/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_ikev2_common.c | 27 u8 *keymat) 32 /* KEYMAT = prf+(SK_d, Ni | Nr) */ 44 keymat, EAP_MSK_LEN + EAP_EMSK_LEN)) { 50 wpa_hexdump_key(MSG_DEBUG, "EAP-IKEV2: KEYMAT", 51 keymat, EAP_MSK_LEN + EAP_EMSK_LEN);
|
eap_ikev2_common.h | 36 u8 *keymat);
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_ikev2_common.c | 27 u8 *keymat) 32 /* KEYMAT = prf+(SK_d, Ni | Nr) */ 44 keymat, EAP_MSK_LEN + EAP_EMSK_LEN)) { 50 wpa_hexdump_key(MSG_DEBUG, "EAP-IKEV2: KEYMAT", 51 keymat, EAP_MSK_LEN + EAP_EMSK_LEN);
|
eap_ikev2_common.h | 36 u8 *keymat);
|
/external/ipsec-tools/src/racoon/ |
backupsa.c | 78 * l_alloc l_bytes l_addtime l_usetime seq keymat 167 k = val2str(sa_args->keymat, sa_args->e_keylen + sa_args->a_keylen); 286 sa_args.keymat = str2val(p, 16, &keymatlen); 287 if (sa_args.keymat == NULL) { 289 "illegal format(keymat) line#%d in %s: %s\n", 319 if (sa_args.keymat != NULL) { 320 racoon_free(sa_args.keymat); 321 sa_args.keymat = NULL;
|
proposal.h | 85 vchar_t *keymat; /* KEYMAT */ member in struct:saproto 86 vchar_t *keymat_p; /* peer's KEYMAT */
|
oakley.c | 479 * compute KEYMAT 496 /* compute keymat */ 501 plog(LLV_DEBUG, LOCATION, NULL, "KEYMAT computed.\n"); 510 * compute KEYMAT. 511 * KEYMAT = prf(SKEYID_d, protocol | SPI | Ni_b | Nr_b). 513 * KEYMAT = prf(SKEYID_d, g(qm)^xy | protocol | SPI | Ni_b | Nr_b) 544 "failed to get keymat buffer.\n"); 573 plog(LLV_DEBUG, LOCATION, NULL, "KEYMAT compute with\n"); 623 * KEYMAT = K1 | K2 | K3 | ... 632 "generating K1...K%d for KEYMAT.\n" [all...] |
TODO | 77 o don't keep to hold keymat values, do it ?
|
proposal.c | 874 vfree(p->keymat);
|
pfkey.c | 1205 sa_args.keymat = pr->keymat->v; [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_ikev2.c | 31 u8 keymat[EAP_MSK_LEN + EAP_EMSK_LEN]; member in struct:eap_ikev2_data 127 data->keymat) < 0) { 458 os_memcpy(key, data->keymat, EAP_MSK_LEN); 476 os_memcpy(key, data->keymat + EAP_MSK_LEN, EAP_EMSK_LEN);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_ikev2.c | 31 u8 keymat[EAP_MSK_LEN + EAP_EMSK_LEN]; member in struct:eap_ikev2_data 127 data->keymat) < 0) { 458 os_memcpy(key, data->keymat, EAP_MSK_LEN); 476 os_memcpy(key, data->keymat + EAP_MSK_LEN, EAP_EMSK_LEN);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_ikev2.c | 31 u8 keymat[EAP_MSK_LEN + EAP_EMSK_LEN]; member in struct:eap_ikev2_data 336 data->keymat) < 0) { 487 os_memcpy(key, data->keymat, EAP_MSK_LEN); 505 os_memcpy(key, data->keymat + EAP_MSK_LEN, EAP_EMSK_LEN);
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_ikev2.c | 31 u8 keymat[EAP_MSK_LEN + EAP_EMSK_LEN]; member in struct:eap_ikev2_data 337 data->keymat) < 0) { 488 os_memcpy(key, data->keymat, EAP_MSK_LEN); 506 os_memcpy(key, data->keymat + EAP_MSK_LEN, EAP_EMSK_LEN);
|
/external/ipsec-tools/src/libipsec/ |
pfkey.c | 1388 sa_parms->keymat, sa_parms->e_keylen); 1396 sa_parms->keymat + sa_parms->e_keylen, [all...] |
libpfkey.h | 81 caddr_t keymat; member in struct:pfkey_send_sa_args
|
/external/ipsec-tools/src/racoon/missing/crypto/rijndael/ |
rijndael-api-fst.c | 42 char *keyMat; 67 keyMat = key->keyMaterial; 69 k[i >> 2][i & 3] = (word8)keyMat[i];
|