/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_sim_common.h | 80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, 86 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req, 88 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, 94 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk); 98 int eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req, 101 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len, 111 u8 *k_encr, u8 *k_aut, u8 *k_re, 125 static inline int eap_sim_verify_mac_sha256(const u8 *k_aut, argument 215 const u8 *k_aut, 108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
|
H A D | eap_sim_common.c | 77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) argument 88 os_memcpy(k_aut, pos, EAP_SIM_K_AUT_LEN); 97 k_aut, EAP_SIM_K_AUT_LEN); 165 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req, argument 195 k_aut, EAP_SIM_K_AUT_LEN); 196 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac); 205 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, argument 223 k_aut, EAP_SIM_K_AUT_LEN); 224 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac); 278 u8 *k_aut, u 276 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument 360 eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument 400 eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, const u8 *extra, size_t extra_len) argument 1007 eap_sim_msg_finish(struct eap_sim_msg *msg, int type, const u8 *k_aut, const u8 *extra, size_t extra_len) argument [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_sim_common.h | 80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, 86 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req, 88 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, 94 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk); 98 int eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req, 101 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len, 111 u8 *k_encr, u8 *k_aut, u8 *k_re, 125 static inline int eap_sim_verify_mac_sha256(const u8 *k_aut, argument 215 const u8 *k_aut, 108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
|
H A D | eap_sim_common.c | 77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) argument 88 os_memcpy(k_aut, pos, EAP_SIM_K_AUT_LEN); 97 k_aut, EAP_SIM_K_AUT_LEN); 165 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req, argument 195 k_aut, EAP_SIM_K_AUT_LEN); 196 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac); 205 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, argument 223 k_aut, EAP_SIM_K_AUT_LEN); 224 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac); 278 u8 *k_aut, u 276 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument 360 eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument 400 eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, const u8 *extra, size_t extra_len) argument 1007 eap_sim_msg_finish(struct eap_sim_msg *msg, int type, const u8 *k_aut, const u8 *extra, size_t extra_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_sim_common.h | 80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, 86 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req, 88 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, 94 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk); 98 int eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req, 101 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len, 111 u8 *k_encr, u8 *k_aut, u8 *k_re, 125 static inline int eap_sim_verify_mac_sha256(const u8 *k_aut, argument 215 const u8 *k_aut, 108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
|
H A D | eap_sim_common.c | 77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) argument 88 os_memcpy(k_aut, pos, EAP_SIM_K_AUT_LEN); 97 k_aut, EAP_SIM_K_AUT_LEN); 165 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req, argument 195 k_aut, EAP_SIM_K_AUT_LEN); 196 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac); 205 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, argument 223 k_aut, EAP_SIM_K_AUT_LEN); 224 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac); 278 u8 *k_aut, u 276 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument 360 eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument 400 eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, const u8 *extra, size_t extra_len) argument 1007 eap_sim_msg_finish(struct eap_sim_msg *msg, int type, const u8 *k_aut, const u8 *extra, size_t extra_len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_sim_db.h | 62 const u8 *k_aut, const u8 *k_re); 74 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_sim_reauth
|
H A D | eap_server_aka.c | 23 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_aka_data 118 os_memcpy(data->k_aut, data->reauth->k_aut, 537 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, NULL, 0); 560 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 584 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, NULL, 0); 623 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, NULL, 0); 837 data->ck, data->k_encr, data->k_aut, 842 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 904 return eap_sim_verify_mac_sha256(data->k_aut, re [all...] |
H A D | eap_server_sim.c | 22 u8 k_aut[EAP_SIM_K_AUT_LEN]; member in struct:eap_sim_data 243 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, 260 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 281 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, NULL, 0); 320 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, NULL, 0); 552 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 570 eap_sim_verify_mac(data->k_aut, respData, attr->mac, 612 eap_sim_verify_mac(data->k_aut, respData, attr->mac, data->nonce_s,
|
H A D | eap_sim_db.c | 125 " k_aut CHAR(64)," 245 const u8 *k_encr, const u8 *k_aut, const u8 *k_re) 262 k_aut ? ", k_aut" : "", 280 if (k_aut) { 282 pos += wpa_snprintf_hex(pos, end - pos, k_aut, 325 } else if (os_strcmp(col[i], "k_aut") == 0 && argv[i]) { 326 hexstr2bin(argv[i], reauth->k_aut, 327 sizeof(reauth->k_aut)); 1246 * @k_aut 243 db_add_reauth(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *mk, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument 1254 eap_sim_db_add_reauth_prime(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_sim_db.h | 62 const u8 *k_aut, const u8 *k_re); 74 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_sim_reauth
|
