/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
D | eap_sim_common.h | 84 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, 97 const u8 *ik, const u8 *ck, u8 *k_encr, 115 u8 *k_encr, u8 *k_aut, u8 *k_re, in eap_aka_prime_derive_keys() argument 210 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data, 229 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr,
|
D | eap_sim_common.c | 81 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) in eap_sim_derive_keys() argument 90 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN); in eap_sim_derive_keys() 99 k_encr, EAP_SIM_K_ENCR_LEN); in eap_sim_derive_keys() 280 const u8 *ik, const u8 *ck, u8 *k_encr, in eap_aka_prime_derive_keys() argument 304 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN); in eap_aka_prime_derive_keys() 306 k_encr, EAP_SIM_K_ENCR_LEN); in eap_aka_prime_derive_keys() 943 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data, in eap_sim_parse_encr() argument 962 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { in eap_sim_parse_encr() 1147 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr, int attr_pad) in eap_sim_msg_add_encr_end() argument 1151 if (msg == NULL || k_encr == NULL || msg->iv == 0 || msg->encr == 0) in eap_sim_msg_add_encr_end() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
D | eap_sim_common.h | 80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, 93 const u8 *ik, const u8 *ck, u8 *k_encr, 111 u8 *k_encr, u8 *k_aut, u8 *k_re, in eap_aka_prime_derive_keys() argument 206 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data, 225 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr,
|
D | eap_sim_common.c | 77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) in eap_sim_derive_keys() argument 86 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN); in eap_sim_derive_keys() 95 k_encr, EAP_SIM_K_ENCR_LEN); in eap_sim_derive_keys() 276 const u8 *ik, const u8 *ck, u8 *k_encr, in eap_aka_prime_derive_keys() argument 300 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN); in eap_aka_prime_derive_keys() 302 k_encr, EAP_SIM_K_ENCR_LEN); in eap_aka_prime_derive_keys() 933 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data, in eap_sim_parse_encr() argument 952 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { in eap_sim_parse_encr() 1137 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr, int attr_pad) in eap_sim_msg_add_encr_end() argument 1141 if (msg == NULL || k_encr == NULL || msg->iv == 0 || msg->encr == 0) in eap_sim_msg_add_encr_end() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap_server_aka.c | 24 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member 117 os_memcpy(data->k_encr, data->reauth->k_encr, in eap_aka_check_identity_reauth() 462 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { in eap_aka_build_encr() 568 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, in eap_aka_build_reauth() 628 if (eap_sim_msg_add_encr_end(msg, data->k_encr, in eap_aka_build_notification() 858 data->ck, data->k_encr, data->k_aut, in eap_aka_fullauth() 863 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, in eap_aka_fullauth() 1021 data->k_encr, data->k_aut, in eap_aka_process_challenge() 1093 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_reauth() 1136 data->k_encr, data->k_aut, in eap_aka_process_reauth()
|
D | eap_sim_db.h | 61 char *reauth_id, u16 counter, const u8 *k_encr, 73 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member
|
D | eap_sim_db.c | 245 const u8 *k_encr, const u8 *k_aut, const u8 *k_re) in db_add_reauth() argument 261 k_encr ? ", k_encr" : "", in db_add_reauth() 273 if (k_encr) { in db_add_reauth() 275 pos += wpa_snprintf_hex(pos, end - pos, k_encr, in db_add_reauth() 323 hexstr2bin(argv[i], reauth->k_encr, in get_reauth_cb() 324 sizeof(reauth->k_encr)); in get_reauth_cb() 1256 u16 counter, const u8 *k_encr, in eap_sim_db_add_reauth_prime() argument 1267 k_encr, k_aut, k_re); in eap_sim_db_add_reauth_prime() 1273 os_memcpy(r->k_encr, k_encr, EAP_SIM_K_ENCR_LEN); in eap_sim_db_add_reauth_prime()
|
