/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_sim_db.h | 59 u16 counter, const u8 *k_encr, const u8 *k_aut, 74 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_sim_reauth
|
eap_sim.c | 27 u8 k_aut[EAP_SIM_K_AUT_LEN]; member in struct:eap_sim_data 223 return eap_sim_msg_finish(msg, data->k_aut, data->nonce_mt, 240 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 261 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0); 300 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0); 501 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 517 eap_sim_verify_mac(data->k_aut, respData, attr->mac, 569 eap_sim_verify_mac(data->k_aut, respData, attr->mac, data->nonce_s,
|
eap_aka.c | 29 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_aka_data 433 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0); 456 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 480 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0); 519 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0); 654 os_memcpy(data->k_aut, 655 data->reauth->k_aut, 742 data->ck, data->k_encr, data->k_aut, 747 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 794 return eap_sim_verify_mac_sha256(data->k_aut, req, mac, extra [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_sim_db.h | 62 const u8 *k_aut, const u8 *k_re); 74 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_sim_reauth
|
eap_server_sim.c | 22 u8 k_aut[EAP_SIM_K_AUT_LEN]; member in struct:eap_sim_data 242 return eap_sim_msg_finish(msg, data->k_aut, data->nonce_mt, 259 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 280 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0); 319 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0); 551 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 569 eap_sim_verify_mac(data->k_aut, respData, attr->mac, 611 eap_sim_verify_mac(data->k_aut, respData, attr->mac, data->nonce_s,
|
eap_server_aka.c | 23 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_aka_data 118 os_memcpy(data->k_aut, data->reauth->k_aut, 536 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0); 559 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 583 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0); 622 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0); 825 data->ck, data->k_encr, data->k_aut, 830 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 892 return eap_sim_verify_mac_sha256(data->k_aut, req, mac, extra [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_aka.c | 35 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_aka_data 521 return eap_sim_msg_finish(msg, data->k_aut, (u8 *) "", 0); 563 return eap_sim_msg_finish(msg, data->k_aut, nonce_s, 572 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; local 577 if (k_aut && data->reauth) { 593 if (k_aut) { 597 return eap_sim_msg_finish(msg, k_aut, (u8 *) "", 0); 657 return eap_sim_verify_mac_sha256(data->k_aut, req, mac, extra, 659 return eap_sim_verify_mac(data->k_aut, req, mac, extra, extra_len) [all...] |
eap_sim.c | 37 u8 k_aut[EAP_SIM_K_AUT_LEN]; member in struct:eap_sim_data 416 return eap_sim_msg_finish(msg, data->k_aut, (u8 *) data->sres, 457 return eap_sim_msg_finish(msg, data->k_aut, data->nonce_s, 466 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; local 471 if (k_aut && data->reauth) { 487 if (k_aut) { 491 return eap_sim_msg_finish(msg, k_aut, (u8 *) "", 0); 643 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 645 if (eap_sim_verify_mac(data->k_aut, reqData, attr->mac, data->nonce_mt [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_sim.c | 30 u8 k_aut[EAP_SIM_K_AUT_LEN]; member in struct:eap_sim_data 443 return eap_sim_msg_finish(msg, data->k_aut, (u8 *) data->sres, 485 return eap_sim_msg_finish(msg, data->k_aut, nonce_s, 494 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; local 499 if (k_aut && data->reauth) { 515 if (k_aut) { 519 return eap_sim_msg_finish(msg, k_aut, (u8 *) "", 0); 671 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 673 if (eap_sim_verify_mac(data->k_aut, reqData, attr->mac, data->nonce_mt [all...] |
eap_aka.c | 27 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_aka_data 548 return eap_sim_msg_finish(msg, data->k_aut, (u8 *) "", 0); 590 return eap_sim_msg_finish(msg, data->k_aut, nonce_s, 599 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; local 604 if (k_aut && data->reauth) { 620 if (k_aut) { 624 return eap_sim_msg_finish(msg, k_aut, (u8 *) "", 0); 684 return eap_sim_verify_mac_sha256(data->k_aut, req, mac, extra, 686 return eap_sim_verify_mac(data->k_aut, req, mac, extra, extra_len) [all...] |