Home
last modified time | relevance | path

Searched refs:kek_len (Results 1 - 25 of 43) sorted by relevance

12

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/
H A Dwpa_ft.c770 size_t kek_len;
774 kek_len = sm->ptk.kek2_len;
777 kek_len = sm->ptk.kek_len;
795 if (aes_unwrap(kek, kek_len, gtk_len / 8, gtk_elem + 11, gtk)) {
857 size_t kek_len;
861 kek_len = sm->ptk.kek2_len;
864 kek_len = sm->ptk.kek_len;
893 if (aes_unwrap(kek, kek_len, igtk_le
[all...]
H A Dwpa.h89 void (*set_rekey_offload)(void *ctx, const u8 *kek, size_t kek_len,
590 size_t *kek_len, const u8 **snonce,
H A Dwpa.c157 if (!ptk || !ptk->kek_len) in wpa_eapol_key_send()
187 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); in wpa_eapol_key_send()
192 if (aes_siv_encrypt(ptk->kek, ptk->kek_len, in wpa_eapol_key_send()
2936 if (ver == WPA_KEY_INFO_TYPE_HMAC_MD5_RC4 && sm->ptk.kek_len == 16) {
2950 os_memcpy(ek + 16, sm->ptk.kek, sm->ptk.kek_len);
2975 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, maxkeylen / 8,
3340 if (ver == WPA_KEY_INFO_TYPE_HMAC_MD5_RC4 && sm->ptk.kek_len == 16) {
3350 os_memcpy(ek + 16, sm->ptk.kek, sm->ptk.kek_len);
3366 (unsigned int) sm->ptk.kek_len);
3383 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, *key_data_le
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Daes-unwrap.c19 * @kek_len: Length of KEK in octets
26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument
39 ctx = aes_decrypt_init(kek, kek_len); in aes_unwrap()
H A Daes-wrap.c19 * @kek_len: Length of KEK in octets
26 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument
40 ctx = aes_encrypt_init(kek, kek_len); in aes_wrap()
H A Daes_wrap.h21 int __must_check aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain,
23 int __must_check aes_unwrap(const u8 *kek, size_t kek_len, int n,
H A Dcrypto_linux.c784 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument
797 skcipher = linux_af_alg_skcipher("kw(aes)", kek, kek_len); in aes_unwrap()
H A Dcrypto_openssl.c431 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument
438 if (AES_set_encrypt_key(kek, kek_len << 3, &actx)) in aes_wrap()
446 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument
454 if (AES_set_decrypt_key(kek, kek_len << 3, &actx)) in aes_unwrap()
H A Dcrypto_wolfssl.c412 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument
419 ret = wc_AesKeyWrap(kek, kek_len, plain, n * 8, cipher, (n + 1) * 8, in aes_wrap()
425 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument
433 ret = wc_AesKeyUnWrap(kek, kek_len, cipher, (n + 1) * 8, plain, n * 8, in aes_unwrap()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Daes-unwrap.c19 * @kek_len: Length of KEK in octets
26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument
39 ctx = aes_decrypt_init(kek, kek_len); in aes_unwrap()
H A Daes-wrap.c19 * @kek_len: Length of KEK in octets
26 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument
40 ctx = aes_encrypt_init(kek, kek_len); in aes_wrap()
H A Daes_wrap.h21 int __must_check aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain,
23 int __must_check aes_unwrap(const u8 *kek, size_t kek_len, int n,
H A Dcrypto_linux.c784 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument
797 skcipher = linux_af_alg_skcipher("kw(aes)", kek, kek_len); in aes_unwrap()
H A Dcrypto_wolfssl.c412 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument
419 ret = wc_AesKeyWrap(kek, kek_len, plain, n * 8, cipher, (n + 1) * 8, in aes_wrap()
