HomeSort by relevance Sort by last modified time
    Searched refs:msk (Results 1 - 25 of 39) sorted by null

1 2

  /external/wpa_supplicant/
eap_psk_common.c 37 void eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk,
53 aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size]);
eap_gpsk_common.c 119 u8 *msk, u8 *emsk,
175 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MSK", pos, EAP_MSK_LEN);
176 os_memcpy(msk, pos, EAP_MSK_LEN);
198 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
211 * MSK = GKDF-160 (MK, inputString)[0..63]
226 msk, emsk, sk, *sk_len,
234 u8 *msk, u8 *emsk,
247 * MSK = GKDF-160 (MK, inputString)[0..63]
260 msk, emsk, sk, *sk_len,
278 * @msk: Buffer for 64-byte MS
    [all...]
eap_gpsk_common.h 60 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
eap_psk_common.h 100 void eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk,
eap_sim_common.h 79 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk,
83 const u8 *nonce_s, const u8 *mk, u8 *msk,
eap_sake_common.h 96 u8 *tek, u8 *msk, u8 *emsk);
eap_sake_common.c 259 * @msk: Buffer for 64-byte MSK
265 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk,
299 os_memcpy(msk, key_buf, EAP_MSK_LEN);
301 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: MSK", msk, EAP_MSK_LEN);
eap_sim_common.c 80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk)
93 os_memcpy(msk, pos, EAP_SIM_KEYING_DATA_LEN);
101 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: keying material (MSK)",
102 msk, EAP_SIM_KEYING_DATA_LEN);
112 const u8 *nonce_s, const u8 *mk, u8 *msk,
153 if (msk) {
154 os_memcpy(msk, buf, EAP_SIM_KEYING_DATA_LEN);
155 wpa_hexdump(MSG_DEBUG, "EAP-SIM: keying material (MSK)",
156 msk, EAP_SIM_KEYING_DATA_LEN);
eap_psk.c 34 u8 msk[EAP_MSK_LEN]; member in struct:eap_psk_data
244 data->msk, data->emsk);
246 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: MSK", data->msk, EAP_MSK_LEN);
422 os_memcpy(key, data->msk, EAP_MSK_LEN);
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_psk_common.c 40 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk,
58 if (aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size]))
eap_gpsk_common.c 120 u8 *msk, u8 *emsk,
176 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MSK", pos, EAP_MSK_LEN);
177 os_memcpy(msk, pos, EAP_MSK_LEN);
199 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
212 * MSK = GKDF-160 (MK, inputString)[0..63]
227 msk, emsk, sk, *sk_len,
235 u8 *msk, u8 *emsk,
248 * MSK = GKDF-160 (MK, inputString)[0..63]
261 msk, emsk, sk, *sk_len,
279 * @msk: Buffer for 64-byte MS
    [all...]
eap_sim_common.h 86 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk,
90 const u8 *nonce_s, const u8 *mk, u8 *msk,
100 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk);
103 const u8 *nonce_s, u8 *msk, u8 *emsk);
118 u8 *msk, u8 *emsk)
125 const u8 *nonce_s, u8 *msk,
eap_fast_common.h 108 void eap_fast_derive_eap_msk(const u8 *simck, u8 *msk);
eap_gpsk_common.h 60 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
eap_psk_common.h 76 u8 *msk, u8 *emsk);
eap_sim_common.c 82 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk)
95 os_memcpy(msk, pos, EAP_SIM_KEYING_DATA_LEN);
103 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: keying material (MSK)",
104 msk, EAP_SIM_KEYING_DATA_LEN);
114 const u8 *nonce_s, const u8 *mk, u8 *msk,
155 if (msk) {
156 os_memcpy(msk, buf, EAP_SIM_KEYING_DATA_LEN);
157 wpa_hexdump(MSG_DEBUG, "EAP-SIM: keying material (MSK)",
158 msk, EAP_SIM_KEYING_DATA_LEN);
283 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk
    [all...]
eap_sake_common.h 92 u8 *tek, u8 *msk, u8 *emsk);
eap_fast_common.c 151 void eap_fast_derive_eap_msk(const u8 *simck, u8 *msk)
155 * MSK = T-PRF(S-IMCK[j], "Session Key Generating Function", 64)
160 msk, EAP_FAST_KEY_LEN);
161 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (MSK)",
162 msk, EAP_FAST_KEY_LEN);
eap_sake_common.c 260 * @msk: Buffer for 64-byte MSK
266 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk,
300 os_memcpy(msk, key_buf, EAP_MSK_LEN);
302 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: MSK", msk, EAP_MSK_LEN);
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_psk.c 32 u8 msk[EAP_MSK_LEN]; member in struct:eap_psk_data
253 data->msk, data->emsk)) {
259 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: MSK", data->msk, EAP_MSK_LEN);
436 os_memcpy(key, data->msk, EAP_MSK_LEN);
eap_sake.c 31 u8 msk[EAP_MSK_LEN]; member in struct:eap_sake_data
248 (u8 *) &data->tek, data->msk, data->emsk);
453 os_memcpy(key, data->msk, EAP_MSK_LEN);
  /external/wpa_supplicant_6/wpa_supplicant/tests/
test_sha1.c 89 const u8 msk[] = { local
158 printf("- T-PRF (SHA1) test case / MSK\n");
160 (u8 *) "", 0, buf, sizeof(msk));
161 if (memcmp(msk, buf, sizeof(msk)) != 0) {
168 (u8 *) "", 0, buf, sizeof(msk));
  /external/wpa_supplicant/tests/
test_sha1.c 89 const u8 msk[] = { local
147 printf("- T-PRF (SHA1) test case / MSK\n");
149 (u8 *) "", 0, buf, sizeof(msk));
150 if (memcmp(msk, buf, sizeof(msk)) != 0) {
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_psk.c 33 u8 msk[EAP_MSK_LEN]; member in struct:eap_psk_data
131 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk,
135 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: MSK", data->msk, EAP_MSK_LEN);
461 os_memcpy(key, data->msk, EAP_MSK_LEN);
eap_aka.c 32 u8 msk[EAP_SIM_KEYING_DATA_LEN]; member in struct:eap_aka_data
454 data->msk, data->emsk);
457 data->msk, data->emsk);
460 data->mk, data->msk, data->emsk);
743 data->k_re, data->msk, data->emsk);
748 data->msk, data->emsk);
1193 os_memcpy(key, data->msk, EAP_SIM_KEYING_DATA_LEN);
    [all...]

Completed in 313 milliseconds

1 2