/external/wpa_supplicant/ |
eap_pax_common.c | 24 * @mac_id: MAC ID (EAP_PAX_MAC_*) / currently, only HMAC_SHA1_128 is supported 36 int eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len, 52 if (mac_id != EAP_PAX_MAC_HMAC_SHA1_128) 78 * @mac_id: MAC ID (EAP_PAX_MAC_*) / currently, only HMAC_SHA1_128 is supported 92 int eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len, 104 if (mac_id != EAP_PAX_MAC_HMAC_SHA1_128) 124 * @mac_id: MAC ID (EAP_PAX_MAC_*) / currently, only HMAC_SHA1_128 is supported 132 int eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, 136 if (eap_pax_kdf(mac_id, ak, EAP_PAX_AK_LEN, "Master Key", 138 eap_pax_kdf(mac_id, mk, EAP_PAX_MK_LEN, "Confirmation Key" [all...] |
eap_pax_common.h | 29 u8 mac_id; member in struct:eap_pax_hdr 58 /* mac_id: */ 89 int eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len, 93 int eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len, 98 int eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e,
|
eap_pax.c | 35 u8 mac_id, dh_group_id, public_key_id; member in struct:eap_pax_data 124 resp->mac_id = req->mac_id; 198 if (eap_pax_initial_key_derivation(req->mac_id, data->ak, data->rand.e, 229 eap_pax_mac(req->mac_id, data->ck, EAP_PAX_CK_LEN, 239 eap_pax_mac(req->mac_id, data->ick, EAP_PAX_ICK_LEN, 246 data->mac_id = req->mac_id; 303 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN, 335 eap_pax_mac(data->mac_id, data->ick, EAP_PAX_ICK_LEN [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_pax_common.c | 24 * @mac_id: MAC ID (EAP_PAX_MAC_*) / currently, only HMAC_SHA1_128 is supported 36 int eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len, 52 if (mac_id != EAP_PAX_MAC_HMAC_SHA1_128) 78 * @mac_id: MAC ID (EAP_PAX_MAC_*) / currently, only HMAC_SHA1_128 is supported 92 int eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len, 104 if (mac_id != EAP_PAX_MAC_HMAC_SHA1_128) 124 * @mac_id: MAC ID (EAP_PAX_MAC_*) / currently, only HMAC_SHA1_128 is supported 132 int eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, 136 if (eap_pax_kdf(mac_id, ak, EAP_PAX_AK_LEN, "Master Key", 138 eap_pax_kdf(mac_id, mk, EAP_PAX_MK_LEN, "Confirmation Key" [all...] |
eap_pax_common.h | 25 u8 mac_id; member in struct:eap_pax_hdr 54 /* mac_id: */ 85 int eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len, 89 int eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len, 94 int eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e,
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_pax.c | 34 u8 mac_id, dh_group_id, public_key_id; member in struct:eap_pax_data 114 pax->mac_id = req->mac_id; 187 if (eap_pax_initial_key_derivation(req->mac_id, data->ak, data->rand.e, 214 eap_pax_mac(req->mac_id, data->ck, EAP_PAX_CK_LEN, 224 eap_pax_mac(req->mac_id, data->ick, EAP_PAX_ICK_LEN, 230 data->mac_id = req->mac_id; 285 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN, 315 eap_pax_mac(data->mac_id, data->ick, EAP_PAX_ICK_LEN [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_pax.c | 32 u8 mac_id; member in struct:eap_pax_data 62 data->mac_id = EAP_PAX_MAC_HMAC_SHA1_128; 104 pax->mac_id = data->mac_id; 114 eap_pax_mac(data->mac_id, (u8 *) "", 0, 145 pax->mac_id = data->mac_id; 151 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN, 161 eap_pax_mac(data->mac_id, data->ick, EAP_PAX_ICK_LEN, 207 "flags 0x%x mac_id 0x%x dh_group_id 0x%x [all...] |