HomeSort by: relevance | last modified time | path
    Searched refs:emsk (Results 1 - 25 of 41) sorted by relevancy

1 2

  /src/external/bsd/wpa/dist/src/eap_common/
eap_psk_common.c 35 u8 *emsk)
61 &emsk[i * aes_block_size]))
eap_sim_common.h 81 u8 *emsk);
85 u8 *emsk);
94 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk);
97 const u8 *nonce_s, u8 *msk, u8 *emsk);
112 u8 *msk, u8 *emsk)
120 u8 *emsk)
eap_gpsk_common.c 112 u8 *msk, u8 *emsk,
172 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: EMSK", pos, EAP_EMSK_LEN);
173 os_memcpy(emsk, pos, EAP_EMSK_LEN);
191 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
205 * EMSK = GKDF-160 (MK, inputString)[64..127]
219 msk, emsk, sk, *sk_len,
227 u8 *msk, u8 *emsk,
241 * EMSK = GKDF-160 (MK, inputString)[64..127]
253 msk, emsk, sk, *sk_len,
272 * @emsk: Buffer for 64-byte EMS
    [all...]
eap_fast_common.h 103 int eap_fast_derive_eap_emsk(const u8 *simck, u8 *emsk);
eap_gpsk_common.h 54 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
eap_psk_common.h 70 u8 *msk, u8 *emsk);
eap_sim_common.c 77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk)
92 os_memcpy(emsk, pos, EAP_EMSK_LEN);
100 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN);
110 u8 *emsk)
155 if (emsk) {
156 os_memcpy(emsk, buf + EAP_SIM_KEYING_DATA_LEN, EAP_EMSK_LEN);
157 wpa_hexdump(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN);
277 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk)
    [all...]
eap_teap_common.h 207 int eap_teap_derive_eap_emsk(u16 tls_cs, const u8 *simck, u8 *emsk);
213 const u8 *emsk, size_t emsk_len,
eap_pwd_common.h 66 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id);
eap_sake_common.h 86 u8 *tek, u8 *msk, u8 *emsk);
eap_fast_common.c 130 int eap_fast_derive_eap_emsk(const u8 *simck, u8 *emsk)
134 * EMSK = T-PRF(S-IMCK[j],
140 emsk, EAP_EMSK_LEN) < 0)
142 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (EMSK)",
143 emsk, EAP_EMSK_LEN);
eap_teap_common.c 103 int eap_teap_derive_eap_emsk(u16 tls_cs, const u8 *simck, u8 *emsk)
107 * EMSK = TLS-PRF(S-IMCK[j],
113 (u8 *) "", 0, emsk, EAP_EMSK_LEN) < 0)
115 wpa_hexdump_key(MSG_DEBUG, "EAP-TEAP: Derived key (EMSK)",
116 emsk, EAP_EMSK_LEN);
148 const u8 *emsk, size_t emsk_len,
157 * IMSK = First 32 octets of TLS-PRF(EMSK, "TEAPbindkey@ietf.org" |
159 * (if EMSK is not available, MSK is used instead; if neither is
172 wpa_hexdump_key(MSG_DEBUG, "EAP-TEAP: EMSK[j]", emsk, emsk_len)
    [all...]
eap_sake_common.c 267 * @emsk: Buffer for 64-byte EMSK
274 u8 *emsk)
312 os_memcpy(emsk, key_buf + EAP_MSK_LEN, EAP_EMSK_LEN);
314 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: EMSK", emsk, EAP_EMSK_LEN);
eap_eke_common.h 104 u8 *msk, u8 *emsk);
  /src/external/bsd/wpa/dist/src/eap_server/
eap_server_tls.c 369 u8 *eapKeyData, *emsk; local
389 emsk = os_malloc(EAP_EMSK_LEN);
390 if (emsk)
391 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN,
395 emsk = NULL;
397 if (emsk) {
399 wpa_hexdump(MSG_DEBUG, "EAP-TLS: Derived EMSK",
400 emsk, EAP_EMSK_LEN);
402 wpa_printf(MSG_DEBUG, "EAP-TLS: Failed to derive EMSK");
405 return emsk;
    [all...]
eap_server_psk.c 29 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_psk_data
127 data->emsk))
131 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: EMSK", data->emsk, EAP_EMSK_LEN);
468 key = os_memdup(data->emsk, EAP_EMSK_LEN);
eap_server_ttls.c 1328 u8 *eapKeyData, *emsk; local
1349 emsk = os_malloc(EAP_EMSK_LEN);
1350 if (emsk)
1351 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN,
1355 emsk = NULL;
1357 if (emsk) {
1359 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: Derived EMSK",
1360 emsk, EAP_EMSK_LEN);
1362 wpa_printf(MSG_DEBUG, "EAP-TTLS: Failed to derive EMSK");
1365 return emsk;
    [all...]
eap_server_aka.c 28 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_aka_data
606 data->msk, data->emsk);
609 data->msk, data->emsk);
612 data->mk, data->msk, data->emsk);
967 data->k_re, data->msk, data->emsk);
972 data->msk, data->emsk);
1411 key = os_memdup(data->emsk, EAP_EMSK_LEN);
eap_server_sim.c 27 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_sim_data
287 data->emsk);
290 data->msk, data->emsk);
694 data->emsk);
949 key = os_memdup(data->emsk, EAP_EMSK_LEN);
eap_server_gpsk.c 22 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_gpsk_data
413 data->msk, data->emsk,
595 key = os_memdup(data->emsk, EAP_EMSK_LEN);
eap_server_sake.c 26 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_sake_data
347 data->emsk) < 0) {
491 key = os_memdup(data->emsk, EAP_EMSK_LEN);
eap_server_peap.c 1415 u8 *eapKeyData, *emsk; local
1425 /* [MS-PEAP] does not define EMSK derivation */
1442 emsk = os_memdup(eapKeyData + EAP_TLS_KEY_LEN, EAP_EMSK_LEN);
1444 if (!emsk)
1447 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Derived EMSK",
1448 emsk, EAP_EMSK_LEN);
1450 wpa_printf(MSG_DEBUG, "EAP-PEAP: Failed to derive EMSK");
1451 emsk = NULL;
1454 return emsk;
  /src/external/bsd/wpa/dist/src/eap_peer/
eap_sake.c 27 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_sake_data
241 data->emsk) < 0) {
494 key = os_memdup(data->emsk, EAP_EMSK_LEN);
eap_psk.c 29 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_psk_data
249 data->msk, data->emsk)) {
256 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: EMSK", data->emsk, EAP_EMSK_LEN);
466 key = os_memdup(data->emsk, EAP_EMSK_LEN);
eap_teap.c 58 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_teap_data
236 forced_memzero(data->emsk, EAP_EMSK_LEN);
279 /* FIX: RFC 7170 does not describe whether MSK or EMSK based S-IMCK[j]
284 data->emsk) < 0)
657 wpa_hexdump(MSG_MSGDUMP, "EAP-TEAP: EMSK Compound MAC",
722 wpa_hexdump(MSG_MSGDUMP, "EAP-TEAP: EMSK Compound MAC",
734 u8 *msk = NULL, *emsk = NULL; local
772 emsk = data->phase2_method->get_emsk(sm, data->phase2_priv,
778 msk, msk_len, emsk, emsk_len,
782 bin_clear_free(emsk, emsk_len)
    [all...]

Completed in 43 milliseconds

1 2