Lines Matching +full:mac +full:- +full:only

2  * EAP server/peer: EAP-PAX shared routines
17 * eap_pax_kdf - PAX Key Derivation Function
18 * @mac_id: MAC ID (EAP_PAX_MAC_*) / currently, only HMAC_SHA1_128 is supported
26 * Returns: 0 on success, -1 failed
28 * RFC 4746, Section 2.6: PAX-KDF-W(X, Y, Z)
35 u8 mac[SHA1_MAC_LEN]; in eap_pax_kdf() local
41 num_blocks = (output_len + EAP_PAX_MAC_LEN - 1) / EAP_PAX_MAC_LEN; in eap_pax_kdf()
43 return -1; in eap_pax_kdf()
47 return -1; in eap_pax_kdf()
60 if (hmac_sha1_vector(key, key_len, 3, addr, len, mac) < 0) in eap_pax_kdf()
61 return -1; in eap_pax_kdf()
62 os_memcpy(pos, mac, clen); in eap_pax_kdf()
64 left -= clen; in eap_pax_kdf()
72 * eap_pax_mac - EAP-PAX MAC
73 * @mac_id: MAC ID (EAP_PAX_MAC_*) / currently, only HMAC_SHA1_128 is supported
82 * @mac: Buffer for the MAC value (EAP_PAX_MAC_LEN = 16 bytes)
83 * Returns: 0 on success, -1 on failure
85 * Wrapper function to calculate EAP-PAX MAC.
91 u8 *mac) in eap_pax_mac() argument
100 return -1; in eap_pax_mac()
111 return -1; in eap_pax_mac()
112 os_memcpy(mac, hash, EAP_PAX_MAC_LEN); in eap_pax_mac()
119 * eap_pax_initial_key_derivation - EAP-PAX initial key derivation
120 * @mac_id: MAC ID (EAP_PAX_MAC_*) / currently, only HMAC_SHA1_128 is supported
127 * Returns: 0 on success, -1 on failure
132 wpa_printf(MSG_DEBUG, "EAP-PAX: initial key derivation"); in eap_pax_initial_key_derivation()
141 return -1; in eap_pax_initial_key_derivation()
143 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: AK", ak, EAP_PAX_AK_LEN); in eap_pax_initial_key_derivation()
144 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: MK", mk, EAP_PAX_MK_LEN); in eap_pax_initial_key_derivation()
145 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: CK", ck, EAP_PAX_CK_LEN); in eap_pax_initial_key_derivation()
146 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: ICK", ick, EAP_PAX_ICK_LEN); in eap_pax_initial_key_derivation()
147 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: MID", mid, EAP_PAX_MID_LEN); in eap_pax_initial_key_derivation()