/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_psk.c | 29 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data 252 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, 258 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN); 287 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce), 351 if (aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce),
|
eap_sake.c | 30 } tek; member in struct:eap_sake_data 248 (u8 *) &data->tek, data->msk, data->emsk); 274 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 318 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 347 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_psk.c | 32 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data 131 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk, 134 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN); 145 if (aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce), 384 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce),
|
eap_sake.c | 29 } tek; member in struct:eap_sake_data 220 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 367 (u8 *) &data->tek, data->msk, data->emsk); 369 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 406 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_psk.c | 24 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data 247 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, 253 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN); 282 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce), 346 if (aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce),
|
eap_sake.c | 25 } tek; member in struct:eap_sake_data 243 (u8 *) &data->tek, data->msk, data->emsk); 269 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 313 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 342 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_psk.c | 27 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data 128 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk, 131 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN); 142 if (aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce), 381 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce),
|
eap_server_sake.c | 24 } tek; member in struct:eap_sake_data 215 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 362 (u8 *) &data->tek, data->msk, data->emsk); 364 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 401 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
|