/external/wpa_supplicant_8/src/eap_server/ |
eap_sim_db.h | 62 const u8 *k_aut, const u8 *k_re); 75 u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; member in struct:eap_sim_reauth
|
eap_sim_db.c | 122 " k_re CHAR(64)" 241 const u8 *k_encr, const u8 *k_aut, const u8 *k_re) 259 k_re ? ", k_re" : "", 283 if (k_re) { 285 pos += wpa_snprintf_hex(pos, end - pos, k_re, 324 } else if (os_strcmp(col[i], "k_re") == 0 && argv[i]) { 325 hexstr2bin(argv[i], reauth->k_re, 326 sizeof(reauth->k_re)); 1180 * @k_re: 32-byte K_re from the previous full authenticatio [all...] |
eap_server_aka.c | 25 u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; /* EAP-AKA' only */ member in struct:eap_aka_data 120 os_memcpy(data->k_re, data->reauth->k_re, 554 eap_aka_prime_derive_keys_reauth(data->k_re, data->counter, 838 data->k_re, data->msk, data->emsk); 1000 data->k_re); 1114 data->k_re); [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_sim_common.h | 94 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk); 95 int eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, 111 u8 *k_encr, u8 *k_aut, u8 *k_re, 116 static inline int eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter,
|
eap_sim_common.c | 278 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) 289 * K_re = MK[384..639] 311 os_memcpy(k_re, pos, EAP_AKA_PRIME_K_RE_LEN); 312 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': K_re", 313 k_re, EAP_AKA_PRIME_K_RE_LEN); 325 int eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, 334 * MK = PRF'(K_re,"EAP-AKA' re-auth"|Identity|counter|NONCE_S) 342 prf_prime(k_re, "EAP-AKA' re-auth", identity, identity_len,
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_aka.c | 29 u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; /* EAP-AKA' only */ member in struct:eap_aka_data 898 data->k_re, data->msk, data->emsk); 1133 eap_aka_prime_derive_keys_reauth(data->k_re, data->counter, [all...] |