/dports/net/hostapd/hostapd-2.9/src/eap_common/ |
H A D | eap_teap_common.c | 141 const u8 *emsk, size_t emsk_len, in eap_teap_derive_imck() argument 165 wpa_hexdump_key(MSG_DEBUG, "EAP-TEAP: EMSK[j]", emsk, emsk_len); in eap_teap_derive_imck() 167 if (emsk && emsk_len > 0) { in eap_teap_derive_imck() 173 if (eap_teap_tls_prf(emsk, emsk_len, "TEAPbindkey@ietf.org", in eap_teap_derive_imck()
|
H A D | eap_teap_common.h | 203 const u8 *emsk, size_t emsk_len,
|
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_teap_common.c | 141 const u8 *emsk, size_t emsk_len, in eap_teap_derive_imck() argument 165 wpa_hexdump_key(MSG_DEBUG, "EAP-TEAP: EMSK[j]", emsk, emsk_len); in eap_teap_derive_imck() 167 if (emsk && emsk_len > 0) { in eap_teap_derive_imck() 173 if (eap_teap_tls_prf(emsk, emsk_len, "TEAPbindkey@ietf.org", in eap_teap_derive_imck()
|
H A D | eap_teap_common.h | 203 const u8 *emsk, size_t emsk_len,
|
/dports/security/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_teap_common.c | 141 const u8 *emsk, size_t emsk_len, in eap_teap_derive_imck() argument 165 wpa_hexdump_key(MSG_DEBUG, "EAP-TEAP: EMSK[j]", emsk, emsk_len); in eap_teap_derive_imck() 167 if (emsk && emsk_len > 0) { in eap_teap_derive_imck() 173 if (eap_teap_tls_prf(emsk, emsk_len, "TEAPbindkey@ietf.org", in eap_teap_derive_imck()
|
H A D | eap_teap_common.h | 203 const u8 *emsk, size_t emsk_len,
|
/dports/net/hostapd-devel/hostap-14ab4a816/src/eap_common/ |
H A D | eap_teap_common.c | 148 const u8 *emsk, size_t emsk_len, in eap_teap_derive_imck() argument 172 wpa_hexdump_key(MSG_DEBUG, "EAP-TEAP: EMSK[j]", emsk, emsk_len); in eap_teap_derive_imck() 174 if (emsk && emsk_len > 0) { in eap_teap_derive_imck() 180 if (eap_teap_tls_prf(tls_cs, emsk, emsk_len, in eap_teap_derive_imck()
|
H A D | eap_teap_common.h | 213 const u8 *emsk, size_t emsk_len,
|
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/eap_common/ |
H A D | eap_teap_common.c | 148 const u8 *emsk, size_t emsk_len, in eap_teap_derive_imck() argument 172 wpa_hexdump_key(MSG_DEBUG, "EAP-TEAP: EMSK[j]", emsk, emsk_len); in eap_teap_derive_imck() 174 if (emsk && emsk_len > 0) { in eap_teap_derive_imck() 180 if (eap_teap_tls_prf(tls_cs, emsk, emsk_len, in eap_teap_derive_imck()
|
H A D | eap_teap_common.h | 213 const u8 *emsk, size_t emsk_len,
|
/dports/net/hostapd/hostapd-2.9/src/eap_server/ |
H A D | eap_server.c | 416 size_t emsk_len = 0; in eap_server_erp_init() local 446 emsk = sm->m->get_emsk(sm, sm->eap_method_priv, &emsk_len); in eap_server_erp_init() 447 if (!emsk || emsk_len == 0 || emsk_len > ERP_MAX_KEY_LEN) { in eap_server_erp_init() 453 wpa_hexdump_key(MSG_DEBUG, "EAP: EMSK", emsk, emsk_len); in eap_server_erp_init() 469 WPA_PUT_BE16(len, emsk_len); in eap_server_erp_init() 470 if (hmac_sha256_kdf(emsk, emsk_len, in eap_server_erp_init() 472 len, sizeof(len), erp->rRK, emsk_len) < 0) { in eap_server_erp_init() 476 erp->rRK_len = emsk_len; in eap_server_erp_init() 497 bin_clear_free(emsk, emsk_len); in eap_server_erp_init()
|
H A D | eap_server_teap.c | 305 size_t msk_len = 0, emsk_len = 0; in eap_teap_update_icmk() local 332 &emsk_len); in eap_teap_update_icmk() 336 msk, msk_len, emsk, emsk_len, in eap_teap_update_icmk() 340 bin_clear_free(emsk, emsk_len); in eap_teap_update_icmk()
|
/dports/net/hostapd-devel/hostap-14ab4a816/src/eap_server/ |
