/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
D | eap_sim_common.h | 84 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, 90 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req, 92 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, 98 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk); 102 int eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req, 105 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len, 115 u8 *k_encr, u8 *k_aut, u8 *k_re, in eap_aka_prime_derive_keys() argument 129 static inline int eap_sim_verify_mac_sha256(const u8 *k_aut, in eap_sim_verify_mac_sha256() argument 219 const u8 *k_aut,
|
D | eap_sim_common.c | 81 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) in eap_sim_derive_keys() argument 92 os_memcpy(k_aut, pos, EAP_SIM_K_AUT_LEN); in eap_sim_derive_keys() 101 k_aut, EAP_SIM_K_AUT_LEN); in eap_sim_derive_keys() 169 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req, in eap_sim_verify_mac() argument 198 k_aut, EAP_SIM_K_AUT_LEN); in eap_sim_verify_mac() 199 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac); in eap_sim_verify_mac() 208 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, in eap_sim_add_mac() argument 226 k_aut, EAP_SIM_K_AUT_LEN); in eap_sim_add_mac() 227 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac); in eap_sim_add_mac() 281 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys() argument [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
D | eap_sim_common.h | 80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, 86 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req, 88 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, 94 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk); 98 int eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req, 101 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len, 111 u8 *k_encr, u8 *k_aut, u8 *k_re, in eap_aka_prime_derive_keys() argument 125 static inline int eap_sim_verify_mac_sha256(const u8 *k_aut, in eap_sim_verify_mac_sha256() argument 215 const u8 *k_aut,
|
D | eap_sim_common.c | 77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) in eap_sim_derive_keys() argument 88 os_memcpy(k_aut, pos, EAP_SIM_K_AUT_LEN); in eap_sim_derive_keys() 97 k_aut, EAP_SIM_K_AUT_LEN); in eap_sim_derive_keys() 165 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req, in eap_sim_verify_mac() argument 194 k_aut, EAP_SIM_K_AUT_LEN); in eap_sim_verify_mac() 195 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac); in eap_sim_verify_mac() 204 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, in eap_sim_add_mac() argument 222 k_aut, EAP_SIM_K_AUT_LEN); in eap_sim_add_mac() 223 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac); in eap_sim_add_mac() 277 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys() argument [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
D | eap_sim.c | 30 u8 k_aut[EAP_SIM_K_AUT_LEN]; member 144 os_memset(data->k_aut, 0, EAP_SIM_K_AUT_LEN); in eap_sim_clear_keys() 556 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, in eap_sim_response_challenge() 599 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, nonce_s, in eap_sim_response_reauth() 608 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; in eap_sim_response_notification() local 613 if (k_aut && data->reauth) { in eap_sim_response_notification() 629 if (k_aut) { in eap_sim_response_notification() 633 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, k_aut, (u8 *) "", 0); in eap_sim_response_notification() 801 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_process_challenge() 803 if (eap_sim_verify_mac(data->k_aut, reqData, attr->mac, data->nonce_mt, in eap_sim_process_challenge() [all …]
|
D | eap_aka.c | 27 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member 142 os_memset(data->k_aut, 0, EAP_AKA_PRIME_K_AUT_LEN); in eap_aka_clear_keys() 680 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, (u8 *) "", in eap_aka_response_challenge() 723 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, nonce_s, in eap_aka_response_reauth() 732 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; in eap_aka_response_notification() local 737 if (k_aut && data->reauth) { in eap_aka_response_notification() 753 if (k_aut) { in eap_aka_response_notification() 757 return eap_sim_msg_finish(msg, data->eap_method, k_aut, (u8 *) "", 0); in eap_aka_response_notification() 817 return eap_sim_verify_mac_sha256(data->k_aut, req, mac, extra, in eap_aka_verify_mac() 819 return eap_sim_verify_mac(data->k_aut, req, mac, extra, extra_len); in eap_aka_verify_mac() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
D | eap_sim.c | 30 u8 k_aut[EAP_SIM_K_AUT_LEN]; member 146 os_memset(data->k_aut, 0, EAP_SIM_K_AUT_LEN); in eap_sim_clear_keys() 561 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, in eap_sim_response_challenge() 604 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, nonce_s, in eap_sim_response_reauth() 613 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; in eap_sim_response_notification() local 618 if (k_aut && data->reauth) { in eap_sim_response_notification() 634 if (k_aut) { in eap_sim_response_notification() 638 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, k_aut, (u8 *) "", 0); in eap_sim_response_notification() 813 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_process_challenge() 815 if (eap_sim_verify_mac(data->k_aut, reqData, attr->mac, data->nonce_mt, in eap_sim_process_challenge() [all …]
|
