/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_psk_common.c | 35 u8 *emsk) 61 &emsk[i * aes_block_size])) 34 eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument
|
H A D | eap_fast_common.c | 131 int eap_fast_derive_eap_emsk(const u8 *simck, u8 *emsk) argument 141 emsk, EAP_EMSK_LEN) < 0) 144 emsk, EAP_EMSK_LEN);
|
H A D | eap_gpsk_common.c | 112 u8 *msk, u8 *emsk, 173 os_memcpy(emsk, pos, EAP_EMSK_LEN); 191 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 219 msk, emsk, sk, *sk_len, 227 u8 *msk, u8 *emsk, 253 msk, emsk, sk, *sk_len, 272 * @emsk: Buffer for 64-byte EMSK 284 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 320 msk, emsk, sk, sk_len, 327 msk, emsk, s 108 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 189 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 225 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) argument 279 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument [all...] |
H A D | eap_pwd_common.c | 310 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) 364 os_memcpy(emsk, msk_emsk + EAP_MSK_LEN, EAP_EMSK_LEN); 307 compute_keys(EAP_PWD_group *grp, BN_CTX *bnctx, const BIGNUM *k, const BIGNUM *peer_scalar, const BIGNUM *server_scalar, const u8 *confirm_peer, const u8 *confirm_server, const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) argument
|
H A D | eap_sake_common.c | 255 * @emsk: Buffer for 64-byte EMSK 261 u8 *emsk) 295 os_memcpy(emsk, key_buf + EAP_MSK_LEN, EAP_EMSK_LEN); 297 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: EMSK", emsk, EAP_EMSK_LEN); 259 eap_sake_derive_keys(const u8 *root_secret_a, const u8 *root_secret_b, const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_psk_common.c | 35 u8 *emsk) 61 &emsk[i * aes_block_size])) 34 eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument
|
H A D | eap_fast_common.c | 131 int eap_fast_derive_eap_emsk(const u8 *simck, u8 *emsk) argument 141 emsk, EAP_EMSK_LEN) < 0) 144 emsk, EAP_EMSK_LEN);
|
H A D | eap_gpsk_common.c | 112 u8 *msk, u8 *emsk, 173 os_memcpy(emsk, pos, EAP_EMSK_LEN); 191 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 219 msk, emsk, sk, *sk_len, 227 u8 *msk, u8 *emsk, 253 msk, emsk, sk, *sk_len, 272 * @emsk: Buffer for 64-byte EMSK 284 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 320 msk, emsk, sk, sk_len, 327 msk, emsk, s 108 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 189 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 225 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) argument 279 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument [all...] |
H A D | eap_pwd_common.c | 310 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) 364 os_memcpy(emsk, msk_emsk + EAP_MSK_LEN, EAP_EMSK_LEN); 307 compute_keys(EAP_PWD_group *grp, BN_CTX *bnctx, const BIGNUM *k, const BIGNUM *peer_scalar, const BIGNUM *server_scalar, const u8 *confirm_peer, const u8 *confirm_server, const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) argument
|
H A D | eap_sake_common.c | 255 * @emsk: Buffer for 64-byte EMSK 261 u8 *emsk) 295 os_memcpy(emsk, key_buf + EAP_MSK_LEN, EAP_EMSK_LEN); 297 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: EMSK", emsk, EAP_EMSK_LEN); 259 eap_sake_derive_keys(const u8 *root_secret_a, const u8 *root_secret_b, const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_psk_common.c | 35 u8 *emsk) 61 &emsk[i * aes_block_size])) 34 eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument
|
H A D | eap_fast_common.c | 131 int eap_fast_derive_eap_emsk(const u8 *simck, u8 *emsk) argument 141 emsk, EAP_EMSK_LEN) < 0) 144 emsk, EAP_EMSK_LEN);
|
H A D | eap_gpsk_common.c | 112 u8 *msk, u8 *emsk, 173 os_memcpy(emsk, pos, EAP_EMSK_LEN); 191 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 219 msk, emsk, sk, *sk_len, 227 u8 *msk, u8 *emsk, 253 msk, emsk, sk, *sk_len, 272 * @emsk: Buffer for 64-byte EMSK 284 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 320 msk, emsk, sk, sk_len, 327 msk, emsk, s 108 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 189 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 225 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) argument 279 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_psk.c | 29 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_psk_data 250 data->msk, data->emsk)) { 257 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: EMSK", data->emsk, EAP_EMSK_LEN); 474 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
|
H A D | eap_sake.c | 27 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_sake_data 242 (u8 *) &data->tek, data->msk, data->emsk); 487 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_gpsk.c | 22 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_gpsk_data 414 data->msk, data->emsk, 599 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
|
H A D | eap_server_psk.c | 29 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_psk_data 127 data->emsk)) 131 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: EMSK", data->emsk, EAP_EMSK_LEN); 474 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
|
H A D | eap_server_sake.c | 26 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_sake_data 347 (u8 *) &data->tek, data->msk, data->emsk); 484 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
|
H A D | eap_server_tls.c | 327 u8 *eapKeyData, *emsk; local 336 emsk = os_malloc(EAP_EMSK_LEN); 337 if (emsk) 338 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 342 emsk = NULL; 344 if (emsk) { 347 emsk, EAP_EMSK_LEN); 352 return emsk;
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_psk.c | 29 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_psk_data 250 data->msk, data->emsk)) { 257 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: EMSK", data->emsk, EAP_EMSK_LEN); 474 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
|
H A D | eap_sake.c | 27 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_sake_data 242 (u8 *) &data->tek, data->msk, data->emsk); 487 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_gpsk.c | 22 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_gpsk_data 414 data->msk, data->emsk, 599 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
|
H A D | eap_server_psk.c | 29 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_psk_data 127 data->emsk)) 131 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: EMSK", data->emsk, EAP_EMSK_LEN); 474 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
|
H A D | eap_server_sake.c | 26 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_sake_data 347 (u8 *) &data->tek, data->msk, data->emsk); 484 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
|
H A D | eap_server_tls.c | 327 u8 *eapKeyData, *emsk; local 336 emsk = os_malloc(EAP_EMSK_LEN); 337 if (emsk) 338 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 342 emsk = NULL; 344 if (emsk) { 347 emsk, EAP_EMSK_LEN); 352 return emsk;
|