H A D | eap_server.c | 423 size_t emsk_len = 0; in eap_server_erp_init() local 453 emsk = sm->m->get_emsk(sm, sm->eap_method_priv, &emsk_len); in eap_server_erp_init() 454 if (!emsk || emsk_len == 0 || emsk_len > ERP_MAX_KEY_LEN) { in eap_server_erp_init() 460 wpa_hexdump_key(MSG_DEBUG, "EAP: EMSK", emsk, emsk_len); in eap_server_erp_init() 476 WPA_PUT_BE16(len, emsk_len); in eap_server_erp_init() 477 if (hmac_sha256_kdf(emsk, emsk_len, in eap_server_erp_init() 479 len, sizeof(len), erp->rRK, emsk_len) < 0) { in eap_server_erp_init() 483 erp->rRK_len = emsk_len; in eap_server_erp_init() 504 bin_clear_free(emsk, emsk_len); in eap_server_erp_init()
|
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server.c | 416 size_t emsk_len = 0; in eap_server_erp_init() local 446 emsk = sm->m->get_emsk(sm, sm->eap_method_priv, &emsk_len); in eap_server_erp_init() 447 if (!emsk || emsk_len == 0 || emsk_len > ERP_MAX_KEY_LEN) { in eap_server_erp_init() 453 wpa_hexdump_key(MSG_DEBUG, "EAP: EMSK", emsk, emsk_len); in eap_server_erp_init() 469 WPA_PUT_BE16(len, emsk_len); in eap_server_erp_init() 470 if (hmac_sha256_kdf(emsk, emsk_len, in eap_server_erp_init() 472 len, sizeof(len), erp->rRK, emsk_len) < 0) { in eap_server_erp_init() 476 erp->rRK_len = emsk_len; in eap_server_erp_init() 497 bin_clear_free(emsk, emsk_len); in eap_server_erp_init()
|
H A D | eap_server_teap.c | 305 size_t msk_len = 0, emsk_len = 0; in eap_teap_update_icmk() local 332 &emsk_len); in eap_teap_update_icmk() 336 msk, msk_len, emsk, emsk_len, in eap_teap_update_icmk() 340 bin_clear_free(emsk, emsk_len); in eap_teap_update_icmk()
|
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/eap_server/ |
H A D | eap_server.c | 423 size_t emsk_len = 0; in eap_server_erp_init() local 453 emsk = sm->m->get_emsk(sm, sm->eap_method_priv, &emsk_len); in eap_server_erp_init() 454 if (!emsk || emsk_len == 0 || emsk_len > ERP_MAX_KEY_LEN) { in eap_server_erp_init() 460 wpa_hexdump_key(MSG_DEBUG, "EAP: EMSK", emsk, emsk_len); in eap_server_erp_init() 476 WPA_PUT_BE16(len, emsk_len); in eap_server_erp_init() 477 if (hmac_sha256_kdf(emsk, emsk_len, in eap_server_erp_init() 479 len, sizeof(len), erp->rRK, emsk_len) < 0) { in eap_server_erp_init() 483 erp->rRK_len = emsk_len; in eap_server_erp_init() 504 bin_clear_free(emsk, emsk_len); in eap_server_erp_init()
|
/dports/security/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server.c | 416 size_t emsk_len = 0; in eap_server_erp_init() local 446 emsk = sm->m->get_emsk(sm, sm->eap_method_priv, &emsk_len); in eap_server_erp_init() 447 if (!emsk || emsk_len == 0 || emsk_len > ERP_MAX_KEY_LEN) { in eap_server_erp_init() 453 wpa_hexdump_key(MSG_DEBUG, "EAP: EMSK", emsk, emsk_len); in eap_server_erp_init() 469 WPA_PUT_BE16(len, emsk_len); in eap_server_erp_init() 470 if (hmac_sha256_kdf(emsk, emsk_len, in eap_server_erp_init() 472 len, sizeof(len), erp->rRK, emsk_len) < 0) { in eap_server_erp_init() 476 erp->rRK_len = emsk_len; in eap_server_erp_init() 497 bin_clear_free(emsk, emsk_len); in eap_server_erp_init()
|
/dports/net/hostapd/hostapd-2.9/src/eap_peer/ |
H A D | eap.c | 682 size_t emsk_len = 0; in eap_peer_erp_init() local 716 emsk_len = ext_emsk_len; in eap_peer_erp_init() 718 emsk = sm->m->get_emsk(sm, sm->eap_method_priv, &emsk_len); in eap_peer_erp_init() 721 if (!emsk || emsk_len == 0 || emsk_len > ERP_MAX_KEY_LEN) { in eap_peer_erp_init() 727 wpa_hexdump_key(MSG_DEBUG, "EAP: EMSK", emsk, emsk_len); in eap_peer_erp_init() 756 WPA_PUT_BE16(len, emsk_len); in eap_peer_erp_init() 757 if (hmac_sha256_kdf(emsk, emsk_len, in eap_peer_erp_init() 759 len, sizeof(len), erp->rRK, emsk_len) < 0) { in eap_peer_erp_init() 763 erp->rRK_len = emsk_len; in eap_peer_erp_init() 784 bin_clear_free(emsk, emsk_len); in eap_peer_erp_init()
|
/dports/net/hostapd-devel/hostap-14ab4a816/src/eap_peer/ |
