Home
last modified time | relevance | path

Searched refs:k_aut (Results 1 – 16 of 16) sorted by relevance

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
Deap_sim_common.h84 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk,
90 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req,
92 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac,
98 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk);
102 int eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req,
105 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len,
115 u8 *k_encr, u8 *k_aut, u8 *k_re, in eap_aka_prime_derive_keys() argument
129 static inline int eap_sim_verify_mac_sha256(const u8 *k_aut, in eap_sim_verify_mac_sha256() argument
219 const u8 *k_aut,
Deap_sim_common.c81 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) in eap_sim_derive_keys() argument
92 os_memcpy(k_aut, pos, EAP_SIM_K_AUT_LEN); in eap_sim_derive_keys()
101 k_aut, EAP_SIM_K_AUT_LEN); in eap_sim_derive_keys()
169 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req, in eap_sim_verify_mac() argument
198 k_aut, EAP_SIM_K_AUT_LEN); in eap_sim_verify_mac()
199 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac); in eap_sim_verify_mac()
208 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, in eap_sim_add_mac() argument
226 k_aut, EAP_SIM_K_AUT_LEN); in eap_sim_add_mac()
227 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac); in eap_sim_add_mac()
281 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys() argument
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
Deap_sim_common.h80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk,
86 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req,
88 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac,
94 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk);
98 int eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req,
101 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len,
111 u8 *k_encr, u8 *k_aut, u8 *k_re, in eap_aka_prime_derive_keys() argument
125 static inline int eap_sim_verify_mac_sha256(const u8 *k_aut, in eap_sim_verify_mac_sha256() argument
215 const u8 *k_aut,
Deap_sim_common.c77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) in eap_sim_derive_keys() argument
88 os_memcpy(k_aut, pos, EAP_SIM_K_AUT_LEN); in eap_sim_derive_keys()
97 k_aut, EAP_SIM_K_AUT_LEN); in eap_sim_derive_keys()
165 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req, in eap_sim_verify_mac() argument
194 k_aut, EAP_SIM_K_AUT_LEN); in eap_sim_verify_mac()
195 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac); in eap_sim_verify_mac()
204 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, in eap_sim_add_mac() argument
222 k_aut, EAP_SIM_K_AUT_LEN); in eap_sim_add_mac()
223 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac); in eap_sim_add_mac()
277 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys() argument
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
Deap_sim.c30 u8 k_aut[EAP_SIM_K_AUT_LEN]; member
144 os_memset(data->k_aut, 0, EAP_SIM_K_AUT_LEN); in eap_sim_clear_keys()
556 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, in eap_sim_response_challenge()
599 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, nonce_s, in eap_sim_response_reauth()
608 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; in eap_sim_response_notification() local
613 if (k_aut && data->reauth) { in eap_sim_response_notification()
629 if (k_aut) { in eap_sim_response_notification()
633 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, k_aut, (u8 *) "", 0); in eap_sim_response_notification()
801 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_process_challenge()
803 if (eap_sim_verify_mac(data->k_aut, reqData, attr->mac, data->nonce_mt, in eap_sim_process_challenge()
[all …]
Deap_aka.c27 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member
142 os_memset(data->k_aut, 0, EAP_AKA_PRIME_K_AUT_LEN); in eap_aka_clear_keys()
680 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, (u8 *) "", in eap_aka_response_challenge()
723 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, nonce_s, in eap_aka_response_reauth()
732 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; in eap_aka_response_notification() local
737 if (k_aut && data->reauth) { in eap_aka_response_notification()
753 if (k_aut) { in eap_aka_response_notification()
757 return eap_sim_msg_finish(msg, data->eap_method, k_aut, (u8 *) "", 0); in eap_aka_response_notification()
817 return eap_sim_verify_mac_sha256(data->k_aut, req, mac, extra, in eap_aka_verify_mac()
819 return eap_sim_verify_mac(data->k_aut, req, mac, extra, extra_len); in eap_aka_verify_mac()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
Deap_sim.c30 u8 k_aut[EAP_SIM_K_AUT_LEN]; member
146 os_memset(data->k_aut, 0, EAP_SIM_K_AUT_LEN); in eap_sim_clear_keys()
561 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, in eap_sim_response_challenge()
604 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, nonce_s, in eap_sim_response_reauth()
613 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; in eap_sim_response_notification() local
618 if (k_aut && data->reauth) { in eap_sim_response_notification()
634 if (k_aut) { in eap_sim_response_notification()
638 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, k_aut, (u8 *) "", 0); in eap_sim_response_notification()
813 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_process_challenge()
815 if (eap_sim_verify_mac(data->k_aut, reqData, attr->mac, data->nonce_mt, in eap_sim_process_challenge()
