Home
last modified time | relevance | path

Searched refs:tek (Results 1 - 16 of 16) sorted by relevance

/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
H A Deap_psk_common.c34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, in eap_psk_derive_keys() argument
45 if (aes_128_encrypt_block(kdk, hash, tek)) in eap_psk_derive_keys()
H A Deap_sake_common.c258 * @tek: Buffer for Temporary EAK Keys (TEK-Auth[16] | TEK-Cipher[16])
266 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, in eap_sake_derive_keys()
285 tek, EAP_SAKE_TEK_LEN) < 0) in eap_sake_derive_keys()
288 tek, EAP_SAKE_TEK_AUTH_LEN); in eap_sake_derive_keys()
290 tek + EAP_SAKE_TEK_AUTH_LEN, EAP_SAKE_TEK_CIPHER_LEN); in eap_sake_derive_keys()
265 eap_sake_derive_keys(const u8 *root_secret_a, const u8 *root_secret_b, const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) eap_sake_derive_keys() argument
H A Deap_psk_common.h69 int __must_check eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek,
H A Deap_sake_common.h86 u8 *tek, u8 *msk, u8 *emsk);
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
H A Deap_psk_common.c34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, in eap_psk_derive_keys() argument
45 if (aes_128_encrypt_block(kdk, hash, tek)) in eap_psk_derive_keys()
H A Deap_sake_common.c258 * @tek: Buffer for Temporary EAK Keys (TEK-Auth[16] | TEK-Cipher[16])
266 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, in eap_sake_derive_keys()
285 tek, EAP_SAKE_TEK_LEN) < 0) in eap_sake_derive_keys()
288 tek, EAP_SAKE_TEK_AUTH_LEN); in eap_sake_derive_keys()
290 tek + EAP_SAKE_TEK_AUTH_LEN, EAP_SAKE_TEK_CIPHER_LEN); in eap_sake_derive_keys()
265 eap_sake_derive_keys(const u8 *root_secret_a, const u8 *root_secret_b, const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) eap_sake_derive_keys() argument
H A Deap_psk_common.h69 int __must_check eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek,
H A Deap_sake_common.h86 u8 *tek, u8 *msk, u8 *emsk);
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
H A Deap_psk.c25 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member
248 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, in eap_psk_process_3()
254 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN); in eap_psk_process_3()
282 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce), in eap_psk_process_3()
346 if (aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce), in eap_psk_process_3()
H A Deap_sake.c25 } tek; member
240 (u8 *) &data->tek, data->msk, in eap_sake_process_challenge()
269 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_challenge()
314 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_confirm()
351 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_confirm()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
H A Deap_server_psk.c27 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member
126 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk, in eap_psk_build_3()
129 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN); in eap_psk_build_3()
140 if (aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce), in eap_psk_build_3()
377 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce), in eap_psk_process_4()
H A Deap_server_sake.c24 } tek; member
200 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_build_confirm()
346 (u8 *) &data->tek, data->msk, in eap_sake_process_challenge()
353 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_challenge()
394 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_confirm()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
H A Deap_psk.c25 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member
248 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, in eap_psk_process_3()
254 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN); in eap_psk_process_3()
282 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce), in eap_psk_process_3()
346 if (aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce), in eap_psk_process_3()
H A Deap_sake.c25 } tek; member
240 (u8 *) &data->tek, data->msk, in eap_sake_process_challenge()
269 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_challenge()
314 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_confirm()
351 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_confirm()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
H A Deap_server_psk.c27 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member
126 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk, in eap_psk_build_3()
129 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN); in eap_psk_build_3()
140 if (aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce), in eap_psk_build_3()
377 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce), in eap_psk_process_4()
H A Deap_server_sake.c24 } tek; member
200 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_build_confirm()
346 (u8 *) &data->tek, data->msk, in eap_sake_process_challenge()
353 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_challenge()
394 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_confirm()

Completed in 9 milliseconds