/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa_ft.c | 136 * @kck: 128-bit KCK for MIC or %NULL if no MIC is used 147 const u8 *kck, const u8 *target_ap, 264 if (kck) { 284 if (kck) { 299 if (wpa_ft_mic(kck, sm->own_addr, target_ap, 5, 487 sm->pmk_r1_name, sm->ptk.kck, bssid, 755 if (wpa_ft_mic(sm->ptk.kck, sm->own_addr, src_addr, 6, 145 wpa_ft_gen_req_ies(struct wpa_sm *sm, size_t *len, const u8 *anonce, const u8 *pmk_name, const u8 *kck, const u8 *target_ap, const u8 *ric_ies, size_t ric_ies_len, const u8 *ap_mdie) argument
|
H A D | tdls.c | 102 u8 kck[16]; /* TPK-KCK */ member in struct:wpa_tdls_peer::tpk 400 peer->tpk.kck, sizeof(peer->tpk.kck)); 409 * @kck: TPK-KCK 418 static int wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid, argument 460 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16); 461 ret = omac1_aes_128(kck, buf, pos - buf, mic); 470 * @kck: TPK-KCK 480 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, argument 519 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 1 [all...] |
H A D | wpa.c | 29 * @kck: Key Confirmation Key (KCK, part of PTK) 37 void wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, argument 59 wpa_eapol_key_mic(kck, ver, msg, msg_len, key_mic)) { 65 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", kck, 16); 131 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL, 348 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL, 1032 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL, 1305 wpa_eapol_key_send(sm, sm->ptk.kck, ver, sm->bssid, ETH_P_EAPOL, 1381 wpa_eapol_key_mic(sm->tptk.kck, ver, buf, len, 1397 wpa_eapol_key_mic(sm->ptk.kck, ve [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | wpa_ft.c | 136 * @kck: 128-bit KCK for MIC or %NULL if no MIC is used 147 const u8 *kck, const u8 *target_ap, 264 if (kck) { 284 if (kck) { 299 if (wpa_ft_mic(kck, sm->own_addr, target_ap, 5, 487 sm->pmk_r1_name, sm->ptk.kck, bssid, 755 if (wpa_ft_mic(sm->ptk.kck, sm->own_addr, src_addr, 6, 145 wpa_ft_gen_req_ies(struct wpa_sm *sm, size_t *len, const u8 *anonce, const u8 *pmk_name, const u8 *kck, const u8 *target_ap, const u8 *ric_ies, size_t ric_ies_len, const u8 *ap_mdie) argument
|
H A D | tdls.c | 102 u8 kck[16]; /* TPK-KCK */ member in struct:wpa_tdls_peer::tpk 400 peer->tpk.kck, sizeof(peer->tpk.kck)); 409 * @kck: TPK-KCK 418 static int wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid, argument 460 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16); 461 ret = omac1_aes_128(kck, buf, pos - buf, mic); 470 * @kck: TPK-KCK 480 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, argument 519 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 1 [all...] |
H A D | wpa.c | 29 * @kck: Key Confirmation Key (KCK, part of PTK) 37 void wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, argument 59 wpa_eapol_key_mic(kck, ver, msg, msg_len, key_mic)) { 65 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", kck, 16); 131 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL, 348 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL, 1032 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL, 1305 wpa_eapol_key_send(sm, sm->ptk.kck, ver, sm->bssid, ETH_P_EAPOL, 1381 wpa_eapol_key_mic(sm->tptk.kck, ver, buf, len, 1397 wpa_eapol_key_mic(sm->ptk.kck, ve [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | wpa_ft.c | 136 * @kck: 128-bit KCK for MIC or %NULL if no MIC is used 147 const u8 *kck, const u8 *target_ap, 264 if (kck) { 284 if (kck) { 299 if (wpa_ft_mic(kck, sm->own_addr, target_ap, 5, 487 sm->pmk_r1_name, sm->ptk.kck, bssid, 755 if (wpa_ft_mic(sm->ptk.kck, sm->own_addr, src_addr, 6, 145 wpa_ft_gen_req_ies(struct wpa_sm *sm, size_t *len, const u8 *anonce, const u8 *pmk_name, const u8 *kck, const u8 *target_ap, const u8 *ric_ies, size_t ric_ies_len, const u8 *ap_mdie) argument
|
H A D | tdls.c | 102 u8 kck[16]; /* TPK-KCK */ member in struct:wpa_tdls_peer::tpk 400 peer->tpk.kck, sizeof(peer->tpk.kck)); 409 * @kck: TPK-KCK 418 static int wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid, argument 460 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16); 461 ret = omac1_aes_128(kck, buf, pos - buf, mic); 470 * @kck: TPK-KCK 480 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, argument 519 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 1 [all...] |
