/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/ |
H A D | wpa_ft.c | 152 * @kck_len: KCK length in octets 163 const u8 *kck, size_t kck_len, in wpa_ft_gen_req_ies() 381 if (wpa_ft_mic(kck, kck_len, sm->own_addr, target_ap, 5, in wpa_ft_gen_req_ies() 497 size_t kck_len; in wpa_ft_process_response() local 624 kck_len = sm->ptk.kck2_len; in wpa_ft_process_response() 627 kck_len = sm->ptk.kck_len; in wpa_ft_process_response() 631 kck, kck_len, bssid, in wpa_ft_process_response() 849 size_t kck_len; in wpa_ft_validate_reassoc_resp() local 974 kck_len in wpa_ft_validate_reassoc_resp() 161 wpa_ft_gen_req_ies(struct wpa_sm *sm, size_t *len, const u8 *anonce, const u8 *pmk_name, const u8 *kck, size_t kck_len, const u8 *target_ap, const u8 *ric_ies, size_t ric_ies_len, const u8 *ap_mdie) wpa_ft_gen_req_ies() argument [all...] |
H A D | pmksa_cache.h | 70 const u8 *pmkid, const u8 *kck, size_t kck_len, 136 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add() 135 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp, const u8 *cache_id) pmksa_cache_add() argument
|
H A D | pmksa_cache.c | 117 * @kck_len: KCK length in bytes 132 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add() 153 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_add() 155 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_add() 131 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp, const u8 *cache_id) pmksa_cache_add() argument
|
H A D | wpa.h | 81 const u8 *kck, size_t kck_len,
|
H A D | wpa_i.h | 305 sm->ptk.kck, sm->ptk.kck_len, in wpa_sm_set_rekey_offload()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/ |
H A D | wpa_common.c | 392 ptk->kck_len = wpa_kck_len(akmp, pmk_len); in wpa_pmk_to_ptk() 401 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len; in wpa_pmk_to_ptk() 458 os_memcpy(ptk->kck, tmp, ptk->kck_len); in wpa_pmk_to_ptk() 459 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len); in wpa_pmk_to_ptk() 461 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); in wpa_pmk_to_ptk() 464 os_memcpy(ptk->tk, tmp + ptk->kck_len + ptk->kek_len, ptk->tk_len); in wpa_pmk_to_ptk() 591 ptk->kck_len = 0; in fils_pmk_to_ptk() 754 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, in wpa_ft_mic() argument 767 if (kck_len == 16) { in wpa_ft_mic() 770 } else if (kck_len in wpa_ft_mic() 1882 rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, u8 *pmkid) rsn_pmkid_suite_b() argument 1915 rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, u8 *pmkid) rsn_pmkid_suite_b_192() argument [all...] |
H A D | wpa_common.h | 216 size_t kck_len; member 370 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, 416 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, 419 static inline int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, in rsn_pmkid_suite_b() argument 426 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, 429 static inline int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, in rsn_pmkid_suite_b_192() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | pmksa_cache_auth.h | 53 const u8 *kck, size_t kck_len, 58 const u8 *kck, size_t kck_len, const u8 *aa,
|
H A D | pmksa_cache_auth.c | 265 * @kck_len: KCK length in bytes 281 const u8 *kck, size_t kck_len, in pmksa_cache_auth_add() 287 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len, in pmksa_cache_auth_add() 304 * @kck_len: KCK length in bytes 316 const u8 *kck, size_t kck_len, const u8 *aa, in pmksa_cache_auth_create_entry() 337 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_auth_create_entry() 339 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_auth_create_entry() 279 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) pmksa_cache_auth_add() argument 315 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) pmksa_cache_auth_create_entry() argument
|
H A D | wpa_auth_ft.c | 2522 size_t kck_len; in wpa_sm_write_assoc_resp_ies() local 2768 kck_len = sm->PTK.kck2_len; in wpa_sm_write_assoc_resp_ies() 2771 kck_len = sm->PTK.kck_len; in wpa_sm_write_assoc_resp_ies() 2774 wpa_ft_mic(kck, kck_len, sm->addr, sm->wpa_auth->addr, 6, in wpa_sm_write_assoc_resp_ies() 3319 size_t kck_len; in wpa_ft_validate_reassoc() local 3468 kck_len = sm->PTK.kck2_len; in wpa_ft_validate_reassoc() 3471 kck_len = sm->PTK.kck_len; in wpa_ft_validate_reassoc() 3473 if (wpa_ft_mic(kck, kck_len, s in wpa_ft_validate_reassoc() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | pmksa_cache_auth.h | 53 const u8 *kck, size_t kck_len, 58 const u8 *kck, size_t kck_len, const u8 *aa,
|
H A D | pmksa_cache_auth.c | 265 * @kck_len: KCK length in bytes 281 const u8 *kck, size_t kck_len, in pmksa_cache_auth_add() 287 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len, in pmksa_cache_auth_add() 304 * @kck_len: KCK length in bytes 316 const u8 *kck, size_t kck_len, const u8 *aa, in pmksa_cache_auth_create_entry() 337 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_auth_create_entry() 339 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_auth_create_entry() 279 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) pmksa_cache_auth_add() argument 315 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) pmksa_cache_auth_create_entry() argument
