HomeSort by relevance Sort by last modified time
    Searched refs:k_aut (Results 1 - 20 of 20) sorted by null

  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_sim_common.h 86 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk,
92 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req,
94 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac,
100 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk);
104 int eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req,
107 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len,
117 u8 *k_encr, u8 *k_aut, u8 *k_re,
131 static inline int eap_sim_verify_mac_sha256(const u8 *k_aut,
220 struct wpabuf * eap_sim_msg_finish(struct eap_sim_msg *msg, const u8 *k_aut,
eap_sim_common.c 82 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk)
93 os_memcpy(k_aut, pos, EAP_SIM_K_AUT_LEN);
101 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_aut",
102 k_aut, EAP_SIM_K_AUT_LEN);
170 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req,
199 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: Verify MAC - K_aut",
200 k_aut, EAP_SIM_K_AUT_LEN);
201 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac);
210 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac,
227 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: Add MAC - K_aut",
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_sim_common.h 86 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk,
92 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req,
94 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac,
100 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk);
104 int eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req,
107 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len,
117 u8 *k_encr, u8 *k_aut, u8 *k_re,
131 static inline int eap_sim_verify_mac_sha256(const u8 *k_aut,
220 struct wpabuf * eap_sim_msg_finish(struct eap_sim_msg *msg, const u8 *k_aut,
eap_sim_common.c 83 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk)
94 os_memcpy(k_aut, pos, EAP_SIM_K_AUT_LEN);
102 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_aut",
103 k_aut, EAP_SIM_K_AUT_LEN);
171 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req,
200 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: Verify MAC - K_aut",
201 k_aut, EAP_SIM_K_AUT_LEN);
202 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac);
211 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac,
228 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: Add MAC - K_aut",
    [all...]
  /external/wpa_supplicant/
eap_sim_common.h 79 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk,
85 int eap_sim_verify_mac(const u8 *k_aut, const u8 *req, size_t req_len,
87 void eap_sim_add_mac(const u8 *k_aut, u8 *msg, size_t msg_len, u8 *mac,
151 u8 * eap_sim_msg_finish(struct eap_sim_msg *msg, size_t *len, const u8 *k_aut,
eap_sim_common.c 80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk)
91 os_memcpy(k_aut, pos, EAP_SIM_K_AUT_LEN);
99 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_aut",
100 k_aut, EAP_SIM_K_AUT_LEN);
168 int eap_sim_verify_mac(const u8 *k_aut, const u8 *req, size_t req_len,
195 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: Verify MAC - K_aut",
196 k_aut, EAP_SIM_K_AUT_LEN);
197 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac);
206 void eap_sim_add_mac(const u8 *k_aut, u8 *msg, size_t msg_len, u8 *mac,
223 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: Add MAC - K_aut",
    [all...]
eap_aka.c 29 u8 k_aut[EAP_SIM_K_AUT_LEN]; member in struct:eap_aka_data
299 return eap_sim_msg_finish(msg, respDataLen, data->k_aut, (u8 *) "", 0);
338 return eap_sim_msg_finish(msg, respDataLen, data->k_aut, nonce_s,
349 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; local
355 if (k_aut && data->reauth) {
371 if (k_aut) {
375 return eap_sim_msg_finish(msg, respDataLen, k_aut, (u8 *) "", 0);
473 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
475 if (eap_sim_verify_mac(data->k_aut, (const u8 *) req, reqDataLen
    [all...]
eap_sim.c 35 u8 k_aut[EAP_SIM_K_AUT_LEN]; member in struct:eap_sim_data
317 return eap_sim_msg_finish(msg, respDataLen, data->k_aut,
357 return eap_sim_msg_finish(msg, respDataLen, data->k_aut, data->nonce_s,
368 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; local
376 if (k_aut && data->reauth) {
392 if (k_aut) {
396 return eap_sim_msg_finish(msg, respDataLen, k_aut, (u8 *) "", 0);
551 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
553 if (eap_sim_verify_mac(data->k_aut, (const u8 *) req, reqDataLen
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_sim_db.h 59 u16 counter, const u8 *k_encr, const u8 *k_aut,
74 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_sim_reauth
eap_aka.c 29 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_aka_data
433 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0);
456 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
480 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0);
519 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0);
654 os_memcpy(data->k_aut,
655 data->reauth->k_aut,
742 data->ck, data->k_encr, data->k_aut,
747 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
794 return eap_sim_verify_mac_sha256(data->k_aut, req, mac, extra
    [all...]
