/freebsd-9.3-release/contrib/wpa/src/eap_server/ |
H A D | eap_sim_db.h | 57 u16 counter, const u8 *k_encr, const u8 *k_aut, 71 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_sim_reauth
|
H A D | eap_server_aka.c | 29 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_aka_data 350 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { 455 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 506 if (eap_sim_msg_add_encr_end(msg, data->k_encr, 650 os_memcpy(data->k_encr, 651 data->reauth->k_encr, 741 data->ck, data->k_encr, data->k_aut, 746 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 900 data->k_encr, data->k_aut, 975 decrypted = eap_sim_parse_encr(data->k_encr, att [all...] |
H A D | eap_server_sim.c | 28 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_sim_data 188 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { 240 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 288 if (eap_sim_msg_add_encr_end(msg, data->k_encr, 501 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 582 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
|
H A D | eap_sim_db.c | 1036 * @k_encr: K_encr from the previous full authentication 1047 u16 counter, const u8 *k_encr, const u8 *k_aut, 1059 os_memcpy(r->k_encr, k_encr, EAP_SIM_K_ENCR_LEN); 1045 eap_sim_db_add_reauth_prime(void *priv, const u8 *identity, size_t identity_len, char *reauth_id, u16 counter, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument
|
/freebsd-9.3-release/contrib/wpa/src/eap_common/ |
H A D | eap_sim_common.h | 86 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, 99 const u8 *ik, const u8 *ck, u8 *k_encr, 117 u8 *k_encr, u8 *k_aut, u8 *k_re, 212 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data, 230 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr, 114 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
|
H A D | eap_sim_common.c | 82 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) argument 91 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN); 100 k_encr, EAP_SIM_K_ENCR_LEN); 282 const u8 *ik, const u8 *ck, u8 *k_encr, 306 os_memcpy(k_encr, pos, EAP_SIM_K_ENCR_LEN); 308 k_encr, EAP_SIM_K_ENCR_LEN); 940 u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data, argument 956 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { 1141 int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr, int attr_pad) argument 1145 if (msg == NULL || k_encr 281 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument [all...] |
/freebsd-9.3-release/contrib/wpa/src/eap_peer/ |
H A D | eap_sim.c | 36 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_sim_data 443 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { 477 if (eap_sim_msg_add_encr_end(msg, data->k_encr, 641 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 659 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 700 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 817 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
|
H A D | eap_aka.c | 34 u8 k_encr[EAP_SIM_K_ENCR_LEN]; member in struct:eap_aka_data 548 if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) { 583 if (eap_sim_msg_add_encr_end(msg, data->k_encr, 868 data->ck, data->k_encr, data->k_aut, 873 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 891 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 932 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 1056 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
|