|
H A D | wpa_auth_ft.c | 2429 size_t kck_len; in wpa_sm_write_assoc_resp_ies() local 2589 kck_len = sm->PTK.kck2_len; in wpa_sm_write_assoc_resp_ies() 2592 kck_len = sm->PTK.kck_len; in wpa_sm_write_assoc_resp_ies() 2595 wpa_ft_mic(kck, kck_len, sm->addr, sm->wpa_auth->addr, 6, in wpa_sm_write_assoc_resp_ies() 3122 size_t kck_len; in wpa_ft_validate_reassoc() local 3265 kck_len = sm->PTK.kck2_len; in wpa_ft_validate_reassoc() 3268 kck_len = sm->PTK.kck_len; in wpa_ft_validate_reassoc() 3270 if (wpa_ft_mic(kck, kck_len, s in wpa_ft_validate_reassoc() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/ |
H A D | wpa_ft.c | 179 * @kck_len: KCK length in octets 191 const u8 *kck, size_t kck_len, in wpa_ft_gen_req_ies() 433 if (wpa_ft_mic(kck, kck_len, sm->own_addr, target_ap, 5, in wpa_ft_gen_req_ies() 557 size_t kck_len, kdk_len; 698 kck_len = sm->ptk.kck2_len; 701 kck_len = sm->ptk.kck_len; 705 kck, kck_len, bssid, 1004 size_t kck_len; 1134 kck_len 189 wpa_ft_gen_req_ies(struct wpa_sm *sm, size_t *len, const u8 *anonce, const u8 *pmk_name, const u8 *kck, size_t kck_len, const u8 *target_ap, const u8 *ric_ies, size_t ric_ies_len, const u8 *ap_mdie, int omit_rsnxe) wpa_ft_gen_req_ies() argument [all...] |
H A D | pmksa_cache.h | 74 const u8 *pmkid, const u8 *kck, size_t kck_len, 143 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add() 142 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp, const u8 *cache_id) pmksa_cache_add() argument
|
H A D | pmksa_cache.c | 159 * @kck_len: KCK length in bytes 174 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add() 195 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_add() 197 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_add() 173 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp, const u8 *cache_id) pmksa_cache_add() argument
|
H A D | wpa_i.h | 370 sm->ptk.kck, sm->ptk.kck_len, in wpa_sm_set_rekey_offload()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | wpa_common.c | 443 ptk->kck_len = wpa_kck_len(akmp, pmk_len); in wpa_pmk_to_ptk() 453 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len + ptk->kdk_len; in wpa_pmk_to_ptk() 558 os_memcpy(ptk->kck, tmp, ptk->kck_len); in wpa_pmk_to_ptk() 559 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len); in wpa_pmk_to_ptk() 561 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); in wpa_pmk_to_ptk() 564 os_memcpy(ptk->tk, tmp + ptk->kck_len + ptk->kek_len, ptk->tk_len); in wpa_pmk_to_ptk() 568 os_memcpy(ptk->kdk, tmp + ptk->kck_len + ptk->kek_len + in wpa_pmk_to_ptk() 701 ptk->kck_len = 0; in fils_pmk_to_ptk() 885 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, in wpa_ft_mic() argument 900 if (kck_len in wpa_ft_mic() 2305 rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, u8 *pmkid) rsn_pmkid_suite_b() argument 2338 rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, u8 *pmkid) rsn_pmkid_suite_b_192() argument [all...] |
H A D | wpa_common.h | 254 size_t kck_len; member 464 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, 513 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, 516 static inline int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, in rsn_pmkid_suite_b() argument 523 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, 526 static inline int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, in rsn_pmkid_suite_b_192() argument
|
H A D | sae.h | 43 size_t kck_len; member
|
H A D | sae.c | 1633 sae->tmp->kck_len = hash_len; in sae_derive_keys() 1648 sae->tmp->kck, sae->tmp->kck_len); in sae_derive_keys() 2290 return hkdf_extract(sae->tmp->kck_len, sae->tmp->kck, sae->tmp->kck_len, in sae_cn_confirm() 2349 hash_len = sae->tmp->kck_len; in sae_write_confirm() 2393 hash_len = sae->tmp->kck_len; in sae_check_confirm()
|
H A D | common_module_tests.c | 663 if (ptk.kck_len != sizeof(kck) || in pasn_test_pasn_auth() 742 if (ptk.kck_len != sizeof(kck) || in pasn_test_no_pasn_auth()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | driver_i.h | 593 const u8 *kck, size_t kck_len, in wpa_drv_set_rekey_info() 599 kck, kck_len, replay_ctr); in wpa_drv_set_rekey_info() 591 wpa_drv_set_rekey_info(struct wpa_supplicant *wpa_s, const u8 *kek, size_t kek_len, const u8 *kck, size_t kck_len, const u8 *replay_ctr) wpa_drv_set_rekey_info() argument
|
H A D | wpas_glue.c | 1147 const u8 *kck, size_t kck_len, in wpa_supplicant_set_rekey_offload() 1152 wpa_drv_set_rekey_info(wpa_s, kek, kek_len, kck, kck_len, replay_ctr); in wpa_supplicant_set_rekey_offload() 1145 wpa_supplicant_set_rekey_offload(void *ctx, const u8 *kek, size_t kek_len, const u8 *kck, size_t kck_len, const u8 *replay_ctr) wpa_supplicant_set_rekey_offload() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | driver_i.h | 662 const u8 *kck, size_t kck_len, in wpa_drv_set_rekey_info() 668 kck, kck_len, replay_ctr); in wpa_drv_set_rekey_info() 660 wpa_drv_set_rekey_info(struct wpa_supplicant *wpa_s, const u8 *kek, size_t kek_len, const u8 *kck, size_t kck_len, const u8 *replay_ctr) wpa_drv_set_rekey_info() argument
|