HomeSort by relevance Sort by last modified time
    Searched refs:kdk (Results 1 - 5 of 5) sorted by null

  /external/wpa_supplicant_8/src/eap_common/
eap_psk_common.c 19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk)
24 os_memcpy(kdk, ak, aes_block_size);
26 kdk[aes_block_size - 1] ^= 0x02;
28 aes_128_encrypt_block(psk, kdk, kdk))
34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk,
41 if (aes_128_encrypt_block(kdk, rand_p, hash))
45 if (aes_128_encrypt_block(kdk, hash, tek))
52 if (aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size]))
60 if (aes_128_encrypt_block(kdk, hash
    [all...]
eap_psk_common.h 68 int __must_check eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk);
69 int __must_check eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek,
  /external/wpa_supplicant_8/src/wps/
wps_common.c 62 u8 dhkey[SHA256_MAC_LEN], kdk[SHA256_MAC_LEN]; local
102 /* KDK = HMAC-SHA-256_DHKey(N1 || EnrolleeMAC || N2) */
109 hmac_sha256_vector(dhkey, sizeof(dhkey), 3, addr, len, kdk);
110 wpa_hexdump_key(MSG_DEBUG, "WPS: KDK", kdk, sizeof(kdk));
112 wps_kdf(kdk, NULL, 0, "Wi-Fi Easy and Secure Key Derivation",
  /external/wpa_supplicant_8/src/eap_peer/
eap_psk.c 25 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data
49 if (eap_psk_key_setup(password, data->ak, data->kdk)) {
54 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: KDK", data->kdk, EAP_PSK_KDK_LEN);
249 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek,
  /external/wpa_supplicant_8/src/eap_server/
eap_server_psk.c 27 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data
126 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk,
285 if (eap_psk_key_setup(sm->user->password, data->ak, data->kdk)) {
290 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: KDK", data->kdk, EAP_PSK_KDK_LEN);

Completed in 246 milliseconds