Home
last modified time | relevance | path

Searched refs:k_aut (Results 1 – 8 of 8) sorted by relevance

/external/wpa_supplicant_8/src/eap_common/
Deap_sim_common.h80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk,
86 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req,
88 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac,
94 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk);
98 int eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req,
101 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len,
111 u8 *k_encr, u8 *k_aut, u8 *k_re, in eap_aka_prime_derive_keys() argument
125 static inline int eap_sim_verify_mac_sha256(const u8 *k_aut, in eap_sim_verify_mac_sha256() argument
215 const u8 *k_aut,
Deap_sim_common.c77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) in eap_sim_derive_keys() argument
88 os_memcpy(k_aut, pos, EAP_SIM_K_AUT_LEN); in eap_sim_derive_keys()
97 k_aut, EAP_SIM_K_AUT_LEN); in eap_sim_derive_keys()
165 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req, in eap_sim_verify_mac() argument
195 k_aut, EAP_SIM_K_AUT_LEN); in eap_sim_verify_mac()
196 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac); in eap_sim_verify_mac()
205 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, in eap_sim_add_mac() argument
223 k_aut, EAP_SIM_K_AUT_LEN); in eap_sim_add_mac()
224 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac); in eap_sim_add_mac()
278 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys() argument
[all …]
/external/wpa_supplicant_8/src/eap_peer/
Deap_sim.c30 u8 k_aut[EAP_SIM_K_AUT_LEN]; member
139 os_memset(data->k_aut, 0, EAP_SIM_K_AUT_LEN); in eap_sim_clear_keys()
545 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, in eap_sim_response_challenge()
588 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, nonce_s, in eap_sim_response_reauth()
597 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; in eap_sim_response_notification() local
602 if (k_aut && data->reauth) { in eap_sim_response_notification()
618 if (k_aut) { in eap_sim_response_notification()
622 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, k_aut, (u8 *) "", 0); in eap_sim_response_notification()
780 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_process_challenge()
782 if (eap_sim_verify_mac(data->k_aut, reqData, attr->mac, data->nonce_mt, in eap_sim_process_challenge()
[all …]
Deap_aka.c27 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member
135 os_memset(data->k_aut, 0, EAP_AKA_PRIME_K_AUT_LEN); in eap_aka_clear_keys()
658 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, (u8 *) "", in eap_aka_response_challenge()
701 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, nonce_s, in eap_aka_response_reauth()
710 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; in eap_aka_response_notification() local
715 if (k_aut && data->reauth) { in eap_aka_response_notification()
731 if (k_aut) { in eap_aka_response_notification()
735 return eap_sim_msg_finish(msg, data->eap_method, k_aut, (u8 *) "", 0); in eap_aka_response_notification()
795 return eap_sim_verify_mac_sha256(data->k_aut, req, mac, extra, in eap_aka_verify_mac()
797 return eap_sim_verify_mac(data->k_aut, req, mac, extra, extra_len); in eap_aka_verify_mac()
[all …]
/external/wpa_supplicant_8/src/eap_server/
Deap_server_aka.c23 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member
118 os_memcpy(data->k_aut, data->reauth->k_aut, in eap_aka_check_identity_reauth()
537 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, NULL, 0); in eap_aka_build_challenge()
560 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, in eap_aka_build_reauth()
584 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, NULL, 0); in eap_aka_build_reauth()
623 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, NULL, 0); in eap_aka_build_notification()
837 data->ck, data->k_encr, data->k_aut, in eap_aka_fullauth()
842 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, in eap_aka_fullauth()
904 return eap_sim_verify_mac_sha256(data->k_aut, req, mac, extra, in eap_aka_verify_mac()
906 return eap_sim_verify_mac(data->k_aut, req, mac, extra, extra_len); in eap_aka_verify_mac()
[all …]
Deap_sim_db.h62 const u8 *k_aut, const u8 *k_re);
74 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member
Deap_server_sim.c22 u8 k_aut[EAP_SIM_K_AUT_LEN]; member
243 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, in eap_sim_build_challenge()
260 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_build_reauth()
281 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, NULL, 0); in eap_sim_build_reauth()
320 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, NULL, 0); in eap_sim_build_notification()
552 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_process_start()
570 eap_sim_verify_mac(data->k_aut, respData, attr->mac, in eap_sim_process_challenge()
612 eap_sim_verify_mac(data->k_aut, respData, attr->mac, data->nonce_s, in eap_sim_process_reauth()
Deap_sim_db.c245 const u8 *k_encr, const u8 *k_aut, const u8 *k_re) in db_add_reauth() argument
262 k_aut ? ", k_aut" : "", in db_add_reauth()
280 if (k_aut) { in db_add_reauth()
282 pos += wpa_snprintf_hex(pos, end - pos, k_aut, in db_add_reauth()
326 hexstr2bin(argv[i], reauth->k_aut, in get_reauth_cb()
327 sizeof(reauth->k_aut)); in get_reauth_cb()
1257 const u8 *k_aut, const u8 *k_re) in eap_sim_db_add_reauth_prime() argument
1267 k_encr, k_aut, k_re); in eap_sim_db_add_reauth_prime()
1274 os_memcpy(r->k_aut, k_aut, EAP_AKA_PRIME_K_AUT_LEN); in eap_sim_db_add_reauth_prime()