/external/wpa_supplicant/ |
H A D | aes_wrap.h | 25 int aes_wrap(const u8 *kek, int n, const u8 *plain, u8 *cipher); 26 int aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain);
|
H A D | aes_wrap.c | 37 * @kek: 16-octet Key encryption key (KEK) 44 int aes_wrap(const u8 *kek, int n, const u8 *plain, u8 *cipher) argument 57 ctx = aes_encrypt_init(kek, 16); 96 * @kek: Key encryption key (KEK) 103 int aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain) argument 114 ctx = aes_decrypt_init(kek, 16);
|
H A D | wpa_i.h | 30 u8 kek[16]; /* EAPOL-Key Key Encryption Key (KEK) */ member in struct:wpa_ptk
|
H A D | wpa.c | 3042 os_memcpy(ek + 16, sm->ptk.kek, 16); 3064 if (aes_unwrap(sm->ptk.kek, maxkeylen / 8, 3290 os_memcpy(ek + 16, sm->ptk.kek, 16); 3306 if (aes_unwrap(sm->ptk.kek, keydatalen / 8,
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | aes_wrap.h | 25 int __must_check aes_wrap(const u8 *kek, int n, const u8 *plain, u8 *cipher); 26 int __must_check aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain);
|
H A D | aes_wrap.c | 32 * @kek: 16-octet Key encryption key (KEK) 39 int aes_wrap(const u8 *kek, int n, const u8 *plain, u8 *cipher) argument 52 ctx = aes_encrypt_init(kek, 16); 93 * @kek: Key encryption key (KEK) 100 int aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain) argument 111 ctx = aes_decrypt_init(kek, 16);
|
/external/openssl/crypto/aes/ |
H A D | aes_wrap.c | 143 int AES_wrap_unwrap_test(const unsigned char *kek, int keybits, argument 155 if (AES_set_encrypt_key(kek, keybits, &wctx)) 164 if (AES_set_decrypt_key(kek, keybits, &wctx)) 188 static const unsigned char kek[] = { local 244 ret = AES_wrap_unwrap_test(kek, 128, NULL, e1, key, 16); 246 ret = AES_wrap_unwrap_test(kek, 192, NULL, e2, key, 16); 248 ret = AES_wrap_unwrap_test(kek, 256, NULL, e3, key, 16); 250 ret = AES_wrap_unwrap_test(kek, 192, NULL, e4, key, 24); 252 ret = AES_wrap_unwrap_test(kek, 256, NULL, e5, key, 24); 254 ret = AES_wrap_unwrap_test(kek, 25 [all...] |
/external/wpa_supplicant/tests/ |
H A D | test_aes.c | 231 u8 kek[] = { local 249 if (aes_wrap(kek, 2, plain, result)) { 257 if (aes_unwrap(kek, 2, crypt, result)) {
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
H A D | test_aes.c | 233 u8 kek[] = { local 251 if (aes_wrap(kek, 2, plain, result)) { 259 if (aes_unwrap(kek, 2, crypt, result)) {
|
/external/wpa_supplicant_6/wpa_supplicant/src/common/ |
H A D | wpa_common.h | 169 u8 kek[16]; /* EAPOL-Key Key Encryption Key (KEK) */ member in struct:wpa_ptk
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
H A D | wpa_ft.c | 616 if (aes_unwrap(sm->ptk.kek, gtk_len / 8, gtk_elem + 10, gtk)) { 707 if (aes_unwrap(sm->ptk.kek, WPA_IGTK_LEN / 8, igtk_elem + 9, igtk)) {
|
H A D | wpa.c | 1123 os_memcpy(ek + 16, sm->ptk.kek, 16); 1145 if (aes_unwrap(sm->ptk.kek, maxkeylen / 8, 1321 os_memcpy(ek + 16, sm->ptk.kek, 16); 1338 if (aes_unwrap(sm->ptk.kek, keydatalen / 8,
|