Home
last modified time | relevance | path

Searched refs:k_encr (Results 1 – 16 of 16) sorted by relevance

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
Deap_sim_common.h84 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk,
97 const u8 *ik, const u8 *ck, u8 *k_encr,
115 u8 *k_encr, u8 *k_aut, u8 *k_re, in eap_aka_prime_derive_keys() argument
210 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data,
229 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr,
Deap_sim_common.c81 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) in eap_sim_derive_keys() argument
90 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN); in eap_sim_derive_keys()
99 k_encr, EAP_SIM_K_ENCR_LEN); in eap_sim_derive_keys()
280 const u8 *ik, const u8 *ck, u8 *k_encr, in eap_aka_prime_derive_keys() argument
304 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN); in eap_aka_prime_derive_keys()
306 k_encr, EAP_SIM_K_ENCR_LEN); in eap_aka_prime_derive_keys()
943 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data, in eap_sim_parse_encr() argument
962 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { in eap_sim_parse_encr()
1147 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr, int attr_pad) in eap_sim_msg_add_encr_end() argument
1151 if (msg == NULL || k_encr == NULL || msg->iv == 0 || msg->encr == 0) in eap_sim_msg_add_encr_end()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
Deap_sim_common.h80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk,
93 const u8 *ik, const u8 *ck, u8 *k_encr,
111 u8 *k_encr, u8 *k_aut, u8 *k_re, in eap_aka_prime_derive_keys() argument
206 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data,
225 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr,
Deap_sim_common.c77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) in eap_sim_derive_keys() argument
86 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN); in eap_sim_derive_keys()
95 k_encr, EAP_SIM_K_ENCR_LEN); in eap_sim_derive_keys()
276 const u8 *ik, const u8 *ck, u8 *k_encr, in eap_aka_prime_derive_keys() argument
300 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN); in eap_aka_prime_derive_keys()
302 k_encr, EAP_SIM_K_ENCR_LEN); in eap_aka_prime_derive_keys()
933 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data, in eap_sim_parse_encr() argument
952 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { in eap_sim_parse_encr()
1137 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr, int attr_pad) in eap_sim_msg_add_encr_end() argument
1141 if (msg == NULL || k_encr == NULL || msg->iv == 0 || msg->encr == 0) in eap_sim_msg_add_encr_end()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
Deap_server_aka.c24 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member
117 os_memcpy(data->k_encr, data->reauth->k_encr, in eap_aka_check_identity_reauth()
462 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { in eap_aka_build_encr()
568 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, in eap_aka_build_reauth()
628 if (eap_sim_msg_add_encr_end(msg, data->k_encr, in eap_aka_build_notification()
858 data->ck, data->k_encr, data->k_aut, in eap_aka_fullauth()
863 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, in eap_aka_fullauth()
1021 data->k_encr, data->k_aut, in eap_aka_process_challenge()
1093 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_reauth()
1136 data->k_encr, data->k_aut, in eap_aka_process_reauth()
Deap_sim_db.h61 char *reauth_id, u16 counter, const u8 *k_encr,
73 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member
Deap_sim_db.c245 const u8 *k_encr, const u8 *k_aut, const u8 *k_re) in db_add_reauth() argument
261 k_encr ? ", k_encr" : "", in db_add_reauth()
273 if (k_encr) { in db_add_reauth()
275 pos += wpa_snprintf_hex(pos, end - pos, k_encr, in db_add_reauth()
323 hexstr2bin(argv[i], reauth->k_encr, in get_reauth_cb()
324 sizeof(reauth->k_encr)); in get_reauth_cb()
1256 u16 counter, const u8 *k_encr, in eap_sim_db_add_reauth_prime() argument
1267 k_encr, k_aut, k_re); in eap_sim_db_add_reauth_prime()
1273 os_memcpy(r->k_encr, k_encr, EAP_SIM_K_ENCR_LEN); in eap_sim_db_add_reauth_prime()
Deap_server_sim.c23 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member
215 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { in eap_sim_build_encr()
268 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_build_reauth()
325 if (eap_sim_msg_add_encr_end(msg, data->k_encr, in eap_sim_build_notification()
572 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_process_start()
646 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_reauth()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