425 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument
433 ret = wc_AesKeyUnWrap(kek, kek_len, cipher, (n + 1) * 8, plain, n * 8, in aes_unwrap()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/
H A Dsae_pk.c629 if (tmp->kek_len != 32 && tmp->kek_len != 48 && tmp->kek_len != 64) { in sae_write_confirm_pk()
688 if (aes_siv_encrypt(tmp->kek, tmp->kek_len, in sae_write_confirm_pk()
789 if (tmp->kek_len != 32 && tmp->kek_len != 48 && tmp->kek_len != 64) { in sae_check_confirm_pk()
825 if (aes_siv_decrypt(tmp->kek, tmp->kek_len, in sae_check_confirm_pk()
H A Dwpa_common.c444 ptk->kek_len = wpa_kek_len(akmp, pmk_len); in wpa_pmk_to_ptk()
453 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len + ptk->kdk_len; in wpa_pmk_to_ptk()
561 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); in wpa_pmk_to_ptk()
562 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); in wpa_pmk_to_ptk()
564 os_memcpy(ptk->tk, tmp + ptk->kck_len + ptk->kek_len, ptk->tk_len); in wpa_pmk_to_ptk()
568 os_memcpy(ptk->kdk, tmp + ptk->kck_len + ptk->kek_len + in wpa_pmk_to_ptk()
702 ptk->kek_len = wpa_kek_len(akmp, pmk_len); in fils_pmk_to_ptk()
710 key_data_len = *ick_len + ptk->kek_len + ptk->tk_len; in fils_pmk_to_ptk()
762 os_memcpy(ptk->kek, tmp + offset, ptk->kek_len); in fils_pmk_to_ptk()
763 wpa_hexdump_key(MSG_DEBUG, "FILS: KEK", ptk->kek, ptk->kek_len); in fils_pmk_to_ptk()
[all...]
H A Dsae.h70 size_t kek_len; member
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/
H A Dwpa_ft.c695 size_t kek_len; in wpa_ft_process_gtk_subelem() local
699 kek_len = sm->ptk.kek2_len; in wpa_ft_process_gtk_subelem()
702 kek_len = sm->ptk.kek_len; in wpa_ft_process_gtk_subelem()
720 if (aes_unwrap(kek, kek_len, gtk_len / 8, gtk_elem + 11, gtk)) { in wpa_ft_process_gtk_subelem()
778 size_t kek_len; in wpa_ft_process_igtk_subelem() local
782 kek_len = sm->ptk.kek2_len; in wpa_ft_process_igtk_subelem()
785 kek_len = sm->ptk.kek_len; in wpa_ft_process_igtk_subelem()
814 if (aes_unwrap(kek, kek_len, igtk_le in wpa_ft_process_igtk_subelem()
[all...]
H A Dwpa.h80 void (*set_rekey_offload)(void *ctx, const u8 *kek, size_t kek_len,
456 size_t *kek_len, const u8 **snonce,
H A Dwpa.c107 if (!ptk || !ptk->kek_len) in wpa_eapol_key_send()
137 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); in wpa_eapol_key_send()
142 if (aes_siv_encrypt(ptk->kek, ptk->kek_len, in wpa_eapol_key_send()
1700 if (ver == WPA_KEY_INFO_TYPE_HMAC_MD5_RC4 && sm->ptk.kek_len == 16) { in wpa_supplicant_process_1_of_2_wpa()
1714 os_memcpy(ek + 16, sm->ptk.kek, sm->ptk.kek_len); in wpa_supplicant_process_1_of_2_wpa()
1739 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, maxkeylen / 8, in wpa_supplicant_process_1_of_2_wpa()
1992 if (ver == WPA_KEY_INFO_TYPE_HMAC_MD5_RC4 && sm->ptk.kek_len == 16) { in wpa_supplicant_decrypt_key_data()
2002 os_memcpy(ek + 16, sm->ptk.kek, sm->ptk.kek_len); in wpa_supplicant_decrypt_key_data()
2018 (unsigned int) sm->ptk.kek_len); in wpa_supplicant_decrypt_key_data()
2035 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, *key_data_le in wpa_supplicant_decrypt_key_data()
4079 fils_build_assoc_req(struct wpa_sm *sm, const u8 **kek, size_t *kek_len, const u8 **snonce, const u8 **anonce, const struct wpabuf **hlp, unsigned int num_hlp) fils_build_assoc_req() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/
H A Dwpa_common.c393 ptk->kek_len = wpa_kek_len(akmp, pmk_len); in wpa_pmk_to_ptk()
401 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len; in wpa_pmk_to_ptk()
