/external/wpa_supplicant_8/src/eap_peer/ |
eap_peap.c | 255 u8 isk[32], imck[60]; local 297 isk, sizeof(isk), imck, sizeof(imck)) < 0) 299 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: IMCK (IPMKj)", 300 imck, sizeof(imck)); 302 os_memcpy(data->ipmk, imck, 40); 304 os_memcpy(data->cmk, imck + 40, 20); [all...] |
eap_fast.c | 288 * S-IMCK[0] = session_key_seed 291 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", 313 * S-IMCK[0] = session_key_seed 316 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", 697 u8 isk[32], imck[60]; local 704 * IMCK[j] = T-PRF(S-IMCK[j-1], "Inner Methods Compound Keys", 706 * S-IMCK[j] = first 40 octets of IMCK[j] 707 * CMK[j] = last 20 octets of IMCK[j [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_peap.c | 326 u8 isk[32], imck[60]; local 363 isk, sizeof(isk), imck, sizeof(imck)) < 0) { 367 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: IMCK (IPMKj)", 368 imck, sizeof(imck)); 372 os_memcpy(data->ipmk, imck, 40); 374 os_memcpy(data->cmk, imck + 40, 20); [all...] |
eap_server_fast.c | 291 * S-IMCK[0] = session_key_seed 294 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", 315 * S-IMCK[0] = session_key_seed 318 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])", 380 u8 isk[32], imck[60]; local 382 wpa_printf(MSG_DEBUG, "EAP-FAST: Deriving ICMK[%d] (S-IMCK and CMK)", 387 * IMCK[j] = T-PRF(S-IMCK[j-1], "Inner Methods Compound Keys", 389 * S-IMCK[j] = first 40 octets of IMCK[j [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto_module_tests.c | 894 const u8 imck[] = { local 966 wpa_printf(MSG_INFO, "- T-PRF (SHA1) test case / IMCK"); 968 isk, sizeof(isk), buf, sizeof(imck)) < 0 || 969 os_memcmp(imck, buf, sizeof(imck)) != 0) { 974 simck = imck; 975 cmk = imck + 40; [all...] |