HomeSort by relevance Sort by last modified time
    Searched refs:k_encr (Results 1 - 16 of 16) sorted by null

  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_sim_db.h 59 u16 counter, const u8 *k_encr, const u8 *k_aut,
73 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_sim_reauth
eap_aka.c 30 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_aka_data
351 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) {
456 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
507 if (eap_sim_msg_add_encr_end(msg, data->k_encr,
651 os_memcpy(data->k_encr,
652 data->reauth->k_encr,
742 data->ck, data->k_encr, data->k_aut,
747 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
901 data->k_encr, data->k_aut,
976 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data
    [all...]
eap_sim.c 28 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_sim_data
188 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) {
240 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
288 if (eap_sim_msg_add_encr_end(msg, data->k_encr,
501 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
582 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
eap_sim_db.c 1036 * @k_encr: K_encr from the previous full authentication
1047 u16 counter, const u8 *k_encr, const u8 *k_aut,
1059 os_memcpy(r->k_encr, k_encr, EAP_SIM_K_ENCR_LEN);
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_sim_db.h 51 u16 counter, const u8 *k_encr, const u8 *k_aut,
65 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_sim_reauth
eap_server_aka.c 24 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_aka_data
344 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) {
449 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
500 if (eap_sim_msg_add_encr_end(msg, data->k_encr,
644 os_memcpy(data->k_encr,
645 data->reauth->k_encr,
735 data->ck, data->k_encr, data->k_aut,
740 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
894 data->k_encr, data->k_aut,
969 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data
    [all...]
eap_server_sim.c 23 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_sim_data
183 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) {
235 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
283 if (eap_sim_msg_add_encr_end(msg, data->k_encr,
496 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
577 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
eap_sim_db.c 1031 * @k_encr: K_encr from the previous full authentication
1042 u16 counter, const u8 *k_encr, const u8 *k_aut,
1054 os_memcpy(r->k_encr, k_encr, EAP_SIM_K_ENCR_LEN);
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_sim_common.h 86 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk,
99 const u8 *ik, const u8 *ck, u8 *k_encr,
117 u8 *k_encr, u8 *k_aut, u8 *k_re,
212 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data,
230 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr,
eap_sim_common.c 82 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk)
91 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN);
99 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_encr",
100 k_encr, EAP_SIM_K_ENCR_LEN);
282 const u8 *ik, const u8 *ck, u8 *k_encr,
292 * K_encr = MK[0..127]
306 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN);
307 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': K_encr",
308 k_encr, EAP_SIM_K_ENCR_LEN);
940 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_sim_common.h 80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk,
93 const u8 *ik, const u8 *ck, u8 *k_encr,
111 u8 *k_encr, u8 *k_aut, u8 *k_re,
206 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data,
224 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr,
eap_sim_common.c 77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk)
86 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN);
94 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_encr",
95 k_encr, EAP_SIM_K_ENCR_LEN);
277 const u8 *ik, const u8 *ck, u8 *k_encr,
287 * K_encr = MK[0..127]
301 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN);
302 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': K_encr",
303 k_encr, EAP_SIM_K_ENCR_LEN);
935 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_sim.c 38 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_sim_data
445 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) {
479 if (eap_sim_msg_add_encr_end(msg, data->k_encr,
643 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
661 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
702 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
819 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
eap_aka.c 36 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_aka_data
550 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) {
585 if (eap_sim_msg_add_encr_end(msg, data->k_encr,
870 data->ck, data->k_encr, data->k_aut,
875 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
893 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
934 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
1058 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_sim.c 31 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_sim_data
458 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) {
492 if (eap_sim_msg_add_encr_end(msg, data->k_encr,
656 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
674 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
715 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
832 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
eap_aka.c 28 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_aka_data
562 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) {
597 if (eap_sim_msg_add_encr_end(msg, data->k_encr,
882 data->ck, data->k_encr, data->k_aut,
887 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
905 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
946 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
1070 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
    [all...]

Completed in 814 milliseconds