/external/wpa_supplicant_8/src/crypto/ |
milenage.c | 33 * @mac_s: Buffer for MAC-S = 64-bit resync authentication code, or %NULL 37 const u8 *sqn, const u8 *amf, u8 *mac_a, u8 *mac_s) 70 if (mac_s) 71 os_memcpy(mac_s, tmp1 + 8, 8); /* f1* */ 212 u8 ak[6], mac_s[8]; local 219 if (milenage_f1(opc, k, _rand, sqn, amf, NULL, mac_s) || 220 memcmp(mac_s, auts + 6, 8) != 0)
|
milenage.h | 23 const u8 *sqn, const u8 *amf, u8 *mac_a, u8 *mac_s);
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_psk_common.h | 52 u8 mac_s[EAP_PSK_MAC_LEN]; member in struct:eap_psk_hdr_3
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_psk.c | 217 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_S", hdr3->mac_s, EAP_PSK_MAC_LEN); 228 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */ 240 if (os_memcmp(mac, hdr3->mac_s, EAP_PSK_MAC_LEN) != 0) { 241 wpa_printf(MSG_WARNING, "EAP-PSK: Invalid MAC_S in third " 247 wpa_printf(MSG_DEBUG, "EAP-PSK: MAC_S verified successfully");
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_psk.c | 112 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */ 120 if (omac1_aes_128(data->ak, buf, buflen, psk->mac_s)) {
|