/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_pax_common.c | 123 * @ick: Buffer for the derived Integrity Check Key 128 u8 *mk, u8 *ck, u8 *ick, u8 *mid) 136 e, 2 * EAP_PAX_RAND_LEN, EAP_PAX_ICK_LEN, ick) || 144 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: ICK", ick, EAP_PAX_ICK_LEN); 127 eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, u8 *mk, u8 *ck, u8 *ick, u8 *mid) argument
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_pax_common.c | 123 * @ick: Buffer for the derived Integrity Check Key 128 u8 *mk, u8 *ck, u8 *ick, u8 *mid) 136 e, 2 * EAP_PAX_RAND_LEN, EAP_PAX_ICK_LEN, ick) || 144 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: ICK", ick, EAP_PAX_ICK_LEN); 127 eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, u8 *mk, u8 *ck, u8 *ick, u8 *mid) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_pax_common.c | 123 * @ick: Buffer for the derived Integrity Check Key 128 u8 *mk, u8 *ck, u8 *ick, u8 *mid) 136 e, 2 * EAP_PAX_RAND_LEN, EAP_PAX_ICK_LEN, ick) || 144 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: ICK", ick, EAP_PAX_ICK_LEN); 127 eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, u8 *mk, u8 *ck, u8 *ick, u8 *mid) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_pax.c | 40 u8 ick[EAP_PAX_ICK_LEN]; member in struct:eap_pax_data 182 data->mk, data->ck, data->ick, 218 eap_pax_mac(req->mac_id, data->ick, EAP_PAX_ICK_LEN, 309 eap_pax_mac(data->mac_id, data->ick, EAP_PAX_ICK_LEN, 415 eap_pax_mac(req->mac_id, data->ick, EAP_PAX_ICK_LEN,
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_pax.c | 38 u8 ick[EAP_PAX_ICK_LEN]; member in struct:eap_pax_data 156 eap_pax_mac(data->mac_id, data->ick, EAP_PAX_ICK_LEN, 267 eap_pax_mac(data->mac_id, data->ick, EAP_PAX_ICK_LEN, 391 data->ick, data->mid) < 0) { 421 eap_pax_mac(data->mac_id, data->ick, EAP_PAX_ICK_LEN,
|
/external/wpa_supplicant_8/hostapd/src/pae/ |
H A D | ieee802_1x_key.c | 149 size_t ckn_bytes, u8 *ick) 158 128, ick); 168 int ieee802_1x_icv_128bits_aes_cmac(const u8 *ick, const u8 *msg, argument 171 if (omac1_aes_128(ick, msg, msg_bytes, icv)) { 148 ieee802_1x_ick_128bits_aes_cmac(const u8 *cak, const u8 *ckn, size_t ckn_bytes, u8 *ick) argument
|
H A D | ieee802_1x_kay_i.h | 169 int (*ick_trfm)(const u8 *cak, const u8 *ckn, size_t ckn_len, u8 *ick); 170 int (*icv_hash)(const u8 *ick, const u8 *msg, size_t msg_len, u8 *icv); 200 struct mka_key ick; member in struct:ieee802_1x_mka_participant
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_pax.c | 40 u8 ick[EAP_PAX_ICK_LEN]; member in struct:eap_pax_data 182 data->mk, data->ck, data->ick, 218 eap_pax_mac(req->mac_id, data->ick, EAP_PAX_ICK_LEN, 309 eap_pax_mac(data->mac_id, data->ick, EAP_PAX_ICK_LEN, 415 eap_pax_mac(req->mac_id, data->ick, EAP_PAX_ICK_LEN,
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_pax.c | 38 u8 ick[EAP_PAX_ICK_LEN]; member in struct:eap_pax_data 156 eap_pax_mac(data->mac_id, data->ick, EAP_PAX_ICK_LEN, 267 eap_pax_mac(data->mac_id, data->ick, EAP_PAX_ICK_LEN, 391 data->ick, data->mid) < 0) { 421 eap_pax_mac(data->mac_id, data->ick, EAP_PAX_ICK_LEN,
|
/external/wpa_supplicant_8/src/pae/ |
H A D | ieee802_1x_key.c | 149 size_t ckn_bytes, u8 *ick) 158 128, ick); 168 int ieee802_1x_icv_128bits_aes_cmac(const u8 *ick, const u8 *msg, argument 171 if (omac1_aes_128(ick, msg, msg_bytes, icv)) { 148 ieee802_1x_ick_128bits_aes_cmac(const u8 *cak, const u8 *ckn, size_t ckn_bytes, u8 *ick) argument
|
H A D | ieee802_1x_kay_i.h | 169 int (*ick_trfm)(const u8 *cak, const u8 *ckn, size_t ckn_len, u8 *ick); 170 int (*icv_hash)(const u8 *ick, const u8 *msg, size_t msg_len, u8 *icv); 200 struct mka_key ick; member in struct:ieee802_1x_mka_participant
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_pax.c | 40 u8 ick[EAP_PAX_ICK_LEN]; member in struct:eap_pax_data 182 data->mk, data->ck, data->ick, 218 eap_pax_mac(req->mac_id, data->ick, EAP_PAX_ICK_LEN, 309 eap_pax_mac(data->mac_id, data->ick, EAP_PAX_ICK_LEN, 415 eap_pax_mac(req->mac_id, data->ick, EAP_PAX_ICK_LEN,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_pax.c | 38 u8 ick[EAP_PAX_ICK_LEN]; member in struct:eap_pax_data 156 eap_pax_mac(data->mac_id, data->ick, EAP_PAX_ICK_LEN, 267 eap_pax_mac(data->mac_id, data->ick, EAP_PAX_ICK_LEN, 391 data->ick, data->mid) < 0) { 421 eap_pax_mac(data->mac_id, data->ick, EAP_PAX_ICK_LEN,
|
/external/wpa_supplicant_8/wpa_supplicant/src/pae/ |
H A D | ieee802_1x_key.c | 149 size_t ckn_bytes, u8 *ick) 158 128, ick); 168 int ieee802_1x_icv_128bits_aes_cmac(const u8 *ick, const u8 *msg, argument 171 if (omac1_aes_128(ick, msg, msg_bytes, icv)) { 148 ieee802_1x_ick_128bits_aes_cmac(const u8 *cak, const u8 *ckn, size_t ckn_bytes, u8 *ick) argument
|
H A D | ieee802_1x_kay_i.h | 169 int (*ick_trfm)(const u8 *cak, const u8 *ckn, size_t ckn_len, u8 *ick); 170 int (*icv_hash)(const u8 *ick, const u8 *msg, size_t msg_len, u8 *icv); 200 struct mka_key ick; member in struct:ieee802_1x_mka_participant
|