/dports/net/hostapd/hostapd-2.9/src/eap_common/ |
H A D | eap_sim_common.h | 81 u8 *emsk); 85 u8 *emsk); 94 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk); 97 const u8 *nonce_s, u8 *msk, u8 *emsk); 112 u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys() argument 120 u8 *emsk) in eap_aka_prime_derive_keys_reauth() argument
|
H A D | eap_gpsk_common.c | 112 u8 *msk, u8 *emsk, in eap_gpsk_derive_keys_helper() argument 173 os_memcpy(emsk, pos, EAP_EMSK_LEN); in eap_gpsk_derive_keys_helper() 191 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, in eap_gpsk_derive_keys_aes() argument 219 msk, emsk, sk, *sk_len, in eap_gpsk_derive_keys_aes() 227 u8 *msk, u8 *emsk, in eap_gpsk_derive_keys_sha256() argument 253 msk, emsk, sk, *sk_len, in eap_gpsk_derive_keys_sha256() 284 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, in eap_gpsk_derive_keys() argument 320 msk, emsk, sk, sk_len, in eap_gpsk_derive_keys() 327 msk, emsk, sk, sk_len); in eap_gpsk_derive_keys()
|
H A D | eap_teap_common.c | 97 int eap_teap_derive_eap_emsk(const u8 *simck, u8 *emsk) in eap_teap_derive_eap_emsk() argument 107 (u8 *) "", 0, emsk, EAP_EMSK_LEN) < 0) in eap_teap_derive_eap_emsk() 110 emsk, EAP_EMSK_LEN); in eap_teap_derive_eap_emsk() 141 const u8 *emsk, size_t emsk_len, in eap_teap_derive_imck() argument 165 wpa_hexdump_key(MSG_DEBUG, "EAP-TEAP: EMSK[j]", emsk, emsk_len); in eap_teap_derive_imck() 167 if (emsk && emsk_len > 0) { in eap_teap_derive_imck() 173 if (eap_teap_tls_prf(emsk, emsk_len, "TEAPbindkey@ietf.org", in eap_teap_derive_imck()
|
H A D | eap_sim_common.c | 92 os_memcpy(emsk, pos, EAP_EMSK_LEN); in eap_sim_derive_keys() 100 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN); in eap_sim_derive_keys() 110 u8 *emsk) in eap_sim_derive_keys_reauth() argument 155 if (emsk) { in eap_sim_derive_keys_reauth() 156 os_memcpy(emsk, buf + EAP_SIM_KEYING_DATA_LEN, EAP_EMSK_LEN); in eap_sim_derive_keys_reauth() 157 wpa_hexdump(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN); in eap_sim_derive_keys_reauth() 277 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys() argument 319 os_memcpy(emsk, pos, EAP_EMSK_LEN); in eap_aka_prime_derive_keys() 320 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': EMSK", emsk, EAP_EMSK_LEN); in eap_aka_prime_derive_keys() 326 const u8 *nonce_s, u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys_reauth() argument [all …]
|
/dports/net/hostapd-devel/hostap-14ab4a816/src/eap_common/ |
H A D | eap_sim_common.h | 81 u8 *emsk); 85 u8 *emsk); 94 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk); 97 const u8 *nonce_s, u8 *msk, u8 *emsk); 112 u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys() argument 120 u8 *emsk) in eap_aka_prime_derive_keys_reauth() argument
|
H A D | eap_gpsk_common.c | 112 u8 *msk, u8 *emsk, in eap_gpsk_derive_keys_helper() argument 173 os_memcpy(emsk, pos, EAP_EMSK_LEN); in eap_gpsk_derive_keys_helper() 191 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, in eap_gpsk_derive_keys_aes() argument 219 msk, emsk, sk, *sk_len, in eap_gpsk_derive_keys_aes() 227 u8 *msk, u8 *emsk, in eap_gpsk_derive_keys_sha256() argument 253 msk, emsk, sk, *sk_len, in eap_gpsk_derive_keys_sha256() 284 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, in eap_gpsk_derive_keys() argument 320 msk, emsk, sk, sk_len, in eap_gpsk_derive_keys() 327 msk, emsk, sk, sk_len); in eap_gpsk_derive_keys()
|
