/external/wpa_supplicant/tests/ |
test_sha1.c | 79 const u8 imck[] = { local 136 printf("- T-PRF (SHA1) test case / IMCK\n"); 138 isk, sizeof(isk), buf, sizeof(imck)); 139 if (memcmp(imck, buf, sizeof(imck)) != 0) { 144 simck = imck; 145 cmk = imck + 40;
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
test_sha1.c | 79 const u8 imck[] = { local 147 printf("- T-PRF (SHA1) test case / IMCK\n"); 149 isk, sizeof(isk), buf, sizeof(imck)); 150 if (memcmp(imck, buf, sizeof(imck)) != 0) { 155 simck = imck; 156 cmk = imck + 40;
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_peap.c | 253 u8 isk[32], imck[60]; local 289 isk, sizeof(isk), imck, sizeof(imck)); 290 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: IMCK (IPMKj)", 291 imck, sizeof(imck)); 293 os_memcpy(data->ipmk, imck, 40); 295 os_memcpy(data->cmk, imck + 40, 20); [all...] |
eap_fast.c | 280 * S-IMCK[0] = session_key_seed 283 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", 305 * S-IMCK[0] = session_key_seed 308 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", 683 u8 isk[32], imck[60]; local 690 * IMCK[j] = T-PRF(S-IMCK[j-1], "Inner Methods Compound Keys", 692 * S-IMCK[j] = first 40 octets of IMCK[j] 693 * CMK[j] = last 20 octets of IMCK[j [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_peap.c | 253 u8 isk[32], imck[60]; local 289 isk, sizeof(isk), imck, sizeof(imck)); 290 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: IMCK (IPMKj)", 291 imck, sizeof(imck)); 293 os_memcpy(data->ipmk, imck, 40); 295 os_memcpy(data->cmk, imck + 40, 20); [all...] |
eap_fast.c | 280 * S-IMCK[0] = session_key_seed 283 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", 305 * S-IMCK[0] = session_key_seed 308 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", 683 u8 isk[32], imck[60]; local 690 * IMCK[j] = T-PRF(S-IMCK[j-1], "Inner Methods Compound Keys", 692 * S-IMCK[j] = first 40 octets of IMCK[j] 693 * CMK[j] = last 20 octets of IMCK[j [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_fast.c | 291 * S-IMCK[0] = session_key_seed 294 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", 316 * S-IMCK[0] = session_key_seed 319 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", 381 u8 isk[32], imck[60]; local 383 wpa_printf(MSG_DEBUG, "EAP-FAST: Deriving ICMK[%d] (S-IMCK and CMK)", 388 * IMCK[j] = T-PRF(S-IMCK[j-1], "Inner Methods Compound Keys", 390 * S-IMCK[j] = first 40 octets of IMCK[j [all...] |
eap_peap.c | 328 u8 isk[32], imck[60]; local 352 isk, sizeof(isk), imck, sizeof(imck)); 353 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: IMCK (IPMKj)", 354 imck, sizeof(imck)); 359 os_memcpy(data->ipmk, imck, 40); 361 os_memcpy(data->cmk, imck + 40, 20); [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_fast.c | 292 * S-IMCK[0] = session_key_seed 295 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", 317 * S-IMCK[0] = session_key_seed 320 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", 382 u8 isk[32], imck[60]; local 384 wpa_printf(MSG_DEBUG, "EAP-FAST: Deriving ICMK[%d] (S-IMCK and CMK)", 389 * IMCK[j] = T-PRF(S-IMCK[j-1], "Inner Methods Compound Keys", 391 * S-IMCK[j] = first 40 octets of IMCK[j [all...] |
eap_server_peap.c | 331 u8 isk[32], imck[60]; local 355 isk, sizeof(isk), imck, sizeof(imck)); 356 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: IMCK (IPMKj)", 357 imck, sizeof(imck)); 362 os_memcpy(data->ipmk, imck, 40); 364 os_memcpy(data->cmk, imck + 40, 20); [all...] |
/external/wpa_supplicant/ |
eap_fast.c | 991 * S-IMCK[0] = session_key_seed 994 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", 1015 * S-IMCK[0] = session_key_seed 1018 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", 1236 u8 isk[32], imck[60], *cmk, cmac[20], *key; local 1266 * IMCK[j] = T-PRF(S-IMCK[j-1], "Inner Methods Compound Keys", 1268 * S-IMCK[j] = first 40 octets of IMCK[j] 1269 * CMK[j] = last 20 octets of IMCK[j [all...] |