Home
last modified time | relevance | path

Searched refs:cak (Results 1 - 14 of 14) sorted by relevance

/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
H A Dwpas_kay.c327 struct mka_key *cak; in ieee802_1x_notify_create_actor() local
341 cak = os_zalloc(sizeof(*cak)); in ieee802_1x_notify_create_actor()
342 if (!msk || !sid || !ckn || !cak) in ieee802_1x_notify_create_actor()
359 cak->len = DEFAULT_KEY_LEN; in ieee802_1x_notify_create_actor()
361 peer_addr, cak->key, cak->len)) { in ieee802_1x_notify_create_actor()
366 wpa_hexdump_key(MSG_DEBUG, "Derived CAK", cak->key, cak->len); in ieee802_1x_notify_create_actor()
378 res = ieee802_1x_kay_create_mka(wpa_s->kay, ckn, cak, in ieee802_1x_notify_create_actor()
400 struct mka_key *cak; ieee802_1x_create_preshared_mka() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
H A Dwpas_kay.c327 struct mka_key *cak; in ieee802_1x_notify_create_actor() local
341 cak = os_zalloc(sizeof(*cak)); in ieee802_1x_notify_create_actor()
342 if (!msk || !sid || !ckn || !cak) in ieee802_1x_notify_create_actor()
359 cak->len = DEFAULT_KEY_LEN; in ieee802_1x_notify_create_actor()
361 peer_addr, cak->key, cak->len)) { in ieee802_1x_notify_create_actor()
366 wpa_hexdump_key(MSG_DEBUG, "Derived CAK", cak->key, cak->len); in ieee802_1x_notify_create_actor()
378 res = ieee802_1x_kay_create_mka(wpa_s->kay, ckn, cak, in ieee802_1x_notify_create_actor()
400 struct mka_key *cak; ieee802_1x_create_preshared_mka() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
H A Dwpa_auth_kay.c415 struct mka_key *cak; in ieee802_1x_notify_create_actor_hapd() local
429 cak = os_zalloc(sizeof(*cak)); in ieee802_1x_notify_create_actor_hapd()
430 if (!msk || !sid || !ckn || !cak) in ieee802_1x_notify_create_actor_hapd()
450 cak->len = DEFAULT_KEY_LEN; in ieee802_1x_notify_create_actor_hapd()
452 sta->addr, cak->key, cak->len)) { in ieee802_1x_notify_create_actor_hapd()
456 wpa_hexdump_key(MSG_DEBUG, "Derived CAK", cak->key, cak->len); in ieee802_1x_notify_create_actor_hapd()
467 res = ieee802_1x_kay_create_mka(hapd->kay, ckn, cak, in ieee802_1x_notify_create_actor_hapd()
483 struct mka_key *cak; ieee802_1x_create_preshared_mka_hapd() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
H A Dwpa_auth_kay.c415 struct mka_key *cak; in ieee802_1x_notify_create_actor_hapd() local
429 cak = os_zalloc(sizeof(*cak)); in ieee802_1x_notify_create_actor_hapd()
430 if (!msk || !sid || !ckn || !cak) in ieee802_1x_notify_create_actor_hapd()
450 cak->len = DEFAULT_KEY_LEN; in ieee802_1x_notify_create_actor_hapd()
452 sta->addr, cak->key, cak->len)) { in ieee802_1x_notify_create_actor_hapd()
456 wpa_hexdump_key(MSG_DEBUG, "Derived CAK", cak->key, cak->len); in ieee802_1x_notify_create_actor_hapd()
467 res = ieee802_1x_kay_create_mka(hapd->kay, ckn, cak, in ieee802_1x_notify_create_actor_hapd()
483 struct mka_key *cak; ieee802_1x_create_preshared_mka_hapd() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/pae/
H A Dieee802_1x_key.c92 const u8 *mac2, u8 *cak, size_t cak_bytes) in ieee802_1x_cak_aes_cmac()
98 context, sizeof(context) * 8, 8 * cak_bytes, cak); in ieee802_1x_cak_aes_cmac()
137 int ieee802_1x_kek_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn, in ieee802_1x_kek_aes_cmac() argument
146 return aes_kdf(cak, 8 * cak_bytes, "IEEE8021 KEK", in ieee802_1x_kek_aes_cmac()
158 int ieee802_1x_ick_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn, in ieee802_1x_ick_aes_cmac() argument
167 return aes_kdf(cak, 8 *cak_bytes, "IEEE8021 ICK", in ieee802_1x_ick_aes_cmac()
205 int ieee802_1x_sak_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ctx, in ieee802_1x_sak_aes_cmac() argument
208 return aes_kdf(cak, cak_bytes * 8, "IEEE8021 SAK", ctx, ctx_bytes * 8, in ieee802_1x_sak_aes_cmac()
91 ieee802_1x_cak_aes_cmac(const u8 *msk, size_t msk_bytes, const u8 *mac1, const u8 *mac2, u8 *cak, size_t cak_bytes) ieee802_1x_cak_aes_cmac() argument