H A D | eap_server_aka.c | 23 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_aka_data 118 os_memcpy(data->k_aut, data->reauth->k_aut, 537 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, NULL, 0); 560 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 584 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, NULL, 0); 623 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, NULL, 0); 837 data->ck, data->k_encr, data->k_aut, 842 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 904 return eap_sim_verify_mac_sha256(data->k_aut, re [all...] |
H A D | eap_server_sim.c | 22 u8 k_aut[EAP_SIM_K_AUT_LEN]; member in struct:eap_sim_data 243 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, 260 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 281 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, NULL, 0); 320 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, NULL, 0); 552 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 570 eap_sim_verify_mac(data->k_aut, respData, attr->mac, 612 eap_sim_verify_mac(data->k_aut, respData, attr->mac, data->nonce_s,
|
H A D | eap_sim_db.c | 125 " k_aut CHAR(64)," 245 const u8 *k_encr, const u8 *k_aut, const u8 *k_re) 262 k_aut ? ", k_aut" : "", 280 if (k_aut) { 282 pos += wpa_snprintf_hex(pos, end - pos, k_aut, 325 } else if (os_strcmp(col[i], "k_aut") == 0 && argv[i]) { 326 hexstr2bin(argv[i], reauth->k_aut, 327 sizeof(reauth->k_aut)); 1246 * @k_aut 243 db_add_reauth(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *mk, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument 1254 eap_sim_db_add_reauth_prime(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_sim_db.h | 62 const u8 *k_aut, const u8 *k_re); 74 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_sim_reauth
|
H A D | eap_server_aka.c | 23 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_aka_data 118 os_memcpy(data->k_aut, data->reauth->k_aut, 537 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, NULL, 0); 560 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 584 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, NULL, 0); 623 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, NULL, 0); 837 data->ck, data->k_encr, data->k_aut, 842 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 904 return eap_sim_verify_mac_sha256(data->k_aut, re [all...] |
H A D | eap_server_sim.c | 22 u8 k_aut[EAP_SIM_K_AUT_LEN]; member in struct:eap_sim_data 243 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, 260 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 281 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, NULL, 0); 320 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, NULL, 0); 552 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 570 eap_sim_verify_mac(data->k_aut, respData, attr->mac, 612 eap_sim_verify_mac(data->k_aut, respData, attr->mac, data->nonce_s,
|
H A D | eap_sim_db.c | 125 " k_aut CHAR(64)," 245 const u8 *k_encr, const u8 *k_aut, const u8 *k_re) 262 k_aut ? ", k_aut" : "", 280 if (k_aut) { 282 pos += wpa_snprintf_hex(pos, end - pos, k_aut, 325 } else if (os_strcmp(col[i], "k_aut") == 0 && argv[i]) { 326 hexstr2bin(argv[i], reauth->k_aut, 327 sizeof(reauth->k_aut)); 1246 * @k_aut 243 db_add_reauth(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *mk, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument 1254 eap_sim_db_add_reauth_prime(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_aka.c | 27 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_aka_data 133 os_memset(data->k_aut, 0, EAP_AKA_PRIME_K_AUT_LEN); 653 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, (u8 *) "", 696 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, nonce_s, 705 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; local 710 if (k_aut && data->reauth) { 726 if (k_aut) { 730 return eap_sim_msg_finish(msg, data->eap_method, k_aut, (u8 *) "", 0); 790 return eap_sim_verify_mac_sha256(data->k_aut, re [all...] |
H A D | eap_sim.c | 30 u8 k_aut[EAP_SIM_K_AUT_LEN]; member in struct:eap_sim_data 137 os_memset(data->k_aut, 0, EAP_SIM_K_AUT_LEN); 540 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, 583 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, nonce_s, 592 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; local 597 if (k_aut && data->reauth) { 613 if (k_aut) { 617 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, k_aut, (u8 *) "", 0); 775 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, dat [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_aka.c | 27 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_aka_data 133 os_memset(data->k_aut, 0, EAP_AKA_PRIME_K_AUT_LEN); 653 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, (u8 *) "", 696 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, nonce_s, 705 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; local 710 if (k_aut && data->reauth) { 726 if (k_aut) { 730 return eap_sim_msg_finish(msg, data->eap_method, k_aut, (u8 *) "", 0); 790 return eap_sim_verify_mac_sha256(data->k_aut, re [all...] |
H A D | eap_sim.c | 30 u8 k_aut[EAP_SIM_K_AUT_LEN]; member in struct:eap_sim_data 137 os_memset(data->k_aut, 0, EAP_SIM_K_AUT_LEN); 540 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, 583 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, nonce_s, 592 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; local 597 if (k_aut && data->reauth) { 613 if (k_aut) { 617 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, k_aut, (u8 *) "", 0); 775 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, dat [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_aka.c | 27 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_aka_data 133 os_memset(data->k_aut, 0, EAP_AKA_PRIME_K_AUT_LEN); 653 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, (u8 *) "", 696 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, nonce_s, 705 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; local 710 if (k_aut && data->reauth) { 726 if (k_aut) { 730 return eap_sim_msg_finish(msg, data->eap_method, k_aut, (u8 *) "", 0); 790 return eap_sim_verify_mac_sha256(data->k_aut, re [all...] |
H A D | eap_sim.c | 30 u8 k_aut[EAP_SIM_K_AUT_LEN]; member in struct:eap_sim_data 137 os_memset(data->k_aut, 0, EAP_SIM_K_AUT_LEN); 540 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, 583 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, nonce_s, 592 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; local 597 if (k_aut && data->reauth) { 613 if (k_aut) { 617 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, k_aut, (u8 *) "", 0); 775 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, dat [all...] |