/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | dpp_backup.c | 269 u8 kek[DPP_MAX_HASH_LEN]; in dpp_build_pw_recipient_info() local 288 kek, hash_len)) { in dpp_build_pw_recipient_info() 293 kek, hash_len); in dpp_build_pw_recipient_info() 297 aes_siv_encrypt(kek, hash_len, wpabuf_head(cont_enc_key), in dpp_build_pw_recipient_info() 342 forced_memzero(kek, sizeof(kek)); in dpp_build_pw_recipient_info() 1137 u8 kek[DPP_MAX_HASH_LEN]; in dpp_conf_resp_env_data() local 1160 kek, data.pbkdf2_key_len)) { in dpp_conf_resp_env_data() 1165 kek, data.pbkdf2_key_len); in dpp_conf_resp_env_data() 1172 res = aes_siv_decrypt(kek, dat in dpp_conf_resp_env_data() [all...] |
H A D | common_module_tests.c | 716 const u8 kek[] = { in pasn_test_no_pasn_auth() local 748 if (ptk.kek_len != sizeof(kek) || in pasn_test_no_pasn_auth() 749 os_memcmp(kek, ptk.kek, sizeof(kek)) != 0) { in pasn_test_no_pasn_auth()
|
H A D | sae.h | 69 u8 kek[SAE_MAX_HASH_LEN]; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/ |
H A D | wpa_ft.c | 769 const u8 *kek; 773 kek = sm->ptk.kek2; 776 kek = sm->ptk.kek; 795 if (aes_unwrap(kek, kek_len, gtk_len / 8, gtk_elem + 11, gtk)) { 856 const u8 *kek; 860 kek = sm->ptk.kek2; 863 kek = sm->ptk.kek; 893 if (aes_unwrap(kek, kek_le [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | aes-unwrap.c | 18 * @kek: Key encryption key (KEK) 26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument 39 ctx = aes_decrypt_init(kek, kek_len); in aes_unwrap()
|
H A D | aes-wrap.c | 18 * @kek: Key encryption key (KEK) 26 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument 40 ctx = aes_encrypt_init(kek, kek_len); in aes_wrap()
|
H A D | aes_wrap.h | 21 int __must_check aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, 23 int __must_check aes_unwrap(const u8 *kek, size_t kek_len, int n,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | aes-unwrap.c | 18 * @kek: Key encryption key (KEK) 26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument 39 ctx = aes_decrypt_init(kek, kek_len); in aes_unwrap()
|
H A D | aes-wrap.c | 18 * @kek: Key encryption key (KEK) 26 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument 40 ctx = aes_encrypt_init(kek, kek_len); in aes_wrap()
|
H A D | aes_wrap.h | 21 int __must_check aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, 23 int __must_check aes_unwrap(const u8 *kek, size_t kek_len, int n,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/ |
H A D | wpa_ft.c | 694 const u8 *kek; in wpa_ft_process_gtk_subelem() local 698 kek = sm->ptk.kek2; in wpa_ft_process_gtk_subelem() 701 kek = sm->ptk.kek; in wpa_ft_process_gtk_subelem() 720 if (aes_unwrap(kek, kek_len, gtk_len / 8, gtk_elem + 11, gtk)) { in wpa_ft_process_gtk_subelem() 777 const u8 *kek; in wpa_ft_process_igtk_subelem() local 781 kek = sm->ptk.kek2; in wpa_ft_process_igtk_subelem() 784 kek = sm->ptk.kek; in wpa_ft_process_igtk_subelem() 814 if (aes_unwrap(kek, kek_le in wpa_ft_process_igtk_subelem() [all...] |
H A D | wpa.h | 80 void (*set_rekey_offload)(void *ctx, const u8 *kek, size_t kek_len, 455 struct wpabuf * fils_build_assoc_req(struct wpa_sm *sm, const u8 **kek,
|
/third_party/libwebsockets/lib/tls/mbedtls/ |
H A D | lws-genaes.c | 178 lws_genaes_rfc3394_wrap(int wrap, int cek_bits, const uint8_t *kek, in lws_genaes_rfc3394_wrap() argument 214 n = mbedtls_aes_setkey_enc(&ctx, kek, (unsigned int)kek_bits); in lws_genaes_rfc3394_wrap() 231 n = mbedtls_aes_setkey_dec(&ctx, kek, (unsigned int)kek_bits); in lws_genaes_rfc3394_wrap()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/pae/ |
H A D | ieee802_1x_key.c | 138 size_t ckn_bytes, u8 *kek, size_t kek_bytes) in ieee802_1x_kek_aes_cmac() 148 8 * kek_bytes, kek); in ieee802_1x_kek_aes_cmac() 137 ieee802_1x_kek_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn, size_t ckn_bytes, u8 *kek, size_t kek_bytes) ieee802_1x_kek_aes_cmac() argument
