Searched refs:k_encr (Results 1 - 25 of 32) sorted by relevance

12

/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
H A Deap_sim_db.h59 u16 counter, const u8 *k_encr, const u8 *k_aut,
73 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_sim_reauth
H A Deap_aka.c30 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_aka_data
351 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) {
456 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
507 if (eap_sim_msg_add_encr_end(msg, data->k_encr,
651 os_memcpy(data->k_encr,
652 data->reauth->k_encr,
742 data->ck, data->k_encr, data->k_aut,
747 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
901 data->k_encr, data->k_aut,
976 decrypted = eap_sim_parse_encr(data->k_encr, att
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_sim_db.h61 char *reauth_id, u16 counter, const u8 *k_encr,
73 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_sim_reauth
H A Deap_server_aka.c24 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_aka_data
116 os_memcpy(data->k_encr, data->reauth->k_encr,
454 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) {
559 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
610 if (eap_sim_msg_add_encr_end(msg, data->k_encr,
825 data->ck, data->k_encr, data->k_aut,
830 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
987 data->k_encr, data->k_aut,
1058 decrypted = eap_sim_parse_encr(data->k_encr, att
[all...]
H A Deap_sim_db.c120 " k_encr CHAR(32),"
241 const u8 *k_encr, const u8 *k_aut, const u8 *k_re)
257 k_encr ? ", k_encr" : "",
269 if (k_encr) {
271 pos += wpa_snprintf_hex(pos, end - pos, k_encr,
318 } else if (os_strcmp(col[i], "k_encr") == 0 && argv[i]) {
319 hexstr2bin(argv[i], reauth->k_encr,
320 sizeof(reauth->k_encr));
1178 * @k_encr
239 db_add_reauth(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *mk, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument
1187 eap_sim_db_add_reauth_prime(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap_sim_db.h61 char *reauth_id, u16 counter, const u8 *k_encr,
73 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_sim_reauth
H A Deap_server_aka.c24 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_aka_data
116 os_memcpy(data->k_encr, data->reauth->k_encr,
454 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) {
559 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
610 if (eap_sim_msg_add_encr_end(msg, data->k_encr,
825 data->ck, data->k_encr, data->k_aut,
830 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
987 data->k_encr, data->k_aut,
1058 decrypted = eap_sim_parse_encr(data->k_encr, att
[all...]
H A Deap_sim_db.c120 " k_encr CHAR(32),"
241 const u8 *k_encr, const u8 *k_aut, const u8 *k_re)
257 k_encr ? ", k_encr" : "",
269 if (k_encr) {
271 pos += wpa_snprintf_hex(pos, end - pos, k_encr,
318 } else if (os_strcmp(col[i], "k_encr") == 0 && argv[i]) {
319 hexstr2bin(argv[i], reauth->k_encr,
320 sizeof(reauth->k_encr));
1178 * @k_encr
239 db_add_reauth(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *mk, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument
1187 eap_sim_db_add_reauth_prime(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_sim_db.h61 char *reauth_id, u16 counter, const u8 *k_encr,
73 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_sim_reauth
H A Deap_server_aka.c24 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_aka_data
116 os_memcpy(data->k_encr, data->reauth->k_encr,
454 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) {
559 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
610 if (eap_sim_msg_add_encr_end(msg, data->k_encr,
825 data->ck, data->k_encr, data->k_aut,
830 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
987 data->k_encr, data->k_aut,
1058 decrypted = eap_sim_parse_encr(data->k_encr, att
[all...]
H A Deap_sim_db.c120 " k_encr CHAR(32),"
241 const u8 *k_encr, const u8 *k_aut, const u8 *k_re)
257 k_encr ? ", k_encr" : "",
269 if (k_encr) {
271 pos += wpa_snprintf_hex(pos, end - pos, k_encr,
318 } else if (os_strcmp(col[i], "k_encr") == 0 && argv[i]) {
319 hexstr2bin(argv[i], reauth->k_encr,
320 sizeof(reauth->k_encr));
1178 * @k_encr
239 db_add_reauth(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *mk, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument
1187 eap_sim_db_add_reauth_prime(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
H A Deap_sim_common.h86 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk,
99 const u8 *ik, const u8 *ck, u8 *k_encr,
117 u8 *k_encr, u8 *k_aut, u8 *k_re,
212 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data,
230 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr,
114 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
H A Deap_sim_common.c82 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) argument
91 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN);
100 k_encr, EAP_SIM_K_ENCR_LEN);
282 const u8 *ik, const u8 *ck, u8 *k_encr,
306 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN);
308 k_encr, EAP_SIM_K_ENCR_LEN);
940 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data, argument
956 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) {
1141 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr, int attr_pad) argument
1145 if (msg == NULL || k_encr
281 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_sim_common.h80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk,
93 const u8 *ik, const u8 *ck, u8 *k_encr,
