/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_sim_db.h | 56 const u8 *mk); 72 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_sim_reauth
|
H A D | eap_pax.c | 41 u8 mk[EAP_PAX_MK_LEN]; member in struct:eap_pax_data 390 data->rand.e, data->mk, data->ck, 508 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN, 529 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN,
|
H A D | eap_sim.c | 24 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_sim_data 240 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 243 sm->identity_len, data->nonce_s, data->mk, 432 os_memcpy(data->mk, data->reauth->mk, 500 data->num_chal, (const u8 *) data->kc, data->mk); 501 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 552 data->mk); 632 data->counter + 1, data->mk);
|
H A D | eap_aka.c | 27 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_aka_data 456 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 460 data->mk, data->msk, data->emsk); 661 os_memcpy(data->mk, data->reauth->mk, 746 data->ck, data->mk); 747 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 909 data->mk); 1048 data->mk);
|
H A D | eap_sim_db.c | 1000 * @mk: 16-byte MK from the previous full authentication or %NULL 1009 const u8 *mk) 1019 os_memcpy(r->mk, mk, EAP_SIM_MK_LEN); 1007 eap_sim_db_add_reauth(void *priv, const u8 *identity, size_t identity_len, char *reauth_id, u16 counter, const u8 *mk) argument
|
/external/wpa_supplicant/ |
H A D | eap_pax_common.c | 127 * @mk: Buffer for the derived Master Key 133 u8 *mk, u8 *ck, u8 *ick) 137 e, 2 * EAP_PAX_RAND_LEN, EAP_PAX_MK_LEN, mk) || 138 eap_pax_kdf(mac_id, mk, EAP_PAX_MK_LEN, "Confirmation Key", 140 eap_pax_kdf(mac_id, mk, EAP_PAX_MK_LEN, "Integrity Check Key", 145 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: MK", mk, EAP_PAX_MK_LEN); 132 eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, u8 *mk, u8 *ck, u8 *ick) argument
|
H A D | eap_gpsk_common.c | 123 u8 mk[32], *pos, *data; local 164 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { 169 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MK", mk, mk_len); 171 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0)
|
H A D | eap_pax.c | 46 u8 mk[EAP_PAX_MK_LEN]; member in struct:eap_pax_data 199 data->mk, data->ck, data->ick) < 0) 500 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN, 521 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN,
|
H A D | eap_aka.c | 28 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_aka_data 472 data->mk); 473 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 678 data->mk, NULL, NULL); 705 data->nonce_s, data->mk, data->msk,
|
H A D | eap_sim.c | 34 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_sim_data 550 (const u8 *) data->kc, data->mk); 551 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 774 data->nonce_s, data->mk, data->msk,
|
H A D | eap_sim_common.c | 34 int num_chal, const u8 *kc, u8 *mk) 54 sha1_vector(5, addr, len, mk); 55 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: MK", mk, EAP_SIM_MK_LEN); 60 const u8 *ik, const u8 *ck, u8 *mk) 73 sha1_vector(3, addr, len, mk); 76 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: MK", mk, EAP_SIM_MK_LEN); 80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) argument 84 if (eap_sim_prf(mk, buf, sizeof(buf)) < 0) { 112 const u8 *nonce_s, const u8 *mk, u8 *msk, 132 addr[3] = mk; 31 eap_sim_derive_mk(const u8 *identity, size_t identity_len, const u8 *nonce_mt, u16 selected_version, const u8 *ver_list, size_t ver_list_len, int num_chal, const u8 *kc, u8 *mk) argument 59 eap_aka_derive_mk(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *mk) argument 110 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | eap_pax_common.c | 127 * @mk: Buffer for the derived Master Key 133 u8 *mk, u8 *ck, u8 *ick) 137 e, 2 * EAP_PAX_RAND_LEN, EAP_PAX_MK_LEN, mk) || 138 eap_pax_kdf(mac_id, mk, EAP_PAX_MK_LEN, "Confirmation Key", 140 eap_pax_kdf(mac_id, mk, EAP_PAX_MK_LEN, "Integrity Check Key", 145 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: MK", mk, EAP_PAX_MK_LEN); 132 eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, u8 *mk, u8 *ck, u8 *ick) argument
|
H A D | eap_gpsk_common.c | 124 u8 mk[32], *pos, *data; local 165 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { 170 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MK", mk, mk_len); 172 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0)
|
H A D | eap_sim_common.c | 36 int num_chal, const u8 *kc, u8 *mk) 56 sha1_vector(5, addr, len, mk); 57 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: MK", mk, EAP_SIM_MK_LEN); 62 const u8 *ik, const u8 *ck, u8 *mk) 75 sha1_vector(3, addr, len, mk); 78 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: MK", mk, EAP_SIM_MK_LEN); 82 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) argument 86 if (eap_sim_prf(mk, buf, sizeof(buf)) < 0) { 114 const u8 *nonce_s, const u8 *mk, u8 *msk, 134 addr[3] = mk; 33 eap_sim_derive_mk(const u8 *identity, size_t identity_len, const u8 *nonce_mt, u16 selected_version, const u8 *ver_list, size_t ver_list_len, int num_chal, const u8 *kc, u8 *mk) argument 61 eap_aka_derive_mk(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *mk) argument 112 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_pax.c | 45 u8 mk[EAP_PAX_MK_LEN]; member in struct:eap_pax_data 188 data->mk, data->ck, data->ick) < 0) 481 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN, 502 eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN,
|
H A D | eap_sim.c | 36 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_sim_data 642 (const u8 *) data->kc, data->mk); 643 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 863 data->nonce_s, data->mk, data->msk,
|
H A D | eap_aka.c | 34 u8 mk[EAP_SIM_MK_LEN]; member in struct:eap_aka_data 874 data->mk); 875 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 1114 data->nonce_s, data->mk,
|
/external/icu4c/test/intltest/ |
H A D | rbbitst.cpp | 4347 // mk - MonkeyKind, abstraction for obtaining expected results 4352 void RBBITest::RunMonkey(BreakIterator *bi, RBBIMonkeyKind &mk, const char *name, uint32_t seed, argument 4374 numCharClasses = mk.charClasses()->size(); 4375 chClasses = mk.charClasses(); 4380 if (U_FAILURE(mk.deferredStatus)) { 4381 errln("status of \"%s\" in creation of RBBIMonkeyKind.", u_errorName(mk.deferredStatus)); 4419 mk.setText(testText); 4425 breakPos = mk.next(breakPos);
|