Home | History | Annotate | Download | only in eap_common

Lines Matching refs:ik

57 		       const u8 *ik, const u8 *ck, u8 *mk)
64 addr[1] = ik;
69 /* MK = SHA1(Identity|IK|CK) */
71 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN);
277 const u8 *ik, const u8 *ck, u8 *k_encr,
286 * MK = PRF'(IK'|CK',"EAP-AKA'"|Identity)
294 os_memcpy(key, ik, EAP_AKA_IK_LEN);
426 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak,
438 * (CK', IK') = F(CK, IK, <access network identity>)
440 /* TODO: CK', IK' generation should really be moved into the actual
447 * CK' || IK' = HMAC-SHA-256(Key, S)
449 * Key = CK || IK
459 wpa_printf(MSG_DEBUG, "EAP-AKA': Derive (CK',IK') from (CK,IK)");
461 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': IK", ik, EAP_AKA_IK_LEN);
468 os_memcpy(key + EAP_AKA_CK_LEN, ik, EAP_AKA_IK_LEN);
469 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': Key = CK || IK",
486 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': KDF output (CK' || IK')",
490 os_memcpy(ik, hash + EAP_AKA_CK_LEN, EAP_AKA_IK_LEN);
492 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': IK'", ik, EAP_AKA_IK_LEN);