/external/wpa_supplicant_8/src/eap_common/ |
eap_psk_common.c | 19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) 24 os_memcpy(kdk, ak, aes_block_size); 26 kdk[aes_block_size - 1] ^= 0x02; 28 aes_128_encrypt_block(psk, kdk, kdk)) 34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, 41 if (aes_128_encrypt_block(kdk, rand_p, hash)) 45 if (aes_128_encrypt_block(kdk, hash, tek)) 52 if (aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size])) 60 if (aes_128_encrypt_block(kdk, hash [all...] |
eap_psk_common.h | 68 int __must_check eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk); 69 int __must_check eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek,
|
/external/wpa_supplicant_8/src/wps/ |
wps_common.c | 62 u8 dhkey[SHA256_MAC_LEN], kdk[SHA256_MAC_LEN]; local 102 /* KDK = HMAC-SHA-256_DHKey(N1 || EnrolleeMAC || N2) */ 109 hmac_sha256_vector(dhkey, sizeof(dhkey), 3, addr, len, kdk); 110 wpa_hexdump_key(MSG_DEBUG, "WPS: KDK", kdk, sizeof(kdk)); 112 wps_kdf(kdk, NULL, 0, "Wi-Fi Easy and Secure Key Derivation",
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_psk.c | 25 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data 49 if (eap_psk_key_setup(password, data->ak, data->kdk)) { 54 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: KDK", data->kdk, EAP_PSK_KDK_LEN); 249 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek,
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_psk.c | 27 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data 126 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk, 285 if (eap_psk_key_setup(sm->user->password, data->ak, data->kdk)) { 290 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: KDK", data->kdk, EAP_PSK_KDK_LEN);
|