Deap_server_aka.c24 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member
117 os_memcpy(data->k_encr, data->reauth->k_encr, in eap_aka_check_identity_reauth()
462 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { in eap_aka_build_encr()
568 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, in eap_aka_build_reauth()
628 if (eap_sim_msg_add_encr_end(msg, data->k_encr, in eap_aka_build_notification()
858 data->ck, data->k_encr, data->k_aut, in eap_aka_fullauth()
863 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, in eap_aka_fullauth()
1020 data->k_encr, data->k_aut, in eap_aka_process_challenge()
1092 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_reauth()
1135 data->k_encr, data->k_aut, in eap_aka_process_reauth()
Deap_sim_db.h61 char *reauth_id, u16 counter, const u8 *k_encr,
73 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member
Deap_sim_db.c245 const u8 *k_encr, const u8 *k_aut, const u8 *k_re) in db_add_reauth() argument
261 k_encr ? ", k_encr" : "", in db_add_reauth()
273 if (k_encr) { in db_add_reauth()
275 pos += wpa_snprintf_hex(pos, end - pos, k_encr, in db_add_reauth()
323 hexstr2bin(argv[i], reauth->k_encr, in get_reauth_cb()
324 sizeof(reauth->k_encr)); in get_reauth_cb()
1256 u16 counter, const u8 *k_encr, in eap_sim_db_add_reauth_prime() argument
1267 k_encr, k_aut, k_re); in eap_sim_db_add_reauth_prime()
1273 os_memcpy(r->k_encr, k_encr, EAP_SIM_K_ENCR_LEN); in eap_sim_db_add_reauth_prime()
Deap_server_sim.c23 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member
215 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { in eap_sim_build_encr()
268 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_build_reauth()
325 if (eap_sim_msg_add_encr_end(msg, data->k_encr, in eap_sim_build_notification()
572 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_process_start()
645 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_reauth()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
Deap_sim.c31 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member
145 os_memset(data->k_encr, 0, EAP_SIM_K_ENCR_LEN); in eap_sim_clear_keys()
587 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { in eap_sim_response_reauth()
621 if (eap_sim_msg_add_encr_end(msg, data->k_encr, in eap_sim_response_notification()
801 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_process_challenge()
824 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_challenge()
865 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_notification_reauth()
1003 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_reauthentication()
Deap_aka.c28 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member
143 os_memset(data->k_encr, 0, EAP_SIM_K_ENCR_LEN); in eap_aka_clear_keys()
710 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { in eap_aka_response_reauth()
745 if (eap_sim_msg_add_encr_end(msg, data->k_encr, in eap_aka_response_notification()
1062 data->ck, data->k_encr, data->k_aut, in eap_aka_process_challenge()
1067 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, in eap_aka_process_challenge()
1090 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_challenge()
1131 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_notification_reauth()
1269 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_reauthentication()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
Deap_sim.c31 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member
147 os_memset(data->k_encr, 0, EAP_SIM_K_ENCR_LEN); in eap_sim_clear_keys()
592 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { in eap_sim_response_reauth()
626 if (eap_sim_msg_add_encr_end(msg, data->k_encr, in eap_sim_response_notification()
813 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_process_challenge()
836 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_challenge()
877 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_notification_reauth()
1015 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_reauthentication()
Deap_aka.c28 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member
143 os_memset(data->k_encr, 0, EAP_SIM_K_ENCR_LEN); in eap_aka_clear_keys()
719 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { in eap_aka_response_reauth()
754 if (eap_sim_msg_add_encr_end(msg, data->k_encr, in eap_aka_response_notification()
1076 data->ck, data->k_encr, data->k_aut, in eap_aka_process_challenge()
1081 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, in eap_aka_process_challenge()
1104 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_challenge()
1145 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_notification_reauth()
1283 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_reauthentication()