H A D | eap_sim_common.c | 92 os_memcpy(emsk, pos, EAP_EMSK_LEN); in eap_sim_derive_keys() 100 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN); in eap_sim_derive_keys() 110 u8 *emsk) in eap_sim_derive_keys_reauth() argument 155 if (emsk) { in eap_sim_derive_keys_reauth() 156 os_memcpy(emsk, buf + EAP_SIM_KEYING_DATA_LEN, EAP_EMSK_LEN); in eap_sim_derive_keys_reauth() 157 wpa_hexdump(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN); in eap_sim_derive_keys_reauth() 277 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys() argument 319 os_memcpy(emsk, pos, EAP_EMSK_LEN); in eap_aka_prime_derive_keys() 320 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': EMSK", emsk, EAP_EMSK_LEN); in eap_aka_prime_derive_keys() 326 const u8 *nonce_s, u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys_reauth() argument [all …]
|
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/eap_common/ |
H A D | eap_sim_common.h | 81 u8 *emsk); 85 u8 *emsk); 94 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk); 97 const u8 *nonce_s, u8 *msk, u8 *emsk); 112 u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys() argument 120 u8 *emsk) in eap_aka_prime_derive_keys_reauth() argument
|
H A D | eap_gpsk_common.c | 112 u8 *msk, u8 *emsk, in eap_gpsk_derive_keys_helper() argument 173 os_memcpy(emsk, pos, EAP_EMSK_LEN); in eap_gpsk_derive_keys_helper() 191 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, in eap_gpsk_derive_keys_aes() argument 219 msk, emsk, sk, *sk_len, in eap_gpsk_derive_keys_aes() 227 u8 *msk, u8 *emsk, in eap_gpsk_derive_keys_sha256() argument 253 msk, emsk, sk, *sk_len, in eap_gpsk_derive_keys_sha256() 284 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, in eap_gpsk_derive_keys() argument 320 msk, emsk, sk, sk_len, in eap_gpsk_derive_keys() 327 msk, emsk, sk, sk_len); in eap_gpsk_derive_keys()
|
H A D | eap_sim_common.c | 92 os_memcpy(emsk, pos, EAP_EMSK_LEN); in eap_sim_derive_keys() 100 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN); in eap_sim_derive_keys() 110 u8 *emsk) in eap_sim_derive_keys_reauth() argument 155 if (emsk) { in eap_sim_derive_keys_reauth() 156 os_memcpy(emsk, buf + EAP_SIM_KEYING_DATA_LEN, EAP_EMSK_LEN); in eap_sim_derive_keys_reauth() 157 wpa_hexdump(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN); in eap_sim_derive_keys_reauth() 277 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys() argument 319 os_memcpy(emsk, pos, EAP_EMSK_LEN); in eap_aka_prime_derive_keys() 320 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': EMSK", emsk, EAP_EMSK_LEN); in eap_aka_prime_derive_keys() 326 const u8 *nonce_s, u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys_reauth() argument [all …]
|
/dports/security/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_sim_common.h | 81 u8 *emsk); 85 u8 *emsk); 94 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk); 97 const u8 *nonce_s, u8 *msk, u8 *emsk); 112 u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys() argument 120 u8 *emsk) in eap_aka_prime_derive_keys_reauth() argument
|
H A D | eap_gpsk_common.c | 112 u8 *msk, u8 *emsk, in eap_gpsk_derive_keys_helper() argument 173 os_memcpy(emsk, pos, EAP_EMSK_LEN); in eap_gpsk_derive_keys_helper() 191 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, in eap_gpsk_derive_keys_aes() argument 219 msk, emsk, sk, *sk_len, in eap_gpsk_derive_keys_aes() 227 u8 *msk, u8 *emsk, in eap_gpsk_derive_keys_sha256() argument 253 msk, emsk, sk, *sk_len, in eap_gpsk_derive_keys_sha256() 284 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, in eap_gpsk_derive_keys() argument 320 msk, emsk, sk, sk_len, in eap_gpsk_derive_keys() 327 msk, emsk, sk, sk_len); in eap_gpsk_derive_keys()
|
