/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_sim_common.h | 81 u8 *emsk); 85 u8 *emsk); 94 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk); 97 const u8 *nonce_s, u8 *msk, u8 *emsk); 112 u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys() 120 u8 *emsk) in eap_aka_prime_derive_keys_reauth() 108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) eap_aka_prime_derive_keys() argument 116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) eap_aka_prime_derive_keys_reauth() argument
|
H A D | eap_gpsk_common.c | 112 u8 *msk, u8 *emsk, in eap_gpsk_derive_keys_helper() 173 os_memcpy(emsk, pos, EAP_EMSK_LEN); in eap_gpsk_derive_keys_helper() 191 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, in eap_gpsk_derive_keys_aes() 219 msk, emsk, sk, *sk_len, in eap_gpsk_derive_keys_aes() 227 u8 *msk, u8 *emsk, in eap_gpsk_derive_keys_sha256() 253 msk, emsk, sk, *sk_len, in eap_gpsk_derive_keys_sha256() 272 * @emsk: Buffer for 64-byte EMSK 284 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, in eap_gpsk_derive_keys() 320 msk, emsk, sk, sk_len, in eap_gpsk_derive_keys() 327 msk, emsk, s in eap_gpsk_derive_keys() 108 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) eap_gpsk_derive_keys_helper() argument 189 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) eap_gpsk_derive_keys_aes() argument 225 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) eap_gpsk_derive_keys_sha256() argument 279 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) eap_gpsk_derive_keys() argument [all...] |
H A D | eap_psk_common.c | 35 u8 *emsk) in eap_psk_derive_keys() 61 &emsk[i * aes_block_size])) in eap_psk_derive_keys() 34 eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) eap_psk_derive_keys() argument
|
H A D | eap_sim_common.c | 77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) in eap_sim_derive_keys() argument 92 os_memcpy(emsk, pos, EAP_EMSK_LEN); in eap_sim_derive_keys() 100 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN); in eap_sim_derive_keys() 110 u8 *emsk) in eap_sim_derive_keys_reauth() 155 if (emsk) { in eap_sim_derive_keys_reauth() 156 os_memcpy(emsk, buf + EAP_SIM_KEYING_DATA_LEN, EAP_EMSK_LEN); in eap_sim_derive_keys_reauth() 157 wpa_hexdump(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN); in eap_sim_derive_keys_reauth() 277 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys() 319 os_memcpy(emsk, pos, EAP_EMSK_LEN); in eap_aka_prime_derive_keys() 320 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': EMSK", emsk, EAP_EMSK_LE in eap_aka_prime_derive_keys() 107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) eap_sim_derive_keys_reauth() argument 275 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) eap_aka_prime_derive_keys() argument 324 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) eap_aka_prime_derive_keys_reauth() argument [all...] |
H A D | eap_teap_common.c | 97 int eap_teap_derive_eap_emsk(const u8 *simck, u8 *emsk) in eap_teap_derive_eap_emsk() argument 107 (u8 *) "", 0, emsk, EAP_EMSK_LEN) < 0) in eap_teap_derive_eap_emsk() 110 emsk, EAP_EMSK_LEN); in eap_teap_derive_eap_emsk() 141 const u8 *emsk, size_t emsk_len, in eap_teap_derive_imck() 165 wpa_hexdump_key(MSG_DEBUG, "EAP-TEAP: EMSK[j]", emsk, emsk_len); in eap_teap_derive_imck() 167 if (emsk && emsk_len > 0) { in eap_teap_derive_imck() 173 if (eap_teap_tls_prf(emsk, emsk_len, "TEAPbindkey@ietf.org", in eap_teap_derive_imck() 139 eap_teap_derive_imck(const u8 *prev_s_imck_msk, const u8 *prev_s_imck_emsk, const u8 *msk, size_t msk_len, const u8 *emsk, size_t emsk_len, u8 *s_imck_msk, u8 *cmk_msk, u8 *s_imck_emsk, u8 *cmk_emsk) eap_teap_derive_imck() argument
|
H A D | eap_fast_common.c | 130 int eap_fast_derive_eap_emsk(const u8 *simck, u8 *emsk) in eap_fast_derive_eap_emsk() argument 140 emsk, EAP_EMSK_LEN) < 0) in eap_fast_derive_eap_emsk() 143 emsk, EAP_EMSK_LEN); in eap_fast_derive_eap_emsk()
|
H A D | eap_sake_common.c | 260 * @emsk: Buffer for 64-byte EMSK 267 u8 *emsk) in eap_sake_derive_keys() 305 os_memcpy(emsk, key_buf + EAP_MSK_LEN, EAP_EMSK_LEN); in eap_sake_derive_keys() 307 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: EMSK", emsk, EAP_EMSK_LEN); in eap_sake_derive_keys() 265 eap_sake_derive_keys(const u8 *root_secret_a, const u8 *root_secret_b, const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) eap_sake_derive_keys() argument
