Searched refs:k_aut (Results 1 - 24 of 24) sorted by relevance

/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_sim_common.h80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk,
86 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req,
88 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac,
94 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk);
98 int eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req,
101 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len,
111 u8 *k_encr, u8 *k_aut, u8 *k_re,
125 static inline int eap_sim_verify_mac_sha256(const u8 *k_aut, argument
215 const u8 *k_aut,
108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
H A Deap_sim_common.c77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) argument
88 os_memcpy(k_aut, pos, EAP_SIM_K_AUT_LEN);
97 k_aut, EAP_SIM_K_AUT_LEN);
165 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req, argument
195 k_aut, EAP_SIM_K_AUT_LEN);
196 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac);
205 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, argument
223 k_aut, EAP_SIM_K_AUT_LEN);
224 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac);
278 u8 *k_aut, u
276 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
360 eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument
400 eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, const u8 *extra, size_t extra_len) argument
1007 eap_sim_msg_finish(struct eap_sim_msg *msg, int type, const u8 *k_aut, const u8 *extra, size_t extra_len) argument
[all...]
/external/wpa_supplicant_8/src/eap_common/
H A Deap_sim_common.h80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk,
86 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req,
88 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac,
94 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk);
98 int eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req,
101 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len,
111 u8 *k_encr, u8 *k_aut, u8 *k_re,
125 static inline int eap_sim_verify_mac_sha256(const u8 *k_aut, argument
215 const u8 *k_aut,
108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
H A Deap_sim_common.c77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) argument
88 os_memcpy(k_aut, pos, EAP_SIM_K_AUT_LEN);
97 k_aut, EAP_SIM_K_AUT_LEN);
165 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req, argument
195 k_aut, EAP_SIM_K_AUT_LEN);
196 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac);
205 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, argument
223 k_aut, EAP_SIM_K_AUT_LEN);
224 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac);
278 u8 *k_aut, u
276 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
360 eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument
400 eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, const u8 *extra, size_t extra_len) argument
1007 eap_sim_msg_finish(struct eap_sim_msg *msg, int type, const u8 *k_aut, const u8 *extra, size_t extra_len) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_sim_common.h80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk,
86 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req,
88 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac,
94 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk);
98 int eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req,
101 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len,
111 u8 *k_encr, u8 *k_aut, u8 *k_re,
125 static inline int eap_sim_verify_mac_sha256(const u8 *k_aut, argument
215 const u8 *k_aut,
108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
H A Deap_sim_common.c77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) argument
88 os_memcpy(k_aut, pos, EAP_SIM_K_AUT_LEN);
97 k_aut, EAP_SIM_K_AUT_LEN);
165 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req, argument
195 k_aut, EAP_SIM_K_AUT_LEN);
196 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac);
205 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, argument
223 k_aut, EAP_SIM_K_AUT_LEN);
224 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac);
278 u8 *k_aut, u
276 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
360 eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument
400 eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, const u8 *extra, size_t extra_len) argument
1007 eap_sim_msg_finish(struct eap_sim_msg *msg, int type, const u8 *k_aut, const u8 *extra, size_t extra_len) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_sim_db.h62 const u8 *k_aut, const u8 *k_re);
74 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_sim_reauth
H A Deap_server_aka.c23 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_aka_data
118 os_memcpy(data->k_aut, data->reauth->k_aut,
537 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, NULL, 0);
560 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
584 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, NULL, 0);
623 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, NULL, 0);
837 data->ck, data->k_encr, data->k_aut,
842 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
904 return eap_sim_verify_mac_sha256(data->k_aut, re
[all...]
H A Deap_server_sim.c22 u8 k_aut[EAP_SIM_K_AUT_LEN]; member in struct:eap_sim_data
243 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut,
260 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
281 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, NULL, 0);
320 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, NULL, 0);
552 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
570 eap_sim_verify_mac(data->k_aut, respData, attr->mac,
612 eap_sim_verify_mac(data->k_aut, respData, attr->mac, data->nonce_s,
H A Deap_sim_db.c120 " k_aut CHAR(64),"
240 const u8 *k_encr, const u8 *k_aut, const u8 *k_re)
257 k_aut ? ", k_aut" : "",
275 if (k_aut) {
277 pos += wpa_snprintf_hex(pos, end - pos, k_aut,
320 } else if (os_strcmp(col[i], "k_aut") == 0 && argv[i]) {
321 hexstr2bin(argv[i], reauth->k_aut,
322 sizeof(reauth->k_aut));
1188 * @k_aut
238 db_add_reauth(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *mk, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument
1196 eap_sim_db_add_reauth_prime(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap_sim_db.h62 const u8 *k_aut, const u8 *k_re);
74 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_sim_reauth
H A Deap_server_aka.c23 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_aka_data
118 os_memcpy(data->k_aut, data->reauth->k_aut,
537 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, NULL, 0);
560 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
584 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, NULL, 0);
623 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, NULL, 0);
837 data->ck, data->k_encr, data->k_aut,
842 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
904 return eap_sim_verify_mac_sha256(data->k_aut, re
[all...]
