| /src/external/bsd/wpa/dist/src/eap_common/ |
| eap_psk_common.c | 35 u8 *emsk) 61 &emsk[i * aes_block_size]))
|
| eap_sim_common.h | 81 u8 *emsk); 85 u8 *emsk); 94 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk); 97 const u8 *nonce_s, u8 *msk, u8 *emsk); 112 u8 *msk, u8 *emsk) 120 u8 *emsk)
|
| eap_gpsk_common.c | 112 u8 *msk, u8 *emsk, 172 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: EMSK", pos, EAP_EMSK_LEN); 173 os_memcpy(emsk, pos, EAP_EMSK_LEN); 191 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 205 * EMSK = GKDF-160 (MK, inputString)[64..127] 219 msk, emsk, sk, *sk_len, 227 u8 *msk, u8 *emsk, 241 * EMSK = GKDF-160 (MK, inputString)[64..127] 253 msk, emsk, sk, *sk_len, 272 * @emsk: Buffer for 64-byte EMS [all...] |
| eap_fast_common.h | 103 int eap_fast_derive_eap_emsk(const u8 *simck, u8 *emsk);
|
| eap_gpsk_common.h | 54 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
|
| eap_psk_common.h | 70 u8 *msk, u8 *emsk);
|
| eap_sim_common.c | 77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) 92 os_memcpy(emsk, pos, EAP_EMSK_LEN); 100 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN); 110 u8 *emsk) 155 if (emsk) { 156 os_memcpy(emsk, buf + EAP_SIM_KEYING_DATA_LEN, EAP_EMSK_LEN); 157 wpa_hexdump(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN); 277 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) [all...] |
| eap_teap_common.h | 207 int eap_teap_derive_eap_emsk(u16 tls_cs, const u8 *simck, u8 *emsk); 213 const u8 *emsk, size_t emsk_len,
|
| eap_pwd_common.h | 66 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id);
|
| eap_sake_common.h | 86 u8 *tek, u8 *msk, u8 *emsk);
|
| eap_fast_common.c | 130 int eap_fast_derive_eap_emsk(const u8 *simck, u8 *emsk) 134 * EMSK = T-PRF(S-IMCK[j], 140 emsk, EAP_EMSK_LEN) < 0) 142 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (EMSK)", 143 emsk, EAP_EMSK_LEN);
|
| eap_teap_common.c | 103 int eap_teap_derive_eap_emsk(u16 tls_cs, const u8 *simck, u8 *emsk) 107 * EMSK = TLS-PRF(S-IMCK[j], 113 (u8 *) "", 0, emsk, EAP_EMSK_LEN) < 0) 115 wpa_hexdump_key(MSG_DEBUG, "EAP-TEAP: Derived key (EMSK)", 116 emsk, EAP_EMSK_LEN); 148 const u8 *emsk, size_t emsk_len, 157 * IMSK = First 32 octets of TLS-PRF(EMSK, "TEAPbindkey@ietf.org" | 159 * (if EMSK is not available, MSK is used instead; if neither is 172 wpa_hexdump_key(MSG_DEBUG, "EAP-TEAP: EMSK[j]", emsk, emsk_len) [all...] |
| eap_sake_common.c | 267 * @emsk: Buffer for 64-byte EMSK 274 u8 *emsk) 312 os_memcpy(emsk, key_buf + EAP_MSK_LEN, EAP_EMSK_LEN); 314 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: EMSK", emsk, EAP_EMSK_LEN);
|
| eap_eke_common.h | 104 u8 *msk, u8 *emsk);
|
| /src/external/bsd/wpa/dist/src/eap_server/ |
| eap_server_tls.c | 369 u8 *eapKeyData, *emsk; local 389 emsk = os_malloc(EAP_EMSK_LEN); 390 if (emsk) 391 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 395 emsk = NULL; 397 if (emsk) { 399 wpa_hexdump(MSG_DEBUG, "EAP-TLS: Derived EMSK", 400 emsk, EAP_EMSK_LEN); 402 wpa_printf(MSG_DEBUG, "EAP-TLS: Failed to derive EMSK"); 405 return emsk; [all...] |
| eap_server_psk.c | 29 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_psk_data 127 data->emsk)) 131 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: EMSK", data->emsk, EAP_EMSK_LEN); 468 key = os_memdup(data->emsk, EAP_EMSK_LEN);
|
| eap_server_ttls.c | 1328 u8 *eapKeyData, *emsk; local 1349 emsk = os_malloc(EAP_EMSK_LEN); 1350 if (emsk) 1351 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 1355 emsk = NULL; 1357 if (emsk) { 1359 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: Derived EMSK", 1360 emsk, EAP_EMSK_LEN); 1362 wpa_printf(MSG_DEBUG, "EAP-TTLS: Failed to derive EMSK"); 1365 return emsk; [all...] |
| eap_server_aka.c | 28 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_aka_data 606 data->msk, data->emsk); 609 data->msk, data->emsk); 612 data->mk, data->msk, data->emsk); 967 data->k_re, data->msk, data->emsk); 972 data->msk, data->emsk); 1411 key = os_memdup(data->emsk, EAP_EMSK_LEN);
|
| eap_server_sim.c | 27 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_sim_data 287 data->emsk); 290 data->msk, data->emsk); 694 data->emsk); 949 key = os_memdup(data->emsk, EAP_EMSK_LEN);
|
| eap_server_gpsk.c | 22 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_gpsk_data 413 data->msk, data->emsk, 595 key = os_memdup(data->emsk, EAP_EMSK_LEN);
|
| eap_server_sake.c | 26 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_sake_data 347 data->emsk) < 0) { 491 key = os_memdup(data->emsk, EAP_EMSK_LEN);
|
| eap_server_peap.c | 1415 u8 *eapKeyData, *emsk; local 1425 /* [MS-PEAP] does not define EMSK derivation */ 1442 emsk = os_memdup(eapKeyData + EAP_TLS_KEY_LEN, EAP_EMSK_LEN); 1444 if (!emsk) 1447 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Derived EMSK", 1448 emsk, EAP_EMSK_LEN); 1450 wpa_printf(MSG_DEBUG, "EAP-PEAP: Failed to derive EMSK"); 1451 emsk = NULL; 1454 return emsk;
|
| /src/external/bsd/wpa/dist/src/eap_peer/ |
| eap_sake.c | 27 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_sake_data 241 data->emsk) < 0) { 494 key = os_memdup(data->emsk, EAP_EMSK_LEN);
|
| eap_psk.c | 29 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_psk_data 249 data->msk, data->emsk)) { 256 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: EMSK", data->emsk, EAP_EMSK_LEN); 466 key = os_memdup(data->emsk, EAP_EMSK_LEN);
|
| eap_teap.c | 58 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_teap_data 236 forced_memzero(data->emsk, EAP_EMSK_LEN); 279 /* FIX: RFC 7170 does not describe whether MSK or EMSK based S-IMCK[j] 284 data->emsk) < 0) 657 wpa_hexdump(MSG_MSGDUMP, "EAP-TEAP: EMSK Compound MAC", 722 wpa_hexdump(MSG_MSGDUMP, "EAP-TEAP: EMSK Compound MAC", 734 u8 *msk = NULL, *emsk = NULL; local 772 emsk = data->phase2_method->get_emsk(sm, data->phase2_priv, 778 msk, msk_len, emsk, emsk_len, 782 bin_clear_free(emsk, emsk_len) [all...] |