/freebsd-11-stable/contrib/wpa/src/eap_common/ |
H A D | eap_teap_common.c | 115 int eap_teap_derive_cmk_basic_pw_auth(const u8 *s_imck_msk, u8 *cmk) argument 131 os_memcpy(cmk, &imck[EAP_TEAP_SIMCK_LEN], EAP_TEAP_CMK_LEN); 133 cmk, EAP_TEAP_CMK_LEN); 308 static int eap_teap_tls_mac(u16 tls_cs, const u8 *cmk, size_t cmk_len, argument 320 res = hmac_sha1(cmk, cmk_len, buffer, buffer_len, tmp); 323 res = hmac_sha256(cmk, cmk_len, buffer, buffer_len, tmp); 326 res = hmac_sha384(cmk, cmk_len, buffer, buffer_len, tmp); 350 const u8 *cmk, u8 *compound_mac) 404 cmk, EAP_TEAP_CMK_LEN); 408 res = eap_teap_tls_mac(tls_cs, cmk, EAP_TEAP_CMK_LE 347 eap_teap_compound_mac(u16 tls_cs, const struct teap_tlv_crypto_binding *cb, const struct wpabuf *server_outer_tlvs, const struct wpabuf *peer_outer_tlvs, const u8 *cmk, u8 *compound_mac) argument [all...] |
H A D | eap_teap_common.h | 200 int eap_teap_derive_cmk_basic_pw_auth(const u8 *s_imck_msk, u8 *cmk); 209 const u8 *cmk, u8 *compound_mac);
|
/freebsd-11-stable/contrib/wpa/src/eap_server/ |
H A D | eap_server_peap.c | 52 u8 cmk[20]; member in struct:eap_peap_data 344 os_memcpy(data->cmk, tk + 40, 20); 346 data->cmk, 20); 377 os_memcpy(data->cmk, imck + 40, 20); 378 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: CMK (CMKj)", data->cmk, 20); 456 data->cmk, 20); 461 hmac_sha1_vector(data->cmk, 20, 2, addr, len, mac); 641 hmac_sha1(data->cmk, 20, buf, sizeof(buf), mac); 646 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: CMK", data->cmk, 20);
|
H A D | eap_server_fast.c | 50 u8 cmk[EAP_FAST_CMK_LEN]; member in struct:eap_fast_data 403 os_memcpy(data->cmk, imck + EAP_FAST_SIMCK_LEN, EAP_FAST_CMK_LEN); 405 data->cmk, EAP_FAST_CMK_LEN); 665 hmac_sha1(data->cmk, EAP_FAST_CMK_LEN, 1221 hmac_sha1(data->cmk, EAP_FAST_CMK_LEN, (u8 *) b, bind_len,
|
/freebsd-11-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_peap.c | 67 u8 cmk[20]; member in struct:eap_peap_data 277 os_memcpy(data->cmk, tk + 40, 20); 279 data->cmk, 20); 306 os_memcpy(data->cmk, imck + 40, 20); 307 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: CMK (CMKj)", data->cmk, 20); 340 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC CMK", data->cmk, 20); 345 if (hmac_sha1_vector(data->cmk, 20, 2, addr, len, mac) < 0) 439 hmac_sha1(data->cmk, 20, buf, sizeof(buf), mac);
|
H A D | eap_fast.c | 623 struct eap_tlv_crypto_binding_tlv *_bind, const u8 *cmk) 634 hmac_sha1(cmk, EAP_FAST_CMK_LEN, (u8 *) rbind, sizeof(*rbind), 695 u8 *cmk) 721 os_memcpy(cmk, imck + EAP_FAST_SIMCK_LEN, EAP_FAST_CMK_LEN); 723 cmk, EAP_FAST_CMK_LEN); 760 u8 cmk[EAP_FAST_CMK_LEN], cmac[SHA1_MAC_LEN]; local 767 if (eap_fast_get_cmk(sm, data, cmk) < 0) 775 hmac_sha1(cmk, EAP_FAST_CMK_LEN, (u8 *) _bind, bind_len, 825 pos, _bind, cmk); 621 eap_fast_write_crypto_binding( struct eap_tlv_crypto_binding_tlv *rbind, struct eap_tlv_crypto_binding_tlv *_bind, const u8 *cmk) argument 694 eap_fast_get_cmk(struct eap_sm *sm, struct eap_fast_data *data, u8 *cmk) argument
|
/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | crypto_module_tests.c | 941 const u8 *simck, *cmk; local 975 cmk = imck + 40; 995 if (hmac_sha1(cmk, 20, tlv, sizeof(tlv), tlv + sizeof(tlv) - 20) < 0 ||
|