/external/wpa_supplicant/ |
H A D | eap_psk_common.c | 37 void eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, argument 53 aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size]);
|
H A D | eap_gpsk_common.c | 119 u8 *msk, u8 *emsk, 176 os_memcpy(msk, pos, EAP_MSK_LEN); 198 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 226 msk, emsk, sk, *sk_len, 234 u8 *msk, u8 *emsk, 260 msk, emsk, sk, *sk_len, 278 * @msk: Buffer for 64-byte MSK 291 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 329 msk, emsk, sk, sk_len, 335 msk, ems 115 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 196 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 232 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) argument 286 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument [all...] |
H A D | eap_psk.c | 34 u8 msk[EAP_MSK_LEN]; member in struct:eap_psk_data 244 data->msk, data->emsk); 246 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: MSK", data->msk, EAP_MSK_LEN); 422 os_memcpy(key, data->msk, EAP_MSK_LEN);
|
H A D | eap_sake.c | 32 u8 msk[EAP_MSK_LEN]; member in struct:eap_sake_data 258 (u8 *) &data->tek, data->msk, data->emsk); 469 os_memcpy(key, data->msk, EAP_MSK_LEN);
|
H A D | eap_sake_common.c | 259 * @msk: Buffer for 64-byte MSK 265 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, 299 os_memcpy(msk, key_buf, EAP_MSK_LEN); 301 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: MSK", msk, EAP_MSK_LEN); 264 eap_sake_derive_keys(const u8 *root_secret_a, const u8 *root_secret_b, const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | eap_psk_common.c | 40 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, argument 58 if (aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size]))
|
H A D | eap_fast_common.c | 151 void eap_fast_derive_eap_msk(const u8 *simck, u8 *msk) argument 160 msk, EAP_FAST_KEY_LEN); 162 msk, EAP_FAST_KEY_LEN);
|
H A D | eap_gpsk_common.c | 120 u8 *msk, u8 *emsk, 177 os_memcpy(msk, pos, EAP_MSK_LEN); 199 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 227 msk, emsk, sk, *sk_len, 235 u8 *msk, u8 *emsk, 261 msk, emsk, sk, *sk_len, 279 * @msk: Buffer for 64-byte MSK 292 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 330 msk, emsk, sk, sk_len, 336 msk, ems 116 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 197 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 233 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) argument 287 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument [all...] |
H A D | eap_sake_common.c | 260 * @msk: Buffer for 64-byte MSK 266 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, 300 os_memcpy(msk, key_buf, EAP_MSK_LEN); 302 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: MSK", msk, EAP_MSK_LEN); 265 eap_sake_derive_keys(const u8 *root_secret_a, const u8 *root_secret_b, const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_psk_common.c | 40 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, argument 58 if (aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size]))
|
H A D | eap_fast_common.c | 151 void eap_fast_derive_eap_msk(const u8 *simck, u8 *msk) argument 160 msk, EAP_FAST_KEY_LEN); 162 msk, EAP_FAST_KEY_LEN);
|
H A D | eap_gpsk_common.c | 117 u8 *msk, u8 *emsk, 174 os_memcpy(msk, pos, EAP_MSK_LEN); 196 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 224 msk, emsk, sk, *sk_len, 232 u8 *msk, u8 *emsk, 258 msk, emsk, sk, *sk_len, 276 * @msk: Buffer for 64-byte MSK 289 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 327 msk, emsk, sk, sk_len, 333 msk, ems 113 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 194 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 230 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) argument 284 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument [all...] |
H A D | eap_pwd_common.c | 269 u32 *ciphersuite, u8 *msk, u8 *emsk) 306 os_memcpy(msk, msk_emsk, EAP_MSK_LEN); 266 compute_keys(EAP_PWD_group *grp, BN_CTX *bnctx, BIGNUM *k, BIGNUM *peer_scalar, BIGNUM *server_scalar, u8 *commit_peer, u8 *commit_server, u32 *ciphersuite, u8 *msk, u8 *emsk) argument
|
H A D | eap_sake_common.c | 260 * @msk: Buffer for 64-byte MSK 266 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, 300 os_memcpy(msk, key_buf, EAP_MSK_LEN); 302 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: MSK", msk, EAP_MSK_LEN); 265 eap_sake_derive_keys(const u8 *root_secret_a, const u8 *root_secret_b, const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_psk_common.c | 40 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, argument 58 if (aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size]))
|
H A D | eap_fast_common.c | 151 void eap_fast_derive_eap_msk(const u8 *simck, u8 *msk) argument 160 msk, EAP_FAST_KEY_LEN); 162 msk, EAP_FAST_KEY_LEN);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_psk_common.c | 40 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, argument 58 if (aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size]))
|
H A D | eap_fast_common.c | 151 void eap_fast_derive_eap_msk(const u8 *simck, u8 *msk) argument 160 msk, EAP_FAST_KEY_LEN); 162 msk, EAP_FAST_KEY_LEN);
|
/external/wpa_supplicant/tests/ |
H A D | test_sha1.c | 89 const u8 msk[] = { local 149 (u8 *) "", 0, buf, sizeof(msk)); 150 if (memcmp(msk, buf, sizeof(msk)) != 0) {
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
H A D | test_sha1.c | 89 const u8 msk[] = { local 160 (u8 *) "", 0, buf, sizeof(msk)); 161 if (memcmp(msk, buf, sizeof(msk)) != 0) { 168 (u8 *) "", 0, buf, sizeof(msk));
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_psk.c | 32 u8 msk[EAP_MSK_LEN]; member in struct:eap_psk_data 253 data->msk, data->emsk)) { 259 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: MSK", data->msk, EAP_MSK_LEN); 436 os_memcpy(key, data->msk, EAP_MSK_LEN);
|
H A D | eap_sake.c | 31 u8 msk[EAP_MSK_LEN]; member in struct:eap_sake_data 248 (u8 *) &data->tek, data->msk, data->emsk); 453 os_memcpy(key, data->msk, EAP_MSK_LEN);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_gpsk.c | 26 u8 msk[EAP_MSK_LEN]; member in struct:eap_gpsk_data 425 data->msk, data->emsk, 577 os_memcpy(key, data->msk, EAP_MSK_LEN);
|
H A D | eap_psk.c | 33 u8 msk[EAP_MSK_LEN]; member in struct:eap_psk_data 131 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk, 135 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: MSK", data->msk, EAP_MSK_LEN); 461 os_memcpy(key, data->msk, EAP_MSK_LEN);
|
H A D | eap_sake.c | 30 u8 msk[EAP_MSK_LEN]; member in struct:eap_sake_data 367 (u8 *) &data->tek, data->msk, data->emsk); 486 os_memcpy(key, data->msk, EAP_MSK_LEN);
|