Lines Matching defs:prf

121 static int eap_eke_prf_len(u8 prf)
123 if (prf == EAP_EKE_PRF_HMAC_SHA1)
125 if (prf == EAP_EKE_PRF_HMAC_SHA2_256)
131 static int eap_eke_nonce_len(u8 prf)
135 prf_len = eap_eke_prf_len(prf);
146 static int eap_eke_auth_len(u8 prf)
148 switch (prf) {
183 static int eap_eke_prf(u8 prf, const u8 *key, size_t key_len, const u8 *data,
199 if (prf == EAP_EKE_PRF_HMAC_SHA1)
201 if (prf == EAP_EKE_PRF_HMAC_SHA2_256)
290 static int eap_eke_prfplus(u8 prf, const u8 *key, size_t key_len,
293 if (prf == EAP_EKE_PRF_HMAC_SHA1)
296 if (prf == EAP_EKE_PRF_HMAC_SHA2_256)
313 /* temp = prf(0+, password) */
315 if (eap_eke_prf(sess->prf, zeros, sess->prf_len,
318 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: temp = prf(0+, password)",
321 /* key = prf+(temp, ID_S | ID_P) */
329 if (eap_eke_prfplus(sess->prf, temp, sess->prf_len,
335 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: key = prf+(temp, ID_S | ID_P)",
399 /* SharedSecret = prf(0+, g ^ (x_s * x_p) (mod p)) */
412 if (eap_eke_prf(sess->prf, zeros, sess->auth_len, modexp, dh->prime_len,
434 * Ke | Ki = prf+(SharedSecret, "EAP-EKE Keys" | ID_S | ID_P)
460 if (eap_eke_prfplus(sess->prf, sess->shared_secret, sess->prf_len,
487 * Ka = prf+(SharedSecret, "EAP-EKE Ka" | ID_S | ID_P | Nonce_P |
508 if (eap_eke_prfplus(sess->prf, sess->shared_secret, sess->prf_len,
534 * MSK | EMSK = prf+(SharedSecret, "EAP-EKE Exported Keys" | ID_S |
553 if (eap_eke_prfplus(sess->prf, sess->shared_secret, sess->prf_len,
693 return eap_eke_prf(sess->prf, sess->ka, sess->auth_len,
700 u8 prf, u8 mac)
704 sess->prf = prf;
707 sess->prf_len = eap_eke_prf_len(prf);
708 sess->nonce_len = eap_eke_nonce_len(prf);
709 sess->auth_len = eap_eke_auth_len(prf);