[all …]
Deap_aka.c27 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member
142 os_memset(data->k_aut, 0, EAP_AKA_PRIME_K_AUT_LEN); in eap_aka_clear_keys()
689 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, (u8 *) "", in eap_aka_response_challenge()
732 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, nonce_s, in eap_aka_response_reauth()
741 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; in eap_aka_response_notification() local
746 if (k_aut && data->reauth) { in eap_aka_response_notification()
762 if (k_aut) { in eap_aka_response_notification()
766 return eap_sim_msg_finish(msg, data->eap_method, k_aut, (u8 *) "", 0); in eap_aka_response_notification()
831 return eap_sim_verify_mac_sha256(data->k_aut, req, mac, extra, in eap_aka_verify_mac()
833 return eap_sim_verify_mac(data->k_aut, req, mac, extra, extra_len); in eap_aka_verify_mac()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
Deap_server_aka.c23 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member
119 os_memcpy(data->k_aut, data->reauth->k_aut, in eap_aka_check_identity_reauth()
544 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, NULL, 0); in eap_aka_build_challenge()
568 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, in eap_aka_build_reauth()
592 buf = eap_sim_msg_finish(msg, data->eap_method, data->k_aut, NULL, 0); in eap_aka_build_reauth()
640 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, NULL, 0); in eap_aka_build_notification()
858 data->ck, data->k_encr, data->k_aut, in eap_aka_fullauth()
863 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, in eap_aka_fullauth()
925 return eap_sim_verify_mac_sha256(data->k_aut, req, mac, extra, in eap_aka_verify_mac()
927 return eap_sim_verify_mac(data->k_aut, req, mac, extra, extra_len); in eap_aka_verify_mac()
[all …]
Deap_server_sim.c22 u8 k_aut[EAP_SIM_K_AUT_LEN]; member
250 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, in eap_sim_build_challenge()
268 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_build_reauth()
289 buf = eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, NULL, 0); in eap_sim_build_reauth()
337 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, NULL, 0); in eap_sim_build_notification()
572 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_process_start()
590 eap_sim_verify_mac(data->k_aut, respData, attr->mac, in eap_sim_process_challenge()
633 eap_sim_verify_mac(data->k_aut, respData, attr->mac, data->nonce_s, in eap_sim_process_reauth()
Deap_sim_db.h62 const u8 *k_aut, const u8 *k_re);
74 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member
Deap_sim_db.c245 const u8 *k_encr, const u8 *k_aut, const u8 *k_re) in db_add_reauth() argument
262 k_aut ? ", k_aut" : "", in db_add_reauth()
280 if (k_aut) { in db_add_reauth()
282 pos += wpa_snprintf_hex(pos, end - pos, k_aut, in db_add_reauth()
326 hexstr2bin(argv[i], reauth->k_aut, in get_reauth_cb()
327 sizeof(reauth->k_aut)); in get_reauth_cb()
1257 const u8 *k_aut, const u8 *k_re) in eap_sim_db_add_reauth_prime() argument
1267 k_encr, k_aut, k_re); in eap_sim_db_add_reauth_prime()
1274 os_memcpy(r->k_aut, k_aut, EAP_AKA_PRIME_K_AUT_LEN); in eap_sim_db_add_reauth_prime()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
Deap_server_aka.c23 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member
119 os_memcpy(data->k_aut, data->reauth->k_aut, in eap_aka_check_identity_reauth()
544 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, NULL, 0); in eap_aka_build_challenge()
568 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, in eap_aka_build_reauth()
592 buf = eap_sim_msg_finish(msg, data->eap_method, data->k_aut, NULL, 0); in eap_aka_build_reauth()
640 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, NULL, 0); in eap_aka_build_notification()
858 data->ck, data->k_encr, data->k_aut, in eap_aka_fullauth()
863 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, in eap_aka_fullauth()
925 return eap_sim_verify_mac_sha256(data->k_aut, req, mac, extra, in eap_aka_verify_mac()
927 return eap_sim_verify_mac(data->k_aut, req, mac, extra, extra_len); in eap_aka_verify_mac()
[all …]
Deap_server_sim.c22 u8 k_aut[EAP_SIM_K_AUT_LEN]; member
250 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, in eap_sim_build_challenge()
268 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_build_reauth()
289 buf = eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, NULL, 0); in eap_sim_build_reauth()
337 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, NULL, 0); in eap_sim_build_notification()
572 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_process_start()
590 eap_sim_verify_mac(data->k_aut, respData, attr->mac, in eap_sim_process_challenge()
632 eap_sim_verify_mac(data->k_aut, respData, attr->mac, data->nonce_s, in eap_sim_process_reauth()
Deap_sim_db.h62 const u8 *k_aut, const u8 *k_re);
74 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member
Deap_sim_db.c245 const u8 *k_encr, const u8 *k_aut, const u8 *k_re) in db_add_reauth() argument
262 k_aut ? ", k_aut" : "", in db_add_reauth()
280 if (k_aut) { in db_add_reauth()
282 pos += wpa_snprintf_hex(pos, end - pos, k_aut, in db_add_reauth()
326 hexstr2bin(argv[i], reauth->k_aut, in get_reauth_cb()
327 sizeof(reauth->k_aut)); in get_reauth_cb()
1257 const u8 *k_aut, const u8 *k_re) in eap_sim_db_add_reauth_prime() argument
1267 k_encr, k_aut, k_re); in eap_sim_db_add_reauth_prime()
1274 os_memcpy(r->k_aut, k_aut, EAP_AKA_PRIME_K_AUT_LEN); in eap_sim_db_add_reauth_prime()