/hostap-3.7.0/src/eap_common/ |
D | eap_psk_common.c | 34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, in eap_psk_derive_keys() argument 45 if (aes_128_encrypt_block(kdk, hash, tek)) in eap_psk_derive_keys()
|
D | eap_sake_common.c | 266 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, in eap_sake_derive_keys() argument 285 tek, EAP_SAKE_TEK_LEN) < 0) in eap_sake_derive_keys() 288 tek, EAP_SAKE_TEK_AUTH_LEN); in eap_sake_derive_keys() 290 tek + EAP_SAKE_TEK_AUTH_LEN, EAP_SAKE_TEK_CIPHER_LEN); in eap_sake_derive_keys()
|
D | eap_psk_common.h | 69 int __must_check eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek,
|
D | eap_sake_common.h | 86 u8 *tek, u8 *msk, u8 *emsk);
|
/hostap-3.7.0/src/eap_peer/ |
D | eap_psk.c | 25 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member 248 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, in eap_psk_process_3() 254 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN); in eap_psk_process_3() 282 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce), in eap_psk_process_3() 346 if (aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce), in eap_psk_process_3()
|
D | eap_sake.c | 25 } tek; member 240 (u8 *) &data->tek, data->msk, in eap_sake_process_challenge() 269 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_challenge() 314 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_confirm() 351 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_confirm()
|
/hostap-3.7.0/src/eap_server/ |
D | eap_server_psk.c | 27 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member 126 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk, in eap_psk_build_3() 129 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN); in eap_psk_build_3() 140 if (aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce), in eap_psk_build_3() 377 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce), in eap_psk_process_4()
|
D | eap_server_sake.c | 24 } tek; member 200 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_build_confirm() 346 (u8 *) &data->tek, data->msk, in eap_sake_process_challenge() 353 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_challenge() 394 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_confirm()
|