D | eap_aka.c | 27 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member 142 os_memset(data->k_aut, 0, EAP_AKA_PRIME_K_AUT_LEN); in eap_aka_clear_keys() 689 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, (u8 *) "", in eap_aka_response_challenge() 732 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, nonce_s, in eap_aka_response_reauth() 741 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; in eap_aka_response_notification() local 746 if (k_aut && data->reauth) { in eap_aka_response_notification() 762 if (k_aut) { in eap_aka_response_notification() 766 return eap_sim_msg_finish(msg, data->eap_method, k_aut, (u8 *) "", 0); in eap_aka_response_notification() 831 return eap_sim_verify_mac_sha256(data->k_aut, req, mac, extra, in eap_aka_verify_mac() 833 return eap_sim_verify_mac(data->k_aut, req, mac, extra, extra_len); in eap_aka_verify_mac() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap_server_aka.c | 23 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member 119 os_memcpy(data->k_aut, data->reauth->k_aut, in eap_aka_check_identity_reauth() 544 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, NULL, 0); in eap_aka_build_challenge() 568 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, in eap_aka_build_reauth() 592 buf = eap_sim_msg_finish(msg, data->eap_method, data->k_aut, NULL, 0); in eap_aka_build_reauth() 640 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, NULL, 0); in eap_aka_build_notification() 858 data->ck, data->k_encr, data->k_aut, in eap_aka_fullauth() 863 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, in eap_aka_fullauth() 925 return eap_sim_verify_mac_sha256(data->k_aut, req, mac, extra, in eap_aka_verify_mac() 927 return eap_sim_verify_mac(data->k_aut, req, mac, extra, extra_len); in eap_aka_verify_mac() [all …]
|
D | eap_server_sim.c | 22 u8 k_aut[EAP_SIM_K_AUT_LEN]; member 250 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, in eap_sim_build_challenge() 268 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_build_reauth() 289 buf = eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, NULL, 0); in eap_sim_build_reauth() 337 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, NULL, 0); in eap_sim_build_notification() 572 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_process_start() 590 eap_sim_verify_mac(data->k_aut, respData, attr->mac, in eap_sim_process_challenge() 633 eap_sim_verify_mac(data->k_aut, respData, attr->mac, data->nonce_s, in eap_sim_process_reauth()
|
D | eap_sim_db.h | 62 const u8 *k_aut, const u8 *k_re); 74 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member
|
D | eap_sim_db.c | 245 const u8 *k_encr, const u8 *k_aut, const u8 *k_re) in db_add_reauth() argument 262 k_aut ? ", k_aut" : "", in db_add_reauth() 280 if (k_aut) { in db_add_reauth() 282 pos += wpa_snprintf_hex(pos, end - pos, k_aut, in db_add_reauth() 326 hexstr2bin(argv[i], reauth->k_aut, in get_reauth_cb() 327 sizeof(reauth->k_aut)); in get_reauth_cb() 1257 const u8 *k_aut, const u8 *k_re) in eap_sim_db_add_reauth_prime() argument 1267 k_encr, k_aut, k_re); in eap_sim_db_add_reauth_prime() 1274 os_memcpy(r->k_aut, k_aut, EAP_AKA_PRIME_K_AUT_LEN); in eap_sim_db_add_reauth_prime()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap_server_aka.c | 23 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member 119 os_memcpy(data->k_aut, data->reauth->k_aut, in eap_aka_check_identity_reauth() 544 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, NULL, 0); in eap_aka_build_challenge() 568 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, in eap_aka_build_reauth() 592 buf = eap_sim_msg_finish(msg, data->eap_method, data->k_aut, NULL, 0); in eap_aka_build_reauth() 640 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, NULL, 0); in eap_aka_build_notification() 858 data->ck, data->k_encr, data->k_aut, in eap_aka_fullauth() 863 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, in eap_aka_fullauth() 925 return eap_sim_verify_mac_sha256(data->k_aut, req, mac, extra, in eap_aka_verify_mac() 927 return eap_sim_verify_mac(data->k_aut, req, mac, extra, extra_len); in eap_aka_verify_mac() [all …]
|
D | eap_server_sim.c | 22 u8 k_aut[EAP_SIM_K_AUT_LEN]; member 250 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, in eap_sim_build_challenge() 268 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_build_reauth() 289 buf = eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, NULL, 0); in eap_sim_build_reauth() 337 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, NULL, 0); in eap_sim_build_notification() 572 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_process_start() 590 eap_sim_verify_mac(data->k_aut, respData, attr->mac, in eap_sim_process_challenge() 632 eap_sim_verify_mac(data->k_aut, respData, attr->mac, data->nonce_s, in eap_sim_process_reauth()
|
D | eap_sim_db.h | 62 const u8 *k_aut, const u8 *k_re); 74 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member
|
D | eap_sim_db.c | 245 const u8 *k_encr, const u8 *k_aut, const u8 *k_re) in db_add_reauth() argument 262 k_aut ? ", k_aut" : "", in db_add_reauth() 280 if (k_aut) { in db_add_reauth() 282 pos += wpa_snprintf_hex(pos, end - pos, k_aut, in db_add_reauth() 326 hexstr2bin(argv[i], reauth->k_aut, in get_reauth_cb() 327 sizeof(reauth->k_aut)); in get_reauth_cb() 1257 const u8 *k_aut, const u8 *k_re) in eap_sim_db_add_reauth_prime() argument 1267 k_encr, k_aut, k_re); in eap_sim_db_add_reauth_prime() 1274 os_memcpy(r->k_aut, k_aut, EAP_AKA_PRIME_K_AUT_LEN); in eap_sim_db_add_reauth_prime()
|