/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_sim_db.h | 59 u16 counter, const u8 *k_encr, const u8 *k_aut, 73 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_sim_reauth
|
eap_aka.c | 30 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_aka_data 351 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { 456 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 507 if (eap_sim_msg_add_encr_end(msg, data->k_encr, 651 os_memcpy(data->k_encr, 652 data->reauth->k_encr, 742 data->ck, data->k_encr, data->k_aut, 747 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 901 data->k_encr, data->k_aut, 976 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data [all...] |
eap_sim.c | 28 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_sim_data 188 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { 240 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 288 if (eap_sim_msg_add_encr_end(msg, data->k_encr, 501 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 582 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
|
eap_sim_db.c | 1036 * @k_encr: K_encr from the previous full authentication 1047 u16 counter, const u8 *k_encr, const u8 *k_aut, 1059 os_memcpy(r->k_encr, k_encr, EAP_SIM_K_ENCR_LEN); [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_sim_db.h | 57 u16 counter, const u8 *k_encr, const u8 *k_aut, 71 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_sim_reauth
|
eap_server_aka.c | 30 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_aka_data 351 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { 456 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 507 if (eap_sim_msg_add_encr_end(msg, data->k_encr, 651 os_memcpy(data->k_encr, 652 data->reauth->k_encr, 742 data->ck, data->k_encr, data->k_aut, 747 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 901 data->k_encr, data->k_aut, 976 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data [all...] |
eap_server_sim.c | 29 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_sim_data 189 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { 241 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 289 if (eap_sim_msg_add_encr_end(msg, data->k_encr, 502 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 583 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
|
eap_sim_db.c | 1037 * @k_encr: K_encr from the previous full authentication 1048 u16 counter, const u8 *k_encr, const u8 *k_aut, 1060 os_memcpy(r->k_encr, k_encr, EAP_SIM_K_ENCR_LEN); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_sim_common.h | 86 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, 99 const u8 *ik, const u8 *ck, u8 *k_encr, 117 u8 *k_encr, u8 *k_aut, u8 *k_re, 212 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data, 230 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr,
|
eap_sim_common.c | 82 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) 91 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN); 99 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_encr", 100 k_encr, EAP_SIM_K_ENCR_LEN); 282 const u8 *ik, const u8 *ck, u8 *k_encr, 292 * K_encr = MK[0..127] 306 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN); 307 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': K_encr", 308 k_encr, EAP_SIM_K_ENCR_LEN); 940 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_sim_common.h | 86 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, 99 const u8 *ik, const u8 *ck, u8 *k_encr, 117 u8 *k_encr, u8 *k_aut, u8 *k_re, 212 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data, 230 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr,
|
eap_sim_common.c | 83 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) 92 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN); 100 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_encr", 101 k_encr, EAP_SIM_K_ENCR_LEN); 283 const u8 *ik, const u8 *ck, u8 *k_encr, 293 * K_encr = MK[0..127] 307 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN); 308 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': K_encr", 309 k_encr, EAP_SIM_K_ENCR_LEN); 941 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data [all...] |
/external/wpa_supplicant/ |
eap_sim_common.h | 79 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, 143 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data, 161 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr,
|
eap_sim_common.c | 80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) 89 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN); 97 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_encr", 98 k_encr, EAP_SIM_K_ENCR_LEN); 567 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data, 583 aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len); 775 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr, int attr_pad) 779 if (msg == NULL || k_encr == NULL || msg->iv == 0 || msg->encr == 0) 802 aes_128_cbc_encrypt(k_encr, msg->buf + msg->iv,
|
eap_aka.c | 30 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_aka_data 330 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { 363 if (eap_sim_msg_add_encr_end(msg, data->k_encr, 473 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 491 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 528 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 651 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
|
eap_sim.c | 36 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_sim_data 349 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { 384 if (eap_sim_msg_add_encr_end(msg, data->k_encr, 551 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 570 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 607 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 730 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_sim.c | 38 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_sim_data 445 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { 479 if (eap_sim_msg_add_encr_end(msg, data->k_encr, 643 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 661 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 702 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 819 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
|
eap_aka.c | 36 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_aka_data 550 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { 585 if (eap_sim_msg_add_encr_end(msg, data->k_encr, 870 data->ck, data->k_encr, data->k_aut, 875 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 893 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 934 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 1058 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_sim.c | 37 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_sim_data 444 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { 478 if (eap_sim_msg_add_encr_end(msg, data->k_encr, 642 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 660 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 701 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 818 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
|
eap_aka.c | 34 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_aka_data 548 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { 583 if (eap_sim_msg_add_encr_end(msg, data->k_encr, 868 data->ck, data->k_encr, data->k_aut, 873 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 891 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 932 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 1056 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, [all...] |