Searched refs:EAP_SIM_MK_LEN (Results 1 – 16 of 16) sorted by relevance
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap_sim_db.h | 72 u8 mk[EAP_SIM_MK_LEN];
|
D | eap_server_sim.c | 19 u8 mk[EAP_SIM_MK_LEN]; 490 os_memcpy(data->mk, data->reauth->mk, EAP_SIM_MK_LEN); in eap_sim_process_start()
|
D | eap_sim_db.c | 269 pos += wpa_snprintf_hex(pos, end - pos, mk, EAP_SIM_MK_LEN); in db_add_reauth() 1230 os_memcpy(r->mk, mk, EAP_SIM_MK_LEN); in eap_sim_db_add_reauth()
|
D | eap_server_aka.c | 21 u8 mk[EAP_SIM_MK_LEN]; 124 os_memcpy(data->mk, data->reauth->mk, EAP_SIM_MK_LEN); in eap_aka_check_identity_reauth()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap_sim_db.h | 72 u8 mk[EAP_SIM_MK_LEN];
|
D | eap_server_sim.c | 19 u8 mk[EAP_SIM_MK_LEN]; 490 os_memcpy(data->mk, data->reauth->mk, EAP_SIM_MK_LEN); in eap_sim_process_start()
|
D | eap_sim_db.c | 269 pos += wpa_snprintf_hex(pos, end - pos, mk, EAP_SIM_MK_LEN); in db_add_reauth() 1230 os_memcpy(r->mk, mk, EAP_SIM_MK_LEN); in eap_sim_db_add_reauth()
|
D | eap_server_aka.c | 21 u8 mk[EAP_SIM_MK_LEN]; 124 os_memcpy(data->mk, data->reauth->mk, EAP_SIM_MK_LEN); in eap_aka_check_identity_reauth()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
D | eap_sim_common.c | 24 return fips186_2_prf(key, EAP_SIM_MK_LEN, x, xlen); in eap_sim_prf() 52 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: MK", mk, EAP_SIM_MK_LEN); in eap_sim_derive_mk() 73 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: MK", mk, EAP_SIM_MK_LEN); in eap_aka_derive_mk() 130 len[3] = EAP_SIM_MK_LEN; in eap_sim_derive_keys_reauth() 140 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: MK", mk, EAP_SIM_MK_LEN); in eap_sim_derive_keys_reauth()
|
D | eap_sim_common.h | 15 #define EAP_SIM_MK_LEN 20 macro
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
D | eap_sim_common.c | 24 return fips186_2_prf(key, EAP_SIM_MK_LEN, x, xlen); in eap_sim_prf() 52 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: MK", mk, EAP_SIM_MK_LEN); in eap_sim_derive_mk() 73 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: MK", mk, EAP_SIM_MK_LEN); in eap_aka_derive_mk() 130 len[3] = EAP_SIM_MK_LEN; in eap_sim_derive_keys_reauth() 140 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: MK", mk, EAP_SIM_MK_LEN); in eap_sim_derive_keys_reauth()
|
D | eap_sim_common.h | 15 #define EAP_SIM_MK_LEN 20 macro
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
D | eap_sim.c | 29 u8 mk[EAP_SIM_MK_LEN]; 143 os_memset(data->mk, 0, EAP_SIM_MK_LEN); in eap_sim_clear_keys()
|
D | eap_aka.c | 26 u8 mk[EAP_SIM_MK_LEN]; 141 os_memset(data->mk, 0, EAP_SIM_MK_LEN); in eap_aka_clear_keys()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
D | eap_sim.c | 29 u8 mk[EAP_SIM_MK_LEN]; 145 os_memset(data->mk, 0, EAP_SIM_MK_LEN); in eap_sim_clear_keys()
|
D | eap_aka.c | 26 u8 mk[EAP_SIM_MK_LEN]; 141 os_memset(data->mk, 0, EAP_SIM_MK_LEN); in eap_aka_clear_keys()
|