HomeSort by relevance Sort by last modified time
    Searched full:emsk (Results 26 - 40 of 40) sorted by null

12

  /external/wpa_supplicant_8/src/eap_peer/
eap_eke.c 21 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_eke_data
609 data->msk, data->emsk) < 0) {
610 wpa_printf(MSG_INFO, "EAP-EKE: Failed to derive MSK/EMSK");
741 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
eap_aka.c 31 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_aka_data
138 os_memset(data->emsk, 0, EAP_EMSK_LEN);
1007 data->k_re, data->msk, data->emsk);
1012 data->msk, data->emsk);
    [all...]
eap_sim.c 33 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_sim_data
143 os_memset(data->emsk, 0, EAP_EMSK_LEN);
776 data->emsk);
1001 data->emsk);
    [all...]
eap_pwd.c 47 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_pwd_data
764 &cs, data->msk, data->emsk, data->session_id) < 0) {
766 "EMSK");
1047 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
eap_gpsk.c 21 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_gpsk_data
372 data->msk, data->emsk,
746 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
eap_fast.c 58 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_fast_data
251 os_memset(data->emsk, 0, EAP_EMSK_LEN);
262 eap_fast_derive_eap_emsk(data->simck, data->emsk) < 0)
    [all...]
eap.c 489 u8 *emsk = NULL; local
520 emsk = sm->m->get_emsk(sm, sm->eap_method_priv, &emsk_len);
521 if (!emsk || emsk_len == 0 || emsk_len > ERP_MAX_KEY_LEN) {
523 "EAP: No suitable EMSK available for ERP");
527 wpa_hexdump_key(MSG_DEBUG, "EAP: EMSK", emsk, emsk_len);
530 if (hmac_sha256_kdf(sm->eapSessionId, sm->eapSessionIdLen, "EMSK",
544 if (hmac_sha256_kdf(emsk, emsk_len,
566 bin_clear_free(emsk, emsk_len);
    [all...]
eap_tls.c 189 wpa_hexdump_key(MSG_DEBUG, "EAP-TLS: Derived EMSK",
eap_ttls.c 283 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Derived EMSK",
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_eke.c 22 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_eke_data
648 data->msk, data->emsk) < 0) {
649 wpa_printf(MSG_INFO, "EAP-EKE: Failed to derive MSK/EMSK");
755 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
eap_server.c 415 u8 *emsk = NULL; local
446 emsk = sm->m->get_emsk(sm, sm->eap_method_priv, &emsk_len);
447 if (!emsk || emsk_len == 0 || emsk_len > ERP_MAX_KEY_LEN) {
449 "EAP: No suitable EMSK available for ERP");
453 wpa_hexdump_key(MSG_DEBUG, "EAP: EMSK", emsk, emsk_len);
457 "EMSK", len, sizeof(len),
470 if (hmac_sha256_kdf(emsk, emsk_len,
495 bin_clear_free(emsk, emsk_len);
    [all...]
eap_server_pwd.c 49 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_pwd_data
897 data->my_confirm, &cs, data->msk, data->emsk,
1059 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
  /external/wpa_supplicant_8/src/wps/
wps_i.h 66 u8 emsk[WPS_EMSK_LEN]; member in struct:wps_data
wps_common.c 119 os_memcpy(wps->emsk, keys + WPS_AUTHKEY_LEN + WPS_KEYWRAPKEY_LEN,
126 wpa_hexdump_key(MSG_DEBUG, "WPS: EMSK", wps->emsk, WPS_EMSK_LEN);
  /external/wpa_supplicant_8/src/crypto/
crypto_module_tests.c 909 const u8 emsk[] = { local
980 wpa_printf(MSG_INFO, "- T-PRF (SHA1) test case / EMSK");
983 os_memcmp(emsk, buf, sizeof(emsk)) != 0) {
    [all...]

Completed in 321 milliseconds

12