/external/wpa_supplicant_8/src/eap_server/ |
eap_server_tls.c | 327 u8 *eapKeyData, *emsk; local 336 emsk = os_malloc(EAP_EMSK_LEN); 337 if (emsk) 338 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 342 emsk = NULL; 344 if (emsk) { 346 wpa_hexdump(MSG_DEBUG, "EAP-TLS: Derived EMSK", 347 emsk, EAP_EMSK_LEN); 349 wpa_printf(MSG_DEBUG, "EAP-TLS: Failed to derive EMSK"); 352 return emsk; [all...] |
eap_server_gpsk.c | 22 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_gpsk_data 413 data->msk, data->emsk, 594 key = os_memdup(data->emsk, EAP_EMSK_LEN);
|
eap_server_psk.c | 29 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_psk_data 127 data->emsk)) 131 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: EMSK", data->emsk, EAP_EMSK_LEN); 468 key = os_memdup(data->emsk, EAP_EMSK_LEN);
|
eap_server_sake.c | 26 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_sake_data 346 (u8 *) &data->tek, data->msk, data->emsk); 479 key = os_memdup(data->emsk, EAP_EMSK_LEN);
|
eap_server_eke.c | 22 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_eke_data 647 data->msk, data->emsk) < 0) { 648 wpa_printf(MSG_INFO, "EAP-EKE: Failed to derive MSK/EMSK"); 750 key = os_memdup(data->emsk, EAP_EMSK_LEN);
|
eap_server_sim.c | 25 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_sim_data 261 data->emsk); 264 data->msk, data->emsk); 553 data->emsk); 806 key = os_memdup(data->emsk, EAP_EMSK_LEN);
|
eap_server.c | 415 u8 *emsk = NULL; local 446 emsk = sm->m->get_emsk(sm, sm->eap_method_priv, &emsk_len); 447 if (!emsk || emsk_len == 0 || emsk_len > ERP_MAX_KEY_LEN) { 449 "EAP: No suitable EMSK available for ERP"); 453 wpa_hexdump_key(MSG_DEBUG, "EAP: EMSK", emsk, emsk_len); 457 "EMSK", len, sizeof(len), 470 if (hmac_sha256_kdf(emsk, emsk_len, 497 bin_clear_free(emsk, emsk_len); [all...] |
eap_server_aka.c | 27 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_aka_data 558 data->msk, data->emsk); 561 data->msk, data->emsk); 564 data->mk, data->msk, data->emsk); 838 data->k_re, data->msk, data->emsk); 843 data->msk, data->emsk); [all...] |
eap_server_pwd.c | 49 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_pwd_data 899 data->my_confirm, &cs, data->msk, data->emsk, 1056 key = os_memdup(data->emsk, EAP_EMSK_LEN);
|
eap_server_ttls.c | 1307 u8 *eapKeyData, *emsk; local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_psk.c | 29 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_psk_data 249 data->msk, data->emsk)) { 256 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: EMSK", data->emsk, EAP_EMSK_LEN); 466 key = os_memdup(data->emsk, EAP_EMSK_LEN);
|
eap_sake.c | 27 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_sake_data 240 (u8 *) &data->tek, data->msk, data->emsk); 490 key = os_memdup(data->emsk, EAP_EMSK_LEN);
|
eap_eke.c | 21 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_eke_data 607 data->msk, data->emsk) < 0) { 608 wpa_printf(MSG_INFO, "EAP-EKE: Failed to derive MSK/EMSK"); 735 key = os_memdup(data->emsk, EAP_EMSK_LEN);
|
eap_gpsk.c | 21 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_gpsk_data 369 data->msk, data->emsk, 739 key = os_memdup(data->emsk, EAP_EMSK_LEN);
|
eap_pwd.c | 47 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_pwd_data 762 &cs, data->msk, data->emsk, data->session_id) < 0) { 764 "EMSK"); 1045 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
|
eap_sim.c | 33 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_sim_data 149 os_memset(data->emsk, 0, EAP_EMSK_LEN); 792 data->emsk); 1018 data->emsk); [all...] |
eap_aka.c | 31 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_aka_data 146 os_memset(data->emsk, 0, EAP_EMSK_LEN); 1048 data->k_re, data->msk, data->emsk); 1053 data->msk, data->emsk); [all...] |
eap_fast.c | 58 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_fast_data 251 os_memset(data->emsk, 0, EAP_EMSK_LEN); 262 eap_fast_derive_eap_emsk(data->simck, data->emsk) < 0) [all...] |
eap.c | 676 u8 *emsk = NULL; local 710 emsk = ext_emsk; 713 emsk = sm->m->get_emsk(sm, sm->eap_method_priv, &emsk_len); 716 if (!emsk || emsk_len == 0 || emsk_len > ERP_MAX_KEY_LEN) { 718 "EAP: No suitable EMSK available for ERP"); 722 wpa_hexdump_key(MSG_DEBUG, "EAP: EMSK", emsk, emsk_len); 739 if (hmac_sha256_kdf(session_id, session_id_len, "EMSK", len, 752 if (hmac_sha256_kdf(emsk, emsk_len, 776 bin_clear_free(emsk, emsk_len) [all...] |
/external/wpa_supplicant_8/src/wps/ |
wps_i.h | 66 u8 emsk[WPS_EMSK_LEN]; member in struct:wps_data
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_module_tests.c | 914 const u8 emsk[] = { local 985 wpa_printf(MSG_INFO, "- T-PRF (SHA1) test case / EMSK"); 988 os_memcmp(emsk, buf, sizeof(emsk)) != 0) { [all...] |
/external/wpa_supplicant_8/src/eapol_supp/ |
eapol_supp_sm.c | 496 u8 *session_id, *emsk; local 505 emsk = eap_proxy_get_emsk(sm->eap_proxy, &emsk_len); 506 if (sm->config->erp && session_id && emsk) 508 session_id_len, emsk, [all...] |