461 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); in wpa_pmk_to_ptk()
462 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); in wpa_pmk_to_ptk()
464 os_memcpy(ptk->tk, tmp + ptk->kck_len + ptk->kek_len, ptk->tk_len); in wpa_pmk_to_ptk()
592 ptk->kek_len = wpa_kek_len(akmp, pmk_len); in fils_pmk_to_ptk()
600 key_data_len = *ick_len + ptk->kek_len + ptk->tk_len; in fils_pmk_to_ptk()
638 os_memcpy(ptk->kek, tmp + *ick_len, ptk->kek_len); in fils_pmk_to_ptk()
639 wpa_hexdump_key(MSG_DEBUG, "FILS: KEK", ptk->kek, ptk->kek_len); in fils_pmk_to_ptk()
641 os_memcpy(ptk->tk, tmp + *ick_len + ptk->kek_len, pt in fils_pmk_to_ptk()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
H A Dwpa_auth_ft.c2174 size_t kek_len; in wpa_ft_gtk_subelem() local
2178 kek_len = sm->PTK.kek2_len; in wpa_ft_gtk_subelem()
2181 kek_len = sm->PTK.kek_len; in wpa_ft_gtk_subelem()
2239 if (aes_wrap(kek, kek_len, key_len / 8, key, subelem + 13)) { in wpa_ft_gtk_subelem()
2241 "FT: GTK subelem encryption failed: kek_len=%d", in wpa_ft_gtk_subelem()
2242 (int) kek_len); in wpa_ft_gtk_subelem()
2260 size_t kek_len; in wpa_ft_igtk_subelem() local
2266 kek_len = sm->PTK.kek2_len; in wpa_ft_igtk_subelem()
2269 kek_len in wpa_ft_igtk_subelem()
2320 size_t kek_len; wpa_ft_bigtk_subelem() local
[all...]
H A Dwpa_auth.c1630 sm->PTK.kek, sm->PTK.kek_len); in __wpa_send_eapol()
1635 if (aes_siv_encrypt(sm->PTK.kek, sm->PTK.kek_len, kde, kde_len, in __wpa_send_eapol()
1664 sm->PTK.kek_len); in __wpa_send_eapol()
1665 if (aes_wrap(sm->PTK.kek, sm->PTK.kek_len, in __wpa_send_eapol()
1673 } else if (sm->PTK.kek_len == 16) { in __wpa_send_eapol()
1682 os_memcpy(ek + 16, sm->PTK.kek, sm->PTK.kek_len); in __wpa_send_eapol()
2483 if (aes_siv_decrypt(ptk->kek, ptk->kek_len, pos, key_data_len, in wpa_aead_decrypt()
2674 if (aes_siv_decrypt(sm->PTK.kek, sm->PTK.kek_len, crypt, end - crypt, in fils_decrypt_assoc()
2751 if (aes_siv_encrypt(sm->PTK.kek, sm->PTK.kek_len, in fils_encrypt_assoc()
5358 *fils_kek_len = sm->PTK.kek_len; in wpa_auth_get_fils_aead_params()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
H A Dwpa_auth_ft.c2174 size_t kek_len; in wpa_ft_gtk_subelem() local
2178 kek_len = sm->PTK.kek2_len; in wpa_ft_gtk_subelem()
2181 kek_len = sm->PTK.kek_len; in wpa_ft_gtk_subelem()
2221 if (aes_wrap(kek, kek_len, key_len / 8, key, subelem + 13)) { in wpa_ft_gtk_subelem()
2223 "FT: GTK subelem encryption failed: kek_len=%d", in wpa_ft_gtk_subelem()
2224 (int) kek_len); in wpa_ft_gtk_subelem()
2242 size_t kek_len; in wpa_ft_igtk_subelem() local
2247 kek_len = sm->PTK.kek2_len; in wpa_ft_igtk_subelem()
2250 kek_len in wpa_ft_igtk_subelem()
[all...]
H A Dwpa_auth.c1551 sm->PTK.kek, sm->PTK.kek_len); in __wpa_send_eapol()
1556 if (aes_siv_encrypt(sm->PTK.kek, sm->PTK.kek_len, kde, kde_len, in __wpa_send_eapol()
1585 (unsigned int) sm->PTK.kek_len); in __wpa_send_eapol()
1586 if (aes_wrap(sm->PTK.kek, sm->PTK.kek_len, in __wpa_send_eapol()
1594 } else if (sm->PTK.kek_len == 16) { in __wpa_send_eapol()
1603 os_memcpy(ek + 16, sm->PTK.kek, sm->PTK.kek_len); in __wpa_send_eapol()
2364 if (aes_siv_decrypt(ptk->kek, ptk->kek_len, pos, key_data_len, in wpa_aead_decrypt()
2555 if (aes_siv_decrypt(sm->PTK.kek, sm->PTK.kek_len, crypt, end - crypt, in fils_decrypt_assoc()
2632 if (aes_siv_encrypt(sm->PTK.kek, sm->PTK.kek_len, in fils_encrypt_assoc()
4928 *fils_kek_len = sm->PTK.kek_len; in wpa_auth_get_fils_aead_params()
[all...]

Completed in 53 milliseconds

12