/hostap-3.6.0/src/eap_common/ |
D | eap_teap_common.c | 121 int eap_teap_derive_cmk_basic_pw_auth(u16 tls_cs, const u8 *s_imck_msk, u8 *cmk) in eap_teap_derive_cmk_basic_pw_auth() argument 137 os_memcpy(cmk, &imck[EAP_TEAP_SIMCK_LEN], EAP_TEAP_CMK_LEN); in eap_teap_derive_cmk_basic_pw_auth() 139 cmk, EAP_TEAP_CMK_LEN); in eap_teap_derive_cmk_basic_pw_auth() 317 static int eap_teap_tls_mac(u16 tls_cs, const u8 *cmk, size_t cmk_len, in eap_teap_tls_mac() argument 329 res = hmac_sha1(cmk, cmk_len, buffer, buffer_len, tmp); in eap_teap_tls_mac() 332 res = hmac_sha256(cmk, cmk_len, buffer, buffer_len, tmp); in eap_teap_tls_mac() 335 res = hmac_sha384(cmk, cmk_len, buffer, buffer_len, tmp); in eap_teap_tls_mac() 359 const u8 *cmk, u8 *compound_mac) in eap_teap_compound_mac() argument 413 cmk, EAP_TEAP_CMK_LEN); in eap_teap_compound_mac() 417 res = eap_teap_tls_mac(tls_cs, cmk, EAP_TEAP_CMK_LEN, in eap_teap_compound_mac()
|
D | eap_teap_common.h | 209 u8 *cmk); 219 const u8 *cmk, u8 *compound_mac);
|
/hostap-3.6.0/src/eap_server/ |
D | eap_server_peap.c | 52 u8 cmk[20]; member 358 os_memcpy(data->cmk, tk + 40, 20); in eap_peap_derive_cmk() 360 data->cmk, 20); in eap_peap_derive_cmk() 391 os_memcpy(data->cmk, imck + 40, 20); in eap_peap_derive_cmk() 392 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: CMK (CMKj)", data->cmk, 20); in eap_peap_derive_cmk() 470 data->cmk, 20); in eap_peap_build_phase2_tlv() 475 hmac_sha1_vector(data->cmk, 20, 2, addr, len, mac); in eap_peap_build_phase2_tlv() 672 hmac_sha1(data->cmk, 20, buf, sizeof(buf), mac); in eap_tlv_validate_cryptobinding() 677 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: CMK", data->cmk, 20); in eap_tlv_validate_cryptobinding()
|
D | eap_server_fast.c | 50 u8 cmk[EAP_FAST_CMK_LEN]; member 403 os_memcpy(data->cmk, imck + EAP_FAST_SIMCK_LEN, EAP_FAST_CMK_LEN); in eap_fast_update_icmk() 405 data->cmk, EAP_FAST_CMK_LEN); in eap_fast_update_icmk() 667 hmac_sha1(data->cmk, EAP_FAST_CMK_LEN, in eap_fast_build_crypto_binding() 1235 hmac_sha1(data->cmk, EAP_FAST_CMK_LEN, (u8 *) b, bind_len, in eap_fast_validate_crypto_binding()
|
/hostap-3.6.0/src/eap_peer/ |
D | eap_peap.c | 67 u8 cmk[20]; member 277 os_memcpy(data->cmk, tk + 40, 20); in eap_peap_derive_cmk() 279 data->cmk, 20); in eap_peap_derive_cmk() 306 os_memcpy(data->cmk, imck + 40, 20); in eap_peap_derive_cmk() 307 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: CMK (CMKj)", data->cmk, 20); in eap_peap_derive_cmk() 340 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC CMK", data->cmk, 20); in eap_tlv_add_cryptobinding() 345 if (hmac_sha1_vector(data->cmk, 20, 2, addr, len, mac) < 0) in eap_tlv_add_cryptobinding() 439 hmac_sha1(data->cmk, 20, buf, sizeof(buf), mac); in eap_tlv_validate_cryptobinding()
|
D | eap_fast.c | 643 struct eap_tlv_crypto_binding_tlv *_bind, const u8 *cmk) in eap_fast_write_crypto_binding() argument 654 hmac_sha1(cmk, EAP_FAST_CMK_LEN, (u8 *) rbind, sizeof(*rbind), in eap_fast_write_crypto_binding() 715 u8 *cmk) in eap_fast_get_cmk() argument 741 os_memcpy(cmk, imck + EAP_FAST_SIMCK_LEN, EAP_FAST_CMK_LEN); in eap_fast_get_cmk() 743 cmk, EAP_FAST_CMK_LEN); in eap_fast_get_cmk() 780 u8 cmk[EAP_FAST_CMK_LEN], cmac[SHA1_MAC_LEN]; in eap_fast_process_crypto_binding() local 787 if (eap_fast_get_cmk(sm, data, cmk) < 0) in eap_fast_process_crypto_binding() 795 hmac_sha1(cmk, EAP_FAST_CMK_LEN, (u8 *) _bind, bind_len, in eap_fast_process_crypto_binding() 845 pos, _bind, cmk); in eap_fast_process_crypto_binding()
|
/hostap-3.6.0/src/crypto/ |
D | crypto_module_tests.c | 1090 const u8 *simck, *cmk; in test_eap_fast() local 1124 cmk = imck + 40; in test_eap_fast() 1144 if (hmac_sha1(cmk, 20, tlv, sizeof(tlv), tlv + sizeof(tlv) - 20) < 0 || in test_eap_fast()
|