HomeSort by relevance Sort by last modified time
    Searched refs:k_encr (Results 1 - 8 of 8) sorted by null

  /external/wpa_supplicant_8/src/eap_server/
eap_sim_db.h 61 char *reauth_id, u16 counter, const u8 *k_encr,
73 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_sim_reauth
eap_server_aka.c 24 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_aka_data
116 os_memcpy(data->k_encr, data->reauth->k_encr,
455 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) {
560 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
611 if (eap_sim_msg_add_encr_end(msg, data->k_encr,
837 data->ck, data->k_encr, data->k_aut,
842 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
999 data->k_encr, data->k_aut,
1070 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data
    [all...]
eap_sim_db.c 120 " k_encr CHAR(32),"
241 const u8 *k_encr, const u8 *k_aut, const u8 *k_re)
257 k_encr ? ", k_encr" : "",
269 if (k_encr) {
271 pos += wpa_snprintf_hex(pos, end - pos, k_encr,
318 } else if (os_strcmp(col[i], "k_encr") == 0 && argv[i]) {
319 hexstr2bin(argv[i], reauth->k_encr,
320 sizeof(reauth->k_encr));
1178 * @k_encr: K_encr from the previous full authenticatio
    [all...]
eap_server_sim.c 23 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_sim_data
208 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) {
260 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
308 if (eap_sim_msg_add_encr_end(msg, data->k_encr,
552 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
625 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
  /external/wpa_supplicant_8/src/eap_common/
eap_sim_common.h 80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk,
93 const u8 *ik, const u8 *ck, u8 *k_encr,
111 u8 *k_encr, u8 *k_aut, u8 *k_re,
206 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data,
224 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr,
eap_sim_common.c 77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk)
86 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN);
94 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_encr",
95 k_encr, EAP_SIM_K_ENCR_LEN);
277 const u8 *ik, const u8 *ck, u8 *k_encr,
287 * K_encr = MK[0..127]
301 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN);
302 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': K_encr",
303 k_encr, EAP_SIM_K_ENCR_LEN);
935 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_sim.c 31 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_sim_data
473 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) {
507 if (eap_sim_msg_add_encr_end(msg, data->k_encr,
671 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
689 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
730 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
847 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
eap_aka.c 28 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_aka_data
577 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) {
612 if (eap_sim_msg_add_encr_end(msg, data->k_encr,
897 data->ck, data->k_encr, data->k_aut,
902 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
920 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
961 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
1085 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
    [all...]

Completed in 146 milliseconds