/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_sim_common.h | 86 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, 92 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req, 94 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, 100 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk); 104 int eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req, 107 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len, 117 u8 *k_encr, u8 *k_aut, u8 *k_re, 131 static inline int eap_sim_verify_mac_sha256(const u8 *k_aut, 220 struct wpabuf * eap_sim_msg_finish(struct eap_sim_msg *msg, const u8 *k_aut,
|
eap_sim_common.c | 82 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) 93 os_memcpy(k_aut, pos, EAP_SIM_K_AUT_LEN); 101 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_aut", 102 k_aut, EAP_SIM_K_AUT_LEN); 170 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req, 199 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: Verify MAC - K_aut", 200 k_aut, EAP_SIM_K_AUT_LEN); 201 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac); 210 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, 227 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: Add MAC - K_aut", [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_sim_common.h | 86 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, 92 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req, 94 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, 100 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk); 104 int eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req, 107 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len, 117 u8 *k_encr, u8 *k_aut, u8 *k_re, 131 static inline int eap_sim_verify_mac_sha256(const u8 *k_aut, 220 struct wpabuf * eap_sim_msg_finish(struct eap_sim_msg *msg, const u8 *k_aut,
|
eap_sim_common.c | 83 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) 94 os_memcpy(k_aut, pos, EAP_SIM_K_AUT_LEN); 102 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_aut", 103 k_aut, EAP_SIM_K_AUT_LEN); 171 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req, 200 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: Verify MAC - K_aut", 201 k_aut, EAP_SIM_K_AUT_LEN); 202 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac); 211 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, 228 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: Add MAC - K_aut", [all...] |
/external/wpa_supplicant/ |
eap_sim_common.h | 79 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, 85 int eap_sim_verify_mac(const u8 *k_aut, const u8 *req, size_t req_len, 87 void eap_sim_add_mac(const u8 *k_aut, u8 *msg, size_t msg_len, u8 *mac, 151 u8 * eap_sim_msg_finish(struct eap_sim_msg *msg, size_t *len, const u8 *k_aut,
|
eap_sim_common.c | 80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) 91 os_memcpy(k_aut, pos, EAP_SIM_K_AUT_LEN); 99 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_aut", 100 k_aut, EAP_SIM_K_AUT_LEN); 168 int eap_sim_verify_mac(const u8 *k_aut, const u8 *req, size_t req_len, 195 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: Verify MAC - K_aut", 196 k_aut, EAP_SIM_K_AUT_LEN); 197 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac); 206 void eap_sim_add_mac(const u8 *k_aut, u8 *msg, size_t msg_len, u8 *mac, 223 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: Add MAC - K_aut", [all...] |
eap_aka.c | 29 u8 k_aut[EAP_SIM_K_AUT_LEN]; member in struct:eap_aka_data 299 return eap_sim_msg_finish(msg, respDataLen, data->k_aut, (u8 *) "", 0); 338 return eap_sim_msg_finish(msg, respDataLen, data->k_aut, nonce_s, 349 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; local 355 if (k_aut && data->reauth) { 371 if (k_aut) { 375 return eap_sim_msg_finish(msg, respDataLen, k_aut, (u8 *) "", 0); 473 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 475 if (eap_sim_verify_mac(data->k_aut, (const u8 *) req, reqDataLen [all...] |
eap_sim.c | 35 u8 k_aut[EAP_SIM_K_AUT_LEN]; member in struct:eap_sim_data 317 return eap_sim_msg_finish(msg, respDataLen, data->k_aut, 357 return eap_sim_msg_finish(msg, respDataLen, data->k_aut, data->nonce_s, 368 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; local 376 if (k_aut && data->reauth) { 392 if (k_aut) { 396 return eap_sim_msg_finish(msg, respDataLen, k_aut, (u8 *) "", 0); 551 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 553 if (eap_sim_verify_mac(data->k_aut, (const u8 *) req, reqDataLen [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_sim_db.h | 59 u16 counter, const u8 *k_encr, const u8 *k_aut, 74 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_sim_reauth
|
