/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_sim_db.h | 59 u16 counter, const u8 *k_encr, const u8 *k_aut, 73 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_sim_reauth
|
H A D | eap_aka.c | 30 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_aka_data 351 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { 456 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 507 if (eap_sim_msg_add_encr_end(msg, data->k_encr, 651 os_memcpy(data->k_encr, 652 data->reauth->k_encr, 742 data->ck, data->k_encr, data->k_aut, 747 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 901 data->k_encr, data->k_aut, 976 decrypted = eap_sim_parse_encr(data->k_encr, att [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_sim_db.h | 61 char *reauth_id, u16 counter, const u8 *k_encr, 73 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_sim_reauth
|
H A D | eap_server_aka.c | 24 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_aka_data 116 os_memcpy(data->k_encr, data->reauth->k_encr, 454 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { 559 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 610 if (eap_sim_msg_add_encr_end(msg, data->k_encr, 825 data->ck, data->k_encr, data->k_aut, 830 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 987 data->k_encr, data->k_aut, 1058 decrypted = eap_sim_parse_encr(data->k_encr, att [all...] |
H A D | eap_sim_db.c | 120 " k_encr CHAR(32)," 241 const u8 *k_encr, const u8 *k_aut, const u8 *k_re) 257 k_encr ? ", k_encr" : "", 269 if (k_encr) { 271 pos += wpa_snprintf_hex(pos, end - pos, k_encr, 318 } else if (os_strcmp(col[i], "k_encr") == 0 && argv[i]) { 319 hexstr2bin(argv[i], reauth->k_encr, 320 sizeof(reauth->k_encr)); 1178 * @k_encr 239 db_add_reauth(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *mk, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument 1187 eap_sim_db_add_reauth_prime(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_sim_db.h | 61 char *reauth_id, u16 counter, const u8 *k_encr, 73 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_sim_reauth
|
H A D | eap_server_aka.c | 24 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_aka_data 116 os_memcpy(data->k_encr, data->reauth->k_encr, 454 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { 559 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 610 if (eap_sim_msg_add_encr_end(msg, data->k_encr, 825 data->ck, data->k_encr, data->k_aut, 830 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 987 data->k_encr, data->k_aut, 1058 decrypted = eap_sim_parse_encr(data->k_encr, att [all...] |
H A D | eap_sim_db.c | 120 " k_encr CHAR(32)," 241 const u8 *k_encr, const u8 *k_aut, const u8 *k_re) 257 k_encr ? ", k_encr" : "", 269 if (k_encr) { 271 pos += wpa_snprintf_hex(pos, end - pos, k_encr, 318 } else if (os_strcmp(col[i], "k_encr") == 0 && argv[i]) { 319 hexstr2bin(argv[i], reauth->k_encr, 320 sizeof(reauth->k_encr)); 1178 * @k_encr 239 db_add_reauth(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *mk, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument 1187 eap_sim_db_add_reauth_prime(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_sim_db.h | 61 char *reauth_id, u16 counter, const u8 *k_encr, 73 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_sim_reauth
|
H A D | eap_server_aka.c | 24 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_aka_data 116 os_memcpy(data->k_encr, data->reauth->k_encr, 454 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { 559 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 610 if (eap_sim_msg_add_encr_end(msg, data->k_encr, 825 data->ck, data->k_encr, data->k_aut, 830 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 987 data->k_encr, data->k_aut, 1058 decrypted = eap_sim_parse_encr(data->k_encr, att [all...] |
H A D | eap_sim_db.c | 120 " k_encr CHAR(32)," 241 const u8 *k_encr, const u8 *k_aut, const u8 *k_re) 257 k_encr ? ", k_encr" : "", 269 if (k_encr) { 271 pos += wpa_snprintf_hex(pos, end - pos, k_encr, 318 } else if (os_strcmp(col[i], "k_encr") == 0 && argv[i]) { 319 hexstr2bin(argv[i], reauth->k_encr, 320 sizeof(reauth->k_encr)); 1178 * @k_encr 239 db_add_reauth(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *mk, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument 1187 eap_sim_db_add_reauth_prime(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | eap_sim_common.h | 86 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, 99 const u8 *ik, const u8 *ck, u8 *k_encr, 117 u8 *k_encr, u8 *k_aut, u8 *k_re, 212 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data, 230 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr, 114 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
|
H A D | eap_sim_common.c | 82 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) argument 91 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN); 100 k_encr, EAP_SIM_K_ENCR_LEN); 282 const u8 *ik, const u8 *ck, u8 *k_encr, 306 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN); 308 k_encr, EAP_SIM_K_ENCR_LEN); 940 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data, argument 956 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { 1141 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr, int attr_pad) argument 1145 if (msg == NULL || k_encr 281 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_sim_common.h | 80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, 93 const u8 *ik, const u8 *ck, u8 *k_encr, 111 u8 *k_encr, u8 *k_aut, u8 *k_re, 206 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data, 224 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr, 108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
