/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_psk_common.h | 70 u8 *msk, u8 *emsk);
|
H A D | eap_fast_common.h | 103 int eap_fast_derive_eap_emsk(const u8 *simck, u8 *emsk);
|
H A D | eap_gpsk_common.h | 54 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
|
H A D | eap_pwd_common.h | 66 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id);
|
H A D | eap_sake_common.h | 86 u8 *tek, u8 *msk, u8 *emsk);
|
H A D | eap_eke_common.h | 104 u8 *msk, u8 *emsk);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | eap_psk_common.h | 70 u8 *msk, u8 *emsk);
|
H A D | eap_fast_common.h | 103 int eap_fast_derive_eap_emsk(const u8 *simck, u8 *emsk);
|
H A D | eap_gpsk_common.h | 54 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
|
H A D | eap_pwd_common.h | 66 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id);
|
H A D | eap_sake_common.h | 86 u8 *tek, u8 *msk, u8 *emsk);
|
H A D | eap_eke_common.h | 104 u8 *msk, u8 *emsk);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_aka.c | 27 u8 emsk[EAP_EMSK_LEN]; member 566 data->msk, data->emsk); in eap_aka_build_reauth() 569 data->msk, data->emsk); in eap_aka_build_reauth() 572 data->mk, data->msk, data->emsk); in eap_aka_build_reauth() 859 data->k_re, data->msk, data->emsk); in eap_aka_fullauth() 864 data->msk, data->emsk); in eap_aka_fullauth() 1301 key = os_memdup(data->emsk, EAP_EMSK_LEN); in eap_aka_get_emsk()
|
H A D | eap_server_sim.c | 25 u8 emsk[EAP_EMSK_LEN]; member 269 data->emsk); in eap_sim_build_reauth() 272 data->msk, data->emsk); in eap_sim_build_reauth() 573 data->emsk); in eap_sim_process_start() 826 key = os_memdup(data->emsk, EAP_EMSK_LEN); in eap_sim_get_emsk()
|
H A D | eap_server_sake.c | 26 u8 emsk[EAP_EMSK_LEN]; member 347 data->emsk) < 0) { in eap_sake_process_challenge() 491 key = os_memdup(data->emsk, EAP_EMSK_LEN); in eap_sake_get_emsk()
|
H A D | eap_server_peap.c | 1354 u8 *eapKeyData, *emsk; in eap_peap_get_emsk() local 1369 emsk = os_memdup(eapKeyData + EAP_TLS_KEY_LEN, EAP_EMSK_LEN); in eap_peap_get_emsk() 1371 if (!emsk) in eap_peap_get_emsk() 1375 emsk, EAP_EMSK_LEN); in eap_peap_get_emsk() 1378 emsk = NULL; in eap_peap_get_emsk() 1381 return emsk; in eap_peap_get_emsk()
|
H A D | eap_server_gpsk.c | 22 u8 emsk[EAP_EMSK_LEN]; member 413 data->msk, data->emsk, in eap_gpsk_process_gpsk_2() 594 key = os_memdup(data->emsk, EAP_EMSK_LEN); in eap_gpsk_get_emsk()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_server_aka.c | 27 u8 emsk[EAP_EMSK_LEN]; member 566 data->msk, data->emsk); in eap_aka_build_reauth() 569 data->msk, data->emsk); in eap_aka_build_reauth() 572 data->mk, data->msk, data->emsk); in eap_aka_build_reauth() 859 data->k_re, data->msk, data->emsk); in eap_aka_fullauth() 864 data->msk, data->emsk); in eap_aka_fullauth() 1303 key = os_memdup(data->emsk, EAP_EMSK_LEN); in eap_aka_get_emsk()
|
H A D | eap_server_sim.c | 25 u8 emsk[EAP_EMSK_LEN]; member 269 data->emsk); in eap_sim_build_reauth() 272 data->msk, data->emsk); in eap_sim_build_reauth() 573 data->emsk); in eap_sim_process_start() 828 key = os_memdup(data->emsk, EAP_EMSK_LEN); in eap_sim_get_emsk()
|
H A D | eap_server_sake.c | 26 u8 emsk[EAP_EMSK_LEN]; member 347 data->emsk) < 0) { in eap_sake_process_challenge() 491 key = os_memdup(data->emsk, EAP_EMSK_LEN); in eap_sake_get_emsk()
|
H A D | eap_server_peap.c | 1397 u8 *eapKeyData, *emsk; in eap_peap_get_emsk() local 1424 emsk = os_memdup(eapKeyData + EAP_TLS_KEY_LEN, EAP_EMSK_LEN); in eap_peap_get_emsk() 1426 if (!emsk) in eap_peap_get_emsk() 1430 emsk, EAP_EMSK_LEN); in eap_peap_get_emsk() 1433 emsk = NULL; in eap_peap_get_emsk() 1436 return emsk; in eap_peap_get_emsk()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap_sake.c | 27 u8 emsk[EAP_EMSK_LEN]; member 241 data->emsk) < 0) { in eap_sake_process_challenge() 494 key = os_memdup(data->emsk, EAP_EMSK_LEN); in eap_sake_get_emsk()
|
H A D | eap_teap.c | 57 u8 emsk[EAP_EMSK_LEN]; member 235 forced_memzero(data->emsk, EAP_EMSK_LEN); in eap_teap_clear() 281 eap_teap_derive_eap_emsk(data->simck_msk, data->emsk) < 0) in eap_teap_derive_msk() 674 u8 *msk = NULL, *emsk = NULL; in eap_teap_get_cmk() local 711 emsk = data->phase2_method->get_emsk(sm, data->phase2_priv, in eap_teap_get_cmk() 716 msk, msk_len, emsk, emsk_len, in eap_teap_get_cmk() 720 bin_clear_free(emsk, emsk_len); in eap_teap_get_cmk() 723 if (emsk) in eap_teap_get_cmk() 1999 key = os_memdup(data->emsk, EAP_EMSK_LEN); in eap_teap_get_emsk()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | eap_sake.c | 27 u8 emsk[EAP_EMSK_LEN]; member 241 data->emsk) < 0) { in eap_sake_process_challenge() 494 key = os_memdup(data->emsk, EAP_EMSK_LEN); in eap_sake_get_emsk()
|
H A D | eap_teap.c | 58 u8 emsk[EAP_EMSK_LEN]; member 236 forced_memzero(data->emsk, EAP_EMSK_LEN); in eap_teap_clear() 284 data->emsk) < 0) in eap_teap_derive_msk() 727 u8 *msk = NULL, *emsk = NULL; in eap_teap_get_cmk() local 765 emsk = data->phase2_method->get_emsk(sm, data->phase2_priv, in eap_teap_get_cmk() 771 msk, msk_len, emsk, emsk_len, in eap_teap_get_cmk() 775 bin_clear_free(emsk, emsk_len); in eap_teap_get_cmk() 778 if (emsk) in eap_teap_get_cmk() 2112 key = os_memdup(data->emsk, EAP_EMSK_LEN); in eap_teap_get_emsk()
|