eap_sim.c 27 u8 k_aut[EAP_SIM_K_AUT_LEN]; member in struct:eap_sim_data
223 return eap_sim_msg_finish(msg, data->k_aut, data->nonce_mt,
240 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
261 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0);
300 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0);
501 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
517 eap_sim_verify_mac(data->k_aut, respData, attr->mac,
569 eap_sim_verify_mac(data->k_aut, respData, attr->mac, data->nonce_s,
eap_sim_db.c 1037 * @k_aut: K_aut from the previous full authentication
1047 u16 counter, const u8 *k_encr, const u8 *k_aut,
1060 os_memcpy(r->k_aut, k_aut, EAP_AKA_PRIME_K_AUT_LEN);
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_sim_db.h 57 u16 counter, const u8 *k_encr, const u8 *k_aut,
72 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_sim_reauth
eap_server_aka.c 29 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_aka_data
433 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0);
456 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
480 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0);
519 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0);
654 os_memcpy(data->k_aut,
655 data->reauth->k_aut,
742 data->ck, data->k_encr, data->k_aut,
747 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
794 return eap_sim_verify_mac_sha256(data->k_aut, req, mac, extra
    [all...]
eap_server_sim.c 28 u8 k_aut[EAP_SIM_K_AUT_LEN]; member in struct:eap_sim_data
224 return eap_sim_msg_finish(msg, data->k_aut, data->nonce_mt,
241 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
262 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0);
301 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0);
502 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
518 eap_sim_verify_mac(data->k_aut, respData, attr->mac,
570 eap_sim_verify_mac(data->k_aut, respData, attr->mac, data->nonce_s,
eap_sim_db.c 1038 * @k_aut: K_aut from the previous full authentication
1048 u16 counter, const u8 *k_encr, const u8 *k_aut,
1061 os_memcpy(r->k_aut, k_aut, EAP_AKA_PRIME_K_AUT_LEN);
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_sim.c 37 u8 k_aut[EAP_SIM_K_AUT_LEN]; member in struct:eap_sim_data
416 return eap_sim_msg_finish(msg, data->k_aut, (u8 *) data->sres,
457 return eap_sim_msg_finish(msg, data->k_aut, data->nonce_s,
466 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; local
471 if (k_aut && data->reauth) {
487 if (k_aut) {
491 return eap_sim_msg_finish(msg, k_aut, (u8 *) "", 0);
643 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
645 if (eap_sim_verify_mac(data->k_aut, reqData, attr->mac, data->nonce_mt
    [all...]
eap_aka.c 35 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_aka_data
521 return eap_sim_msg_finish(msg, data->k_aut, (u8 *) "", 0);
563 return eap_sim_msg_finish(msg, data->k_aut, nonce_s,
572 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; local
577 if (k_aut && data->reauth) {
593 if (k_aut) {
597 return eap_sim_msg_finish(msg, k_aut, (u8 *) "", 0);
657 return eap_sim_verify_mac_sha256(data->k_aut, req, mac, extra,
659 return eap_sim_verify_mac(data->k_aut, req, mac, extra, extra_len)
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_sim.c 36 u8 k_aut[EAP_SIM_K_AUT_LEN]; member in struct:eap_sim_data
415 return eap_sim_msg_finish(msg, data->k_aut, (u8 *) data->sres,
456 return eap_sim_msg_finish(msg, data->k_aut, data->nonce_s,
465 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; local
470 if (k_aut && data->reauth) {
486 if (k_aut) {
490 return eap_sim_msg_finish(msg, k_aut, (u8 *) "", 0);
642 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
644 if (eap_sim_verify_mac(data->k_aut, reqData, attr->mac, data->nonce_mt
    [all...]
eap_aka.c 33 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_aka_data
519 return eap_sim_msg_finish(msg, data->k_aut, (u8 *) "", 0);
561 return eap_sim_msg_finish(msg, data->k_aut, nonce_s,
570 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; local
575 if (k_aut && data->reauth) {
591 if (k_aut) {
595 return eap_sim_msg_finish(msg, k_aut, (u8 *) "", 0);
655 return eap_sim_verify_mac_sha256(data->k_aut, req, mac, extra,
657 return eap_sim_verify_mac(data->k_aut, req, mac, extra, extra_len)
    [all...]

Completed in 1001 milliseconds