/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | wpas_kay.c | 327 struct mka_key *cak; in ieee802_1x_notify_create_actor() local 341 cak = os_zalloc(sizeof(*cak)); in ieee802_1x_notify_create_actor() 342 if (!msk || !sid || !ckn || !cak) in ieee802_1x_notify_create_actor() 359 cak->len = DEFAULT_KEY_LEN; in ieee802_1x_notify_create_actor() 361 peer_addr, cak->key, cak->len)) { in ieee802_1x_notify_create_actor() 366 wpa_hexdump_key(MSG_DEBUG, "Derived CAK", cak->key, cak->len); in ieee802_1x_notify_create_actor() 378 res = ieee802_1x_kay_create_mka(wpa_s->kay, ckn, cak, in ieee802_1x_notify_create_actor() 400 struct mka_key *cak; ieee802_1x_create_preshared_mka() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | wpas_kay.c | 327 struct mka_key *cak; in ieee802_1x_notify_create_actor() local 341 cak = os_zalloc(sizeof(*cak)); in ieee802_1x_notify_create_actor() 342 if (!msk || !sid || !ckn || !cak) in ieee802_1x_notify_create_actor() 359 cak->len = DEFAULT_KEY_LEN; in ieee802_1x_notify_create_actor() 361 peer_addr, cak->key, cak->len)) { in ieee802_1x_notify_create_actor() 366 wpa_hexdump_key(MSG_DEBUG, "Derived CAK", cak->key, cak->len); in ieee802_1x_notify_create_actor() 378 res = ieee802_1x_kay_create_mka(wpa_s->kay, ckn, cak, in ieee802_1x_notify_create_actor() 400 struct mka_key *cak; ieee802_1x_create_preshared_mka() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | wpa_auth_kay.c | 415 struct mka_key *cak; in ieee802_1x_notify_create_actor_hapd() local 429 cak = os_zalloc(sizeof(*cak)); in ieee802_1x_notify_create_actor_hapd() 430 if (!msk || !sid || !ckn || !cak) in ieee802_1x_notify_create_actor_hapd() 450 cak->len = DEFAULT_KEY_LEN; in ieee802_1x_notify_create_actor_hapd() 452 sta->addr, cak->key, cak->len)) { in ieee802_1x_notify_create_actor_hapd() 456 wpa_hexdump_key(MSG_DEBUG, "Derived CAK", cak->key, cak->len); in ieee802_1x_notify_create_actor_hapd() 467 res = ieee802_1x_kay_create_mka(hapd->kay, ckn, cak, in ieee802_1x_notify_create_actor_hapd() 483 struct mka_key *cak; ieee802_1x_create_preshared_mka_hapd() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | wpa_auth_kay.c | 415 struct mka_key *cak; in ieee802_1x_notify_create_actor_hapd() local 429 cak = os_zalloc(sizeof(*cak)); in ieee802_1x_notify_create_actor_hapd() 430 if (!msk || !sid || !ckn || !cak) in ieee802_1x_notify_create_actor_hapd() 450 cak->len = DEFAULT_KEY_LEN; in ieee802_1x_notify_create_actor_hapd() 452 sta->addr, cak->key, cak->len)) { in ieee802_1x_notify_create_actor_hapd() 456 wpa_hexdump_key(MSG_DEBUG, "Derived CAK", cak->key, cak->len); in ieee802_1x_notify_create_actor_hapd() 467 res = ieee802_1x_kay_create_mka(hapd->kay, ckn, cak, in ieee802_1x_notify_create_actor_hapd() 483 struct mka_key *cak; ieee802_1x_create_preshared_mka_hapd() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/pae/ |
H A D | ieee802_1x_key.c | 92 const u8 *mac2, u8 *cak, size_t cak_bytes) in ieee802_1x_cak_aes_cmac() 98 context, sizeof(context) * 8, 8 * cak_bytes, cak); in ieee802_1x_cak_aes_cmac() 137 int ieee802_1x_kek_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn, in ieee802_1x_kek_aes_cmac() argument 146 return aes_kdf(cak, 8 * cak_bytes, "IEEE8021 KEK", in ieee802_1x_kek_aes_cmac() 158 int ieee802_1x_ick_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn, in ieee802_1x_ick_aes_cmac() argument 167 return aes_kdf(cak, 8 *cak_bytes, "IEEE8021 ICK", in ieee802_1x_ick_aes_cmac() 205 int ieee802_1x_sak_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ctx, in ieee802_1x_sak_aes_cmac() argument 208 return aes_kdf(cak, cak_bytes * 8, "IEEE8021 SAK", ctx, ctx_bytes * 8, in ieee802_1x_sak_aes_cmac() 91 ieee802_1x_cak_aes_cmac(const u8 *msk, size_t msk_bytes, const u8 *mac1, const u8 *mac2, u8 *cak, size_t cak_bytes) ieee802_1x_cak_aes_cmac() argument
|