|
H A D | eap_teap_common.h | 199 int eap_teap_derive_eap_emsk(const u8 *simck, u8 *emsk); 203 const u8 *emsk, size_t emsk_len,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | eap_sim_common.h | 85 u8 *emsk); 89 u8 *emsk); 98 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk); 101 const u8 *nonce_s, u8 *msk, u8 *emsk); 116 u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys() 124 u8 *emsk) in eap_aka_prime_derive_keys_reauth() 112 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) eap_aka_prime_derive_keys() argument 120 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) eap_aka_prime_derive_keys_reauth() argument
|
H A D | eap_gpsk_common.c | 112 u8 *msk, u8 *emsk, in eap_gpsk_derive_keys_helper() 173 os_memcpy(emsk, pos, EAP_EMSK_LEN); in eap_gpsk_derive_keys_helper() 191 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, in eap_gpsk_derive_keys_aes() 219 msk, emsk, sk, *sk_len, in eap_gpsk_derive_keys_aes() 227 u8 *msk, u8 *emsk, in eap_gpsk_derive_keys_sha256() 253 msk, emsk, sk, *sk_len, in eap_gpsk_derive_keys_sha256() 272 * @emsk: Buffer for 64-byte EMSK 284 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, in eap_gpsk_derive_keys() 320 msk, emsk, sk, sk_len, in eap_gpsk_derive_keys() 327 msk, emsk, s in eap_gpsk_derive_keys() 108 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) eap_gpsk_derive_keys_helper() argument 189 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) eap_gpsk_derive_keys_aes() argument 225 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) eap_gpsk_derive_keys_sha256() argument 279 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) eap_gpsk_derive_keys() argument [all...] |
H A D | eap_psk_common.c | 35 u8 *emsk) in eap_psk_derive_keys() 61 &emsk[i * aes_block_size])) in eap_psk_derive_keys() 34 eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) eap_psk_derive_keys() argument
|
H A D | eap_sim_common.c | 81 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) in eap_sim_derive_keys() argument 96 os_memcpy(emsk, pos, EAP_EMSK_LEN); in eap_sim_derive_keys() 104 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN); in eap_sim_derive_keys() 114 u8 *emsk) in eap_sim_derive_keys_reauth() 159 if (emsk) { in eap_sim_derive_keys_reauth() 160 os_memcpy(emsk, buf + EAP_SIM_KEYING_DATA_LEN, EAP_EMSK_LEN); in eap_sim_derive_keys_reauth() 161 wpa_hexdump(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN); in eap_sim_derive_keys_reauth() 281 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys() 323 os_memcpy(emsk, pos, EAP_EMSK_LEN); in eap_aka_prime_derive_keys() 324 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': EMSK", emsk, EAP_EMSK_LE in eap_aka_prime_derive_keys() 111 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) eap_sim_derive_keys_reauth() argument 279 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) eap_aka_prime_derive_keys() argument 328 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) eap_aka_prime_derive_keys_reauth() argument [all...] |
H A D | eap_teap_common.c | 103 int eap_teap_derive_eap_emsk(u16 tls_cs, const u8 *simck, u8 *emsk) in eap_teap_derive_eap_emsk() argument 113 (u8 *) "", 0, emsk, EAP_EMSK_LEN) < 0) in eap_teap_derive_eap_emsk() 116 emsk, EAP_EMSK_LEN); in eap_teap_derive_eap_emsk() 148 const u8 *emsk, size_t emsk_len, in eap_teap_derive_imck() 172 wpa_hexdump_key(MSG_DEBUG, "EAP-TEAP: EMSK[j]", emsk, emsk_len); in eap_teap_derive_imck() 174 if (emsk && emsk_len > 0) { in eap_teap_derive_imck() 180 if (eap_teap_tls_prf(tls_cs, emsk, emsk_len, in eap_teap_derive_imck() 145 eap_teap_derive_imck(u16 tls_cs, const u8 *prev_s_imck_msk, const u8 *prev_s_imck_emsk, const u8 *msk, size_t msk_len, const u8 *emsk, size_t emsk_len, u8 *s_imck_msk, u8 *cmk_msk, u8 *s_imck_emsk, u8 *cmk_emsk) eap_teap_derive_imck() argument
|
H A D | eap_fast_common.c | 130 int eap_fast_derive_eap_emsk(const u8 *simck, u8 *emsk) in eap_fast_derive_eap_emsk() argument 140 emsk, EAP_EMSK_LEN) < 0) in eap_fast_derive_eap_emsk() 143 emsk, EAP_EMSK_LEN); in eap_fast_derive_eap_emsk()
