/external/wpa_supplicant_8/src/pae/ |
ieee802_1x_key.h | 13 const u8 *mac2, u8 *cak); 17 int ieee802_1x_kek_128bits_aes_cmac(const u8 *cak, const u8 *ckn, 19 int ieee802_1x_ick_128bits_aes_cmac(const u8 *cak, const u8 *ckn, 23 int ieee802_1x_sak_128bits_aes_cmac(const u8 *cak, const u8 *ctx,
|
ieee802_1x_key.c | 80 * CAK = KDF(Key, Label, mac1 | mac2, CAKlength) 83 const u8 *mac2, u8 *cak) 88 return aes_kdf_128(msk, "IEEE8021 EAP CAK", 89 context, sizeof(context) * 8, 128, cak); 128 int ieee802_1x_kek_128bits_aes_cmac(const u8 *cak, const u8 *ckn, 137 return aes_kdf_128(cak, "IEEE8021 KEK", context, sizeof(context) * 8, 148 int ieee802_1x_ick_128bits_aes_cmac(const u8 *cak, const u8 *ckn, 157 return aes_kdf_128(cak, "IEEE8021 ICK", context, sizeof(context) * 8, 185 int ieee802_1x_sak_128bits_aes_cmac(const u8 *cak, const u8 *ctx, 188 return aes_kdf_128(cak, "IEEE8021 SAK", ctx, ctx_bytes * 8, 128, sak) [all...] |
ieee802_1x_kay_i.h | 165 int (*cak_trfm)(const u8 *msk, const u8 *mac1, const u8 *mac2, u8 *cak); 168 int (*kek_trfm)(const u8 *cak, const u8 *ckn, size_t ckn_len, u8 *kek); 169 int (*ick_trfm)(const u8 *cak, const u8 *ckn, size_t ckn_len, u8 *ick); 181 struct mka_key cak; member in struct:ieee802_1x_mka_participant 288 /* followed by CAK Name*/
|
ieee802_1x_kay.h | 164 struct mka_key_name *ckn, struct mka_key *cak,
|
ieee802_1x_kay.c | 54 /* 128-bit CAK, KEK, ICK, ICV */ [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
wpas_kay.c | 310 struct mka_key *cak; local 324 cak = os_zalloc(sizeof(*cak)); 325 if (!msk || !sid || !ckn || !cak) 341 /* Derive CAK from MSK */ 342 cak->len = DEFAULT_KEY_LEN; 344 peer_addr, cak->key)) { 346 "IEEE 802.1X: Deriving CAK failed"); 349 wpa_hexdump_key(MSG_DEBUG, "Derived CAK", cak->key, cak->len) [all...] |