HomeSort by relevance Sort by last modified time
    Searched refs:k_encr (Results 1 - 12 of 12) sorted by null

  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_sim_db.h 59 u16 counter, const u8 *k_encr, const u8 *k_aut,
73 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_sim_reauth
eap_aka.c 30 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_aka_data
351 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) {
456 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
507 if (eap_sim_msg_add_encr_end(msg, data->k_encr,
651 os_memcpy(data->k_encr,
652 data->reauth->k_encr,
742 data->ck, data->k_encr, data->k_aut,
747 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
901 data->k_encr, data->k_aut,
976 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data
    [all...]
eap_sim.c 28 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_sim_data
188 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) {
240 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
288 if (eap_sim_msg_add_encr_end(msg, data->k_encr,
501 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
582 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
eap_sim_db.c 1036 * @k_encr: K_encr from the previous full authentication
1047 u16 counter, const u8 *k_encr, const u8 *k_aut,
1059 os_memcpy(r->k_encr, k_encr, EAP_SIM_K_ENCR_LEN);
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_sim_common.h 86 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk,
99 const u8 *ik, const u8 *ck, u8 *k_encr,
117 u8 *k_encr, u8 *k_aut, u8 *k_re,
212 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data,
230 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr,
eap_sim_common.c 82 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk)
91 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN);
99 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_encr",
100 k_encr, EAP_SIM_K_ENCR_LEN);
282 const u8 *ik, const u8 *ck, u8 *k_encr,
292 * K_encr = MK[0..127]
306 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN);
307 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': K_encr",
308 k_encr, EAP_SIM_K_ENCR_LEN);
940 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data
    [all...]
  /external/wpa_supplicant/
eap_sim_common.h 79 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk,
143 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data,
161 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr,
eap_sim_common.c 80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk)
89 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN);
97 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_encr",
98 k_encr, EAP_SIM_K_ENCR_LEN);
567 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data,
583 aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len);
775 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr, int attr_pad)
779 if (msg == NULL || k_encr == NULL || msg->iv == 0 || msg->encr == 0)
802 aes_128_cbc_encrypt(k_encr, msg->buf + msg->iv,
eap_aka.c 30 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_aka_data
330 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) {
363 if (eap_sim_msg_add_encr_end(msg, data->k_encr,
473 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
491 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
528 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
651 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
eap_sim.c 36 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_sim_data
349 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) {
384 if (eap_sim_msg_add_encr_end(msg, data->k_encr,
551 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
570 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
607 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
730 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_sim.c 38 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_sim_data
445 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) {
479 if (eap_sim_msg_add_encr_end(msg, data->k_encr,
643 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
661 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
702 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
819 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
eap_aka.c 36 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_aka_data
550 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) {
585 if (eap_sim_msg_add_encr_end(msg, data->k_encr,
870 data->ck, data->k_encr, data->k_aut,
875 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
893 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
934 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
1058 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
    [all...]

Completed in 1140 milliseconds