HomeSort by relevance Sort by last modified time
    Searched refs:kdk (Results 1 - 10 of 10) sorted by null

  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_psk_common.c 25 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk)
30 os_memcpy(kdk, ak, aes_block_size);
32 kdk[aes_block_size - 1] ^= 0x02;
34 aes_128_encrypt_block(psk, kdk, kdk))
40 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk,
47 if (aes_128_encrypt_block(kdk, rand_p, hash))
51 if (aes_128_encrypt_block(kdk, hash, tek))
58 if (aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size]))
66 if (aes_128_encrypt_block(kdk, hash
    [all...]
eap_psk_common.h 74 int __must_check eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk);
75 int __must_check eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek,
  /external/wpa_supplicant_8/src/eap_common/
eap_psk_common.c 19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk)
24 os_memcpy(kdk, ak, aes_block_size);
26 kdk[aes_block_size - 1] ^= 0x02;
28 aes_128_encrypt_block(psk, kdk, kdk))
34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk,
41 if (aes_128_encrypt_block(kdk, rand_p, hash))
45 if (aes_128_encrypt_block(kdk, hash, tek))
52 if (aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size]))
60 if (aes_128_encrypt_block(kdk, hash
    [all...]
eap_psk_common.h 68 int __must_check eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk);
69 int __must_check eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek,
  /external/wpa_supplicant_6/wpa_supplicant/src/wps/
wps_common.c 67 u8 dhkey[SHA256_MAC_LEN], kdk[SHA256_MAC_LEN]; local
104 /* KDK = HMAC-SHA-256_DHKey(N1 || EnrolleeMAC || N2) */
111 hmac_sha256_vector(dhkey, sizeof(dhkey), 3, addr, len, kdk);
112 wpa_hexdump_key(MSG_DEBUG, "WPS: KDK", kdk, sizeof(kdk));
114 wps_kdf(kdk, NULL, 0, "Wi-Fi Easy and Secure Key Derivation",
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_psk.c 29 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data
53 if (eap_psk_key_setup(password, data->ak, data->kdk)) {
58 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: KDK", data->kdk, EAP_PSK_KDK_LEN);
252 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek,
  /external/wpa_supplicant_8/src/eap_peer/
eap_psk.c 24 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data
48 if (eap_psk_key_setup(password, data->ak, data->kdk)) {
53 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: KDK", data->kdk, EAP_PSK_KDK_LEN);
247 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek,
  /external/wpa_supplicant_8/src/wps/
wps_common.c 62 u8 dhkey[SHA256_MAC_LEN], kdk[SHA256_MAC_LEN]; local
102 /* KDK = HMAC-SHA-256_DHKey(N1 || EnrolleeMAC || N2) */
109 hmac_sha256_vector(dhkey, sizeof(dhkey), 3, addr, len, kdk);
110 wpa_hexdump_key(MSG_DEBUG, "WPS: KDK", kdk, sizeof(kdk));
112 wps_kdf(kdk, NULL, 0, "Wi-Fi Easy and Secure Key Derivation",
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_psk.c 32 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data
131 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk,
290 if (eap_psk_key_setup(sm->user->password, data->ak, data->kdk)) {
295 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: KDK", data->kdk, EAP_PSK_KDK_LEN);
  /external/wpa_supplicant_8/src/eap_server/
eap_server_psk.c 27 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data
128 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk,
287 if (eap_psk_key_setup(sm->user->password, data->ak, data->kdk)) {
292 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: KDK", data->kdk, EAP_PSK_KDK_LEN);

Completed in 43 milliseconds