Lines Matching full:ck
57 const u8 *ik, const u8 *ck, u8 *mk) in eap_aka_derive_mk() argument
66 addr[2] = ck; in eap_aka_derive_mk()
69 /* MK = SHA1(Identity|IK|CK) */ in eap_aka_derive_mk()
72 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN); in eap_aka_derive_mk()
276 const u8 *ik, const u8 *ck, u8 *k_encr, in eap_aka_prime_derive_keys() argument
285 * MK = PRF'(IK'|CK',"EAP-AKA'"|Identity) in eap_aka_prime_derive_keys()
294 os_memcpy(key + EAP_AKA_IK_LEN, ck, EAP_AKA_CK_LEN); in eap_aka_prime_derive_keys()
424 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak, in eap_aka_prime_derive_ck_ik_prime() argument
436 * (CK', IK') = F(CK, IK, <access network identity>) in eap_aka_prime_derive_ck_ik_prime()
438 /* TODO: CK', IK' generation should really be moved into the actual in eap_aka_prime_derive_ck_ik_prime()
445 * CK' || IK' = HMAC-SHA-256(Key, S) in eap_aka_prime_derive_ck_ik_prime()
447 * Key = CK || IK in eap_aka_prime_derive_ck_ik_prime()
457 wpa_printf(MSG_DEBUG, "EAP-AKA': Derive (CK',IK') from (CK,IK)"); in eap_aka_prime_derive_ck_ik_prime()
458 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': CK", ck, EAP_AKA_CK_LEN); in eap_aka_prime_derive_ck_ik_prime()
465 os_memcpy(key, ck, EAP_AKA_CK_LEN); in eap_aka_prime_derive_ck_ik_prime()
467 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': Key = CK || IK", in eap_aka_prime_derive_ck_ik_prime()
484 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': KDF output (CK' || IK')", in eap_aka_prime_derive_ck_ik_prime()
487 os_memcpy(ck, hash, EAP_AKA_CK_LEN); in eap_aka_prime_derive_ck_ik_prime()
489 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': CK'", ck, EAP_AKA_CK_LEN); in eap_aka_prime_derive_ck_ik_prime()