H A D | eap_teap_common.c | 97 int eap_teap_derive_eap_emsk(const u8 *simck, u8 *emsk) in eap_teap_derive_eap_emsk() argument 107 (u8 *) "", 0, emsk, EAP_EMSK_LEN) < 0) in eap_teap_derive_eap_emsk() 110 emsk, EAP_EMSK_LEN); in eap_teap_derive_eap_emsk() 141 const u8 *emsk, size_t emsk_len, in eap_teap_derive_imck() argument 165 wpa_hexdump_key(MSG_DEBUG, "EAP-TEAP: EMSK[j]", emsk, emsk_len); in eap_teap_derive_imck() 167 if (emsk && emsk_len > 0) { in eap_teap_derive_imck() 173 if (eap_teap_tls_prf(emsk, emsk_len, "TEAPbindkey@ietf.org", in eap_teap_derive_imck()
|
H A D | eap_sim_common.c | 92 os_memcpy(emsk, pos, EAP_EMSK_LEN); in eap_sim_derive_keys() 100 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN); in eap_sim_derive_keys() 110 u8 *emsk) in eap_sim_derive_keys_reauth() argument 155 if (emsk) { in eap_sim_derive_keys_reauth() 156 os_memcpy(emsk, buf + EAP_SIM_KEYING_DATA_LEN, EAP_EMSK_LEN); in eap_sim_derive_keys_reauth() 157 wpa_hexdump(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN); in eap_sim_derive_keys_reauth() 277 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys() argument 319 os_memcpy(emsk, pos, EAP_EMSK_LEN); in eap_aka_prime_derive_keys() 320 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': EMSK", emsk, EAP_EMSK_LEN); in eap_aka_prime_derive_keys() 326 const u8 *nonce_s, u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys_reauth() argument [all …]
|
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_sim_common.h | 81 u8 *emsk); 85 u8 *emsk); 94 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk); 97 const u8 *nonce_s, u8 *msk, u8 *emsk); 112 u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys() argument 120 u8 *emsk) in eap_aka_prime_derive_keys_reauth() argument
|
H A D | eap_gpsk_common.c | 112 u8 *msk, u8 *emsk, in eap_gpsk_derive_keys_helper() argument 173 os_memcpy(emsk, pos, EAP_EMSK_LEN); in eap_gpsk_derive_keys_helper() 191 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, in eap_gpsk_derive_keys_aes() argument 219 msk, emsk, sk, *sk_len, in eap_gpsk_derive_keys_aes() 227 u8 *msk, u8 *emsk, in eap_gpsk_derive_keys_sha256() argument 253 msk, emsk, sk, *sk_len, in eap_gpsk_derive_keys_sha256() 284 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, in eap_gpsk_derive_keys() argument 320 msk, emsk, sk, sk_len, in eap_gpsk_derive_keys() 327 msk, emsk, sk, sk_len); in eap_gpsk_derive_keys()
|
H A D | eap_teap_common.c | 97 int eap_teap_derive_eap_emsk(const u8 *simck, u8 *emsk) in eap_teap_derive_eap_emsk() argument 107 (u8 *) "", 0, emsk, EAP_EMSK_LEN) < 0) in eap_teap_derive_eap_emsk() 110 emsk, EAP_EMSK_LEN); in eap_teap_derive_eap_emsk() 141 const u8 *emsk, size_t emsk_len, in eap_teap_derive_imck() argument 165 wpa_hexdump_key(MSG_DEBUG, "EAP-TEAP: EMSK[j]", emsk, emsk_len); in eap_teap_derive_imck() 167 if (emsk && emsk_len > 0) { in eap_teap_derive_imck() 173 if (eap_teap_tls_prf(emsk, emsk_len, "TEAPbindkey@ietf.org", in eap_teap_derive_imck()
|
H A D | eap_sim_common.c | 92 os_memcpy(emsk, pos, EAP_EMSK_LEN); in eap_sim_derive_keys() 100 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN); in eap_sim_derive_keys() 110 u8 *emsk) in eap_sim_derive_keys_reauth() argument 155 if (emsk) { in eap_sim_derive_keys_reauth() 156 os_memcpy(emsk, buf + EAP_SIM_KEYING_DATA_LEN, EAP_EMSK_LEN); in eap_sim_derive_keys_reauth() 157 wpa_hexdump(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN); in eap_sim_derive_keys_reauth() 277 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys() argument 319 os_memcpy(emsk, pos, EAP_EMSK_LEN); in eap_aka_prime_derive_keys() 320 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': EMSK", emsk, EAP_EMSK_LEN); in eap_aka_prime_derive_keys() 326 const u8 *nonce_s, u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys_reauth() argument [all …]
