/aosp_15_r20/packages/modules/IPsec/src/java/com/android/internal/net/eap/ |
D | EapResult.java | 46 public final byte[] emsk; field in EapResult.EapSuccess 49 public EapSuccess(@NonNull byte[] msk, @NonNull byte[] emsk) { in EapSuccess() 53 public EapSuccess(@NonNull byte[] msk, @NonNull byte[] emsk, @Nullable EapInfo eapInfo) { in EapSuccess()
|
D | IEapCallback.java | 40 void onSuccess(byte[] msk, byte[] emsk, @Nullable EapInfo eapInfo); in onSuccess()
|
/aosp_15_r20/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_gpsk_common.c | 112 u8 *msk, u8 *emsk, in eap_gpsk_derive_keys_helper() 191 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, in eap_gpsk_derive_keys_aes() 227 u8 *msk, u8 *emsk, in eap_gpsk_derive_keys_sha256() 284 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, in eap_gpsk_derive_keys()
|
H A D | eap_sim_common.c | 77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) in eap_sim_derive_keys() 110 u8 *emsk) in eap_sim_derive_keys_reauth() 277 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys() 326 const u8 *nonce_s, u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys_reauth()
|
H A D | eap_teap_common.c | 103 int eap_teap_derive_eap_emsk(u16 tls_cs, const u8 *simck, u8 *emsk) in eap_teap_derive_eap_emsk() 148 const u8 *emsk, size_t emsk_len, in eap_teap_derive_imck()
|
H A D | eap_sim_common.h | 112 u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys() 120 u8 *emsk) in eap_aka_prime_derive_keys_reauth()
|
H A D | eap_psk_common.c | 35 u8 *emsk) in eap_psk_derive_keys()
|
H A D | eap_fast_common.c | 130 int eap_fast_derive_eap_emsk(const u8 *simck, u8 *emsk) in eap_fast_derive_eap_emsk()
|
H A D | eap_sake_common.c | 274 u8 *emsk) in eap_sake_derive_keys()
|
H A D | eap_pwd_common.c | 334 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) in compute_keys()
|
/aosp_15_r20/packages/modules/IPsec/tests/iketests/src/java/com/android/internal/net/eap/ |
D | EapMethodEndToEndTest.java | 79 protected void verifyEapSuccess(byte[] msk, byte[] emsk) { in verifyEapSuccess() 89 protected void verifyEapSuccessWithOption(byte[] msk, byte[] emsk) { in verifyEapSuccessWithOption()
|
D | EapAkaTest.java | 570 protected void verifyEapSuccess(byte[] msk, byte[] emsk) { in verifyEapSuccess() 577 protected void verifyEapSuccessWithOption(byte[] msk, byte[] emsk) { in verifyEapSuccessWithOption()
|
D | EapAuthenticatorTest.java | 239 public void onSuccess(byte[] msk, byte[] emsk, EapInfo eapInfo) { in onSuccess()
|
D | EapSimTest.java | 320 protected void verifyEapSuccess(byte[] msk, byte[] emsk) { in verifyEapSuccess()
|
D | EapAkaPrimeTest.java | 484 protected void verifyEapSuccess(byte[] msk, byte[] emsk) { in verifyEapSuccess()
|
D | EapTtlsTest.java | 747 private void processAndVerifyEapSuccess(byte[] msk, byte[] emsk) throws Exception { in processAndVerifyEapSuccess()
|
/aosp_15_r20/packages/modules/IPsec/src/java/com/android/internal/net/eap/crypto/ |
D | TlsSession.java | 504 public final byte[] emsk; field in TlsSession.EapTtlsKeyingMaterial 507 public EapTtlsKeyingMaterial(byte[] msk, byte[] emsk) { in EapTtlsKeyingMaterial()
|
/aosp_15_r20/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_teap.c | 58 u8 emsk[EAP_EMSK_LEN]; member 734 u8 *msk = NULL, *emsk = NULL; in eap_teap_get_cmk() local
|
H A D | eap_psk.c | 29 u8 emsk[EAP_EMSK_LEN]; member
|
H A D | eap_sake.c | 27 u8 emsk[EAP_EMSK_LEN]; member
|
/aosp_15_r20/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_tls.c | 369 u8 *eapKeyData, *emsk; in eap_tls_get_emsk() local
|
H A D | eap_server_psk.c | 29 u8 emsk[EAP_EMSK_LEN]; member
|
H A D | eap_server_gpsk.c | 22 u8 emsk[EAP_EMSK_LEN]; member
|
H A D | eap_server_sake.c | 26 u8 emsk[EAP_EMSK_LEN]; member
|
/aosp_15_r20/external/wpa_supplicant_8/src/wps/ |
H A D | wps_i.h | 66 u8 emsk[WPS_EMSK_LEN]; member
|