| /src/external/bsd/wpa/dist/src/eap_common/ |
| eap_teap_common.c | 121 int eap_teap_derive_cmk_basic_pw_auth(u16 tls_cs, const u8 *s_imck_msk, u8 *cmk) 127 * not fully defined in RFC 7170, so this CMK derivation may 129 * published. For now, derive CMK[0] based on S-IMCK[0] and 137 os_memcpy(cmk, &imck[EAP_TEAP_SIMCK_LEN], EAP_TEAP_CMK_LEN); 138 wpa_hexdump_key(MSG_DEBUG, "EAP-TEAP: CMK[no-inner-EAP]", 139 cmk, EAP_TEAP_CMK_LEN); 168 * CMK[j] = last 20 octets of IMCK[j] 201 wpa_hexdump_key(MSG_DEBUG, "EAP-TEAP: EMSK CMK[j]", 230 wpa_hexdump_key(MSG_DEBUG, "EAP-TEAP: MSK CMK[j]", 317 static int eap_teap_tls_mac(u16 tls_cs, const u8 *cmk, size_t cmk_len [all...] |
| eap_teap_common.h | 209 u8 *cmk); 219 const u8 *cmk, u8 *compound_mac);
|
| /src/external/bsd/wpa/dist/src/eap_server/ |
| eap_server_peap.c | 52 u8 cmk[20]; member in struct:eap_peap_data 358 /* Fast-connect: IPMK|CMK = TK */ 362 os_memcpy(data->cmk, tk + 40, 20); 363 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: CMK from TK", 364 data->cmk, 20); 375 * IPMK|CMK = PRF+(TempKey, IPMK Seed, 60) 395 os_memcpy(data->cmk, imck + 40, 20); 396 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: CMK (CMKj)", data->cmk, 20); 473 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC CMK", [all...] |
| eap_server_fast.c | 50 u8 cmk[EAP_FAST_CMK_LEN]; member in struct:eap_fast_data 371 wpa_printf(MSG_DEBUG, "EAP-FAST: Deriving ICMK[%d] (S-IMCK and CMK)", 379 * CMK[j] = last 20 octets of IMCK[j] 392 os_memcpy(data->cmk, imck + EAP_FAST_SIMCK_LEN, EAP_FAST_CMK_LEN); 393 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: CMK[j]", 394 data->cmk, EAP_FAST_CMK_LEN); 652 * CMK = CMK[j] 653 * Compound-MAC = HMAC-SHA1( CMK, Crypto-Binding TLV ) 656 hmac_sha1(data->cmk, EAP_FAST_CMK_LEN [all...] |
| /src/external/bsd/wpa/dist/src/eap_peer/ |
| eap_peap.c | 67 u8 cmk[20]; member in struct:eap_peap_data 284 "EAP-PEAP: CMK derivation - reauth=%d resumed=%d phase2_eap_started=%d phase2_success=%d", 288 /* Fast-connect: IPMK|CMK = TK */ 292 os_memcpy(data->cmk, tk + 40, 20); 293 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: CMK from TK", 294 data->cmk, 20); 305 * IPMK|CMK = PRF+(TempKey, IPMK Seed, 60) 321 os_memcpy(data->cmk, imck + 40, 20); 322 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: CMK (CMKj)", data->cmk, 20) [all...] |
| eap_fast.c | 644 struct eap_tlv_crypto_binding_tlv *_bind, const u8 *cmk) 655 hmac_sha1(cmk, EAP_FAST_CMK_LEN, (u8 *) rbind, sizeof(*rbind), 705 u8 *cmk) 709 wpa_printf(MSG_DEBUG, "EAP-FAST: Determining CMK[%d] for Compound MIC " 717 * CMK[j] = last 20 octets of IMCK[j] 731 os_memcpy(cmk, imck + EAP_FAST_SIMCK_LEN, EAP_FAST_CMK_LEN); 732 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: CMK[j]", 733 cmk, EAP_FAST_CMK_LEN); 770 u8 cmk[EAP_FAST_CMK_LEN], cmac[SHA1_MAC_LEN]; local 777 if (eap_fast_get_cmk(sm, data, cmk) < 0 [all...] |
| /src/external/bsd/ppp/dist/pppd/ |
| peap.c | 153 u_char cmk[PEAP_TLV_CMK_LEN] = {0}; local 179 BCOPY(buf + PEAP_TLV_IPMK_LEN, cmk, PEAP_TLV_CMK_LEN); 180 if (!HMAC(EVP_sha1(), cmk, PEAP_TLV_CMK_LEN, data_tlv, PEAP_TLV_DATA_LEN, compound_mac, &len)) 195 fatal("server's CMK does not match client's CMK, potential MiTM"); 306 /* verify server's CMK */ 308 /* generate client's CMK with new nonce */ 692 dbglog("Failed CMK key generation\n");
|