Home
last modified time | relevance | path

Searched refs:kck (Results 1 - 25 of 42) sorted by relevance

12

/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/
H A Dwpa_ft.c151 * @kck: 128-bit KCK for MIC or %NULL if no MIC is used
163 const u8 *kck, size_t kck_len, in wpa_ft_gen_req_ies()
327 if (kck) { in wpa_ft_gen_req_ies()
340 if (kck && wpa_sm_ocv_enabled(sm)) { in wpa_ft_gen_req_ies()
367 if (kck) { in wpa_ft_gen_req_ies()
381 if (wpa_ft_mic(kck, kck_len, sm->own_addr, target_ap, 5, in wpa_ft_gen_req_ies()
496 const u8 *kck; in wpa_ft_process_response() local
623 kck = sm->ptk.kck2; in wpa_ft_process_response()
626 kck = sm->ptk.kck; in wpa_ft_process_response()
161 wpa_ft_gen_req_ies(struct wpa_sm *sm, size_t *len, const u8 *anonce, const u8 *pmk_name, const u8 *kck, size_t kck_len, const u8 *target_ap, const u8 *ric_ies, size_t ric_ies_len, const u8 *ap_mdie) wpa_ft_gen_req_ies() argument
848 const u8 *kck; wpa_ft_validate_reassoc_resp() local
[all...]
H A Dpmksa_cache.h70 const u8 *pmkid, const u8 *kck, size_t kck_len,
136 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add()
135 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp, const u8 *cache_id) pmksa_cache_add() argument
H A Dpmksa_cache.c116 * @kck: Key confirmation key or %NULL if not yet derived
132 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add()
142 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_add()
153 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_add()
155 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_add()
131 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp, const u8 *cache_id) pmksa_cache_add() argument
H A Dtdls.c112 u8 kck[16]; /* TPK-KCK */ member
453 peer->tpk.kck, sizeof(peer->tpk.kck)); in wpa_tdls_generate_tpk()
462 * @kck: TPK-KCK
471 static int wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid, in wpa_tdls_ftie_mic() argument
513 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16); in wpa_tdls_ftie_mic()
514 ret = omac1_aes_128(kck, buf, pos - buf, mic); in wpa_tdls_ftie_mic()
523 * @kck: TPK-KCK
533 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, in wpa_tdls_key_mic_teardown() argument
572 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 1 in wpa_tdls_key_mic_teardown()
[all...]
H A Dwpa.h81 const u8 *kck, size_t kck_len,
H A Dwpa_i.h305 sm->ptk.kck, sm->ptk.kck_len, in wpa_sm_set_rekey_offload()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/
H A Dwpa_ft.c178 * @kck: 128-bit KCK for MIC or %NULL if no MIC is used
191 const u8 *kck, size_t kck_len, in wpa_ft_gen_req_ies()
357 if (kck) { in wpa_ft_gen_req_ies()
370 if (kck && wpa_sm_ocv_enabled(sm)) { in wpa_ft_gen_req_ies()
416 if (kck) { in wpa_ft_gen_req_ies()
433 if (wpa_ft_mic(kck, kck_len, sm->own_addr, target_ap, 5, in wpa_ft_gen_req_ies()
556 const u8 *kck;
697 kck = sm->ptk.kck2;
700 kck = sm->ptk.kck;
189 wpa_ft_gen_req_ies(struct wpa_sm *sm, size_t *len, const u8 *anonce, const u8 *pmk_name, const u8 *kck, size_t kck_len, const u8 *target_ap, const u8 *ric_ies, size_t ric_ies_len, const u8 *ap_mdie, int omit_rsnxe) wpa_ft_gen_req_ies() argument
[all...]
H A Dpmksa_cache.h74 const u8 *pmkid, const u8 *kck, size_t kck_len,
143 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add()
142 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp, const u8 *cache_id) pmksa_cache_add() argument
H A Dtdls.c112 u8 kck[16]; /* TPK-KCK */ member
465 peer->tpk.kck, sizeof(peer->tpk.kck));
474 * @kck: TPK-KCK
483 static int wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid,
525 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16);
526 ret = omac1_aes_128(kck, buf, pos - buf, mic);
535 * @kck: TPK-KCK
