Home | History | Annotate | Download | only in eap_server

Lines Matching defs:tk

325 	u8 *tk;
329 * Tunnel key (TK) is the first 60 octets of the key generated by
332 tk = eap_server_tls_derive_key(sm, &data->ssl, "client EAP encryption",
334 if (tk == NULL)
336 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60);
339 /* Fast-connect: IPMK|CMK = TK */
340 os_memcpy(data->ipmk, tk, 40);
341 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: IPMK from TK",
343 os_memcpy(data->cmk, tk + 40, 20);
344 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: CMK from TK",
346 os_free(tk);
355 * TempKey = First 40 octets of TK
360 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40);
361 if (peap_prfplus(data->peap_version, tk, 40,
364 os_free(tk);
370 os_free(tk);