111 u8 *k_encr, u8 *k_aut, u8 *k_re,
206 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data,
224 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr,
108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
H A Deap_sim_common.c77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) argument
86 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN);
95 k_encr, EAP_SIM_K_ENCR_LEN);
277 const u8 *ik, const u8 *ck, u8 *k_encr,
301 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN);
303 k_encr, EAP_SIM_K_ENCR_LEN);
935 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data, argument
951 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) {
1136 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr, int attr_pad) argument
1140 if (msg == NULL || k_encr
276 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
[all...]
/external/wpa_supplicant_8/src/eap_common/
H A Deap_sim_common.h80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk,
93 const u8 *ik, const u8 *ck, u8 *k_encr,
111 u8 *k_encr, u8 *k_aut, u8 *k_re,
206 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data,
224 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr,
108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
H A Deap_sim_common.c77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) argument
86 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN);
95 k_encr, EAP_SIM_K_ENCR_LEN);
277 const u8 *ik, const u8 *ck, u8 *k_encr,
301 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN);
303 k_encr, EAP_SIM_K_ENCR_LEN);
935 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data, argument
951 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) {
1136 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr, int attr_pad) argument
1140 if (msg == NULL || k_encr
276 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_sim_common.h80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk,
93 const u8 *ik, const u8 *ck, u8 *k_encr,
111 u8 *k_encr, u8 *k_aut, u8 *k_re,
206 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data,
224 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr,
108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
H A Deap_sim_common.c77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) argument
86 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN);
95 k_encr, EAP_SIM_K_ENCR_LEN);
277 const u8 *ik, const u8 *ck, u8 *k_encr,
301 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN);
303 k_encr, EAP_SIM_K_ENCR_LEN);
935 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data, argument
951 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) {
1136 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr, int attr_pad) argument
1140 if (msg == NULL || k_encr
276 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
H A Deap_sim.c38 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_sim_data
445 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) {
479 if (eap_sim_msg_add_encr_end(msg, data->k_encr,
643 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
661 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
702 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
819 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
H A Deap_aka.c36 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_aka_data
550 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) {
585 if (eap_sim_msg_add_encr_end(msg, data->k_encr,
870 data->ck, data->k_encr, data->k_aut,
875 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
893 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
934 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
1058 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_sim.c31 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_sim_data
473 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) {
507 if (eap_sim_msg_add_encr_end(msg, data->k_encr,
671 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
689 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
730 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
847 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
H A Deap_aka.c28 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_aka_data
577 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) {
612 if (eap_sim_msg_add_encr_end(msg, data->k_encr,
897 data->ck, data->k_encr, data->k_aut,
902 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
920 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
961 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
1085 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_sim.c31 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_sim_data
473 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) {
507 if (eap_sim_msg_add_encr_end(msg, data->k_encr,
671 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
689 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
730 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
847 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_sim.c31 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_sim_data
473 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) {
507 if (eap_sim_msg_add_encr_end(msg, data->k_encr,
671 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
689 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
730 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
847 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,

Completed in 248 milliseconds

12