Searched defs:tek (Results 1 - 18 of 18) sorted by relevance

/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_psk_common.c34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, argument
45 if (aes_128_encrypt_block(kdk, hash, tek))
H A Deap_sake_common.c253 * @tek: Buffer for Temporary EAK Keys (TEK-Auth[16] | TEK-Cipher[16])
260 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk,
278 tek, EAP_SAKE_TEK_LEN);
280 tek, EAP_SAKE_TEK_AUTH_LEN);
282 tek + EAP_SAKE_TEK_AUTH_LEN, EAP_SAKE_TEK_CIPHER_LEN);
259 eap_sake_derive_keys(const u8 *root_secret_a, const u8 *root_secret_b, const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument
/external/wpa_supplicant_8/src/eap_common/
H A Deap_psk_common.c34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, argument
45 if (aes_128_encrypt_block(kdk, hash, tek))
H A Deap_sake_common.c253 * @tek: Buffer for Temporary EAK Keys (TEK-Auth[16] | TEK-Cipher[16])
260 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk,
278 tek, EAP_SAKE_TEK_LEN);
280 tek, EAP_SAKE_TEK_AUTH_LEN);
282 tek + EAP_SAKE_TEK_AUTH_LEN, EAP_SAKE_TEK_CIPHER_LEN);
259 eap_sake_derive_keys(const u8 *root_secret_a, const u8 *root_secret_b, const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_psk_common.c34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, argument
45 if (aes_128_encrypt_block(kdk, hash, tek))
H A Deap_sake_common.c253 * @tek: Buffer for Temporary EAK Keys (TEK-Auth[16] | TEK-Cipher[16])
260 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk,
278 tek, EAP_SAKE_TEK_LEN);
280 tek, EAP_SAKE_TEK_AUTH_LEN);
282 tek + EAP_SAKE_TEK_AUTH_LEN, EAP_SAKE_TEK_CIPHER_LEN);
259 eap_sake_derive_keys(const u8 *root_secret_a, const u8 *root_secret_b, const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_psk.c25 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data
249 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek,
255 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN);
284 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce),
348 if (aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce),
H A Deap_sake.c25 } tek; member in struct:eap_sake_data
243 (u8 *) &data->tek, data->msk, data->emsk);
269 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
313 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
342 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_psk.c27 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data
126 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk,
129 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN);
140 if (aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce),
379 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce),
H A Deap_server_sake.c24 } tek; member in struct:eap_sake_data
200 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
347 (u8 *) &data->tek, data->msk, data->emsk);
349 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
386 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_psk.c25 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data
249 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek,
255 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN);
284 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce),
348 if (aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce),
H A Deap_sake.c25 } tek; member in struct:eap_sake_data
243 (u8 *) &data->tek, data->msk, data->emsk);
269 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
313 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
342 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_psk.c27 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data
126 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk,
129 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN);
140 if (aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce),
379 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce),
H A Deap_server_sake.c24 } tek; member in struct:eap_sake_data
200 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
347 (u8 *) &data->tek, data->msk, data->emsk);
349 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
386 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_psk.c25 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data
249 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek,
255 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN);
284 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce),
348 if (aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce),
H A Deap_sake.c25 } tek; member in struct:eap_sake_data
243 (u8 *) &data->tek, data->msk, data->emsk);
269 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
313 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
342 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_psk.c27 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data
126 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk,
129 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN);
140 if (aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce),
379 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce),
H A Deap_server_sake.c24 } tek; member in struct:eap_sake_data
200 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
347 (u8 *) &data->tek, data->msk, data->emsk);
349 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
386 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,

Completed in 2413 milliseconds