/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_common/ |
H A D | eap_sim_common.h | 86 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, 92 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req, 94 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, 100 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk); 104 int eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req, 107 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len, 117 u8 *k_encr, u8 *k_aut, u8 *k_re, 131 static inline int eap_sim_verify_mac_sha256(const u8 *k_aut, argument 220 struct wpabuf * eap_sim_msg_finish(struct eap_sim_msg *msg, const u8 *k_aut, 114 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
|
H A D | eap_sim_common.c | 82 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) argument 93 os_memcpy(k_aut, pos, EAP_SIM_K_AUT_LEN); 102 k_aut, EAP_SIM_K_AUT_LEN); 170 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req, argument 200 k_aut, EAP_SIM_K_AUT_LEN); 201 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac); 210 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, argument 228 k_aut, EAP_SIM_K_AUT_LEN); 229 hmac_sha1_vector(k_aut, EAP_SIM_K_AUT_LEN, 2, addr, len, hmac); 283 u8 *k_aut, u 281 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument 365 eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument 405 eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, const u8 *extra, size_t extra_len) argument 1014 eap_sim_msg_finish(struct eap_sim_msg *msg, const u8 *k_aut, const u8 *extra, size_t extra_len) argument [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_server/ |
H A D | eap_sim_db.h | 57 u16 counter, const u8 *k_encr, const u8 *k_aut, 72 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_sim_reauth
|
H A D | eap_server_aka.c | 28 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_aka_data 432 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0); 455 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 479 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0); 518 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0); 653 os_memcpy(data->k_aut, 654 data->reauth->k_aut, 741 data->ck, data->k_encr, data->k_aut, 746 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, 793 return eap_sim_verify_mac_sha256(data->k_aut, re [all...] |
H A D | eap_server_sim.c | 27 u8 k_aut[EAP_SIM_K_AUT_LEN]; member in struct:eap_sim_data 223 return eap_sim_msg_finish(msg, data->k_aut, data->nonce_mt, 240 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 261 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0); 300 return eap_sim_msg_finish(msg, data->k_aut, NULL, 0); 501 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 517 eap_sim_verify_mac(data->k_aut, respData, attr->mac, 569 eap_sim_verify_mac(data->k_aut, respData, attr->mac, data->nonce_s,
|
H A D | eap_sim_db.c | 1037 * @k_aut: K_aut from the previous full authentication 1047 u16 counter, const u8 *k_encr, const u8 *k_aut, 1060 os_memcpy(r->k_aut, k_aut, EAP_AKA_PRIME_K_AUT_LEN); 1045 eap_sim_db_add_reauth_prime(void *priv, const u8 *identity, size_t identity_len, char *reauth_id, u16 counter, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_peer/ |
H A D | eap_sim.c | 35 u8 k_aut[EAP_SIM_K_AUT_LEN]; member in struct:eap_sim_data 414 return eap_sim_msg_finish(msg, data->k_aut, (u8 *) data->sres, 455 return eap_sim_msg_finish(msg, data->k_aut, data->nonce_s, 464 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; local 469 if (k_aut && data->reauth) { 485 if (k_aut) { 489 return eap_sim_msg_finish(msg, k_aut, (u8 *) "", 0); 641 eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk, 643 if (eap_sim_verify_mac(data->k_aut, reqDat [all...] |
H A D | eap_aka.c | 33 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN]; member in struct:eap_aka_data 519 return eap_sim_msg_finish(msg, data->k_aut, (u8 *) "", 0); 561 return eap_sim_msg_finish(msg, data->k_aut, nonce_s, 570 u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL; local 575 if (k_aut && data->reauth) { 591 if (k_aut) { 595 return eap_sim_msg_finish(msg, k_aut, (u8 *) "", 0); 655 return eap_sim_verify_mac_sha256(data->k_aut, req, mac, extra, 657 return eap_sim_verify_mac(data->k_aut, re [all...] |