/freebsd-12-stable/contrib/wpa/src/eap_common/ |
H A D | eap_pwd_common.c | 308 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) 360 os_memcpy(emsk, msk_emsk + EAP_MSK_LEN, EAP_EMSK_LEN); 304 compute_keys(EAP_PWD_group *grp, const struct crypto_bignum *k, const struct crypto_bignum *peer_scalar, const struct crypto_bignum *server_scalar, const u8 *confirm_peer, const u8 *confirm_server, const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) argument
|
H A D | eap_eke_common.c | 525 u8 *msk, u8 *emsk) 562 os_memcpy(emsk, buf + EAP_MSK_LEN, EAP_EMSK_LEN); 521 eap_eke_derive_msk(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
|
/freebsd-12-stable/contrib/wpa/src/wps/ |
H A D | wps_i.h | 66 u8 emsk[WPS_EMSK_LEN]; member in struct:wps_data
|
H A D | wps_common.c | 119 os_memcpy(wps->emsk, keys + WPS_AUTHKEY_LEN + WPS_KEYWRAPKEY_LEN, 126 wpa_hexdump_key(MSG_DEBUG, "WPS: EMSK", wps->emsk, WPS_EMSK_LEN);
|
/freebsd-12-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_aka.c | 31 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_aka_data 147 os_memset(data->emsk, 0, EAP_EMSK_LEN); 1063 data->k_re, data->msk, data->emsk); 1068 data->msk, data->emsk); 1321 data->msk, data->emsk); 1326 data->msk, data->emsk); 1565 key = os_memdup(data->emsk, EAP_EMSK_LEN);
|
H A D | eap_sim.c | 33 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_sim_data 150 os_memset(data->emsk, 0, EAP_EMSK_LEN); 802 data->emsk); 1053 data->emsk); 1286 key = os_memdup(data->emsk, EAP_EMSK_LEN);
|
H A D | eap_eke.c | 21 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_eke_data 607 data->msk, data->emsk) < 0) { 735 key = os_memdup(data->emsk, EAP_EMSK_LEN);
|
H A D | eap_gpsk.c | 21 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_gpsk_data 369 data->msk, data->emsk, 739 key = os_memdup(data->emsk, EAP_EMSK_LEN);
|
H A D | eap_pwd.c | 53 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_pwd_data 837 &cs, data->msk, data->emsk, data->session_id) < 0) { 1128 os_memcpy(key, data->emsk, EAP_EMSK_LEN);
|
H A D | eap_fast.c | 58 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_fast_data 251 os_memset(data->emsk, 0, EAP_EMSK_LEN); 262 eap_fast_derive_eap_emsk(data->simck, data->emsk) < 0) 1702 os_memset(data->emsk, 0, EAP_EMSK_LEN); 1788 key = os_memdup(data->emsk, EAP_EMSK_LEN);
|
H A D | eap.c | 681 u8 *emsk = NULL; local 715 emsk = ext_emsk; 718 emsk = sm->m->get_emsk(sm, sm->eap_method_priv, &emsk_len); 721 if (!emsk || emsk_len == 0 || emsk_len > ERP_MAX_KEY_LEN) { 727 wpa_hexdump_key(MSG_DEBUG, "EAP: EMSK", emsk, emsk_len); 757 if (hmac_sha256_kdf(emsk, emsk_len, 784 bin_clear_free(emsk, emsk_len);
|
/freebsd-12-stable/contrib/wpa/src/eap_server/ |
H A D | eap_server.c | 415 u8 *emsk = NULL; local 446 emsk = sm->m->get_emsk(sm, sm->eap_method_priv, &emsk_len); 447 if (!emsk || emsk_len == 0 || emsk_len > ERP_MAX_KEY_LEN) { 453 wpa_hexdump_key(MSG_DEBUG, "EAP: EMSK", emsk, emsk_len); 470 if (hmac_sha256_kdf(emsk, emsk_len, 497 bin_clear_free(emsk, emsk_len);
|
H A D | eap_server_eke.c | 22 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_eke_data 647 data->msk, data->emsk) < 0) { 750 key = os_memdup(data->emsk, EAP_EMSK_LEN);
|
H A D | eap_server_pwd.c | 53 u8 emsk[EAP_EMSK_LEN]; member in struct:eap_pwd_data 834 data->my_confirm, &cs, data->msk, data->emsk, 996 key = os_memdup(data->emsk, EAP_EMSK_LEN);
|
H A D | eap_server_teap.c | 304 u8 *msk = NULL, *emsk = NULL; local 331 emsk = data->phase2_method->get_emsk(sm, data->phase2_priv, 336 msk, msk_len, emsk, emsk_len, 340 bin_clear_free(emsk, emsk_len); 343 if (emsk)
|
/freebsd-12-stable/contrib/wpa/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 497 u8 *session_id, *emsk; local 506 emsk = eap_proxy_get_emsk(sm->eap_proxy, &emsk_len); 507 if (sm->config->erp && session_id && emsk) { 509 session_id_len, emsk, 513 bin_clear_free(emsk, emsk_len);
|
/freebsd-12-stable/contrib/wpa/src/crypto/ |
H A D | crypto_module_tests.c | 914 const u8 emsk[] = { local 988 os_memcmp(emsk, buf, sizeof(emsk)) != 0) {
|