Home | History | Annotate | Download | only in eap_peer

Lines Matching refs:kc

33 	u8 kc[3][EAP_SIM_KC_LEN];
157 data->sres[0], data->kc[0]) ||
159 data->sres[1], data->kc[1]) ||
162 data->sres[2], data->kc[2]))) {
195 data->sres[i], data->kc[i])) {
205 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: Kc",
206 data->kc[i], EAP_SIM_KC_LEN);
213 /* These hardcoded Kc and SRES values are used for testing. RAND to
214 * KC/SREC mapping is very bogus as far as real authentication is
220 wpa_printf(MSG_DEBUG, "EAP-SIM: Use hardcoded Kc and SRES "
225 os_memcpy(data->kc[i],
231 os_memcpy(data->kc[i],
237 os_memcpy(data->kc[i],
642 (const u8 *) data->kc, data->mk);