/external/wpa_supplicant_6/wpa_supplicant/tests/ |
test_sha1.c | 79 const u8 imck[] = { local 147 printf("- T-PRF (SHA1) test case / IMCK\n"); 149 isk, sizeof(isk), buf, sizeof(imck)); 150 if (memcmp(imck, buf, sizeof(imck)) != 0) { 155 simck = imck; 156 cmk = imck + 40;
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_peap.c | 253 u8 isk[32], imck[60]; local 289 isk, sizeof(isk), imck, sizeof(imck)); 290 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: IMCK (IPMKj)", 291 imck, sizeof(imck)); 293 os_memcpy(data->ipmk, imck, 40); 295 os_memcpy(data->cmk, imck + 40, 20); [all...] |
eap_fast.c | 280 * S-IMCK[0] = session_key_seed 283 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", 305 * S-IMCK[0] = session_key_seed 308 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", 683 u8 isk[32], imck[60]; local 690 * IMCK[j] = T-PRF(S-IMCK[j-1], "Inner Methods Compound Keys", 692 * S-IMCK[j] = first 40 octets of IMCK[j] 693 * CMK[j] = last 20 octets of IMCK[j [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_peap.c | 247 u8 isk[32], imck[60]; local 284 isk, sizeof(isk), imck, sizeof(imck)) < 0) 286 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: IMCK (IPMKj)", 287 imck, sizeof(imck)); 289 os_memcpy(data->ipmk, imck, 40); 291 os_memcpy(data->cmk, imck + 40, 20); [all...] |
eap_fast.c | 274 * S-IMCK[0] = session_key_seed 277 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", 299 * S-IMCK[0] = session_key_seed 302 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", 678 u8 isk[32], imck[60]; local 685 * IMCK[j] = T-PRF(S-IMCK[j-1], "Inner Methods Compound Keys", 687 * S-IMCK[j] = first 40 octets of IMCK[j] 688 * CMK[j] = last 20 octets of IMCK[j [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_fast.c | 291 * S-IMCK[0] = session_key_seed 294 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", 316 * S-IMCK[0] = session_key_seed 319 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", 381 u8 isk[32], imck[60]; local 383 wpa_printf(MSG_DEBUG, "EAP-FAST: Deriving ICMK[%d] (S-IMCK and CMK)", 388 * IMCK[j] = T-PRF(S-IMCK[j-1], "Inner Methods Compound Keys", 390 * S-IMCK[j] = first 40 octets of IMCK[j [all...] |
eap_peap.c | 328 u8 isk[32], imck[60]; local 352 isk, sizeof(isk), imck, sizeof(imck)); 353 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: IMCK (IPMKj)", 354 imck, sizeof(imck)); 359 os_memcpy(data->ipmk, imck, 40); 361 os_memcpy(data->cmk, imck + 40, 20); [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_fast.c | 286 * S-IMCK[0] = session_key_seed 289 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", 311 * S-IMCK[0] = session_key_seed 314 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", 376 u8 isk[32], imck[60]; local 378 wpa_printf(MSG_DEBUG, "EAP-FAST: Deriving ICMK[%d] (S-IMCK and CMK)", 383 * IMCK[j] = T-PRF(S-IMCK[j-1], "Inner Methods Compound Keys", 385 * S-IMCK[j] = first 40 octets of IMCK[j [all...] |
eap_server_peap.c | 325 u8 isk[32], imck[60]; local 350 isk, sizeof(isk), imck, sizeof(imck)) < 0) { 354 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: IMCK (IPMKj)", 355 imck, sizeof(imck)); 360 os_memcpy(data->ipmk, imck, 40); 362 os_memcpy(data->cmk, imck + 40, 20); [all...] |