/external/wpa_supplicant_8/src/eap_common/ |
eap_psk_common.c | 35 u8 *emsk) 61 &emsk[i * aes_block_size]))
|
eap_sim_common.h | 81 u8 *emsk); 85 u8 *emsk); 94 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk); 97 const u8 *nonce_s, u8 *msk, u8 *emsk); 112 u8 *msk, u8 *emsk) 120 u8 *emsk)
|
eap_gpsk_common.c | 112 u8 *msk, u8 *emsk, 172 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: EMSK", pos, EAP_EMSK_LEN); 173 os_memcpy(emsk, pos, EAP_EMSK_LEN); 191 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 205 * EMSK = GKDF-160 (MK, inputString)[64..127] 219 msk, emsk, sk, *sk_len, 227 u8 *msk, u8 *emsk, 241 * EMSK = GKDF-160 (MK, inputString)[64..127] 253 msk, emsk, sk, *sk_len, 272 * @emsk: Buffer for 64-byte EMS [all...] |
eap_fast_common.c | 131 int eap_fast_derive_eap_emsk(const u8 *simck, u8 *emsk) 135 * EMSK = T-PRF(S-IMCK[j], 141 emsk, EAP_EMSK_LEN) < 0) 143 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (EMSK)", 144 emsk, EAP_EMSK_LEN);
|
eap_gpsk_common.h | 54 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
|
eap_psk_common.h | 70 u8 *msk, u8 *emsk);
|
eap_sim_common.c | 77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) 92 os_memcpy(emsk, pos, EAP_EMSK_LEN); 100 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN); 110 u8 *emsk) 155 if (emsk) { 156 os_memcpy(emsk, buf + EAP_SIM_KEYING_DATA_LEN, EAP_EMSK_LEN); 157 wpa_hexdump(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN); 278 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) [all...] |
eap_sake_common.c | 255 * @emsk: Buffer for 64-byte EMSK 261 u8 *emsk) 295 os_memcpy(emsk, key_buf + EAP_MSK_LEN, EAP_EMSK_LEN); 297 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: EMSK", emsk, EAP_EMSK_LEN);
|
eap_pwd_common.h | 67 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id);
|
eap_sake_common.h | 86 u8 *tek, u8 *msk, u8 *emsk);
|
eap_eke_common.h | 104 u8 *msk, u8 *emsk);
|
eap_fast_common.h | 103 int eap_fast_derive_eap_emsk(const u8 *simck, u8 *emsk);
|
eap_pwd_common.c | 310 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) 356 /* stretch the mk with the session-id to get MSK | EMSK */ 364 os_memcpy(emsk, msk_emsk + EAP_MSK_LEN, EAP_EMSK_LEN);
|
eap_eke_common.c | 547 u8 *msk, u8 *emsk) 556 * MSK | EMSK = prf+(SharedSecret, "EAP-EKE Exported Keys" | ID_S | 584 os_memcpy(emsk, buf + EAP_MSK_LEN, EAP_EMSK_LEN); 588 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: EMSK", msk, EAP_EMSK_LEN);
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_tls.c | 327 u8 *eapKeyData, *emsk; local 336 emsk = os_malloc(EAP_EMSK_LEN); 337 if (emsk) 338 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 342 emsk = NULL; 344 if (emsk) { 346 wpa_hexdump(MSG_DEBUG, "EAP-TLS: Derived EMSK", 347 emsk, EAP_EMSK_LEN); 349 wpa_printf(MSG_DEBUG, "EAP-TLS: Failed to derive EMSK"); 352 return emsk; [all...] |
eap_i.h | 80 * get_emsk - Get EAP method specific keying extended material (EMSK) 83 * @len: Pointer to a variable to store EMSK length 84 * Returns: EMSK or %NULL if not available
|
eap_server_psk.c | 29 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_psk_data 127 data->emsk)) 131 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: EMSK", data->emsk, EAP_EMSK_LEN); 474 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
|
eap_server_ttls.c | 1306 u8 *eapKeyData, *emsk; local [all...] |
eap_server_sake.c | 26 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_sake_data 347 (u8 *) &data->tek, data->msk, data->emsk); 484 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
|
eap_server_aka.c | 27 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_aka_data 558 data->msk, data->emsk); 561 data->msk, data->emsk); 564 data->mk, data->msk, data->emsk); 838 data->k_re, data->msk, data->emsk); 843 data->msk, data->emsk); [all...] |
eap_server_sim.c | 25 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_sim_data 261 data->emsk); 264 data->msk, data->emsk); 553 data->emsk); 810 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
|
eap_server_gpsk.c | 22 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_gpsk_data 414 data->msk, data->emsk, 599 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_psk.c | 29 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_psk_data 250 data->msk, data->emsk)) { 257 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: EMSK", data->emsk, EAP_EMSK_LEN); 474 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
|
eap_sake.c | 27 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_sake_data 242 (u8 *) &data->tek, data->msk, data->emsk); 487 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
|
eap_i.h | 254 * get_emsk - Get EAP method specific keying extended material (EMSK) 257 * @len: Pointer to a variable to store EMSK length 258 * Returns: EMSK or %NULL if not available
|