D | eap_server_sim.c | 23 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member 215 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { in eap_sim_build_encr() 268 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_build_reauth() 325 if (eap_sim_msg_add_encr_end(msg, data->k_encr, in eap_sim_build_notification() 572 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_process_start() 646 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_reauth()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap_server_aka.c | 24 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member 117 os_memcpy(data->k_encr, data->reauth->k_encr, in eap_aka_check_identity_reauth() 462 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { in eap_aka_build_encr() 568 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, in eap_aka_build_reauth() 628 if (eap_sim_msg_add_encr_end(msg, data->k_encr, in eap_aka_build_notification() 858 data->ck, data->k_encr, data->k_aut, in eap_aka_fullauth() 863 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, in eap_aka_fullauth() 1020 data->k_encr, data->k_aut, in eap_aka_process_challenge() 1092 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_reauth() 1135 data->k_encr, data->k_aut, in eap_aka_process_reauth()
|
D | eap_sim_db.h | 61 char *reauth_id, u16 counter, const u8 *k_encr, 73 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member
|
D | eap_sim_db.c | 245 const u8 *k_encr, const u8 *k_aut, const u8 *k_re) in db_add_reauth() argument 261 k_encr ? ", k_encr" : "", in db_add_reauth() 273 if (k_encr) { in db_add_reauth() 275 pos += wpa_snprintf_hex(pos, end - pos, k_encr, in db_add_reauth() 323 hexstr2bin(argv[i], reauth->k_encr, in get_reauth_cb() 324 sizeof(reauth->k_encr)); in get_reauth_cb() 1256 u16 counter, const u8 *k_encr, in eap_sim_db_add_reauth_prime() argument 1267 k_encr, k_aut, k_re); in eap_sim_db_add_reauth_prime() 1273 os_memcpy(r->k_encr, k_encr, EAP_SIM_K_ENCR_LEN); in eap_sim_db_add_reauth_prime()
|
D | eap_server_sim.c | 23 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member 215 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { in eap_sim_build_encr() 268 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_build_reauth() 325 if (eap_sim_msg_add_encr_end(msg, data->k_encr, in eap_sim_build_notification() 572 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_process_start() 645 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_reauth()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
D | eap_sim.c | 31 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member 145 os_memset(data->k_encr, 0, EAP_SIM_K_ENCR_LEN); in eap_sim_clear_keys() 587 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { in eap_sim_response_reauth() 621 if (eap_sim_msg_add_encr_end(msg, data->k_encr, in eap_sim_response_notification() 801 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_process_challenge() 824 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_challenge() 865 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_notification_reauth() 1003 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_reauthentication()
|
D | eap_aka.c | 28 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member 143 os_memset(data->k_encr, 0, EAP_SIM_K_ENCR_LEN); in eap_aka_clear_keys() 710 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { in eap_aka_response_reauth() 745 if (eap_sim_msg_add_encr_end(msg, data->k_encr, in eap_aka_response_notification() 1062 data->ck, data->k_encr, data->k_aut, in eap_aka_process_challenge() 1067 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, in eap_aka_process_challenge() 1090 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_challenge() 1131 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_notification_reauth() 1269 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_reauthentication()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
D | eap_sim.c | 31 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member 147 os_memset(data->k_encr, 0, EAP_SIM_K_ENCR_LEN); in eap_sim_clear_keys() 592 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { in eap_sim_response_reauth() 626 if (eap_sim_msg_add_encr_end(msg, data->k_encr, in eap_sim_response_notification() 813 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_process_challenge() 836 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_challenge() 877 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_notification_reauth() 1015 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_reauthentication()
|
D | eap_aka.c | 28 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member 143 os_memset(data->k_encr, 0, EAP_SIM_K_ENCR_LEN); in eap_aka_clear_keys() 719 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { in eap_aka_response_reauth() 754 if (eap_sim_msg_add_encr_end(msg, data->k_encr, in eap_aka_response_notification() 1076 data->ck, data->k_encr, data->k_aut, in eap_aka_process_challenge() 1081 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, in eap_aka_process_challenge() 1104 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_challenge() 1145 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_notification_reauth() 1283 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_reauthentication()
|