545 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode,
584 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 1
[all...]
H A Dpmksa_cache.c158 * @kck: Key confirmation key or %NULL if not yet derived
174 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add()
184 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_add()
195 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_add()
197 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_add()
173 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp, const u8 *cache_id) pmksa_cache_add() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/
H A Dwpa_common.h211 u8 kck[WPA_KCK_MAX_LEN]; /* EAPOL-Key Key Confirmation Key (KCK) */ member
370 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr,
416 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa,
419 static inline int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, in rsn_pmkid_suite_b() argument
426 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa,
429 static inline int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, in rsn_pmkid_suite_b_192() argument
H A Dwpa_common.c458 os_memcpy(ptk->kck, tmp, ptk->kck_len); in wpa_pmk_to_ptk()
459 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len); in wpa_pmk_to_ptk()
754 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, in wpa_ft_mic() argument
835 if (hmac_sha384_vector(kck, kck_len, num_elem, addr, len, hash)) in wpa_ft_mic()
841 omac1_aes_128_vector(kck, num_elem, addr, len, mic)) in wpa_ft_mic()
1787 os_memcpy(ptk->kck, tmp, ptk->kck_len); in wpa_pmk_r1_to_ptk()
1797 wpa_hexdump_key(MSG_DEBUG, "FT: KCK", ptk->kck, ptk->kck_len); in wpa_pmk_r1_to_ptk()
1872 * @kck: Key confirmation key
1873 * @kck_len: Length of kck in bytes
1882 int rsn_pmkid_suite_b(const u8 *kck, size_ argument
1915 rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, u8 *pmkid) rsn_pmkid_suite_b_192() argument
[all...]
H A Dcommon_module_tests.c309 const u8 kck[] = { in sae_tests() local
384 if (os_memcmp(kck, sae.tmp->kck, SAE_KCK_LEN) != 0) { in sae_tests()
H A Dsae.h25 u8 kck[SAE_KCK_LEN]; member
H A Dsae.c745 os_memcpy(sae->tmp->kck, keys, SAE_KCK_LEN); in sae_derive_keys()
749 wpa_hexdump_key(MSG_DEBUG, "SAE: KCK", sae->tmp->kck, SAE_KCK_LEN); in sae_derive_keys()
1212 hmac_sha256_vector(sae->tmp->kck, sizeof(sae->tmp->kck), 5, addr, len, in sae_cn_confirm()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/
H A Dcommon_module_tests.c307 const u8 kck[] = { in sae_tests() local
439 if (os_memcmp(kck, sae.tmp->kck, SAE_KCK_LEN) != 0) { in sae_tests()
635 const u8 kck[] = { in pasn_test_pasn_auth() local
663 if (ptk.kck_len != sizeof(kck) || in pasn_test_pasn_auth()
664 os_memcmp(kck, ptk.kck, sizeof(kck)) != 0) { in pasn_test_pasn_auth()
712 const u8 kck[] = { in pasn_test_no_pasn_auth() local
742 if (ptk.kck_len != sizeof(kck) || in pasn_test_no_pasn_auth()
[all...]
H A Dwpa_common.h248 u8 kck[WPA_KCK_MAX_LEN]; /* EAPOL-Key Key Confirmation Key (KCK) */ member
464 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr,
513 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa,
516 static inline int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, in rsn_pmkid_suite_b() argument
523 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa,
526 static inline int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, in rsn_pmkid_suite_b_192() argument
717 int pasn_mic(const u8 *kck, int akmp, int cipher,
H A Dwpa_common.c558 os_memcpy(ptk->kck, tmp, ptk->kck_len); in wpa_pmk_to_ptk()
559 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len); in wpa_pmk_to_ptk()
885 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, in wpa_ft_mic() argument
