/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_sim_db.h | 60 const u8 *k_re); 75 u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; member in struct:eap_sim_reauth
|
eap_aka.c | 31 u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; /* EAP-AKA' only */ member in struct:eap_aka_data 450 eap_aka_prime_derive_keys_reauth(data->k_re, data->counter, 657 os_memcpy(data->k_re, 658 data->reauth->k_re, 743 data->k_re, data->msk, data->emsk); 902 data->k_re); 1041 data->k_re); [all...] |
eap_sim_db.c | 1038 * @k_re: 32-byte K_re from the previous full authentication 1048 const u8 *k_re) 1061 os_memcpy(r->k_re, k_re, EAP_AKA_PRIME_K_RE_LEN); [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_sim_db.h | 58 const u8 *k_re); 73 u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; member in struct:eap_sim_reauth
|
eap_server_aka.c | 31 u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; /* EAP-AKA' only */ member in struct:eap_aka_data 450 eap_aka_prime_derive_keys_reauth(data->k_re, data->counter, 657 os_memcpy(data->k_re, 658 data->reauth->k_re, 743 data->k_re, data->msk, data->emsk); 902 data->k_re); 1041 data->k_re); [all...] |
eap_sim_db.c | 1039 * @k_re: 32-byte K_re from the previous full authentication 1049 const u8 *k_re) 1062 os_memcpy(r->k_re, k_re, EAP_AKA_PRIME_K_RE_LEN); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_sim_common.h | 100 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk); 101 int eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, 117 u8 *k_encr, u8 *k_aut, u8 *k_re, 122 static inline int eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter,
|
eap_sim_common.c | 283 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) 294 * K_re = MK[384..639] 316 os_memcpy(k_re, pos, EAP_AKA_PRIME_K_RE_LEN); 317 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': K_re", 318 k_re, EAP_AKA_PRIME_K_RE_LEN); 330 int eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, 339 * MK = PRF'(K_re,"EAP-AKA' re-auth"|Identity|counter|NONCE_S) 347 prf_prime(k_re, "EAP-AKA' re-auth", identity, identity_len,
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_sim_common.h | 100 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk); 101 int eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, 117 u8 *k_encr, u8 *k_aut, u8 *k_re, 122 static inline int eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter,
|
eap_sim_common.c | 284 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) 295 * K_re = MK[384..639] 317 os_memcpy(k_re, pos, EAP_AKA_PRIME_K_RE_LEN); 318 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': K_re", 319 k_re, EAP_AKA_PRIME_K_RE_LEN); 331 int eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, 340 * MK = PRF'(K_re,"EAP-AKA' re-auth"|Identity|counter|NONCE_S) 348 prf_prime(k_re, "EAP-AKA' re-auth", identity, identity_len,
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_aka.c | 37 u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; /* EAP-AKA' only */ member in struct:eap_aka_data 871 data->k_re, data->msk, data->emsk); 1106 eap_aka_prime_derive_keys_reauth(data->k_re, data->counter, [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_aka.c | 35 u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; /* EAP-AKA' only */ member in struct:eap_aka_data 869 data->k_re, data->msk, data->emsk); 1104 eap_aka_prime_derive_keys_reauth(data->k_re, data->counter, [all...] |