H A Dieee802_1x_key.h13 const u8 *mac2, u8 *cak, size_t cak_bytes);
17 int ieee802_1x_kek_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn,
19 int ieee802_1x_ick_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn,
23 int ieee802_1x_sak_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ctx,
H A Dieee802_1x_kay_i.h70 const u8 *mac2, u8 *cak, size_t cak_bytes);
73 int (*kek_trfm)(const u8 *cak, size_t cak_bytes,
76 int (*ick_trfm)(const u8 *cak, size_t cak_bytes,
89 struct mka_key cak; member
379 * @cak: AES Key Wrap of CAK (see 9.8)
399 u8 cak[24]; member
H A Dieee802_1x_kay.c2148 if (ieee802_1x_sak_aes_cmac(participant->cak.key, in ieee802_1x_kay_generate_new_sak()
2149 participant->cak.len, in ieee802_1x_kay_generate_new_sak()
3588 const struct mka_key *cak, u32 life, in ieee802_1x_kay_create_mka()
3598 if (!kay || !ckn || !cak) { in ieee802_1x_kay_create_mka()
3599 wpa_printf(MSG_ERROR, "KaY: ckn or cak is null"); in ieee802_1x_kay_create_mka()
3603 if (cak->len != 16 && cak->len != 32) { in ieee802_1x_kay_create_mka()
3605 (unsigned int) cak->len); in ieee802_1x_kay_create_mka()
3627 participant->cak.len = cak in ieee802_1x_kay_create_mka()
3586 ieee802_1x_kay_create_mka(struct ieee802_1x_kay *kay, const struct mka_key_name *ckn, const struct mka_key *cak, u32 life, enum mka_created_mode mode, Boolean is_authenticator) ieee802_1x_kay_create_mka() argument
[all...]
H A Dieee802_1x_kay.h249 const struct mka_key *cak,
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/pae/
H A Dieee802_1x_key.c92 const u8 *mac2, u8 *cak, size_t cak_bytes) in ieee802_1x_cak_aes_cmac()
98 context, sizeof(context) * 8, 8 * cak_bytes, cak); in ieee802_1x_cak_aes_cmac()
137 int ieee802_1x_kek_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn, in ieee802_1x_kek_aes_cmac() argument
146 return aes_kdf(cak, 8 * cak_bytes, "IEEE8021 KEK", in ieee802_1x_kek_aes_cmac()
158 int ieee802_1x_ick_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn, in ieee802_1x_ick_aes_cmac() argument
167 return aes_kdf(cak, 8 *cak_bytes, "IEEE8021 ICK", in ieee802_1x_ick_aes_cmac()
205 int ieee802_1x_sak_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ctx, in ieee802_1x_sak_aes_cmac() argument
208 return aes_kdf(cak, cak_bytes * 8, "IEEE8021 SAK", ctx, ctx_bytes * 8, in ieee802_1x_sak_aes_cmac()
91 ieee802_1x_cak_aes_cmac(const u8 *msk, size_t msk_bytes, const u8 *mac1, const u8 *mac2, u8 *cak, size_t cak_bytes) ieee802_1x_cak_aes_cmac() argument
H A Dieee802_1x_key.h13 const u8 *mac2, u8 *cak, size_t cak_bytes);
17 int ieee802_1x_kek_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn,
19 int ieee802_1x_ick_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn,
23 int ieee802_1x_sak_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ctx,
H A Dieee802_1x_kay_i.h70 const u8 *mac2, u8 *cak, size_t cak_bytes);
73 int (*kek_trfm)(const u8 *cak, size_t cak_bytes,
76 int (*ick_trfm)(const u8 *cak, size_t cak_bytes,
89 struct mka_key cak; member
379 * @cak: AES Key Wrap of CAK (see 9.8)
399 u8 cak[24]; member
H A Dieee802_1x_kay.c2185 if (ieee802_1x_sak_aes_cmac(participant->cak.key, in ieee802_1x_kay_generate_new_sak()
2186 participant->cak.len, in ieee802_1x_kay_generate_new_sak()
3625 const struct mka_key *cak, u32 life, in ieee802_1x_kay_create_mka()
3635 if (!kay || !ckn || !cak) { in ieee802_1x_kay_create_mka()
3636 wpa_printf(MSG_ERROR, "KaY: ckn or cak is null"); in ieee802_1x_kay_create_mka()
3640 if (cak->len != 16 && cak->len != 32) { in ieee802_1x_kay_create_mka()
3642 (unsigned int) cak->len); in ieee802_1x_kay_create_mka()
3664 participant->cak.len = cak in ieee802_1x_kay_create_mka()
3623 ieee802_1x_kay_create_mka(struct ieee802_1x_kay *kay, const struct mka_key_name *ckn, const struct mka_key *cak, u32 life, enum mka_created_mode mode, bool is_authenticator) ieee802_1x_kay_create_mka() argument
[all...]
H A Dieee802_1x_kay.h249 const struct mka_key *cak,

Completed in 16 milliseconds