/external/wpa_supplicant_8/src/eap_peer/ |
eap_peap.c | 255 u8 isk[32], imck[60]; local 297 isk, sizeof(isk), imck, sizeof(imck)) < 0) 299 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: IMCK (IPMKj)", 300 imck, sizeof(imck)); 302 os_memcpy(data->ipmk, imck, 40); 304 os_memcpy(data->cmk, imck + 40, 20); [all...] |
eap_fast.c | 288 * S-IMCK[0] = session_key_seed 291 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", 314 * S-IMCK[0] = session_key_seed 317 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", 697 u8 isk[32], imck[60]; local 704 * IMCK[j] = T-PRF(S-IMCK[j-1], "Inner Methods Compound Keys", 706 * S-IMCK[j] = first 40 octets of IMCK[j] 707 * CMK[j] = last 20 octets of IMCK[j [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_peap.c | 326 u8 isk[32], imck[60]; local 363 isk, sizeof(isk), imck, sizeof(imck)) < 0) { 367 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: IMCK (IPMKj)", 368 imck, sizeof(imck)); 372 os_memcpy(data->ipmk, imck, 40); 374 os_memcpy(data->cmk, imck + 40, 20); [all...] |
eap_server_fast.c | 291 * S-IMCK[0] = session_key_seed 294 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", 316 * S-IMCK[0] = session_key_seed 319 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", 381 u8 isk[32], imck[60]; local 383 wpa_printf(MSG_DEBUG, "EAP-FAST: Deriving ICMK[%d] (S-IMCK and CMK)", 388 * IMCK[j] = T-PRF(S-IMCK[j-1], "Inner Methods Compound Keys", 390 * S-IMCK[j] = first 40 octets of IMCK[j [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto_module_tests.c | 889 const u8 imck[] = { local 961 wpa_printf(MSG_INFO, "- T-PRF (SHA1) test case / IMCK"); 963 isk, sizeof(isk), buf, sizeof(imck)) < 0 || 964 os_memcmp(imck, buf, sizeof(imck)) != 0) { 969 simck = imck; 970 cmk = imck + 40; [all...] |