Home | History | Annotate | Download | only in eap_peer

Lines Matching refs:kc

26 	u8 kc[3][EAP_SIM_KC_LEN];
159 data->sres[0], data->kc[0]) ||
161 data->sres[1], data->kc[1]) ||
164 data->sres[2], data->kc[2]))) {
197 data->sres[i], data->kc[i])) {
207 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: Kc",
208 data->kc[i], EAP_SIM_KC_LEN);
215 /* These hardcoded Kc and SRES values are used for testing. RAND to
216 * KC/SREC mapping is very bogus as far as real authentication is
222 wpa_printf(MSG_DEBUG, "EAP-SIM: Use hardcoded Kc and SRES "
227 os_memcpy(data->kc[i],
233 os_memcpy(data->kc[i],
239 os_memcpy(data->kc[i],
670 (const u8 *) data->kc, data->mk);