Searched defs:k_aut (Results 1 - 25 of 32) sorted by relevance

12

/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
H A Deap_sim_db.h59 u16 counter, const u8 *k_encr, const u8 *k_aut,
74 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_sim_reauth
H A Deap_sim.c27 u8 k_aut[EAP_SIM_K_AUT_LEN]; member in struct:eap_sim_data
223 return eap_sim_msg_finish(msg, data->k_aut, data->nonce_mt,
240 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
261 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0);
300 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0);
501 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
517 eap_sim_verify_mac(data->k_aut, respData, attr->mac,
569 eap_sim_verify_mac(data->k_aut, respData, attr->mac, data->nonce_s,
H A Deap_aka.c29 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_aka_data
433 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0);
456 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
480 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0);
519 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0);
654 os_memcpy(data->k_aut,
655 data->reauth->k_aut,
742 data->ck, data->k_encr, data->k_aut,
747 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
794 return eap_sim_verify_mac_sha256(data->k_aut, re
[all...]
H A Deap_sim_db.c1037 * @k_aut: K_aut from the previous full authentication
1047 u16 counter, const u8 *k_encr, const u8 *k_aut,
1060 os_memcpy(r->k_aut, k_aut, EAP_AKA_PRIME_K_AUT_LEN);
1045 eap_sim_db_add_reauth_prime(void *priv, const u8 *identity, size_t identity_len, char *reauth_id, u16 counter, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_sim_db.h62 const u8 *k_aut, const u8 *k_re);
74 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_sim_reauth
H A Deap_server_sim.c22 u8 k_aut[EAP_SIM_K_AUT_LEN]; member in struct:eap_sim_data
242 return eap_sim_msg_finish(msg, data->k_aut, data->nonce_mt,
259 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
280 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0);
319 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0);
551 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
569 eap_sim_verify_mac(data->k_aut, respData, attr->mac,
611 eap_sim_verify_mac(data->k_aut, respData, attr->mac, data->nonce_s,
H A Deap_server_aka.c23 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_aka_data
118 os_memcpy(data->k_aut, data->reauth->k_aut,
536 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0);
559 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
583 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0);
622 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0);
825 data->ck, data->k_encr, data->k_aut,
830 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
892 return eap_sim_verify_mac_sha256(data->k_aut, re
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap_sim_db.h62 const u8 *k_aut, const u8 *k_re);
74 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_sim_reauth
H A Deap_server_sim.c22 u8 k_aut[EAP_SIM_K_AUT_LEN]; member in struct:eap_sim_data
242 return eap_sim_msg_finish(msg, data->k_aut, data->nonce_mt,
259 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
280 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0);
319 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0);
551 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
569 eap_sim_verify_mac(data->k_aut, respData, attr->mac,
611 eap_sim_verify_mac(data->k_aut, respData, attr->mac, data->nonce_s,
H A Deap_server_aka.c23 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_aka_data
118 os_memcpy(data->k_aut, data->reauth->k_aut,
536 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0);
559 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
583 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0);
622 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0);
825 data->ck, data->k_encr, data->k_aut,
830 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
892 return eap_sim_verify_mac_sha256(data->k_aut, re
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_sim_db.h62 const u8 *k_aut, const u8 *k_re);
74 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_sim_reauth
H A Deap_server_sim.c22 u8 k_aut[EAP_SIM_K_AUT_LEN]; member in struct:eap_sim_data
242 return eap_sim_msg_finish(msg, data->k_aut, data->nonce_mt,
259 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
280 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0);
319 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0);
551 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
569 eap_sim_verify_mac(data->k_aut, respData, attr->mac,
611 eap_sim_verify_mac(data->k_aut, respData, attr->mac, data->nonce_s,
H A Deap_server_aka.c23 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_aka_data
118 os_memcpy(data->k_aut, data->reauth->k_aut,
536 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0);
559 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
583 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0);
622 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0);
825 data->ck, data->k_encr, data->k_aut,
830 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
892 return eap_sim_verify_mac_sha256(data->k_aut, re
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
H A Deap_sim_common.c82 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) argument
93 os_memcpy(k_aut, pos, EAP_SIM_K_AUT_LEN);
102 k_aut, EAP_SIM_K_AUT_LEN);
170 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req, argument
200 k_aut, EAP_SIM_K_AUT_LEN);
201 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac);
210 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, argument
228 k_aut, EAP_SIM_K_AUT_LEN);
229 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac);
283 u8 *k_aut, u
281 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
365 eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument
405 eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, const u8 *extra, size_t extra_len) argument
1014 eap_sim_msg_finish(struct eap_sim_msg *msg, const u8 *k_aut, const u8 *extra, size_t extra_len) argument
[all...]
H A Deap_sim_common.h86 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk,
92 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req,
94 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac,
100 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk);
104 int eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req,
107 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len,
117 u8 *k_encr, u8 *k_aut, u8 *k_re,