|
H A D | eap_sim_common.c | 77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) argument 86 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN); 95 k_encr, EAP_SIM_K_ENCR_LEN); 277 const u8 *ik, const u8 *ck, u8 *k_encr, 301 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN); 303 k_encr, EAP_SIM_K_ENCR_LEN); 935 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data, argument 951 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { 1136 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr, int attr_pad) argument 1140 if (msg == NULL || k_encr 276 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_sim_common.h | 80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, 93 const u8 *ik, const u8 *ck, u8 *k_encr, 111 u8 *k_encr, u8 *k_aut, u8 *k_re, 206 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data, 224 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr, 108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
|
H A D | eap_sim_common.c | 77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) argument 86 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN); 95 k_encr, EAP_SIM_K_ENCR_LEN); 277 const u8 *ik, const u8 *ck, u8 *k_encr, 301 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN); 303 k_encr, EAP_SIM_K_ENCR_LEN); 935 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data, argument 951 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { 1136 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr, int attr_pad) argument 1140 if (msg == NULL || k_encr 276 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_sim_common.h | 80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, 93 const u8 *ik, const u8 *ck, u8 *k_encr, 111 u8 *k_encr, u8 *k_aut, u8 *k_re, 206 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data, 224 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr, 108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
|
H A D | eap_sim_common.c | 77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) argument 86 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN); 95 k_encr, EAP_SIM_K_ENCR_LEN); 277 const u8 *ik, const u8 *ck, u8 *k_encr, 301 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN); 303 k_encr, EAP_SIM_K_ENCR_LEN); 935 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data, argument 951 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { 1136 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr, int attr_pad) argument 1140 if (msg == NULL || k_encr 276 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_sim.c | 38 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_sim_data 445 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { 479 if (eap_sim_msg_add_encr_end(msg, data->k_encr, 643 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 661 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 702 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 819 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
|
H A D | eap_aka.c | 36 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_aka_data 550 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { 585 if (eap_sim_msg_add_encr_end(msg, data->k_encr, 870 data->ck, data->k_encr, data->k_aut, 875 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 893 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 934 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 1058 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_sim.c | 31 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_sim_data 473 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { 507 if (eap_sim_msg_add_encr_end(msg, data->k_encr, 671 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 689 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 730 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 847 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
|
H A D | eap_aka.c | 28 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_aka_data 577 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { 612 if (eap_sim_msg_add_encr_end(msg, data->k_encr, 897 data->ck, data->k_encr, data->k_aut, 902 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 920 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 961 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 1085 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_sim.c | 31 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_sim_data 473 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { 507 if (eap_sim_msg_add_encr_end(msg, data->k_encr, 671 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 689 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 730 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 847 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_sim.c | 31 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_sim_data 473 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { 507 if (eap_sim_msg_add_encr_end(msg, data->k_encr, 671 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 689 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 730 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 847 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
|