HomeSort by: relevance | last modified time | path
    Searched refs:cmk (Results 1 - 7 of 7) sorted by relevancy

  /src/external/bsd/wpa/dist/src/eap_common/
eap_teap_common.c 121 int eap_teap_derive_cmk_basic_pw_auth(u16 tls_cs, const u8 *s_imck_msk, u8 *cmk)
127 * not fully defined in RFC 7170, so this CMK derivation may
129 * published. For now, derive CMK[0] based on S-IMCK[0] and
137 os_memcpy(cmk, &imck[EAP_TEAP_SIMCK_LEN], EAP_TEAP_CMK_LEN);
138 wpa_hexdump_key(MSG_DEBUG, "EAP-TEAP: CMK[no-inner-EAP]",
139 cmk, EAP_TEAP_CMK_LEN);
168 * CMK[j] = last 20 octets of IMCK[j]
201 wpa_hexdump_key(MSG_DEBUG, "EAP-TEAP: EMSK CMK[j]",
230 wpa_hexdump_key(MSG_DEBUG, "EAP-TEAP: MSK CMK[j]",
317 static int eap_teap_tls_mac(u16 tls_cs, const u8 *cmk, size_t cmk_len
    [all...]
eap_teap_common.h 209 u8 *cmk);
219 const u8 *cmk, u8 *compound_mac);
  /src/external/bsd/wpa/dist/src/eap_server/
eap_server_peap.c 52 u8 cmk[20]; member in struct:eap_peap_data
358 /* Fast-connect: IPMK|CMK = TK */
362 os_memcpy(data->cmk, tk + 40, 20);
363 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: CMK from TK",
364 data->cmk, 20);
375 * IPMK|CMK = PRF+(TempKey, IPMK Seed, 60)
395 os_memcpy(data->cmk, imck + 40, 20);
396 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: CMK (CMKj)", data->cmk, 20);
473 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC CMK",
    [all...]
eap_server_fast.c 50 u8 cmk[EAP_FAST_CMK_LEN]; member in struct:eap_fast_data
371 wpa_printf(MSG_DEBUG, "EAP-FAST: Deriving ICMK[%d] (S-IMCK and CMK)",
379 * CMK[j] = last 20 octets of IMCK[j]
392 os_memcpy(data->cmk, imck + EAP_FAST_SIMCK_LEN, EAP_FAST_CMK_LEN);
393 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: CMK[j]",
394 data->cmk, EAP_FAST_CMK_LEN);
652 * CMK = CMK[j]
653 * Compound-MAC = HMAC-SHA1( CMK, Crypto-Binding TLV )
656 hmac_sha1(data->cmk, EAP_FAST_CMK_LEN
    [all...]
  /src/external/bsd/wpa/dist/src/eap_peer/
eap_peap.c 67 u8 cmk[20]; member in struct:eap_peap_data
284 "EAP-PEAP: CMK derivation - reauth=%d resumed=%d phase2_eap_started=%d phase2_success=%d",
288 /* Fast-connect: IPMK|CMK = TK */
292 os_memcpy(data->cmk, tk + 40, 20);
293 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: CMK from TK",
294 data->cmk, 20);
305 * IPMK|CMK = PRF+(TempKey, IPMK Seed, 60)
321 os_memcpy(data->cmk, imck + 40, 20);
322 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: CMK (CMKj)", data->cmk, 20)
    [all...]
eap_fast.c 644 struct eap_tlv_crypto_binding_tlv *_bind, const u8 *cmk)
655 hmac_sha1(cmk, EAP_FAST_CMK_LEN, (u8 *) rbind, sizeof(*rbind),
705 u8 *cmk)
709 wpa_printf(MSG_DEBUG, "EAP-FAST: Determining CMK[%d] for Compound MIC "
717 * CMK[j] = last 20 octets of IMCK[j]
731 os_memcpy(cmk, imck + EAP_FAST_SIMCK_LEN, EAP_FAST_CMK_LEN);
732 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: CMK[j]",
733 cmk, EAP_FAST_CMK_LEN);
770 u8 cmk[EAP_FAST_CMK_LEN], cmac[SHA1_MAC_LEN]; local
777 if (eap_fast_get_cmk(sm, data, cmk) < 0
    [all...]
  /src/external/bsd/ppp/dist/pppd/
peap.c 153 u_char cmk[PEAP_TLV_CMK_LEN] = {0}; local
179 BCOPY(buf + PEAP_TLV_IPMK_LEN, cmk, PEAP_TLV_CMK_LEN);
180 if (!HMAC(EVP_sha1(), cmk, PEAP_TLV_CMK_LEN, data_tlv, PEAP_TLV_DATA_LEN, compound_mac, &len))
195 fatal("server's CMK does not match client's CMK, potential MiTM");
306 /* verify server's CMK */
308 /* generate client's CMK with new nonce */
692 dbglog("Failed CMK key generation\n");

Completed in 46 milliseconds