131 static inline int eap_sim_verify_mac_sha256(const u8 *k_aut, argument
220 struct wpabuf * eap_sim_msg_finish(struct eap_sim_msg *msg, const u8 *k_aut,
114 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
H A Deap_sim.c37 u8 k_aut[EAP_SIM_K_AUT_LEN]; member in struct:eap_sim_data
416 return eap_sim_msg_finish(msg, data->k_aut, (u8 *) data->sres,
457 return eap_sim_msg_finish(msg, data->k_aut, data->nonce_s,
466 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; local
471 if (k_aut && data->reauth) {
487 if (k_aut) {
491 return eap_sim_msg_finish(msg, k_aut, (u8 *) "", 0);
643 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
645 if (eap_sim_verify_mac(data->k_aut, reqDat
[all...]
H A Deap_aka.c35 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_aka_data
521 return eap_sim_msg_finish(msg, data->k_aut, (u8 *) "", 0);
563 return eap_sim_msg_finish(msg, data->k_aut, nonce_s,
572 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; local
577 if (k_aut && data->reauth) {
593 if (k_aut) {
597 return eap_sim_msg_finish(msg, k_aut, (u8 *) "", 0);
657 return eap_sim_verify_mac_sha256(data->k_aut, req, mac, extra,
659 return eap_sim_verify_mac(data->k_aut, re
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_sim_common.c77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) argument
88 os_memcpy(k_aut, pos, EAP_SIM_K_AUT_LEN);
97 k_aut, EAP_SIM_K_AUT_LEN);
165 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req, argument
195 k_aut, EAP_SIM_K_AUT_LEN);
196 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac);
205 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, argument
223 k_aut, EAP_SIM_K_AUT_LEN);
224 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac);
278 u8 *k_aut, u
276 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
360 eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument
400 eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, const u8 *extra, size_t extra_len) argument
1009 eap_sim_msg_finish(struct eap_sim_msg *msg, const u8 *k_aut, const u8 *extra, size_t extra_len) argument
[all...]
H A Deap_sim_common.h80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk,
86 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req,
88 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac,
94 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk);
98 int eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req,
101 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len,
111 u8 *k_encr, u8 *k_aut, u8 *k_re,
125 static inline int eap_sim_verify_mac_sha256(const u8 *k_aut, argument
214 struct wpabuf * eap_sim_msg_finish(struct eap_sim_msg *msg, const u8 *k_aut,
108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_sim.c30 u8 k_aut[EAP_SIM_K_AUT_LEN]; member in struct:eap_sim_data
443 return eap_sim_msg_finish(msg, data->k_aut, (u8 *) data->sres,
485 return eap_sim_msg_finish(msg, data->k_aut, nonce_s,
494 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; local
499 if (k_aut && data->reauth) {
515 if (k_aut) {
519 return eap_sim_msg_finish(msg, k_aut, (u8 *) "", 0);
671 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
673 if (eap_sim_verify_mac(data->k_aut, reqDat
[all...]
H A Deap_aka.c27 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_aka_data
548 return eap_sim_msg_finish(msg, data->k_aut, (u8 *) "", 0);
590 return eap_sim_msg_finish(msg, data->k_aut, nonce_s,
599 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; local
604 if (k_aut && data->reauth) {
620 if (k_aut) {
624 return eap_sim_msg_finish(msg, k_aut, (u8 *) "", 0);
684 return eap_sim_verify_mac_sha256(data->k_aut, req, mac, extra,
686 return eap_sim_verify_mac(data->k_aut, re
[all...]
/external/wpa_supplicant_8/src/eap_common/
H A Deap_sim_common.c77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) argument
88 os_memcpy(k_aut, pos, EAP_SIM_K_AUT_LEN);
97 k_aut, EAP_SIM_K_AUT_LEN);
165 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req, argument
195 k_aut, EAP_SIM_K_AUT_LEN);
196 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac);
205 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, argument
223 k_aut, EAP_SIM_K_AUT_LEN);
224 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac);
278 u8 *k_aut, u
276 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
360 eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument
400 eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, const u8 *extra, size_t extra_len) argument
1009 eap_sim_msg_finish(struct eap_sim_msg *msg, const u8 *k_aut, const u8 *extra, size_t extra_len) argument
[all...]
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_sim.c30 u8 k_aut[EAP_SIM_K_AUT_LEN]; member in struct:eap_sim_data
443 return eap_sim_msg_finish(msg, data->k_aut, (u8 *) data->sres,
485 return eap_sim_msg_finish(msg, data->k_aut, nonce_s,
494 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; local
499 if (k_aut && data->reauth) {
515 if (k_aut) {
519 return eap_sim_msg_finish(msg, k_aut, (u8 *) "", 0);
671 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
673 if (eap_sim_verify_mac(data->k_aut, reqDat
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_sim_common.c77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) argument
88 os_memcpy(k_aut, pos, EAP_SIM_K_AUT_LEN);
97 k_aut, EAP_SIM_K_AUT_LEN);
165 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req, argument
195 k_aut, EAP_SIM_K_AUT_LEN);
196 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac);
205 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, argument
223 k_aut, EAP_SIM_K_AUT_LEN);
224 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac);
278 u8 *k_aut, u
276 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
360 eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument
400 eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, const u8 *extra, size_t extra_len) argument
1009 eap_sim_msg_finish(struct eap_sim_msg *msg, const u8 *k_aut, const u8 *extra, size_t extra_len) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_sim.c30 u8 k_aut[EAP_SIM_K_AUT_LEN]; member in struct:eap_sim_data
443 return eap_sim_msg_finish(msg, data->k_aut, (u8 *) data->sres,
485 return eap_sim_msg_finish(msg, data->k_aut, nonce_s,
494 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; local
499 if (k_aut && data->reauth) {
515 if (k_aut) {
519 return eap_sim_msg_finish(msg, k_aut, (u8 *) "", 0);
671 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
673 if (eap_sim_verify_mac(data->k_aut, reqDat
[all...]

Completed in 1165 milliseconds

12