|
H A D | ieee802_1x_key.h | 18 size_t ckn_bytes, u8 *kek, size_t kek_bytes);
|
H A D | ieee802_1x_kay_i.h | 75 u8 *kek, size_t kek_bytes); 108 struct mka_key kek; member
|
H A D | ieee802_1x_kay.c | 1611 if (aes_wrap(participant->kek.key, participant->kek.len, in ieee802_1x_mka_encode_dist_sak_body() 1752 if (aes_unwrap(participant->kek.key, participant->kek.len, in ieee802_1x_mka_decode_dist_sak_body() 3701 participant->kek.len = participant->cak.len; in ieee802_1x_kay_create_mka() 3706 participant->kek.key, in ieee802_1x_kay_create_mka() 3707 participant->kek.len)) { in ieee802_1x_kay_create_mka() 3712 participant->kek.key, participant->kek.len); in ieee802_1x_kay_create_mka() 3812 os_memset(&participant->kek, in ieee802_1x_kay_delete_mka() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/pae/ |
H A D | ieee802_1x_key.c | 138 size_t ckn_bytes, u8 *kek, size_t kek_bytes) in ieee802_1x_kek_aes_cmac() 148 8 * kek_bytes, kek); in ieee802_1x_kek_aes_cmac() 137 ieee802_1x_kek_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn, size_t ckn_bytes, u8 *kek, size_t kek_bytes) ieee802_1x_kek_aes_cmac() argument
|
H A D | ieee802_1x_kay_i.h | 75 u8 *kek, size_t kek_bytes); 108 struct mka_key kek; member
|
H A D | ieee802_1x_key.h | 18 size_t ckn_bytes, u8 *kek, size_t kek_bytes);
|
H A D | ieee802_1x_kay.c | 1648 if (aes_wrap(participant->kek.key, participant->kek.len, in ieee802_1x_mka_encode_dist_sak_body() 1789 if (aes_unwrap(participant->kek.key, participant->kek.len, in ieee802_1x_mka_decode_dist_sak_body() 3738 participant->kek.len = participant->cak.len; in ieee802_1x_kay_create_mka() 3743 participant->kek.key, in ieee802_1x_kay_create_mka() 3744 participant->kek.len)) { in ieee802_1x_kay_create_mka() 3749 participant->kek.key, participant->kek.len); in ieee802_1x_kay_create_mka() 3849 os_memset(&participant->kek, in ieee802_1x_kay_delete_mka() [all...] |
/third_party/node/deps/openssl/openssl/crypto/cms/ |
H A D | cms_kari.c | 215 unsigned char kek[EVP_MAX_KEY_LENGTH]; in cms_kek_cipher() local 225 if (EVP_PKEY_derive(kari->pctx, kek, &keklen) <= 0) in cms_kek_cipher() 228 if (!EVP_CipherInit_ex(kari->ctx, NULL, NULL, kek, NULL, enc)) in cms_kek_cipher() 243 OPENSSL_cleanse(kek, keklen); in cms_kek_cipher()
|
/third_party/openssl/crypto/cms/ |
H A D | cms_kari.c | 215 unsigned char kek[EVP_MAX_KEY_LENGTH]; in cms_kek_cipher() local 225 if (EVP_PKEY_derive(kari->pctx, kek, &keklen) <= 0) in cms_kek_cipher() 228 if (!EVP_CipherInit_ex(kari->ctx, NULL, NULL, kek, NULL, enc)) in cms_kek_cipher() 243 OPENSSL_cleanse(kek, keklen); in cms_kek_cipher()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | wpa_auth_ft.c | 2173 const u8 *kek; in wpa_ft_gtk_subelem() local 2177 kek = sm->PTK.kek2; in wpa_ft_gtk_subelem() 2180 kek = sm->PTK.kek; in wpa_ft_gtk_subelem() 2239 if (aes_wrap(kek, kek_len, key_len / 8, key, subelem + 13)) { in wpa_ft_gtk_subelem() 2259 const u8 *kek, *igtk; in wpa_ft_igtk_subelem() local 2265 kek = sm->PTK.kek2; in wpa_ft_igtk_subelem() 2268 kek = sm->PTK.kek; in wpa_ft_igtk_subelem() 2301 if (aes_wrap(kek, kek_le in wpa_ft_igtk_subelem() 2319 const u8 *kek, *bigtk; wpa_ft_bigtk_subelem() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/ |
H A D | wpa_common.c | 461 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); in wpa_pmk_to_ptk() 462 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); in wpa_pmk_to_ptk() 638 os_memcpy(ptk->kek, tmp + *ick_len, ptk->kek_len); in fils_pmk_to_ptk() 639 wpa_hexdump_key(MSG_DEBUG, "FILS: KEK", ptk->kek, ptk->kek_len); in fils_pmk_to_ptk() 1789 os_memcpy(ptk->kek, tmp + offset, ptk->kek_len); in wpa_pmk_r1_to_ptk() 1798 wpa_hexdump_key(MSG_DEBUG, "FT: KEK", ptk->kek, ptk->kek_len); in wpa_pmk_r1_to_ptk()
|