974 if (hmac_sha384_vector(kck, kck_len, num_elem, addr, len, hash)) in wpa_ft_mic()
980 omac1_aes_128_vector(kck, num_elem, addr, len, mic)) in wpa_ft_mic()
1353 os_memcpy(ptk->kck, tmp, WPA_PASN_KCK_LEN); in pasn_pmk_to_ptk()
1354 wpa_hexdump_key(MSG_DEBUG, "PASN: KCK:", ptk->kck, WPA_PASN_KCK_LEN); in pasn_pmk_to_ptk()
1388 * @kck: The key confirmation key for the PASN PTKSA
1406 int pasn_mic(const u8 *kck, int akmp, int cipher, in pasn_mic() argument
1416 if (!kck) { in pasn_mic()
2305 rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, u8 *pmkid) rsn_pmkid_suite_b() argument
2338 rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, u8 *pmkid) rsn_pmkid_suite_b_192() argument
[all...]
H A Dsae.h42 u8 kck[SAE_MAX_HASH_LEN]; member
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
H A Dpmksa_cache_auth.h53 const u8 *kck, size_t kck_len,
58 const u8 *kck, size_t kck_len, const u8 *aa,
H A Dpmksa_cache_auth.c264 * @kck: Key confirmation key or %NULL if not yet derived
281 const u8 *kck, size_t kck_len, in pmksa_cache_auth_add()
287 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len, in pmksa_cache_auth_add()
303 * @kck: Key confirmation key or %NULL if not yet derived
316 const u8 *kck, size_t kck_len, const u8 *aa, in pmksa_cache_auth_create_entry()
326 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_auth_create_entry()
337 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_auth_create_entry()
339 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_auth_create_entry()
279 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) pmksa_cache_auth_add() argument
315 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) pmksa_cache_auth_create_entry() argument
H A Dwpa_auth_ft.c2521 const u8 *kck; in wpa_sm_write_assoc_resp_ies() local
2767 kck = sm->PTK.kck2; in wpa_sm_write_assoc_resp_ies()
2770 kck = sm->PTK.kck; in wpa_sm_write_assoc_resp_ies()
2774 wpa_ft_mic(kck, kck_len, sm->addr, sm->wpa_auth->addr, 6, in wpa_sm_write_assoc_resp_ies()
3318 const u8 *kck; in wpa_ft_validate_reassoc() local
3467 kck = sm->PTK.kck2; in wpa_ft_validate_reassoc()
3470 kck = sm->PTK.kck; in wpa_ft_validate_reassoc()
3473 if (wpa_ft_mic(kck, kck_le in wpa_ft_validate_reassoc()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
H A Dpmksa_cache_auth.h53 const u8 *kck, size_t kck_len,
58 const u8 *kck, size_t kck_len, const u8 *aa,
H A Dpmksa_cache_auth.c264 * @kck: Key confirmation key or %NULL if not yet derived
281 const u8 *kck, size_t kck_len, in pmksa_cache_auth_add()
287 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len, in pmksa_cache_auth_add()
303 * @kck: Key confirmation key or %NULL if not yet derived
316 const u8 *kck, size_t kck_len, const u8 *aa, in pmksa_cache_auth_create_entry()
326 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_auth_create_entry()
337 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_auth_create_entry()
339 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_auth_create_entry()
279 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) pmksa_cache_auth_add() argument
315 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) pmksa_cache_auth_create_entry() argument
H A Dwpa_auth_ft.c2428 const u8 *kck; in wpa_sm_write_assoc_resp_ies() local
2588 kck = sm->PTK.kck2; in wpa_sm_write_assoc_resp_ies()
2591 kck = sm->PTK.kck; in wpa_sm_write_assoc_resp_ies()
2595 wpa_ft_mic(kck, kck_len, sm->addr, sm->wpa_auth->addr, 6, in wpa_sm_write_assoc_resp_ies()
3121 const u8 *kck; in wpa_ft_validate_reassoc() local
3264 kck = sm->PTK.kck2; in wpa_ft_validate_reassoc()
3267 kck = sm->PTK.kck; in wpa_ft_validate_reassoc()
3270 if (wpa_ft_mic(kck, kck_le in wpa_ft_validate_reassoc()
[all...]

Completed in 37 milliseconds

12