HomeSort by relevance Sort by last modified time
    Searched defs:tek (Results 1 - 8 of 8) sorted by null

  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_psk.c 29 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data
252 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek,
258 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN);
287 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce),
351 if (aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce),
eap_sake.c 30 } tek; member in struct:eap_sake_data
248 (u8 *) &data->tek, data->msk, data->emsk);
274 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
318 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
347 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_psk.c 32 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data
131 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk,
134 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN);
145 if (aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce),
384 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce),
eap_sake.c 29 } tek; member in struct:eap_sake_data
220 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
367 (u8 *) &data->tek, data->msk, data->emsk);
369 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
406 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
  /external/wpa_supplicant_8/src/eap_peer/
eap_psk.c 24 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data
247 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek,
253 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN);
282 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce),
346 if (aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce),
eap_sake.c 25 } tek; member in struct:eap_sake_data
243 (u8 *) &data->tek, data->msk, data->emsk);
269 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
313 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
342 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
  /external/wpa_supplicant_8/src/eap_server/
eap_server_psk.c 27 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data
128 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk,
131 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN);
142 if (aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce),
381 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce),
eap_server_sake.c 24 } tek; member in struct:eap_sake_data
215 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
362 (u8 *) &data->tek, data->msk, data->emsk);
364 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
401 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,

Completed in 372 milliseconds