|
/dports/net/hostapd/hostapd-2.9/src/eap_server/ |
H A D | eap_server_tls.c | 393 u8 *eapKeyData, *emsk; in eap_tls_get_emsk() local 413 emsk = os_malloc(EAP_EMSK_LEN); in eap_tls_get_emsk() 414 if (emsk) in eap_tls_get_emsk() 415 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, in eap_tls_get_emsk() 419 emsk = NULL; in eap_tls_get_emsk() 421 if (emsk) { in eap_tls_get_emsk() 424 emsk, EAP_EMSK_LEN); in eap_tls_get_emsk() 429 return emsk; in eap_tls_get_emsk()
|
/dports/net/hostapd-devel/hostap-14ab4a816/src/eap_server/ |
H A D | eap_server_tls.c | 361 u8 *eapKeyData, *emsk; in eap_tls_get_emsk() local 381 emsk = os_malloc(EAP_EMSK_LEN); in eap_tls_get_emsk() 382 if (emsk) in eap_tls_get_emsk() 383 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, in eap_tls_get_emsk() 387 emsk = NULL; in eap_tls_get_emsk() 389 if (emsk) { in eap_tls_get_emsk() 392 emsk, EAP_EMSK_LEN); in eap_tls_get_emsk() 397 return emsk; in eap_tls_get_emsk()
|
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_tls.c | 393 u8 *eapKeyData, *emsk; in eap_tls_get_emsk() local 413 emsk = os_malloc(EAP_EMSK_LEN); in eap_tls_get_emsk() 414 if (emsk) in eap_tls_get_emsk() 415 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, in eap_tls_get_emsk() 419 emsk = NULL; in eap_tls_get_emsk() 421 if (emsk) { in eap_tls_get_emsk() 424 emsk, EAP_EMSK_LEN); in eap_tls_get_emsk() 429 return emsk; in eap_tls_get_emsk()
|
/dports/security/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_tls.c | 393 u8 *eapKeyData, *emsk; in eap_tls_get_emsk() local 413 emsk = os_malloc(EAP_EMSK_LEN); in eap_tls_get_emsk() 414 if (emsk) in eap_tls_get_emsk() 415 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, in eap_tls_get_emsk() 419 emsk = NULL; in eap_tls_get_emsk() 421 if (emsk) { in eap_tls_get_emsk() 424 emsk, EAP_EMSK_LEN); in eap_tls_get_emsk() 429 return emsk; in eap_tls_get_emsk()
|
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/eap_server/ |
H A D | eap_server_tls.c | 361 u8 *eapKeyData, *emsk; in eap_tls_get_emsk() local 381 emsk = os_malloc(EAP_EMSK_LEN); in eap_tls_get_emsk() 382 if (emsk) in eap_tls_get_emsk() 383 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, in eap_tls_get_emsk() 387 emsk = NULL; in eap_tls_get_emsk() 389 if (emsk) { in eap_tls_get_emsk() 392 emsk, EAP_EMSK_LEN); in eap_tls_get_emsk() 397 return emsk; in eap_tls_get_emsk()
|
/dports/net/freediameter/freeDiameter-1.5.0/extensions/app_diameap/plugins/eap_tls/ |
H A D | eap_tls.c | 52 int eap_tls_getKey(struct eap_state_machine *smd, u8** msk, int * msklen, u8** emsk, int * emsklen); 291 int eap_tls_getKey(struct eap_state_machine *smd, u8 ** msk, int *msklen, u8 ** emsk, int *emsklen) in eap_tls_getKey() argument 294 int len = emsk ? 128 : 64; in eap_tls_getKey() 310 if (emsk) { in eap_tls_getKey() 311 *emsk = malloc(64); in eap_tls_getKey() 312 memcpy(*emsk, (*msk)+64, 64); in eap_tls_getKey()
|
/dports/net/freeradius3/freeradius-server-3.0.25/src/modules/rlm_wimax/ |
H A D | rlm_wimax.c | 273 static int mip_keys_generate(void *instance, REQUEST *request, VALUE_PAIR *msk, VALUE_PAIR *emsk) in mip_keys_generate() argument 309 HMAC_Init_ex(hmac, emsk->vp_octets, emsk->vp_length, EVP_sha256(), NULL); in mip_keys_generate() 317 HMAC_Init_ex(hmac, emsk->vp_octets, emsk->vp_length, EVP_sha256(), NULL); in mip_keys_generate() 767 VALUE_PAIR *msk, *emsk, *ki, *opc, *amf, *sqn, *plmn; in CC_HINT() local 775 emsk = fr_pair_find_by_num(request->reply->vps, PW_EAP_EMSK, 0, TAG_ANY); in CC_HINT() 777 if (msk && emsk) { in CC_HINT() 779 return mip_keys_generate(instance, request, msk, emsk); in CC_HINT()
|