HomeSort by relevance Sort by last modified time
    Searched defs:emsk (Results 1 - 22 of 22) sorted by null

  /external/wpa_supplicant_8/src/eap_server/
eap_server_tls.c 327 u8 *eapKeyData, *emsk; local
336 emsk = os_malloc(EAP_EMSK_LEN);
337 if (emsk)
338 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN,
342 emsk = NULL;
344 if (emsk) {
346 wpa_hexdump(MSG_DEBUG, "EAP-TLS: Derived EMSK",
347 emsk, EAP_EMSK_LEN);
349 wpa_printf(MSG_DEBUG, "EAP-TLS: Failed to derive EMSK");
352 return emsk;
    [all...]
eap_server_gpsk.c 22 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_gpsk_data
413 data->msk, data->emsk,
594 key = os_memdup(data->emsk, EAP_EMSK_LEN);
eap_server_psk.c 29 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_psk_data
127 data->emsk))
131 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: EMSK", data->emsk, EAP_EMSK_LEN);
468 key = os_memdup(data->emsk, EAP_EMSK_LEN);
eap_server_sake.c 26 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_sake_data
346 (u8 *) &data->tek, data->msk, data->emsk);
479 key = os_memdup(data->emsk, EAP_EMSK_LEN);
eap_server_eke.c 22 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_eke_data
647 data->msk, data->emsk) < 0) {
648 wpa_printf(MSG_INFO, "EAP-EKE: Failed to derive MSK/EMSK");
750 key = os_memdup(data->emsk, EAP_EMSK_LEN);
eap_server_sim.c 25 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_sim_data
261 data->emsk);
264 data->msk, data->emsk);
553 data->emsk);
806 key = os_memdup(data->emsk, EAP_EMSK_LEN);
eap_server.c 415 u8 *emsk = NULL; local
446 emsk = sm->m->get_emsk(sm, sm->eap_method_priv, &emsk_len);
447 if (!emsk || emsk_len == 0 || emsk_len > ERP_MAX_KEY_LEN) {
449 "EAP: No suitable EMSK available for ERP");
453 wpa_hexdump_key(MSG_DEBUG, "EAP: EMSK", emsk, emsk_len);
457 "EMSK", len, sizeof(len),
470 if (hmac_sha256_kdf(emsk, emsk_len,
497 bin_clear_free(emsk, emsk_len);
    [all...]
eap_server_aka.c 27 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_aka_data
558 data->msk, data->emsk);
561 data->msk, data->emsk);
564 data->mk, data->msk, data->emsk);
838 data->k_re, data->msk, data->emsk);
843 data->msk, data->emsk);
    [all...]
eap_server_pwd.c 49 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_pwd_data
899 data->my_confirm, &cs, data->msk, data->emsk,
1056 key = os_memdup(data->emsk, EAP_EMSK_LEN);
eap_server_ttls.c 1307 u8 *eapKeyData, *emsk; local
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_psk.c 29 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_psk_data
249 data->msk, data->emsk)) {
256 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: EMSK", data->emsk, EAP_EMSK_LEN);
466 key = os_memdup(data->emsk, EAP_EMSK_LEN);
eap_sake.c 27 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_sake_data
240 (u8 *) &data->tek, data->msk, data->emsk);
490 key = os_memdup(data->emsk, EAP_EMSK_LEN);
eap_eke.c 21 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_eke_data
607 data->msk, data->emsk) < 0) {
608 wpa_printf(MSG_INFO, "EAP-EKE: Failed to derive MSK/EMSK");
735 key = os_memdup(data->emsk, EAP_EMSK_LEN);
eap_gpsk.c 21 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_gpsk_data
369 data->msk, data->emsk,
739 key = os_memdup(data->emsk, EAP_EMSK_LEN);
eap_pwd.c 47 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_pwd_data
762 &cs, data->msk, data->emsk, data->session_id) < 0) {
764 "EMSK");
1045 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
eap_sim.c 33 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_sim_data
149 os_memset(data->emsk, 0, EAP_EMSK_LEN);
792 data->emsk);
1018 data->emsk);
    [all...]
eap_aka.c 31 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_aka_data
146 os_memset(data->emsk, 0, EAP_EMSK_LEN);
1048 data->k_re, data->msk, data->emsk);
1053 data->msk, data->emsk);
    [all...]
eap_fast.c 58 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_fast_data
251 os_memset(data->emsk, 0, EAP_EMSK_LEN);
262 eap_fast_derive_eap_emsk(data->simck, data->emsk) < 0)
    [all...]
eap.c 676 u8 *emsk = NULL; local
710 emsk = ext_emsk;
713 emsk = sm->m->get_emsk(sm, sm->eap_method_priv, &emsk_len);
716 if (!emsk || emsk_len == 0 || emsk_len > ERP_MAX_KEY_LEN) {
718 "EAP: No suitable EMSK available for ERP");
722 wpa_hexdump_key(MSG_DEBUG, "EAP: EMSK", emsk, emsk_len);
739 if (hmac_sha256_kdf(session_id, session_id_len, "EMSK", len,
752 if (hmac_sha256_kdf(emsk, emsk_len,
776 bin_clear_free(emsk, emsk_len)
    [all...]
  /external/wpa_supplicant_8/src/wps/
wps_i.h 66 u8 emsk[WPS_EMSK_LEN]; member in struct:wps_data
  /external/wpa_supplicant_8/src/crypto/
crypto_module_tests.c 914 const u8 emsk[] = { local
985 wpa_printf(MSG_INFO, "- T-PRF (SHA1) test case / EMSK");
988 os_memcmp(emsk, buf, sizeof(emsk)) != 0) {
    [all...]
  /external/wpa_supplicant_8/src/eapol_supp/
eapol_supp_sm.c 496 u8 *session_id, *emsk; local
505 emsk = eap_proxy_get_emsk(sm->eap_proxy, &emsk_len);
506 if (sm->config->erp && session_id && emsk)
508 session_id_len, emsk,
    [all...]

Completed in 460 milliseconds