H A D | ieee802_1x_key.h | 13 const u8 *mac2, u8 *cak, size_t cak_bytes); 17 int ieee802_1x_kek_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn, 19 int ieee802_1x_ick_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn, 23 int ieee802_1x_sak_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ctx,
|
H A D | ieee802_1x_kay_i.h | 70 const u8 *mac2, u8 *cak, size_t cak_bytes); 73 int (*kek_trfm)(const u8 *cak, size_t cak_bytes, 76 int (*ick_trfm)(const u8 *cak, size_t cak_bytes, 89 struct mka_key cak; member 379 * @cak: AES Key Wrap of CAK (see 9.8) 399 u8 cak[24]; member
|
H A D | ieee802_1x_kay.c | 2148 if (ieee802_1x_sak_aes_cmac(participant->cak.key, in ieee802_1x_kay_generate_new_sak() 2149 participant->cak.len, in ieee802_1x_kay_generate_new_sak() 3588 const struct mka_key *cak, u32 life, in ieee802_1x_kay_create_mka() 3598 if (!kay || !ckn || !cak) { in ieee802_1x_kay_create_mka() 3599 wpa_printf(MSG_ERROR, "KaY: ckn or cak is null"); in ieee802_1x_kay_create_mka() 3603 if (cak->len != 16 && cak->len != 32) { in ieee802_1x_kay_create_mka() 3605 (unsigned int) cak->len); in ieee802_1x_kay_create_mka() 3627 participant->cak.len = cak in ieee802_1x_kay_create_mka() 3586 ieee802_1x_kay_create_mka(struct ieee802_1x_kay *kay, const struct mka_key_name *ckn, const struct mka_key *cak, u32 life, enum mka_created_mode mode, Boolean is_authenticator) ieee802_1x_kay_create_mka() argument [all...] |
H A D | ieee802_1x_kay.h | 249 const struct mka_key *cak,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/pae/ |
H A D | ieee802_1x_key.c | 92 const u8 *mac2, u8 *cak, size_t cak_bytes) in ieee802_1x_cak_aes_cmac() 98 context, sizeof(context) * 8, 8 * cak_bytes, cak); in ieee802_1x_cak_aes_cmac() 137 int ieee802_1x_kek_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn, in ieee802_1x_kek_aes_cmac() argument 146 return aes_kdf(cak, 8 * cak_bytes, "IEEE8021 KEK", in ieee802_1x_kek_aes_cmac() 158 int ieee802_1x_ick_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn, in ieee802_1x_ick_aes_cmac() argument 167 return aes_kdf(cak, 8 *cak_bytes, "IEEE8021 ICK", in ieee802_1x_ick_aes_cmac() 205 int ieee802_1x_sak_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ctx, in ieee802_1x_sak_aes_cmac() argument 208 return aes_kdf(cak, cak_bytes * 8, "IEEE8021 SAK", ctx, ctx_bytes * 8, in ieee802_1x_sak_aes_cmac() 91 ieee802_1x_cak_aes_cmac(const u8 *msk, size_t msk_bytes, const u8 *mac1, const u8 *mac2, u8 *cak, size_t cak_bytes) ieee802_1x_cak_aes_cmac() argument
|
H A D | ieee802_1x_key.h | 13 const u8 *mac2, u8 *cak, size_t cak_bytes); 17 int ieee802_1x_kek_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn, 19 int ieee802_1x_ick_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn, 23 int ieee802_1x_sak_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ctx,
|
H A D | ieee802_1x_kay_i.h | 70 const u8 *mac2, u8 *cak, size_t cak_bytes); 73 int (*kek_trfm)(const u8 *cak, size_t cak_bytes, 76 int (*ick_trfm)(const u8 *cak, size_t cak_bytes, 89 struct mka_key cak; member 379 * @cak: AES Key Wrap of CAK (see 9.8) 399 u8 cak[24]; member
|
H A D | ieee802_1x_kay.c | 2185 if (ieee802_1x_sak_aes_cmac(participant->cak.key, in ieee802_1x_kay_generate_new_sak() 2186 participant->cak.len, in ieee802_1x_kay_generate_new_sak() 3625 const struct mka_key *cak, u32 life, in ieee802_1x_kay_create_mka() 3635 if (!kay || !ckn || !cak) { in ieee802_1x_kay_create_mka() 3636 wpa_printf(MSG_ERROR, "KaY: ckn or cak is null"); in ieee802_1x_kay_create_mka() 3640 if (cak->len != 16 && cak->len != 32) { in ieee802_1x_kay_create_mka() 3642 (unsigned int) cak->len); in ieee802_1x_kay_create_mka() 3664 participant->cak.len = cak in ieee802_1x_kay_create_mka() 3623 ieee802_1x_kay_create_mka(struct ieee802_1x_kay *kay, const struct mka_key_name *ckn, const struct mka_key *cak, u32 life, enum mka_created_mode mode, bool is_authenticator) ieee802_1x_kay_create_mka() argument [all...] |
H A D | ieee802_1x_kay.h | 249 const struct mka_key *cak,
|