/external/wpa_supplicant_8/hostapd/src/pae/ |
H A D | ieee802_1x_key.c | 186 size_t ctx_bytes, u8 *sak) 188 return aes_kdf_128(cak, "IEEE8021 SAK", ctx, ctx_bytes * 8, 128, sak); 185 ieee802_1x_sak_128bits_aes_cmac(const u8 *cak, const u8 *ctx, size_t ctx_bytes, u8 *sak) argument
|
H A D | ieee802_1x_kay_i.h | 333 * @sak: AES Key Wrap of SAK (see 9.8) 364 u8 sak[0]; member in struct:ieee802_1x_mka_dist_sak_body
|
H A D | ieee802_1x_kay.c | 192 wpa_hexdump(MSG_INFO, "\tAES Key Wrap of SAK...:", body->sak, 24); 1353 /* check all live peer have used the sak for receiving sa */ 1445 struct data_key *sak; local 1460 sak = participant->new_key; 1461 body->confid_offset = sak->confidentiality_offset; 1462 body->dan = sak->an; 1463 body->kn = host_to_be32(sak->key_identifier.kn); 1472 os_memcpy(body->sak, &cs, CS_ID_LEN); 1477 sak->key, body->sak 3397 struct data_key *sak; local [all...] |
/external/wpa_supplicant_8/src/pae/ |
H A D | ieee802_1x_key.c | 186 size_t ctx_bytes, u8 *sak) 188 return aes_kdf_128(cak, "IEEE8021 SAK", ctx, ctx_bytes * 8, 128, sak); 185 ieee802_1x_sak_128bits_aes_cmac(const u8 *cak, const u8 *ctx, size_t ctx_bytes, u8 *sak) argument
|
H A D | ieee802_1x_kay_i.h | 333 * @sak: AES Key Wrap of SAK (see 9.8) 364 u8 sak[0]; member in struct:ieee802_1x_mka_dist_sak_body
|
H A D | ieee802_1x_kay.c | 192 wpa_hexdump(MSG_INFO, "\tAES Key Wrap of SAK...:", body->sak, 24); 1353 /* check all live peer have used the sak for receiving sa */ 1445 struct data_key *sak; local 1460 sak = participant->new_key; 1461 body->confid_offset = sak->confidentiality_offset; 1462 body->dan = sak->an; 1463 body->kn = host_to_be32(sak->key_identifier.kn); 1472 os_memcpy(body->sak, &cs, CS_ID_LEN); 1477 sak->key, body->sak 3397 struct data_key *sak; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/pae/ |
H A D | ieee802_1x_key.c | 186 size_t ctx_bytes, u8 *sak) 188 return aes_kdf_128(cak, "IEEE8021 SAK", ctx, ctx_bytes * 8, 128, sak); 185 ieee802_1x_sak_128bits_aes_cmac(const u8 *cak, const u8 *ctx, size_t ctx_bytes, u8 *sak) argument
|
H A D | ieee802_1x_kay_i.h | 333 * @sak: AES Key Wrap of SAK (see 9.8) 364 u8 sak[0]; member in struct:ieee802_1x_mka_dist_sak_body
|
H A D | ieee802_1x_kay.c | 192 wpa_hexdump(MSG_INFO, "\tAES Key Wrap of SAK...:", body->sak, 24); 1353 /* check all live peer have used the sak for receiving sa */ 1445 struct data_key *sak; local 1460 sak = participant->new_key; 1461 body->confid_offset = sak->confidentiality_offset; 1462 body->dan = sak->an; 1463 body->kn = host_to_be32(sak->key_identifier.kn); 1472 os_memcpy(body->sak, &cs, CS_ID_LEN); 1477 sak->key, body->sak 3397 struct data_key *sak; local [all...] |