/external/wpa_supplicant_8/src/eap_common/ |
eap_pax_common.c | 18 * @mac_id: MAC ID (EAP_PAX_MAC_*) / currently, only HMAC_SHA1_128 is supported 30 int eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len, 46 if (mac_id != EAP_PAX_MAC_HMAC_SHA1_128) 73 * @mac_id: MAC ID (EAP_PAX_MAC_*) / currently, only HMAC_SHA1_128 is supported 87 int eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len, 99 if (mac_id != EAP_PAX_MAC_HMAC_SHA1_128) 120 * @mac_id: MAC ID (EAP_PAX_MAC_*) / currently, only HMAC_SHA1_128 is supported 129 int eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, 133 if (eap_pax_kdf(mac_id, ak, EAP_PAX_AK_LEN, "Master Key", 135 eap_pax_kdf(mac_id, mk, EAP_PAX_MK_LEN, "Confirmation Key" [all...] |
eap_pax_common.h | 19 u8 mac_id; member in struct:eap_pax_hdr 48 /* mac_id: */ 80 int eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len, 84 int eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len, 89 int eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e,
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_pax.c | 27 u8 mac_id, dh_group_id, public_key_id; member in struct:eap_pax_data 107 pax->mac_id = req->mac_id; 180 if (eap_pax_initial_key_derivation(req->mac_id, data->ak, data->rand.e, 207 eap_pax_mac(req->mac_id, data->ck, EAP_PAX_CK_LEN, 217 eap_pax_mac(req->mac_id, data->ick, EAP_PAX_ICK_LEN, 223 data->mac_id = req->mac_id; 278 if (eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN, 315 if (eap_pax_mac(data->mac_id, data->ick, EAP_PAX_ICK_LEN [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_pax.c | 27 u8 mac_id; member in struct:eap_pax_data 58 data->mac_id = EAP_PAX_MAC_HMAC_SHA1_128; 100 pax->mac_id = data->mac_id; 110 eap_pax_mac(data->mac_id, (u8 *) "", 0, 141 pax->mac_id = data->mac_id; 147 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN, 156 eap_pax_mac(data->mac_id, data->ick, EAP_PAX_ICK_LEN, 202 "flags 0x%x mac_id 0x%x dh_group_id 0x%x [all...] |