HomeSort by relevance Sort by last modified time
    Searched full:emsk (Results 1 - 25 of 40) sorted by null

1 2

  /external/wpa_supplicant_8/src/eap_common/
eap_psk_common.c 35 u8 *emsk)
61 &emsk[i * aes_block_size]))
eap_sim_common.h 81 u8 *emsk);
85 u8 *emsk);
94 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk);
97 const u8 *nonce_s, u8 *msk, u8 *emsk);
112 u8 *msk, u8 *emsk)
120 u8 *emsk)
eap_gpsk_common.c 112 u8 *msk, u8 *emsk,
172 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: EMSK", pos, EAP_EMSK_LEN);
173 os_memcpy(emsk, pos, EAP_EMSK_LEN);
191 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
205 * EMSK = GKDF-160 (MK, inputString)[64..127]
219 msk, emsk, sk, *sk_len,
227 u8 *msk, u8 *emsk,
241 * EMSK = GKDF-160 (MK, inputString)[64..127]
253 msk, emsk, sk, *sk_len,
272 * @emsk: Buffer for 64-byte EMS
    [all...]
eap_fast_common.c 131 int eap_fast_derive_eap_emsk(const u8 *simck, u8 *emsk)
135 * EMSK = T-PRF(S-IMCK[j],
141 emsk, EAP_EMSK_LEN) < 0)
143 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (EMSK)",
144 emsk, EAP_EMSK_LEN);
eap_gpsk_common.h 54 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
eap_psk_common.h 70 u8 *msk, u8 *emsk);
eap_sim_common.c 77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk)
92 os_memcpy(emsk, pos, EAP_EMSK_LEN);
100 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN);
110 u8 *emsk)
155 if (emsk) {
156 os_memcpy(emsk, buf + EAP_SIM_KEYING_DATA_LEN, EAP_EMSK_LEN);
157 wpa_hexdump(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN);
278 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk)
    [all...]
eap_sake_common.c 255 * @emsk: Buffer for 64-byte EMSK
261 u8 *emsk)
295 os_memcpy(emsk, key_buf + EAP_MSK_LEN, EAP_EMSK_LEN);
297 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: EMSK", emsk, EAP_EMSK_LEN);
eap_pwd_common.h 67 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id);
eap_sake_common.h 86 u8 *tek, u8 *msk, u8 *emsk);
eap_eke_common.h 104 u8 *msk, u8 *emsk);
eap_fast_common.h 103 int eap_fast_derive_eap_emsk(const u8 *simck, u8 *emsk);
eap_pwd_common.c 310 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id)
356 /* stretch the mk with the session-id to get MSK | EMSK */
364 os_memcpy(emsk, msk_emsk + EAP_MSK_LEN, EAP_EMSK_LEN);
eap_eke_common.c 547 u8 *msk, u8 *emsk)
556 * MSK | EMSK = prf+(SharedSecret, "EAP-EKE Exported Keys" | ID_S |
584 os_memcpy(emsk, buf + EAP_MSK_LEN, EAP_EMSK_LEN);
588 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: EMSK", msk, EAP_EMSK_LEN);
  /external/wpa_supplicant_8/src/eap_server/
eap_server_tls.c 327 u8 *eapKeyData, *emsk; local
336 emsk = os_malloc(EAP_EMSK_LEN);
337 if (emsk)
338 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN,
342 emsk = NULL;
344 if (emsk) {
346 wpa_hexdump(MSG_DEBUG, "EAP-TLS: Derived EMSK",
347 emsk, EAP_EMSK_LEN);
349 wpa_printf(MSG_DEBUG, "EAP-TLS: Failed to derive EMSK");
352 return emsk;
    [all...]
eap_i.h 80 * get_emsk - Get EAP method specific keying extended material (EMSK)
83 * @len: Pointer to a variable to store EMSK length
84 * Returns: EMSK or %NULL if not available
eap_server_psk.c 29 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_psk_data
127 data->emsk))
131 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: EMSK", data->emsk, EAP_EMSK_LEN);
474 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
eap_server_ttls.c 1306 u8 *eapKeyData, *emsk; local
    [all...]
eap_server_sake.c 26 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_sake_data
347 (u8 *) &data->tek, data->msk, data->emsk);
484 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
eap_server_aka.c 27 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_aka_data
558 data->msk, data->emsk);
561 data->msk, data->emsk);
564 data->mk, data->msk, data->emsk);
838 data->k_re, data->msk, data->emsk);
843 data->msk, data->emsk);
    [all...]
eap_server_sim.c 25 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_sim_data
261 data->emsk);
264 data->msk, data->emsk);
553 data->emsk);
810 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
eap_server_gpsk.c 22 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_gpsk_data
414 data->msk, data->emsk,
599 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
  /external/wpa_supplicant_8/src/eap_peer/
eap_psk.c 29 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_psk_data
250 data->msk, data->emsk)) {
257 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: EMSK", data->emsk, EAP_EMSK_LEN);
474 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
eap_sake.c 27 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_sake_data
242 (u8 *) &data->tek, data->msk, data->emsk);
487 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
eap_i.h 254 * get_emsk - Get EAP method specific keying extended material (EMSK)
257 * @len: Pointer to a variable to store EMSK length
258 * Returns: EMSK or %NULL if not available

Completed in 961 milliseconds

1 2