/external/wpa_supplicant_8/src/eap_peer/ |
eap_psk.c | 25 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data 49 if (eap_psk_key_setup(password, data->ak, data->kdk)) { 54 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: KDK", data->kdk, EAP_PSK_KDK_LEN); 249 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek,
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_psk.c | 27 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member in struct:eap_psk_data 126 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk, 285 if (eap_psk_key_setup(sm->user->password, data->ak, data->kdk)) { 290 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: KDK", data->kdk, EAP_PSK_KDK_LEN);
|
/external/wpa_supplicant_8/src/wps/ |
wps_common.c | 65 u8 dhkey[SHA256_MAC_LEN], kdk[SHA256_MAC_LEN]; local 105 /* KDK = HMAC-SHA-256_DHKey(N1 || EnrolleeMAC || N2) */ 112 hmac_sha256_vector(dhkey, sizeof(dhkey), 3, addr, len, kdk); 113 wpa_hexdump_key(MSG_DEBUG, "WPS: KDK", kdk, sizeof(kdk)); 115 wps_kdf(kdk, NULL, 0, "Wi-Fi Easy and Secure Key Derivation",
|