/external/wpa_supplicant_8/src/eap_peer/ |
eap_eke.c | 21 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_eke_data 609 data->msk, data->emsk) < 0) { 610 wpa_printf(MSG_INFO, "EAP-EKE: Failed to derive MSK/EMSK"); 741 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
|
eap_aka.c | 31 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_aka_data 138 os_memset(data->emsk, 0, EAP_EMSK_LEN); 1007 data->k_re, data->msk, data->emsk); 1012 data->msk, data->emsk); [all...] |
eap_sim.c | 33 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_sim_data 143 os_memset(data->emsk, 0, EAP_EMSK_LEN); 776 data->emsk); 1001 data->emsk); [all...] |
eap_pwd.c | 47 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_pwd_data 764 &cs, data->msk, data->emsk, data->session_id) < 0) { 766 "EMSK"); 1047 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
|
eap_gpsk.c | 21 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_gpsk_data 372 data->msk, data->emsk, 746 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
|
eap_fast.c | 58 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_fast_data 251 os_memset(data->emsk, 0, EAP_EMSK_LEN); 262 eap_fast_derive_eap_emsk(data->simck, data->emsk) < 0) [all...] |
eap.c | 489 u8 *emsk = NULL; local 520 emsk = sm->m->get_emsk(sm, sm->eap_method_priv, &emsk_len); 521 if (!emsk || emsk_len == 0 || emsk_len > ERP_MAX_KEY_LEN) { 523 "EAP: No suitable EMSK available for ERP"); 527 wpa_hexdump_key(MSG_DEBUG, "EAP: EMSK", emsk, emsk_len); 530 if (hmac_sha256_kdf(sm->eapSessionId, sm->eapSessionIdLen, "EMSK", 544 if (hmac_sha256_kdf(emsk, emsk_len, 566 bin_clear_free(emsk, emsk_len); [all...] |
eap_tls.c | 189 wpa_hexdump_key(MSG_DEBUG, "EAP-TLS: Derived EMSK",
|
eap_ttls.c | 283 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Derived EMSK", [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_eke.c | 22 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_eke_data 648 data->msk, data->emsk) < 0) { 649 wpa_printf(MSG_INFO, "EAP-EKE: Failed to derive MSK/EMSK"); 755 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
|
eap_server.c | 415 u8 *emsk = NULL; local 446 emsk = sm->m->get_emsk(sm, sm->eap_method_priv, &emsk_len); 447 if (!emsk || emsk_len == 0 || emsk_len > ERP_MAX_KEY_LEN) { 449 "EAP: No suitable EMSK available for ERP"); 453 wpa_hexdump_key(MSG_DEBUG, "EAP: EMSK", emsk, emsk_len); 457 "EMSK", len, sizeof(len), 470 if (hmac_sha256_kdf(emsk, emsk_len, 495 bin_clear_free(emsk, emsk_len); [all...] |
eap_server_pwd.c | 49 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_pwd_data 897 data->my_confirm, &cs, data->msk, data->emsk, 1059 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
|
/external/wpa_supplicant_8/src/wps/ |
wps_i.h | 66 u8 emsk[WPS_EMSK_LEN]; member in struct:wps_data
|
wps_common.c | 119 os_memcpy(wps->emsk, keys + WPS_AUTHKEY_LEN + WPS_KEYWRAPKEY_LEN, 126 wpa_hexdump_key(MSG_DEBUG, "WPS: EMSK", wps->emsk, WPS_EMSK_LEN);
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_module_tests.c | 909 const u8 emsk[] = { local 980 wpa_printf(MSG_INFO, "- T-PRF (SHA1) test case / EMSK"); 983 os_memcmp(emsk, buf, sizeof(emsk)) != 0) { [all...] |