HomeSort by relevance Sort by last modified time
    Searched full:keymat (Results 1 - 17 of 17) sorted by null

  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_ikev2_common.c 27 u8 *keymat)
32 /* KEYMAT = prf+(SK_d, Ni | Nr) */
44 keymat, EAP_MSK_LEN + EAP_EMSK_LEN)) {
50 wpa_hexdump_key(MSG_DEBUG, "EAP-IKEV2: KEYMAT",
51 keymat, EAP_MSK_LEN + EAP_EMSK_LEN);
eap_ikev2_common.h 36 u8 *keymat);
  /external/wpa_supplicant_8/src/eap_common/
eap_ikev2_common.c 27 u8 *keymat)
32 /* KEYMAT = prf+(SK_d, Ni | Nr) */
44 keymat, EAP_MSK_LEN + EAP_EMSK_LEN)) {
50 wpa_hexdump_key(MSG_DEBUG, "EAP-IKEV2: KEYMAT",
51 keymat, EAP_MSK_LEN + EAP_EMSK_LEN);
eap_ikev2_common.h 36 u8 *keymat);
  /external/ipsec-tools/src/racoon/
backupsa.c 78 * l_alloc l_bytes l_addtime l_usetime seq keymat
167 k = val2str(sa_args->keymat, sa_args->e_keylen + sa_args->a_keylen);
286 sa_args.keymat = str2val(p, 16, &keymatlen);
287 if (sa_args.keymat == NULL) {
289 "illegal format(keymat) line#%d in %s: %s\n",
319 if (sa_args.keymat != NULL) {
320 racoon_free(sa_args.keymat);
321 sa_args.keymat = NULL;
proposal.h 85 vchar_t *keymat; /* KEYMAT */ member in struct:saproto
86 vchar_t *keymat_p; /* peer's KEYMAT */
oakley.c 479 * compute KEYMAT
496 /* compute keymat */
501 plog(LLV_DEBUG, LOCATION, NULL, "KEYMAT computed.\n");
510 * compute KEYMAT.
511 * KEYMAT = prf(SKEYID_d, protocol | SPI | Ni_b | Nr_b).
513 * KEYMAT = prf(SKEYID_d, g(qm)^xy | protocol | SPI | Ni_b | Nr_b)
544 "failed to get keymat buffer.\n");
573 plog(LLV_DEBUG, LOCATION, NULL, "KEYMAT compute with\n");
623 * KEYMAT = K1 | K2 | K3 | ...
632 "generating K1...K%d for KEYMAT.\n"
    [all...]
TODO 77 o don't keep to hold keymat values, do it ?
proposal.c 874 vfree(p->keymat);
pfkey.c 1205 sa_args.keymat = pr->keymat->v;
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_ikev2.c 31 u8 keymat[EAP_MSK_LEN + EAP_EMSK_LEN]; member in struct:eap_ikev2_data
127 data->keymat) < 0) {
458 os_memcpy(key, data->keymat, EAP_MSK_LEN);
476 os_memcpy(key, data->keymat + EAP_MSK_LEN, EAP_EMSK_LEN);
  /external/wpa_supplicant_8/src/eap_peer/
eap_ikev2.c 31 u8 keymat[EAP_MSK_LEN + EAP_EMSK_LEN]; member in struct:eap_ikev2_data
127 data->keymat) < 0) {
458 os_memcpy(key, data->keymat, EAP_MSK_LEN);
476 os_memcpy(key, data->keymat + EAP_MSK_LEN, EAP_EMSK_LEN);
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_ikev2.c 31 u8 keymat[EAP_MSK_LEN + EAP_EMSK_LEN]; member in struct:eap_ikev2_data
336 data->keymat) < 0) {
487 os_memcpy(key, data->keymat, EAP_MSK_LEN);
505 os_memcpy(key, data->keymat + EAP_MSK_LEN, EAP_EMSK_LEN);
  /external/wpa_supplicant_8/src/eap_server/
eap_server_ikev2.c 31 u8 keymat[EAP_MSK_LEN + EAP_EMSK_LEN]; member in struct:eap_ikev2_data
337 data->keymat) < 0) {
488 os_memcpy(key, data->keymat, EAP_MSK_LEN);
506 os_memcpy(key, data->keymat + EAP_MSK_LEN, EAP_EMSK_LEN);
  /external/ipsec-tools/src/libipsec/
pfkey.c 1388 sa_parms->keymat, sa_parms->e_keylen);
1396 sa_parms->keymat + sa_parms->e_keylen,
    [all...]
libpfkey.h 81 caddr_t keymat; member in struct:pfkey_send_sa_args
  /external/ipsec-tools/src/racoon/missing/crypto/rijndael/
rijndael-api-fst.c 42 char *keyMat;
67 keyMat = key->keyMaterial;
69 k[i >> 2][i & 3] = (word8)keyMat[i];

Completed in 164 milliseconds