|
H A D | eap_sake_common.c | 260 * @emsk: Buffer for 64-byte EMSK 267 u8 *emsk) in eap_sake_derive_keys() 305 os_memcpy(emsk, key_buf + EAP_MSK_LEN, EAP_EMSK_LEN); in eap_sake_derive_keys() 307 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: EMSK", emsk, EAP_EMSK_LEN); in eap_sake_derive_keys() 265 eap_sake_derive_keys(const u8 *root_secret_a, const u8 *root_secret_b, const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) eap_sake_derive_keys() argument
|
H A D | eap_teap_common.h | 207 int eap_teap_derive_eap_emsk(u16 tls_cs, const u8 *simck, u8 *emsk); 213 const u8 *emsk, size_t emsk_len,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_tls.c | 393 u8 *eapKeyData, *emsk; in eap_tls_get_emsk() local 413 emsk = os_malloc(EAP_EMSK_LEN); in eap_tls_get_emsk() 414 if (emsk) in eap_tls_get_emsk() 415 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, in eap_tls_get_emsk() 419 emsk = NULL; in eap_tls_get_emsk() 421 if (emsk) { in eap_tls_get_emsk() 424 emsk, EAP_EMSK_LEN); in eap_tls_get_emsk() 429 return emsk; in eap_tls_get_emsk()
|
H A D | eap_server_psk.c | 29 u8 emsk[EAP_EMSK_LEN]; member 127 data->emsk)) in eap_psk_build_3() 131 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: EMSK", data->emsk, EAP_EMSK_LEN); in eap_psk_build_3() 468 key = os_memdup(data->emsk, EAP_EMSK_LEN); in eap_psk_get_emsk()
|
H A D | eap_server_ttls.c | 1307 u8 *eapKeyData, *emsk; in eap_ttls_get_emsk() local 1316 emsk = os_malloc(EAP_EMSK_LEN); in eap_ttls_get_emsk() 1317 if (emsk) in eap_ttls_get_emsk() 1318 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, in eap_ttls_get_emsk() 1322 emsk = NULL; in eap_ttls_get_emsk() 1324 if (emsk) { in eap_ttls_get_emsk() 1327 emsk, EAP_EMSK_LEN); in eap_ttls_get_emsk() 1332 return emsk; in eap_ttls_get_emsk()
|
H A D | eap_server_aka.c | 27 u8 emsk[EAP_EMSK_LEN]; member 566 data->msk, data->emsk); in eap_aka_build_reauth() 569 data->msk, data->emsk); in eap_aka_build_reauth() 572 data->mk, data->msk, data->emsk); in eap_aka_build_reauth() 859 data->k_re, data->msk, data->emsk); in eap_aka_fullauth() 864 data->msk, data->emsk); in eap_aka_fullauth() 1301 key = os_memdup(data->emsk, EAP_EMSK_LEN); in eap_aka_get_emsk()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_server_tls.c | 361 u8 *eapKeyData, *emsk; in eap_tls_get_emsk() local 381 emsk = os_malloc(EAP_EMSK_LEN); in eap_tls_get_emsk() 382 if (emsk) in eap_tls_get_emsk() 383 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, in eap_tls_get_emsk() 387 emsk = NULL; in eap_tls_get_emsk() 389 if (emsk) { in eap_tls_get_emsk() 392 emsk, EAP_EMSK_LEN); in eap_tls_get_emsk() 397 return emsk; in eap_tls_get_emsk()
|
H A D | eap_server_psk.c | 29 u8 emsk[EAP_EMSK_LEN]; member 127 data->emsk)) in eap_psk_build_3() 131 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: EMSK", data->emsk, EAP_EMSK_LEN); in eap_psk_build_3() 468 key = os_memdup(data->emsk, EAP_EMSK_LEN); in eap_psk_get_emsk()
|
H A D | eap_server_ttls.c | 1327 u8 *eapKeyData, *emsk; in eap_ttls_get_emsk() local 1348 emsk = os_malloc(EAP_EMSK_LEN); in eap_ttls_get_emsk() 1349 if (emsk) in eap_ttls_get_emsk() 1350 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, in eap_ttls_get_emsk() 1354 emsk = NULL; in eap_ttls_get_emsk() 1356 if (emsk) { in eap_ttls_get_emsk() 1359 emsk, EAP_EMSK_LEN); in eap_ttls_get_emsk() 1364 return emsk; in eap_ttls_get_emsk()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap_psk.c | 29 u8 emsk[EAP_EMSK_LEN]; member 249 data->msk, data->emsk)) { in eap_psk_process_3() 256 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: EMSK", data->emsk, EAP_EMSK_LEN); in eap_psk_process_3() 466 key = os_memdup(data->emsk, EAP_EMSK_LEN); in eap_psk_get_emsk()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | eap_psk.c | 29 u8 emsk[EAP_EMSK_LEN]; member 249 data->msk, data->emsk)) { in eap_psk_process_3() 256 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: EMSK", data->emsk, EAP_EMSK_LEN); in eap_psk_process_3() 466 key = os_memdup(data->emsk, EAP_EMSK_LEN); in eap_psk_get_emsk()
|