/freebsd-12-stable/contrib/wpa/src/eap_common/ |
H A D | eap_psk_common.c | 35 u8 *emsk) 61 &emsk[i * aes_block_size])) 34 eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument
|
H A D | eap_sim_common.h | 81 u8 *emsk); 85 u8 *emsk); 94 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk); 97 const u8 *nonce_s, u8 *msk, u8 *emsk); 112 u8 *msk, u8 *emsk) 120 u8 *emsk) 108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument 116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
|
H A D | eap_gpsk_common.c | 112 u8 *msk, u8 *emsk, 173 os_memcpy(emsk, pos, EAP_EMSK_LEN); 191 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 219 msk, emsk, sk, *sk_len, 227 u8 *msk, u8 *emsk, 253 msk, emsk, sk, *sk_len, 272 * @emsk: Buffer for 64-byte EMSK 284 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 320 msk, emsk, sk, sk_len, 327 msk, emsk, s 108 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 189 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 225 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) argument 279 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument [all...] |
H A D | eap_fast_common.h | 103 int eap_fast_derive_eap_emsk(const u8 *simck, u8 *emsk);
|
H A D | eap_gpsk_common.h | 54 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
|
H A D | eap_psk_common.h | 70 u8 *msk, u8 *emsk);
|
H A D | eap_sim_common.c | 77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) argument 92 os_memcpy(emsk, pos, EAP_EMSK_LEN); 100 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN); 110 u8 *emsk) 155 if (emsk) { 156 os_memcpy(emsk, buf + EAP_SIM_KEYING_DATA_LEN, EAP_EMSK_LEN); 157 wpa_hexdump(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN); 277 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) 319 os_memcpy(emsk, pos, EAP_EMSK_LEN); 320 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': EMSK", emsk, EAP_EMSK_LE 107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument 275 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument 324 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument [all...] |
H A D | eap_teap_common.h | 199 int eap_teap_derive_eap_emsk(const u8 *simck, u8 *emsk); 203 const u8 *emsk, size_t emsk_len,
|
H A D | eap_pwd_common.h | 66 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id);
|
H A D | eap_sake_common.h | 86 u8 *tek, u8 *msk, u8 *emsk);
|
H A D | eap_fast_common.c | 130 int eap_fast_derive_eap_emsk(const u8 *simck, u8 *emsk) argument 140 emsk, EAP_EMSK_LEN) < 0) 143 emsk, EAP_EMSK_LEN);
|
H A D | eap_teap_common.c | 97 int eap_teap_derive_eap_emsk(const u8 *simck, u8 *emsk) argument 107 (u8 *) "", 0, emsk, EAP_EMSK_LEN) < 0) 110 emsk, EAP_EMSK_LEN); 141 const u8 *emsk, size_t emsk_len, 165 wpa_hexdump_key(MSG_DEBUG, "EAP-TEAP: EMSK[j]", emsk, emsk_len); 167 if (emsk && emsk_len > 0) { 173 if (eap_teap_tls_prf(emsk, emsk_len, "TEAPbindkey@ietf.org", 139 eap_teap_derive_imck(const u8 *prev_s_imck_msk, const u8 *prev_s_imck_emsk, const u8 *msk, size_t msk_len, const u8 *emsk, size_t emsk_len, u8 *s_imck_msk, u8 *cmk_msk, u8 *s_imck_emsk, u8 *cmk_emsk) argument
|
H A D | eap_sake_common.c | 260 * @emsk: Buffer for 64-byte EMSK 267 u8 *emsk) 305 os_memcpy(emsk, key_buf + EAP_MSK_LEN, EAP_EMSK_LEN); 307 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: EMSK", emsk, EAP_EMSK_LEN); 265 eap_sake_derive_keys(const u8 *root_secret_a, const u8 *root_secret_b, const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument
|
H A D | eap_eke_common.h | 104 u8 *msk, u8 *emsk);
|
/freebsd-12-stable/contrib/wpa/src/eap_server/ |
H A D | eap_server_tls.c | 393 u8 *eapKeyData, *emsk; local 413 emsk = os_malloc(EAP_EMSK_LEN); 414 if (emsk) 415 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 419 emsk = NULL; 421 if (emsk) { 424 emsk, EAP_EMSK_LEN); 429 return emsk;
|
H A D | eap_server_psk.c | 29 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_psk_data 127 data->emsk)) 131 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: EMSK", data->emsk, EAP_EMSK_LEN); 468 key = os_memdup(data->emsk, EAP_EMSK_LEN);
|
H A D | eap_server_ttls.c | 1307 u8 *eapKeyData, *emsk; local 1316 emsk = os_malloc(EAP_EMSK_LEN); 1317 if (emsk) 1318 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 1322 emsk = NULL; 1324 if (emsk) { 1327 emsk, EAP_EMSK_LEN); 1332 return emsk;
|
H A D | eap_server_aka.c | 27 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_aka_data 566 data->msk, data->emsk); 569 data->msk, data->emsk); 572 data->mk, data->msk, data->emsk); 859 data->k_re, data->msk, data->emsk); 864 data->msk, data->emsk); 1301 key = os_memdup(data->emsk, EAP_EMSK_LEN);
|
H A D | eap_server_sim.c | 25 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_sim_data 269 data->emsk); 272 data->msk, data->emsk); 573 data->emsk); 826 key = os_memdup(data->emsk, EAP_EMSK_LEN);
|
H A D | eap_server_gpsk.c | 22 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_gpsk_data 413 data->msk, data->emsk, 594 key = os_memdup(data->emsk, EAP_EMSK_LEN);
|
H A D | eap_server_sake.c | 26 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_sake_data 347 data->emsk) < 0) { 491 key = os_memdup(data->emsk, EAP_EMSK_LEN);
|
H A D | eap_server_peap.c | 1354 u8 *eapKeyData, *emsk; local 1369 emsk = os_memdup(eapKeyData + EAP_TLS_KEY_LEN, EAP_EMSK_LEN); 1371 if (!emsk) 1375 emsk, EAP_EMSK_LEN); 1378 emsk = NULL; 1381 return emsk;
|
/freebsd-12-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_psk.c | 29 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_psk_data 249 data->msk, data->emsk)) { 256 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: EMSK", data->emsk, EAP_EMSK_LEN); 466 key = os_memdup(data->emsk, EAP_EMSK_LEN);
|
H A D | eap_teap.c | 57 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_teap_data 235 forced_memzero(data->emsk, EAP_EMSK_LEN); 281 eap_teap_derive_eap_emsk(data->simck_msk, data->emsk) < 0) 674 u8 *msk = NULL, *emsk = NULL; local 711 emsk = data->phase2_method->get_emsk(sm, data->phase2_priv, 716 msk, msk_len, emsk, emsk_len, 720 bin_clear_free(emsk, emsk_len); 723 if (emsk) 1999 key = os_memdup(data->emsk, EAP_EMSK_LEN);
|
H A D | eap_sake.c | 27 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_sake_data 241 data->emsk) < 0) { 494 key = os_memdup(data->emsk, EAP_EMSK_LEN);
|