eap_aka.c | 29 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_aka_data 433 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0); 456 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 480 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0); 519 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0); 654 os_memcpy(data->k_aut, 655 data->reauth->k_aut, 742 data->ck, data->k_encr, data->k_aut, 747 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 794 return eap_sim_verify_mac_sha256(data->k_aut, req, mac, extra [all...] |
eap_sim.c | 27 u8 k_aut[EAP_SIM_K_AUT_LEN]; member in struct:eap_sim_data 223 return eap_sim_msg_finish(msg, data->k_aut, data->nonce_mt, 240 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 261 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0); 300 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0); 501 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 517 eap_sim_verify_mac(data->k_aut, respData, attr->mac, 569 eap_sim_verify_mac(data->k_aut, respData, attr->mac, data->nonce_s,
|
eap_sim_db.c | 1037 * @k_aut: K_aut from the previous full authentication 1047 u16 counter, const u8 *k_encr, const u8 *k_aut, 1060 os_memcpy(r->k_aut, k_aut, EAP_AKA_PRIME_K_AUT_LEN); [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_sim_db.h | 57 u16 counter, const u8 *k_encr, const u8 *k_aut, 72 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_sim_reauth
|
eap_server_aka.c | 29 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_aka_data 433 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0); 456 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 480 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0); 519 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0); 654 os_memcpy(data->k_aut, 655 data->reauth->k_aut, 742 data->ck, data->k_encr, data->k_aut, 747 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 794 return eap_sim_verify_mac_sha256(data->k_aut, req, mac, extra [all...] |
eap_server_sim.c | 28 u8 k_aut[EAP_SIM_K_AUT_LEN]; member in struct:eap_sim_data 224 return eap_sim_msg_finish(msg, data->k_aut, data->nonce_mt, 241 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 262 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0); 301 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0); 502 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 518 eap_sim_verify_mac(data->k_aut, respData, attr->mac, 570 eap_sim_verify_mac(data->k_aut, respData, attr->mac, data->nonce_s,
|
eap_sim_db.c | 1038 * @k_aut: K_aut from the previous full authentication 1048 u16 counter, const u8 *k_encr, const u8 *k_aut, 1061 os_memcpy(r->k_aut, k_aut, EAP_AKA_PRIME_K_AUT_LEN); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_sim.c | 37 u8 k_aut[EAP_SIM_K_AUT_LEN]; member in struct:eap_sim_data 416 return eap_sim_msg_finish(msg, data->k_aut, (u8 *) data->sres, 457 return eap_sim_msg_finish(msg, data->k_aut, data->nonce_s, 466 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; local 471 if (k_aut && data->reauth) { 487 if (k_aut) { 491 return eap_sim_msg_finish(msg, k_aut, (u8 *) "", 0); 643 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 645 if (eap_sim_verify_mac(data->k_aut, reqData, attr->mac, data->nonce_mt [all...] |
eap_aka.c | 35 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_aka_data 521 return eap_sim_msg_finish(msg, data->k_aut, (u8 *) "", 0); 563 return eap_sim_msg_finish(msg, data->k_aut, nonce_s, 572 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; local 577 if (k_aut && data->reauth) { 593 if (k_aut) { 597 return eap_sim_msg_finish(msg, k_aut, (u8 *) "", 0); 657 return eap_sim_verify_mac_sha256(data->k_aut, req, mac, extra, 659 return eap_sim_verify_mac(data->k_aut, req, mac, extra, extra_len) [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_sim.c | 36 u8 k_aut[EAP_SIM_K_AUT_LEN]; member in struct:eap_sim_data 415 return eap_sim_msg_finish(msg, data->k_aut, (u8 *) data->sres, 456 return eap_sim_msg_finish(msg, data->k_aut, data->nonce_s, 465 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; local 470 if (k_aut && data->reauth) { 486 if (k_aut) { 490 return eap_sim_msg_finish(msg, k_aut, (u8 *) "", 0); 642 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 644 if (eap_sim_verify_mac(data->k_aut, reqData, attr->mac, data->nonce_mt [all...] |
eap_aka.c | 33 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_aka_data 519 return eap_sim_msg_finish(msg, data->k_aut, (u8 *) "", 0); 561 return eap_sim_msg_finish(msg, data->k_aut, nonce_s, 570 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; local 575 if (k_aut && data->reauth) { 591 if (k_aut) { 595 return eap_sim_msg_finish(msg, k_aut, (u8 *) "", 0); 655 return eap_sim_verify_mac_sha256(data->k_aut, req, mac, extra, 657 return eap_sim_verify_mac(data->k_aut, req, mac, extra, extra_len) [all...] |