Home
last modified time | relevance | path

Searched refs:k_encr (Results 1 - 16 of 16) sorted by relevance

/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
H A Deap_sim_common.h80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk,
93 const u8 *ik, const u8 *ck, u8 *k_encr,
111 u8 *k_encr, u8 *k_aut, u8 *k_re, in eap_aka_prime_derive_keys()
206 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data,
225 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr,
108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) eap_aka_prime_derive_keys() argument
H A Deap_sim_common.c77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) in eap_sim_derive_keys() argument
86 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN); in eap_sim_derive_keys()
95 k_encr, EAP_SIM_K_ENCR_LEN); in eap_sim_derive_keys()
276 const u8 *ik, const u8 *ck, u8 *k_encr, in eap_aka_prime_derive_keys()
300 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN); in eap_aka_prime_derive_keys()
302 k_encr, EAP_SIM_K_ENCR_LEN); in eap_aka_prime_derive_keys()
933 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data, in eap_sim_parse_encr() argument
952 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { in eap_sim_parse_encr()
1137 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr, int attr_pad) in eap_sim_msg_add_encr_end() argument
1141 if (msg == NULL || k_encr in eap_sim_msg_add_encr_end()
275 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) eap_aka_prime_derive_keys() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
H A Deap_sim_common.h84 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk,
97 const u8 *ik, const u8 *ck, u8 *k_encr,
115 u8 *k_encr, u8 *k_aut, u8 *k_re, in eap_aka_prime_derive_keys()
210 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data,
229 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr,
112 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) eap_aka_prime_derive_keys() argument
H A Deap_sim_common.c81 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) in eap_sim_derive_keys() argument
90 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN); in eap_sim_derive_keys()
99 k_encr, EAP_SIM_K_ENCR_LEN); in eap_sim_derive_keys()
280 const u8 *ik, const u8 *ck, u8 *k_encr, in eap_aka_prime_derive_keys()
304 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN); in eap_aka_prime_derive_keys()
306 k_encr, EAP_SIM_K_ENCR_LEN); in eap_aka_prime_derive_keys()
943 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data, in eap_sim_parse_encr() argument
962 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { in eap_sim_parse_encr()
1147 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr, int attr_pad) in eap_sim_msg_add_encr_end() argument
1151 if (msg == NULL || k_encr in eap_sim_msg_add_encr_end()
279 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) eap_aka_prime_derive_keys() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
H A Deap_sim_db.h61 char *reauth_id, u16 counter, const u8 *k_encr,
73 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member
H A Deap_server_aka.c24 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member
117 os_memcpy(data->k_encr, data->reauth->k_encr, in eap_aka_check_identity_reauth()
462 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { in eap_aka_build_encr()
568 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, in eap_aka_build_reauth()
628 if (eap_sim_msg_add_encr_end(msg, data->k_encr, in eap_aka_build_notification()
858 data->ck, data->k_encr, data->k_aut, in eap_aka_fullauth()
863 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, in eap_aka_fullauth()
1020 data->k_encr, data->k_aut, in eap_aka_process_challenge()
1092 decrypted = eap_sim_parse_encr(data->k_encr, att in eap_aka_process_reauth()
[all...]
H A Deap_sim_db.c124 " k_encr CHAR(32)," in db_table_create_reauth()
245 const u8 *k_encr, const u8 *k_aut, const u8 *k_re) in db_add_reauth()
261 k_encr ? ", k_encr" : "", in db_add_reauth()
273 if (k_encr) { in db_add_reauth()
275 pos += wpa_snprintf_hex(pos, end - pos, k_encr, in db_add_reauth()
322 } else if (os_strcmp(col[i], "k_encr") == 0 && argv[i]) { in get_reauth_cb()
323 hexstr2bin(argv[i], reauth->k_encr, in get_reauth_cb()
324 sizeof(reauth->k_encr)); in get_reauth_cb()
1245 * @k_encr
243 db_add_reauth(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *mk, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) db_add_reauth() argument
1254 eap_sim_db_add_reauth_prime(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) eap_sim_db_add_reauth_prime() argument
[all...]
H A Deap_server_sim.c23 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member
215 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { in eap_sim_build_encr()
268 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_build_reauth()
325 if (eap_sim_msg_add_encr_end(msg, data->k_encr, in eap_sim_build_notification()
572 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_process_start()
