/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_pax_common.c | 18 * @mac_id: MAC ID (EAP_PAX_MAC_*) / currently, only HMAC_SHA1_128 is supported 30 int eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len, in eap_pax_kdf() argument 46 if (mac_id != EAP_PAX_MAC_HMAC_SHA1_128) in eap_pax_kdf() 73 * @mac_id: MAC ID (EAP_PAX_MAC_*) / currently, only HMAC_SHA1_128 is supported 87 int eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len, in eap_pax_mac() argument 99 if (mac_id != EAP_PAX_MAC_HMAC_SHA1_128) in eap_pax_mac() 120 * @mac_id: MAC ID (EAP_PAX_MAC_*) / currently, only HMAC_SHA1_128 is supported 129 int eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, in eap_pax_initial_key_derivation() argument 133 if (eap_pax_kdf(mac_id, ak, EAP_PAX_AK_LEN, "Master Key", in eap_pax_initial_key_derivation() 135 eap_pax_kdf(mac_id, m in eap_pax_initial_key_derivation() [all...] |
H A D | eap_pax_common.h | 19 u8 mac_id; member 48 /* mac_id: */ 80 int eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len, 84 int eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len, 89 int eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | eap_pax_common.c | 18 * @mac_id: MAC ID (EAP_PAX_MAC_*) / currently, only HMAC_SHA1_128 is supported 30 int eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len, in eap_pax_kdf() argument 46 if (mac_id != EAP_PAX_MAC_HMAC_SHA1_128) in eap_pax_kdf() 73 * @mac_id: MAC ID (EAP_PAX_MAC_*) / currently, only HMAC_SHA1_128 is supported 87 int eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len, in eap_pax_mac() argument 99 if (mac_id != EAP_PAX_MAC_HMAC_SHA1_128) in eap_pax_mac() 120 * @mac_id: MAC ID (EAP_PAX_MAC_*) / currently, only HMAC_SHA1_128 is supported 129 int eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, in eap_pax_initial_key_derivation() argument 133 if (eap_pax_kdf(mac_id, ak, EAP_PAX_AK_LEN, "Master Key", in eap_pax_initial_key_derivation() 135 eap_pax_kdf(mac_id, m in eap_pax_initial_key_derivation() [all...] |
H A D | eap_pax_common.h | 19 u8 mac_id; member 48 /* mac_id: */ 80 int eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len, 84 int eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len, 89 int eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap_pax.c | 27 u8 mac_id, dh_group_id, public_key_id; member 107 pax->mac_id = req->mac_id; in eap_pax_alloc_resp() 180 if (eap_pax_initial_key_derivation(req->mac_id, data->ak, data->rand.e, in eap_pax_process_std_1() 207 eap_pax_mac(req->mac_id, data->ck, EAP_PAX_CK_LEN, in eap_pax_process_std_1() 217 eap_pax_mac(req->mac_id, data->ick, EAP_PAX_ICK_LEN, in eap_pax_process_std_1() 223 data->mac_id = req->mac_id; in eap_pax_process_std_1() 278 if (eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN, in eap_pax_process_std_3() 315 if (eap_pax_mac(data->mac_id, dat in eap_pax_process_std_3() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | eap_pax.c | 27 u8 mac_id, dh_group_id, public_key_id; member 107 pax->mac_id = req->mac_id; in eap_pax_alloc_resp() 180 if (eap_pax_initial_key_derivation(req->mac_id, data->ak, data->rand.e, in eap_pax_process_std_1() 207 eap_pax_mac(req->mac_id, data->ck, EAP_PAX_CK_LEN, in eap_pax_process_std_1() 217 eap_pax_mac(req->mac_id, data->ick, EAP_PAX_ICK_LEN, in eap_pax_process_std_1() 223 data->mac_id = req->mac_id; in eap_pax_process_std_1() 278 if (eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN, in eap_pax_process_std_3() 315 if (eap_pax_mac(data->mac_id, dat in eap_pax_process_std_3() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_pax.c | 27 u8 mac_id; member 58 data->mac_id = EAP_PAX_MAC_HMAC_SHA1_128; in eap_pax_init() 100 pax->mac_id = data->mac_id; in eap_pax_build_std_1() 110 if (eap_pax_mac(data->mac_id, (u8 *) "", 0, in eap_pax_build_std_1() 146 pax->mac_id = data->mac_id; in eap_pax_build_std_3() 152 if (eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN, in eap_pax_build_std_3() 166 if (eap_pax_mac(data->mac_id, data->ick, EAP_PAX_ICK_LEN, in eap_pax_build_std_3() 217 "flags 0x%x mac_id in eap_pax_check() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_server_pax.c | 27 u8 mac_id; member 58 data->mac_id = EAP_PAX_MAC_HMAC_SHA1_128; in eap_pax_init() 100 pax->mac_id = data->mac_id; in eap_pax_build_std_1() 110 if (eap_pax_mac(data->mac_id, (u8 *) "", 0, in eap_pax_build_std_1() 146 pax->mac_id = data->mac_id; in eap_pax_build_std_3() 152 if (eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN, in eap_pax_build_std_3() 166 if (eap_pax_mac(data->mac_id, data->ick, EAP_PAX_ICK_LEN, in eap_pax_build_std_3() 217 "flags 0x%x mac_id in eap_pax_check() [all...] |