Home
last modified time | relevance | path

Searched refs:k_encr (Results 1 – 8 of 8) sorted by relevance

/external/wpa_supplicant_8/src/eap_common/
Deap_sim_common.h80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk,
93 const u8 *ik, const u8 *ck, u8 *k_encr,
111 u8 *k_encr, u8 *k_aut, u8 *k_re, in eap_aka_prime_derive_keys() argument
206 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data,
225 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr,
Deap_sim_common.c77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) in eap_sim_derive_keys() argument
86 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN); in eap_sim_derive_keys()
95 k_encr, EAP_SIM_K_ENCR_LEN); in eap_sim_derive_keys()
277 const u8 *ik, const u8 *ck, u8 *k_encr, in eap_aka_prime_derive_keys() argument
301 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN); in eap_aka_prime_derive_keys()
303 k_encr, EAP_SIM_K_ENCR_LEN); in eap_aka_prime_derive_keys()
935 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data, in eap_sim_parse_encr() argument
951 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { in eap_sim_parse_encr()
1135 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr, int attr_pad) in eap_sim_msg_add_encr_end() argument
1139 if (msg == NULL || k_encr == NULL || msg->iv == 0 || msg->encr == 0) in eap_sim_msg_add_encr_end()
[all …]
/external/wpa_supplicant_8/src/eap_server/
Deap_sim_db.h61 char *reauth_id, u16 counter, const u8 *k_encr,
73 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member
Deap_server_aka.c24 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member
116 os_memcpy(data->k_encr, data->reauth->k_encr, in eap_aka_check_identity_reauth()
455 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { in eap_aka_build_encr()
560 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, in eap_aka_build_reauth()
611 if (eap_sim_msg_add_encr_end(msg, data->k_encr, in eap_aka_build_notification()
837 data->ck, data->k_encr, data->k_aut, in eap_aka_fullauth()
842 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, in eap_aka_fullauth()
999 data->k_encr, data->k_aut, in eap_aka_process_challenge()
1071 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_reauth()
1114 data->k_encr, data->k_aut, in eap_aka_process_reauth()
Deap_sim_db.c245 const u8 *k_encr, const u8 *k_aut, const u8 *k_re) in db_add_reauth() argument
261 k_encr ? ", k_encr" : "", in db_add_reauth()
273 if (k_encr) { in db_add_reauth()
275 pos += wpa_snprintf_hex(pos, end - pos, k_encr, in db_add_reauth()
323 hexstr2bin(argv[i], reauth->k_encr, in get_reauth_cb()
324 sizeof(reauth->k_encr)); in get_reauth_cb()
1256 u16 counter, const u8 *k_encr, in eap_sim_db_add_reauth_prime() argument
1267 k_encr, k_aut, k_re); in eap_sim_db_add_reauth_prime()
1273 os_memcpy(r->k_encr, k_encr, EAP_SIM_K_ENCR_LEN); in eap_sim_db_add_reauth_prime()
Deap_server_sim.c23 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member
208 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { in eap_sim_build_encr()
260 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_build_reauth()
308 if (eap_sim_msg_add_encr_end(msg, data->k_encr, in eap_sim_build_notification()
552 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_process_start()
625 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_reauth()
/external/wpa_supplicant_8/src/eap_peer/
Deap_sim.c31 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member
140 os_memset(data->k_encr, 0, EAP_SIM_K_ENCR_LEN); in eap_sim_clear_keys()
576 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { in eap_sim_response_reauth()
610 if (eap_sim_msg_add_encr_end(msg, data->k_encr, in eap_sim_response_notification()
780 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_process_challenge()
798 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_challenge()
839 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_notification_reauth()
956 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_reauthentication()
Deap_aka.c28 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member
136 os_memset(data->k_encr, 0, EAP_SIM_K_ENCR_LEN); in eap_aka_clear_keys()
688 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { in eap_aka_response_reauth()
723 if (eap_sim_msg_add_encr_end(msg, data->k_encr, in eap_aka_response_notification()
1011 data->ck, data->k_encr, data->k_aut, in eap_aka_process_challenge()
1016 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, in eap_aka_process_challenge()
1034 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_challenge()
1075 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_notification_reauth()
1199 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_reauthentication()