645 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_reauth()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
H A Deap_sim_db.h61 char *reauth_id, u16 counter, const u8 *k_encr,
73 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member
H A Deap_server_aka.c24 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member
117 os_memcpy(data->k_encr, data->reauth->k_encr, in eap_aka_check_identity_reauth()
462 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { in eap_aka_build_encr()
568 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, in eap_aka_build_reauth()
628 if (eap_sim_msg_add_encr_end(msg, data->k_encr, in eap_aka_build_notification()
858 data->ck, data->k_encr, data->k_aut, in eap_aka_fullauth()
863 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, in eap_aka_fullauth()
1021 data->k_encr, data->k_aut, in eap_aka_process_challenge()
1093 decrypted = eap_sim_parse_encr(data->k_encr, att in eap_aka_process_reauth()
[all...]
H A Deap_sim_db.c124 " k_encr CHAR(32)," in db_table_create_reauth()
245 const u8 *k_encr, const u8 *k_aut, const u8 *k_re) in db_add_reauth()
261 k_encr ? ", k_encr" : "", in db_add_reauth()
273 if (k_encr) { in db_add_reauth()
275 pos += wpa_snprintf_hex(pos, end - pos, k_encr, in db_add_reauth()
322 } else if (os_strcmp(col[i], "k_encr") == 0 && argv[i]) { in get_reauth_cb()
323 hexstr2bin(argv[i], reauth->k_encr, in get_reauth_cb()
324 sizeof(reauth->k_encr)); in get_reauth_cb()
1245 * @k_encr
243 db_add_reauth(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *mk, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) db_add_reauth() argument
1254 eap_sim_db_add_reauth_prime(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) eap_sim_db_add_reauth_prime() argument
[all...]
H A Deap_server_sim.c23 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member
215 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { in eap_sim_build_encr()
268 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_build_reauth()
325 if (eap_sim_msg_add_encr_end(msg, data->k_encr, in eap_sim_build_notification()
572 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_process_start()
646 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_reauth()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
H A Deap_sim.c31 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member
145 os_memset(data->k_encr, 0, EAP_SIM_K_ENCR_LEN); in eap_sim_clear_keys()
587 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { in eap_sim_response_reauth()
621 if (eap_sim_msg_add_encr_end(msg, data->k_encr, in eap_sim_response_notification()
801 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_process_challenge()
824 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_challenge()
865 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_notification_reauth()
1003 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_reauthentication()
H A Deap_aka.c28 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member
143 os_memset(data->k_encr, 0, EAP_SIM_K_ENCR_LEN); in eap_aka_clear_keys()
710 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { in eap_aka_response_reauth()
745 if (eap_sim_msg_add_encr_end(msg, data->k_encr, in eap_aka_response_notification()
1062 data->ck, data->k_encr, data->k_aut, in eap_aka_process_challenge()
1067 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, in eap_aka_process_challenge()
1090 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_challenge()
1131 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_notification_reauth()
1269 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_reauthentication()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
H A Deap_sim.c31 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member
147 os_memset(data->k_encr, 0, EAP_SIM_K_ENCR_LEN); in eap_sim_clear_keys()
592 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { in eap_sim_response_reauth()
626 if (eap_sim_msg_add_encr_end(msg, data->k_encr, in eap_sim_response_notification()
813 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, in eap_sim_process_challenge()
836 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_challenge()
877 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_notification_reauth()
1015 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_reauthentication()
H A Deap_aka.c28 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member
143 os_memset(data->k_encr, 0, EAP_SIM_K_ENCR_LEN); in eap_aka_clear_keys()
719 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { in eap_aka_response_reauth()
754 if (eap_sim_msg_add_encr_end(msg, data->k_encr, in eap_aka_response_notification()
1076 data->ck, data->k_encr, data->k_aut, in eap_aka_process_challenge()
1081 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, in eap_aka_process_challenge()
1104 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_challenge()
1145 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_notification_reauth()
1283 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_reauthentication()

Completed in 21 milliseconds