/external/wpa_supplicant_8/src/eap_peer/ |
eap_peap.c | 258 u8 isk[32], imck[60]; local 295 isk, sizeof(isk), imck, sizeof(imck)) < 0) 297 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: IMCK (IPMKj)", 298 imck, sizeof(imck)); 300 os_memcpy(data->ipmk, imck, 40); 302 os_memcpy(data->cmk, imck + 40, 20); [all...] |
eap_fast.c | 289 * S-IMCK[0] = session_key_seed 292 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", 315 * S-IMCK[0] = session_key_seed 318 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", 698 u8 isk[32], imck[60]; local 705 * IMCK[j] = T-PRF(S-IMCK[j-1], "Inner Methods Compound Keys", 707 * S-IMCK[j] = first 40 octets of IMCK[j] 708 * CMK[j] = last 20 octets of IMCK[j [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_peap.c | 295 u8 isk[32], imck[60]; local 320 isk, sizeof(isk), imck, sizeof(imck)) < 0) { 324 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: IMCK (IPMKj)", 325 imck, sizeof(imck)); 330 os_memcpy(data->ipmk, imck, 40); 332 os_memcpy(data->cmk, imck + 40, 20); [all...] |
eap_server_fast.c | 286 * S-IMCK[0] = session_key_seed 289 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", 311 * S-IMCK[0] = session_key_seed 314 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", 376 u8 isk[32], imck[60]; local 378 wpa_printf(MSG_DEBUG, "EAP-FAST: Deriving ICMK[%d] (S-IMCK and CMK)", 383 * IMCK[j] = T-PRF(S-IMCK[j-1], "Inner Methods Compound Keys", 385 * S-IMCK[j] = first 40 octets of IMCK[j [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto_module_tests.c | 874 const u8 imck[] = { local 944 wpa_printf(MSG_INFO, "- T-PRF (SHA1) test case / IMCK"); 946 isk, sizeof(isk), buf, sizeof(imck)) < 0 || 947 os_memcmp(imck, buf, sizeof(imck)) != 0) { 952 simck = imck; 953 cmk = imck + 40; [all...] |