Searched defs:mk (Results 1 - 18 of 18) sorted by relevance

/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
H A Deap_sim_db.h56 const u8 *mk);
72 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_sim_reauth
H A Deap_pax.c41 u8 mk[EAP_PAX_MK_LEN]; member in struct:eap_pax_data
390 data->rand.e, data->mk, data->ck,
508 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN,
529 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN,
H A Deap_sim.c24 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_sim_data
240 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
243 sm->identity_len, data->nonce_s, data->mk,
432 os_memcpy(data->mk, data->reauth->mk,
500 data->num_chal, (const u8 *) data->kc, data->mk);
501 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
552 data->mk);
632 data->counter + 1, data->mk);
H A Deap_aka.c27 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_aka_data
456 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
460 data->mk, data->msk, data->emsk);
661 os_memcpy(data->mk, data->reauth->mk,
746 data->ck, data->mk);
747 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
909 data->mk);
1048 data->mk);
H A Deap_sim_db.c1000 * @mk: 16-byte MK from the previous full authentication or %NULL
1009 const u8 *mk)
1019 os_memcpy(r->mk, mk, EAP_SIM_MK_LEN);
1007 eap_sim_db_add_reauth(void *priv, const u8 *identity, size_t identity_len, char *reauth_id, u16 counter, const u8 *mk) argument
/external/wpa_supplicant/
H A Deap_pax_common.c127 * @mk: Buffer for the derived Master Key
133 u8 *mk, u8 *ck, u8 *ick)
137 e, 2 * EAP_PAX_RAND_LEN, EAP_PAX_MK_LEN, mk) ||
138 eap_pax_kdf(mac_id, mk, EAP_PAX_MK_LEN, "Confirmation Key",
140 eap_pax_kdf(mac_id, mk, EAP_PAX_MK_LEN, "Integrity Check Key",
145 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: MK", mk, EAP_PAX_MK_LEN);
132 eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, u8 *mk, u8 *ck, u8 *ick) argument
H A Deap_gpsk_common.c123 u8 mk[32], *pos, *data; local
164 if (gkdf(psk, data, data_len, mk, mk_len) < 0) {
169 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MK", mk, mk_len);
171 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0)
H A Deap_pax.c46 u8 mk[EAP_PAX_MK_LEN]; member in struct:eap_pax_data
199 data->mk, data->ck, data->ick) < 0)
500 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN,
521 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN,
H A Deap_aka.c28 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_aka_data
472 data->mk);
473 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
678 data->mk, NULL, NULL);
705 data->nonce_s, data->mk, data->msk,
H A Deap_sim.c34 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_sim_data
550 (const u8 *) data->kc, data->mk);
551 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
774 data->nonce_s, data->mk, data->msk,
H A Deap_sim_common.c34 int num_chal, const u8 *kc, u8 *mk)
54 sha1_vector(5, addr, len, mk);
55 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: MK", mk, EAP_SIM_MK_LEN);
60 const u8 *ik, const u8 *ck, u8 *mk)
73 sha1_vector(3, addr, len, mk);
76 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: MK", mk, EAP_SIM_MK_LEN);
80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) argument
84 if (eap_sim_prf(mk, buf, sizeof(buf)) < 0) {
112 const u8 *nonce_s, const u8 *mk, u8 *msk,
132 addr[3] = mk;
31 eap_sim_derive_mk(const u8 *identity, size_t identity_len, const u8 *nonce_mt, u16 selected_version, const u8 *ver_list, size_t ver_list_len, int num_chal, const u8 *kc, u8 *mk) argument
59 eap_aka_derive_mk(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *mk) argument
110 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
H A Deap_pax_common.c127 * @mk: Buffer for the derived Master Key
133 u8 *mk, u8 *ck, u8 *ick)
137 e, 2 * EAP_PAX_RAND_LEN, EAP_PAX_MK_LEN, mk) ||
138 eap_pax_kdf(mac_id, mk, EAP_PAX_MK_LEN, "Confirmation Key",
140 eap_pax_kdf(mac_id, mk, EAP_PAX_MK_LEN, "Integrity Check Key",
145 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: MK", mk, EAP_PAX_MK_LEN);
132 eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, u8 *mk, u8 *ck, u8 *ick) argument
H A Deap_gpsk_common.c124 u8 mk[32], *pos, *data; local
165 if (gkdf(psk, data, data_len, mk, mk_len) < 0) {
170 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MK", mk, mk_len);
172 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0)
H A Deap_sim_common.c36 int num_chal, const u8 *kc, u8 *mk)
56 sha1_vector(5, addr, len, mk);
57 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: MK", mk, EAP_SIM_MK_LEN);
62 const u8 *ik, const u8 *ck, u8 *mk)
75 sha1_vector(3, addr, len, mk);
78 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: MK", mk, EAP_SIM_MK_LEN);
82 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) argument
86 if (eap_sim_prf(mk, buf, sizeof(buf)) < 0) {
114 const u8 *nonce_s, const u8 *mk, u8 *msk,
134 addr[3] = mk;
33 eap_sim_derive_mk(const u8 *identity, size_t identity_len, const u8 *nonce_mt, u16 selected_version, const u8 *ver_list, size_t ver_list_len, int num_chal, const u8 *kc, u8 *mk) argument
61 eap_aka_derive_mk(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *mk) argument
112 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
H A Deap_pax.c45 u8 mk[EAP_PAX_MK_LEN]; member in struct:eap_pax_data
188 data->mk, data->ck, data->ick) < 0)
481 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN,
502 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN,
H A Deap_sim.c36 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_sim_data
642 (const u8 *) data->kc, data->mk);
643 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
863 data->nonce_s, data->mk, data->msk,
H A Deap_aka.c34 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_aka_data
874 data->mk);
875 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
1114 data->nonce_s, data->mk,
/external/icu4c/test/intltest/
H A Drbbitst.cpp4347 // mk - MonkeyKind, abstraction for obtaining expected results
4352 void RBBITest::RunMonkey(BreakIterator *bi, RBBIMonkeyKind &mk, const char *name, uint32_t seed, argument
4374 numCharClasses = mk.charClasses()->size();
4375 chClasses = mk.charClasses();
4380 if (U_FAILURE(mk.deferredStatus)) {
4381 errln("status of \"%s\" in creation of RBBIMonkeyKind.", u_errorName(mk.deferredStatus));
4419 mk.setText(testText);
4425 breakPos = mk.next(breakPos);

Completed in 194 milliseconds