.h | 75 int __must_check eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek,
|
eap_sake_common.c | 259 * @tek: Buffer for Temporary EAK Keys (TEK-Auth[16] | TEK-Cipher[16]) 266 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, 284 tek, EAP_SAKE_TEK_LEN); 285 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: TEK-Auth", 286 tek, EAP_SAKE_TEK_AUTH_LEN); 287 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: TEK-Cipher", 288 tek + EAP_SAKE_TEK_AUTH_LEN, EAP_SAKE_TEK_CIPHER_LEN); 309 * @tek_auth: 16-byte TEK-Aut [all...] |
eap_sake_common.h | 92 u8 *tek, u8 *msk, u8 *emsk);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_psk.c | 29 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data 252 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, 258 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN); 287 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce), 351 if (aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce),
|
eap_sake.c | 30 } tek; member in struct:eap_sake_data 248 (u8 *) &data->tek, data->msk, data->emsk); 274 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 318 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 347 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_psk.c | 32 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data 131 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk, 134 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN); 145 if (aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce), 384 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce),
|
eap_sake.c | 29 } tek; member in struct:eap_sake_data 220 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 367 (u8 *) &data->tek, data->msk, data->emsk); 369 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 406 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
|