/external/wpa_supplicant_8/src/eap_peer/ |
eap_peap.c | 66 u8 cmk[20]; member in struct:eap_peap_data 271 /* Fast-connect: IPMK|CMK = TK */ 275 os_memcpy(data->cmk, tk + 40, 20); 276 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: CMK from TK", 277 data->cmk, 20); 288 * IPMK|CMK = PRF+(TempKey, IPMK Seed, 60) 302 os_memcpy(data->cmk, imck + 40, 20); 303 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: CMK (CMKj)", data->cmk, 20); 335 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC CMK", data->cmk, 20) [all...] |
eap_fast.c | 619 struct eap_tlv_crypto_binding_tlv *_bind, const u8 *cmk) 630 hmac_sha1(cmk, EAP_FAST_CMK_LEN, (u8 *) rbind, sizeof(*rbind), 691 u8 *cmk) 695 wpa_printf(MSG_DEBUG, "EAP-FAST: Determining CMK[%d] for Compound MIC " 703 * CMK[j] = last 20 octets of IMCK[j] 716 os_memcpy(cmk, imck + EAP_FAST_SIMCK_LEN, EAP_FAST_CMK_LEN); 717 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: CMK[j]", 718 cmk, EAP_FAST_CMK_LEN); 755 u8 cmk[EAP_FAST_CMK_LEN], cmac[SHA1_MAC_LEN]; local 762 if (eap_fast_get_cmk(sm, data, cmk) < 0 [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_peap.c | 52 u8 cmk[20]; member in struct:eap_peap_data 313 * IPMK|CMK = PRF+(TempKey, IPMK Seed, 60) 329 /* TODO: fast-connect: IPMK|CMK = TK */ 332 os_memcpy(data->cmk, imck + 40, 20); 333 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: CMK (CMKj)", data->cmk, 20); 407 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC CMK", 408 data->cmk, 20); 413 hmac_sha1_vector(data->cmk, 20, 2, addr, len, mac); 594 hmac_sha1(data->cmk, 20, buf, sizeof(buf), mac) [all...] |
eap_server_fast.c | 50 u8 cmk[EAP_FAST_CMK_LEN]; member in struct:eap_fast_data 379 wpa_printf(MSG_DEBUG, "EAP-FAST: Deriving ICMK[%d] (S-IMCK and CMK)", 387 * CMK[j] = last 20 octets of IMCK[j] 400 os_memcpy(data->cmk, imck + EAP_FAST_SIMCK_LEN, EAP_FAST_CMK_LEN); 401 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: CMK[j]", 402 data->cmk, EAP_FAST_CMK_LEN); 657 * CMK = CMK[j] 658 * Compound-MAC = HMAC-SHA1( CMK, Crypto-Binding TLV ) 661 hmac_sha1(data->cmk, EAP_FAST_CMK_LEN [all...] |