H A D | wpa.c | 29 * @kck: Key Confirmation Key (KCK, part of PTK) 37 void wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, argument 59 wpa_eapol_key_mic(kck, ver, msg, msg_len, key_mic)) { 65 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", kck, 16); 131 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL, 348 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL, 1032 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL, 1305 wpa_eapol_key_send(sm, sm->ptk.kck, ver, sm->bssid, ETH_P_EAPOL, 1381 wpa_eapol_key_mic(sm->tptk.kck, ver, buf, len, 1397 wpa_eapol_key_mic(sm->ptk.kck, ve [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/common/ |
H A D | wpa_common.c | 135 int wpa_ft_mic(const u8 *kck, const u8 *sta_addr, const u8 *ap_addr, argument 180 if (omac1_aes_128(kck, buf, pos - buf, mic)) {
|
H A D | wpa_common.h | 168 u8 kck[16]; /* EAPOL-Key Key Confirmation Key (KCK) */ member in struct:wpa_ptk 300 int wpa_ft_mic(const u8 *kck, const u8 *sta_addr, const u8 *ap_addr,
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
H A D | wpa_ft.c | 113 * @kck: 128-bit KCK for MIC or %NULL if no MIC is used 121 const u8 *kck, const u8 *target_ap) 244 if (kck) { 257 if (wpa_ft_mic(kck, sm->own_addr, target_ap, 5, 557 sm->pmk_r1_name, sm->ptk.kck, bssid); 813 if (wpa_ft_mic(sm->ptk.kck, sm->own_addr, src_addr, 6, 119 wpa_ft_gen_req_ies(struct wpa_sm *sm, size_t *len, const u8 *anonce, const u8 *pmk_name, const u8 *kck, const u8 *target_ap) argument
|
H A D | wpa.c | 95 * @kck: Key Confirmation Key (KCK, part of PTK) 103 void wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, argument 123 wpa_eapol_key_mic(kck, ver, msg, msg_len, key_mic); 186 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL, 351 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL, 935 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL, 1198 wpa_eapol_key_send(sm, sm->ptk.kck, ver, sm->bssid, ETH_P_EAPOL, 1272 wpa_eapol_key_mic(sm->tptk.kck, ver, buf, len, 1287 wpa_eapol_key_mic(sm->ptk.kck, ver, buf, len,
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | wpa_common.c | 133 int wpa_ft_mic(const u8 *kck, const u8 *sta_addr, const u8 *ap_addr, argument 178 if (omac1_aes_128(kck, buf, pos - buf, mic)) {
|
H A D | wpa_common.h | 174 u8 kck[16]; /* EAPOL-Key Key Confirmation Key (KCK) */ member in struct:wpa_ptk 312 int wpa_ft_mic(const u8 *kck, const u8 *sta_addr, const u8 *ap_addr,
|
/external/wpa_supplicant_8/src/common/ |
H A D | wpa_common.c | 133 int wpa_ft_mic(const u8 *kck, const u8 *sta_addr, const u8 *ap_addr, argument 178 if (omac1_aes_128(kck, buf, pos - buf, mic)) {
|
H A D | wpa_common.h | 174 u8 kck[16]; /* EAPOL-Key Key Confirmation Key (KCK) */ member in struct:wpa_ptk 312 int wpa_ft_mic(const u8 *kck, const u8 *sta_addr, const u8 *ap_addr,
|
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | wpa_common.c | 133 int wpa_ft_mic(const u8 *kck, const u8 *sta_addr, const u8 *ap_addr, argument 178 if (omac1_aes_128(kck, buf, pos - buf, mic)) {
|
H A D | wpa_common.h | 174 u8 kck[16]; /* EAPOL-Key Key Confirmation Key (KCK) */ member in struct:wpa_ptk 312 int wpa_ft_mic(const u8 *kck, const u8 *sta_addr, const u8 *ap_addr,
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wpas_glue.c | 818 const u8 *kck, 823 wpa_drv_set_rekey_info(wpa_s, kek, kck, replay_ctr); 817 wpa_supplicant_set_rekey_offload(void *ctx, const u8 *kek, const u8 *kck, const u8 *replay_ctr) argument
|
H A D | driver_i.h | 678 const u8 *kek, const u8 *kck, 683 wpa_s->driver->set_rekey_info(wpa_s->drv_priv, kek, kck, replay_ctr); 677 wpa_drv_set_rekey_info(struct wpa_supplicant *wpa_s, const u8 *kek, const u8 *kck, const u8 *replay_ctr) argument
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_nl80211.c | 8814 static void nl80211_set_rekey_info(void *priv, const u8 *kek, const u8 *kck, argument 8835 NLA_PUT(msg, NL80211_REKEY_DATA_KCK, NL80211_KCK_LEN, kck);
|
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_nl80211.c | 8814 static void nl80211_set_rekey_info(void *priv, const u8 *kek, const u8 *kck, argument 8835 NLA_PUT(msg, NL80211_REKEY_DATA_KCK, NL80211_KCK_LEN, kck);
|
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_nl80211.c | 8814 static void nl80211_set_rekey_info(void *priv, const u8 *kek, const u8 *kck, argument 8835 NLA_PUT(msg, NL80211_REKEY_DATA_KCK, NL80211_KCK_LEN, kck);
|