H A Deap_server_sim.c22 u8 k_aut[EAP_SIM_K_AUT_LEN]; member in struct:eap_sim_data
243 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut,
260 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
281 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, NULL, 0);
320 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, NULL, 0);
552 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
570 eap_sim_verify_mac(data->k_aut, respData, attr->mac,
612 eap_sim_verify_mac(data->k_aut, respData, attr->mac, data->nonce_s,
H A Deap_sim_db.c120 " k_aut CHAR(64),"
240 const u8 *k_encr, const u8 *k_aut, const u8 *k_re)
257 k_aut ? ", k_aut" : "",
275 if (k_aut) {
277 pos += wpa_snprintf_hex(pos, end - pos, k_aut,
320 } else if (os_strcmp(col[i], "k_aut") == 0 && argv[i]) {
321 hexstr2bin(argv[i], reauth->k_aut,
322 sizeof(reauth->k_aut));
1188 * @k_aut
238 db_add_reauth(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *mk, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument
1196 eap_sim_db_add_reauth_prime(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_sim_db.h62 const u8 *k_aut, const u8 *k_re);
74 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_sim_reauth
H A Deap_server_aka.c23 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_aka_data
118 os_memcpy(data->k_aut, data->reauth->k_aut,
537 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, NULL, 0);
560 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
584 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, NULL, 0);
623 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, NULL, 0);
837 data->ck, data->k_encr, data->k_aut,
842 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
904 return eap_sim_verify_mac_sha256(data->k_aut, re
[all...]
H A Deap_server_sim.c22 u8 k_aut[EAP_SIM_K_AUT_LEN]; member in struct:eap_sim_data
243 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut,
260 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
281 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, NULL, 0);
320 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, NULL, 0);
552 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
570 eap_sim_verify_mac(data->k_aut, respData, attr->mac,
612 eap_sim_verify_mac(data->k_aut, respData, attr->mac, data->nonce_s,
H A Deap_sim_db.c120 " k_aut CHAR(64),"
240 const u8 *k_encr, const u8 *k_aut, const u8 *k_re)
257 k_aut ? ", k_aut" : "",
275 if (k_aut) {
277 pos += wpa_snprintf_hex(pos, end - pos, k_aut,
320 } else if (os_strcmp(col[i], "k_aut") == 0 && argv[i]) {
321 hexstr2bin(argv[i], reauth->k_aut,
322 sizeof(reauth->k_aut));
1188 * @k_aut
238 db_add_reauth(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *mk, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument
1196 eap_sim_db_add_reauth_prime(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_aka.c27 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_aka_data
133 os_memset(data->k_aut, 0, EAP_AKA_PRIME_K_AUT_LEN);
653 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, (u8 *) "",
696 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, nonce_s,
705 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; local
710 if (k_aut && data->reauth) {
726 if (k_aut) {
730 return eap_sim_msg_finish(msg, data->eap_method, k_aut, (u8 *) "", 0);
790 return eap_sim_verify_mac_sha256(data->k_aut, re
[all...]
H A Deap_sim.c30 u8 k_aut[EAP_SIM_K_AUT_LEN]; member in struct:eap_sim_data
137 os_memset(data->k_aut, 0, EAP_SIM_K_AUT_LEN);
538 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut,
581 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, nonce_s,
590 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; local
595 if (k_aut && data->reauth) {
611 if (k_aut) {
615 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, k_aut, (u8 *) "", 0);
773 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, dat
[all...]
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_aka.c27 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_aka_data
133 os_memset(data->k_aut, 0, EAP_AKA_PRIME_K_AUT_LEN);
653 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, (u8 *) "",
696 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, nonce_s,
705 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; local
710 if (k_aut && data->reauth) {
726 if (k_aut) {
730 return eap_sim_msg_finish(msg, data->eap_method, k_aut, (u8 *) "", 0);
790 return eap_sim_verify_mac_sha256(data->k_aut, re
[all...]
H A Deap_sim.c30 u8 k_aut[EAP_SIM_K_AUT_LEN]; member in struct:eap_sim_data
137 os_memset(data->k_aut, 0, EAP_SIM_K_AUT_LEN);
538 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut,
581 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, nonce_s,
590 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; local
595 if (k_aut && data->reauth) {
611 if (k_aut) {
615 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, k_aut, (u8 *) "", 0);
773 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, dat
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_aka.c27 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_aka_data
133 os_memset(data->k_aut, 0, EAP_AKA_PRIME_K_AUT_LEN);
653 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, (u8 *) "",
696 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, nonce_s,
705 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; local
710 if (k_aut && data->reauth) {
726 if (k_aut) {
730 return eap_sim_msg_finish(msg, data->eap_method, k_aut, (u8 *) "", 0);
790 return eap_sim_verify_mac_sha256(data->k_aut, re
[all...]
H A Deap_sim.c30 u8 k_aut[EAP_SIM_K_AUT_LEN]; member in struct:eap_sim_data
137 os_memset(data->k_aut, 0, EAP_SIM_K_AUT_LEN);
538 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut,
581 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, nonce_s,
590 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; local
595 if (k_aut && data->reauth) {
611 if (k_aut) {
615 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, k_aut, (u8 *) "", 0);
773 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, dat
[all...]

Completed in 224 milliseconds