/external/wpa_supplicant_8/src/eap_common/ |
D | eap_sim_common.h | 80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, 93 const u8 *ik, const u8 *ck, u8 *k_encr, 111 u8 *k_encr, u8 *k_aut, u8 *k_re, in eap_aka_prime_derive_keys() argument 206 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data, 225 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr,
|
D | eap_sim_common.c | 77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) in eap_sim_derive_keys() argument 86 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN); in eap_sim_derive_keys() 95 k_encr, EAP_SIM_K_ENCR_LEN); in eap_sim_derive_keys() 277 const u8 *ik, const u8 *ck, u8 *k_encr, in eap_aka_prime_derive_keys() argument 301 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN); in eap_aka_prime_derive_keys() 303 k_encr, EAP_SIM_K_ENCR_LEN); in eap_aka_prime_derive_keys() 935 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data, in eap_sim_parse_encr() argument 951 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { in eap_sim_parse_encr() 1135 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr, int attr_pad) in eap_sim_msg_add_encr_end() argument 1139 if (msg == NULL || k_encr == NULL || msg->iv == 0 || msg->encr == 0) in eap_sim_msg_add_encr_end() [all …]
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_sim_db.h | 61 char *reauth_id, u16 counter, const u8 *k_encr, 73 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member
|
D | eap_server_aka.c | 24 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member 116 os_memcpy(data->k_encr, data->reauth->k_encr, in eap_aka_check_identity_reauth() 455 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { in eap_aka_build_encr() 560 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, in eap_aka_build_reauth() 611 if (eap_sim_msg_add_encr_end(msg, data->k_encr, in eap_aka_build_notification() 837 data->ck, data->k_encr, data->k_aut, in eap_aka_fullauth() 842 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, in eap_aka_fullauth() 999 data->k_encr, data->k_aut, in eap_aka_process_challenge() 1071 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_reauth() 1114 data->k_encr, data->k_aut, in eap_aka_process_reauth()
|
D | eap_sim_db.c | 245 const u8 *k_encr, const u8 *k_aut, const u8 *k_re) in db_add_reauth() argument 261 k_encr ? ", k_encr" : "", in db_add_reauth() 273 if (k_encr) { in db_add_reauth() 275 pos += wpa_snprintf_hex(pos, end - pos, k_encr, in db_add_reauth() 323 hexstr2bin(argv[i], reauth->k_encr, in get_reauth_cb() 324 sizeof(reauth->k_encr)); in get_reauth_cb() 1256 u16 counter, const u8 *k_encr, in eap_sim_db_add_reauth_prime() argument 1267 k_encr, k_aut, k_re); in eap_sim_db_add_reauth_prime() 1273 os_memcpy(r->k_encr, k_encr, EAP_SIM_K_ENCR_LEN); in eap_sim_db_add_reauth_prime()
|
D | eap_server_sim.c | 23 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member 208 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { in eap_sim_build_encr() 260 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_build_reauth() 308 if (eap_sim_msg_add_encr_end(msg, data->k_encr, in eap_sim_build_notification() 552 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_process_start() 625 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_reauth()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_sim.c | 31 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member 140 os_memset(data->k_encr, 0, EAP_SIM_K_ENCR_LEN); in eap_sim_clear_keys() 576 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { in eap_sim_response_reauth() 610 if (eap_sim_msg_add_encr_end(msg, data->k_encr, in eap_sim_response_notification() 780 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_process_challenge() 798 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_challenge() 839 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_notification_reauth() 956 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_reauthentication()
|
D | eap_aka.c | 28 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member 136 os_memset(data->k_encr, 0, EAP_SIM_K_ENCR_LEN); in eap_aka_clear_keys() 688 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { in eap_aka_response_reauth() 723 if (eap_sim_msg_add_encr_end(msg, data->k_encr, in eap_aka_response_notification() 1011 data->ck, data->k_encr, data->k_aut, in eap_aka_process_challenge() 1016 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, in eap_aka_process_challenge() 1034 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_challenge() 1075 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_notification_reauth() 1199 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_reauthentication()
|