Searched defs:emsk (Results 1 - 25 of 87) sorted by relevance

1234

/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_psk_common.c35 u8 *emsk)
61 &emsk[i * aes_block_size]))
34 eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument
H A Deap_fast_common.c131 int eap_fast_derive_eap_emsk(const u8 *simck, u8 *emsk) argument
141 emsk, EAP_EMSK_LEN) < 0)
144 emsk, EAP_EMSK_LEN);
H A Deap_gpsk_common.c112 u8 *msk, u8 *emsk,
173 os_memcpy(emsk, pos, EAP_EMSK_LEN);
191 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
219 msk, emsk, sk, *sk_len,
227 u8 *msk, u8 *emsk,
253 msk, emsk, sk, *sk_len,
272 * @emsk: Buffer for 64-byte EMSK
284 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
320 msk, emsk, sk, sk_len,
327 msk, emsk, s
108 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument
189 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument
225 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) argument
279 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument
[all...]
H A Deap_pwd_common.c310 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id)
364 os_memcpy(emsk, msk_emsk + EAP_MSK_LEN, EAP_EMSK_LEN);
307 compute_keys(EAP_PWD_group *grp, BN_CTX *bnctx, const BIGNUM *k, const BIGNUM *peer_scalar, const BIGNUM *server_scalar, const u8 *confirm_peer, const u8 *confirm_server, const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) argument
H A Deap_sake_common.c255 * @emsk: Buffer for 64-byte EMSK
261 u8 *emsk)
295 os_memcpy(emsk, key_buf + EAP_MSK_LEN, EAP_EMSK_LEN);
297 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: EMSK", emsk, EAP_EMSK_LEN);
259 eap_sake_derive_keys(const u8 *root_secret_a, const u8 *root_secret_b, const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument
/external/wpa_supplicant_8/src/eap_common/
H A Deap_psk_common.c35 u8 *emsk)
61 &emsk[i * aes_block_size]))
34 eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument
H A Deap_fast_common.c131 int eap_fast_derive_eap_emsk(const u8 *simck, u8 *emsk) argument
141 emsk, EAP_EMSK_LEN) < 0)
144 emsk, EAP_EMSK_LEN);
H A Deap_gpsk_common.c112 u8 *msk, u8 *emsk,
173 os_memcpy(emsk, pos, EAP_EMSK_LEN);
191 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
219 msk, emsk, sk, *sk_len,
227 u8 *msk, u8 *emsk,
253 msk, emsk, sk, *sk_len,
272 * @emsk: Buffer for 64-byte EMSK
284 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
320 msk, emsk, sk, sk_len,
327 msk, emsk, s
108 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument
189 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument
225 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) argument
279 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument
[all...]
H A Deap_pwd_common.c310 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id)
364 os_memcpy(emsk, msk_emsk + EAP_MSK_LEN, EAP_EMSK_LEN);
307 compute_keys(EAP_PWD_group *grp, BN_CTX *bnctx, const BIGNUM *k, const BIGNUM *peer_scalar, const BIGNUM *server_scalar, const u8 *confirm_peer, const u8 *confirm_server, const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) argument
H A Deap_sake_common.c255 * @emsk: Buffer for 64-byte EMSK
261 u8 *emsk)
295 os_memcpy(emsk, key_buf + EAP_MSK_LEN, EAP_EMSK_LEN);
297 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: EMSK", emsk, EAP_EMSK_LEN);
259 eap_sake_derive_keys(const u8 *root_secret_a, const u8 *root_secret_b, const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_psk_common.c35 u8 *emsk)
61 &emsk[i * aes_block_size]))
34 eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument
H A Deap_fast_common.c131 int eap_fast_derive_eap_emsk(const u8 *simck, u8 *emsk) argument
141 emsk, EAP_EMSK_LEN) < 0)
144 emsk, EAP_EMSK_LEN);
H A Deap_gpsk_common.c112 u8 *msk, u8 *emsk,
173 os_memcpy(emsk, pos, EAP_EMSK_LEN);
191 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
219 msk, emsk, sk, *sk_len,
227 u8 *msk, u8 *emsk,
253 msk, emsk, sk, *sk_len,
272 * @emsk: Buffer for 64-byte EMSK
284 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
320 msk, emsk, sk, sk_len,
327 msk, emsk, s
108 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument
189 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument
225 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) argument
279 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_psk.c29 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_psk_data
250 data->msk, data->emsk)) {
257 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: EMSK", data->emsk, EAP_EMSK_LEN);
474 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
H A Deap_sake.c27 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_sake_data
242 (u8 *) &data->tek, data->msk, data->emsk);
487 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_gpsk.c22 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_gpsk_data
414 data->msk, data->emsk,
599 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
H A Deap_server_psk.c29 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_psk_data
127 data->emsk))
131 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: EMSK", data->emsk, EAP_EMSK_LEN);
474 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
H A Deap_server_sake.c26 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_sake_data
347 (u8 *) &data->tek, data->msk, data->emsk);
484 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
H A Deap_server_tls.c327 u8 *eapKeyData, *emsk; local
336 emsk = os_malloc(EAP_EMSK_LEN);
337 if (emsk)
338 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN,
342 emsk = NULL;
344 if (emsk) {
347 emsk, EAP_EMSK_LEN);
352 return emsk;
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_psk.c29 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_psk_data
250 data->msk, data->emsk)) {
257 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: EMSK", data->emsk, EAP_EMSK_LEN);
474 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
H A Deap_sake.c27 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_sake_data
242 (u8 *) &data->tek, data->msk, data->emsk);
487 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_gpsk.c22 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_gpsk_data
414 data->msk, data->emsk,
599 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
H A Deap_server_psk.c29 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_psk_data
127 data->emsk))
131 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: EMSK", data->emsk, EAP_EMSK_LEN);
474 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
H A Deap_server_sake.c26 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_sake_data
347 (u8 *) &data->tek, data->msk, data->emsk);
484 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
H A Deap_server_tls.c327 u8 *eapKeyData, *emsk; local
336 emsk = os_malloc(EAP_EMSK_LEN);
337 if (emsk)
338 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN,
342 emsk = NULL;
344 if (emsk) {
347 emsk, EAP_EMSK_LEN);
352 return emsk;

Completed in 8920 milliseconds

1234