Searched refs:emsk (Results 1 - 25 of 42) sorted by relevance

12

/freebsd-12-stable/contrib/wpa/src/eap_common/
H A Deap_psk_common.c35 u8 *emsk)
61 &emsk[i * aes_block_size]))
34 eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument
H A Deap_sim_common.h81 u8 *emsk);
85 u8 *emsk);
94 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk);
97 const u8 *nonce_s, u8 *msk, u8 *emsk);
112 u8 *msk, u8 *emsk)
120 u8 *emsk)
108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
H A Deap_gpsk_common.c112 u8 *msk, u8 *emsk,
173 os_memcpy(emsk, pos, EAP_EMSK_LEN);
191 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
219 msk, emsk, sk, *sk_len,
227 u8 *msk, u8 *emsk,
253 msk, emsk, sk, *sk_len,
272 * @emsk: Buffer for 64-byte EMSK
284 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
320 msk, emsk, sk, sk_len,
327 msk, emsk, s
108 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument
189 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument
225 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) argument
279 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument
[all...]
H A Deap_fast_common.h103 int eap_fast_derive_eap_emsk(const u8 *simck, u8 *emsk);
H A Deap_gpsk_common.h54 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
H A Deap_psk_common.h70 u8 *msk, u8 *emsk);
H A Deap_sim_common.c77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) argument
92 os_memcpy(emsk, pos, EAP_EMSK_LEN);
100 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN);
110 u8 *emsk)
155 if (emsk) {
156 os_memcpy(emsk, buf + EAP_SIM_KEYING_DATA_LEN, EAP_EMSK_LEN);
157 wpa_hexdump(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN);
277 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk)
319 os_memcpy(emsk, pos, EAP_EMSK_LEN);
320 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': EMSK", emsk, EAP_EMSK_LE
107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument
275 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
324 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
[all...]
H A Deap_teap_common.h199 int eap_teap_derive_eap_emsk(const u8 *simck, u8 *emsk);
203 const u8 *emsk, size_t emsk_len,
H A Deap_pwd_common.h66 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id);
H A Deap_sake_common.h86 u8 *tek, u8 *msk, u8 *emsk);
H A Deap_fast_common.c130 int eap_fast_derive_eap_emsk(const u8 *simck, u8 *emsk) argument
140 emsk, EAP_EMSK_LEN) < 0)
143 emsk, EAP_EMSK_LEN);
H A Deap_teap_common.c97 int eap_teap_derive_eap_emsk(const u8 *simck, u8 *emsk) argument
107 (u8 *) "", 0, emsk, EAP_EMSK_LEN) < 0)
110 emsk, EAP_EMSK_LEN);
141 const u8 *emsk, size_t emsk_len,
165 wpa_hexdump_key(MSG_DEBUG, "EAP-TEAP: EMSK[j]", emsk, emsk_len);
167 if (emsk && emsk_len > 0) {
173 if (eap_teap_tls_prf(emsk, emsk_len, "TEAPbindkey@ietf.org",
139 eap_teap_derive_imck(const u8 *prev_s_imck_msk, const u8 *prev_s_imck_emsk, const u8 *msk, size_t msk_len, const u8 *emsk, size_t emsk_len, u8 *s_imck_msk, u8 *cmk_msk, u8 *s_imck_emsk, u8 *cmk_emsk) argument
H A Deap_sake_common.c260 * @emsk: Buffer for 64-byte EMSK
267 u8 *emsk)
305 os_memcpy(emsk, key_buf + EAP_MSK_LEN, EAP_EMSK_LEN);
307 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: EMSK", emsk, EAP_EMSK_LEN);
265 eap_sake_derive_keys(const u8 *root_secret_a, const u8 *root_secret_b, const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument
H A Deap_eke_common.h104 u8 *msk, u8 *emsk);
/freebsd-12-stable/contrib/wpa/src/eap_server/
H A Deap_server_tls.c393 u8 *eapKeyData, *emsk; local
413 emsk = os_malloc(EAP_EMSK_LEN);
414 if (emsk)
415 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN,
419 emsk = NULL;
421 if (emsk) {
424 emsk, EAP_EMSK_LEN);
429 return emsk;
H A Deap_server_psk.c29 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_psk_data
127 data->emsk))
131 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: EMSK", data->emsk, EAP_EMSK_LEN);
468 key = os_memdup(data->emsk, EAP_EMSK_LEN);
H A Deap_server_ttls.c1307 u8 *eapKeyData, *emsk; local
1316 emsk = os_malloc(EAP_EMSK_LEN);
1317 if (emsk)
1318 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN,
1322 emsk = NULL;
1324 if (emsk) {
1327 emsk, EAP_EMSK_LEN);
1332 return emsk;
H A Deap_server_aka.c27 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_aka_data
566 data->msk, data->emsk);
569 data->msk, data->emsk);
572 data->mk, data->msk, data->emsk);
859 data->k_re, data->msk, data->emsk);
864 data->msk, data->emsk);
1301 key = os_memdup(data->emsk, EAP_EMSK_LEN);
H A Deap_server_sim.c25 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_sim_data
269 data->emsk);
272 data->msk, data->emsk);
573 data->emsk);
826 key = os_memdup(data->emsk, EAP_EMSK_LEN);
H A Deap_server_gpsk.c22 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_gpsk_data
413 data->msk, data->emsk,
594 key = os_memdup(data->emsk, EAP_EMSK_LEN);
H A Deap_server_sake.c26 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_sake_data
347 data->emsk) < 0) {
491 key = os_memdup(data->emsk, EAP_EMSK_LEN);
H A Deap_server_peap.c1354 u8 *eapKeyData, *emsk; local
1369 emsk = os_memdup(eapKeyData + EAP_TLS_KEY_LEN, EAP_EMSK_LEN);
1371 if (!emsk)
1375 emsk, EAP_EMSK_LEN);
1378 emsk = NULL;
1381 return emsk;
/freebsd-12-stable/contrib/wpa/src/eap_peer/
H A Deap_psk.c29 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_psk_data
249 data->msk, data->emsk)) {
256 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: EMSK", data->emsk, EAP_EMSK_LEN);
466 key = os_memdup(data->emsk, EAP_EMSK_LEN);
H A Deap_teap.c57 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_teap_data
235 forced_memzero(data->emsk, EAP_EMSK_LEN);
281 eap_teap_derive_eap_emsk(data->simck_msk, data->emsk) < 0)
674 u8 *msk = NULL, *emsk = NULL; local
711 emsk = data->phase2_method->get_emsk(sm, data->phase2_priv,
716 msk, msk_len, emsk, emsk_len,
720 bin_clear_free(emsk, emsk_len);
723 if (emsk)
1999 key = os_memdup(data->emsk, EAP_EMSK_LEN);
H A Deap_sake.c27 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_sake_data
241 data->emsk) < 0) {
494 key = os_memdup(data->emsk, EAP_EMSK_LEN);

Completed in 89 milliseconds

12