H A D | eap.c | 690 size_t emsk_len = 0; in eap_peer_erp_init() local 724 emsk_len = ext_emsk_len; in eap_peer_erp_init() 726 emsk = sm->m->get_emsk(sm, sm->eap_method_priv, &emsk_len); in eap_peer_erp_init() 729 if (!emsk || emsk_len == 0 || emsk_len > ERP_MAX_KEY_LEN) { in eap_peer_erp_init() 735 wpa_hexdump_key(MSG_DEBUG, "EAP: EMSK", emsk, emsk_len); in eap_peer_erp_init() 764 WPA_PUT_BE16(len, emsk_len); in eap_peer_erp_init() 765 if (hmac_sha256_kdf(emsk, emsk_len, in eap_peer_erp_init() 767 len, sizeof(len), erp->rRK, emsk_len) < 0) { in eap_peer_erp_init() 771 erp->rRK_len = emsk_len; in eap_peer_erp_init() 792 bin_clear_free(emsk, emsk_len); in eap_peer_erp_init()
|
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap.c | 682 size_t emsk_len = 0; in eap_peer_erp_init() local 716 emsk_len = ext_emsk_len; in eap_peer_erp_init() 718 emsk = sm->m->get_emsk(sm, sm->eap_method_priv, &emsk_len); in eap_peer_erp_init() 721 if (!emsk || emsk_len == 0 || emsk_len > ERP_MAX_KEY_LEN) { in eap_peer_erp_init() 727 wpa_hexdump_key(MSG_DEBUG, "EAP: EMSK", emsk, emsk_len); in eap_peer_erp_init() 756 WPA_PUT_BE16(len, emsk_len); in eap_peer_erp_init() 757 if (hmac_sha256_kdf(emsk, emsk_len, in eap_peer_erp_init() 759 len, sizeof(len), erp->rRK, emsk_len) < 0) { in eap_peer_erp_init() 763 erp->rRK_len = emsk_len; in eap_peer_erp_init() 784 bin_clear_free(emsk, emsk_len); in eap_peer_erp_init()
|
/dports/security/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap.c | 682 size_t emsk_len = 0; in eap_peer_erp_init() local 716 emsk_len = ext_emsk_len; in eap_peer_erp_init() 718 emsk = sm->m->get_emsk(sm, sm->eap_method_priv, &emsk_len); in eap_peer_erp_init() 721 if (!emsk || emsk_len == 0 || emsk_len > ERP_MAX_KEY_LEN) { in eap_peer_erp_init() 727 wpa_hexdump_key(MSG_DEBUG, "EAP: EMSK", emsk, emsk_len); in eap_peer_erp_init() 756 WPA_PUT_BE16(len, emsk_len); in eap_peer_erp_init() 757 if (hmac_sha256_kdf(emsk, emsk_len, in eap_peer_erp_init() 759 len, sizeof(len), erp->rRK, emsk_len) < 0) { in eap_peer_erp_init() 763 erp->rRK_len = emsk_len; in eap_peer_erp_init() 784 bin_clear_free(emsk, emsk_len); in eap_peer_erp_init()
|
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/eap_peer/ |
H A D | eap.c | 690 size_t emsk_len = 0; in eap_peer_erp_init() local 724 emsk_len = ext_emsk_len; in eap_peer_erp_init() 726 emsk = sm->m->get_emsk(sm, sm->eap_method_priv, &emsk_len); in eap_peer_erp_init() 729 if (!emsk || emsk_len == 0 || emsk_len > ERP_MAX_KEY_LEN) { in eap_peer_erp_init() 735 wpa_hexdump_key(MSG_DEBUG, "EAP: EMSK", emsk, emsk_len); in eap_peer_erp_init() 764 WPA_PUT_BE16(len, emsk_len); in eap_peer_erp_init() 765 if (hmac_sha256_kdf(emsk, emsk_len, in eap_peer_erp_init() 767 len, sizeof(len), erp->rRK, emsk_len) < 0) { in eap_peer_erp_init() 771 erp->rRK_len = emsk_len; in eap_peer_erp_init() 792 bin_clear_free(emsk, emsk_len); in eap_peer_erp_init()
|
/dports/net/hostapd-devel/hostap-14ab4a816/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 512 size_t session_id_len, emsk_len; in SM_STATE() local 520 emsk = eap_proxy_get_emsk(sm->eap_proxy, &emsk_len); in SM_STATE() 524 emsk_len); in SM_STATE() 527 bin_clear_free(emsk, emsk_len); in SM_STATE()
|
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 512 size_t session_id_len, emsk_len; in SM_STATE() local 520 emsk = eap_proxy_get_emsk(sm->eap_proxy, &emsk_len); in SM_STATE() 524 emsk_len); in SM_STATE() 527 bin_clear_free(emsk, emsk_len); in SM_STATE()
|
/dports/net/hostapd/hostapd-2.9/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 498 size_t session_id_len, emsk_len; in SM_STATE() local 506 emsk = eap_proxy_get_emsk(sm->eap_proxy, &emsk_len); in SM_STATE() 510 emsk_len); in SM_STATE() 513 bin_clear_free(emsk, emsk_len); in SM_STATE()
|