Searched refs:kck (Results 1 - 25 of 44) sorted by relevance

12

/external/wpa_supplicant_8/hostapd/src/common/
H A Dsae.h22 u8 kck[SAE_KCK_LEN]; member in struct:sae_temporary_data
H A Dwpa_common.h184 u8 kck[16]; /* EAPOL-Key Key Confirmation Key (KCK) */ member in struct:wpa_ptk
322 int wpa_ft_mic(const u8 *kck, const u8 *sta_addr, const u8 *ap_addr,
H A Dsae.c622 os_memcpy(sae->tmp->kck, keys, SAE_KCK_LEN);
624 wpa_hexdump_key(MSG_DEBUG, "SAE: KCK", sae->tmp->kck, SAE_KCK_LEN);
939 hmac_sha256_vector(sae->tmp->kck, sizeof(sae->tmp->kck), 5, addr, len,
/external/wpa_supplicant_8/src/common/
H A Dsae.h22 u8 kck[SAE_KCK_LEN]; member in struct:sae_temporary_data
H A Dwpa_common.h184 u8 kck[16]; /* EAPOL-Key Key Confirmation Key (KCK) */ member in struct:wpa_ptk
322 int wpa_ft_mic(const u8 *kck, const u8 *sta_addr, const u8 *ap_addr,
H A Dsae.c622 os_memcpy(sae->tmp->kck, keys, SAE_KCK_LEN);
624 wpa_hexdump_key(MSG_DEBUG, "SAE: KCK", sae->tmp->kck, SAE_KCK_LEN);
939 hmac_sha256_vector(sae->tmp->kck, sizeof(sae->tmp->kck), 5, addr, len,
/external/wpa_supplicant_8/wpa_supplicant/src/common/
H A Dsae.h22 u8 kck[SAE_KCK_LEN]; member in struct:sae_temporary_data
H A Dwpa_common.h184 u8 kck[16]; /* EAPOL-Key Key Confirmation Key (KCK) */ member in struct:wpa_ptk
322 int wpa_ft_mic(const u8 *kck, const u8 *sta_addr, const u8 *ap_addr,
H A Dsae.c622 os_memcpy(sae->tmp->kck, keys, SAE_KCK_LEN);
624 wpa_hexdump_key(MSG_DEBUG, "SAE: KCK", sae->tmp->kck, SAE_KCK_LEN);
939 hmac_sha256_vector(sae->tmp->kck, sizeof(sae->tmp->kck), 5, addr, len,
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dwpa_i.h249 sm->ptk.kck, sm->rx_replay_counter);
301 void wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck,
H A Dwpa_ft.c136 * @kck: 128-bit KCK for MIC or %NULL if no MIC is used
147 const u8 *kck, const u8 *target_ap,
264 if (kck) {
284 if (kck) {
299 if (wpa_ft_mic(kck, sm->own_addr, target_ap, 5,
487 sm->pmk_r1_name, sm->ptk.kck, bssid,
769 if (wpa_ft_mic(sm->ptk.kck, sm->own_addr, src_addr, 6,
145 wpa_ft_gen_req_ies(struct wpa_sm *sm, size_t *len, const u8 *anonce, const u8 *pmk_name, const u8 *kck, const u8 *target_ap, const u8 *ric_ies, size_t ric_ies_len, const u8 *ap_mdie) argument
H A Dtdls.c107 u8 kck[16]; /* TPK-KCK */ member in struct:wpa_tdls_peer::tpk
414 peer->tpk.kck, sizeof(peer->tpk.kck));
423 * @kck: TPK-KCK
432 static int wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid, argument
474 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16);
475 ret = omac1_aes_128(kck, buf, pos - buf, mic);
484 * @kck: TPK-KCK
494 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, argument
533 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 1
[all...]
H A Dpeerkey.c115 wpa_eapol_key_send(sm, sm->ptk.kck, ver, dst, ETH_P_EAPOL,
167 wpa_eapol_key_send(sm, sm->ptk.kck, ver, src_addr, ETH_P_EAPOL,
429 wpa_eapol_key_send(sm, peerkey->stk.kck, ver, peerkey->addr,
942 wpa_eapol_key_mic(peerkey->tstk.kck, ver, buf, len,
958 wpa_eapol_key_mic(peerkey->stk.kck, ver, buf, len,
1099 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL,
H A Dwpa.c29 * @kck: Key Confirmation Key (KCK, part of PTK)
37 void wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, argument
59 wpa_eapol_key_mic(kck, ver, msg, msg_len, key_mic)) {
65 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", kck, 16);
131 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL,
348 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL,
1026 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL,
1299 wpa_eapol_key_send(sm, sm->ptk.kck, ver, sm->bssid, ETH_P_EAPOL,
1375 wpa_eapol_key_mic(sm->tptk.kck, ver, buf, len,
1391 wpa_eapol_key_mic(sm->ptk.kck, ve
[all...]
/external/wpa_supplicant_8/src/rsn_supp/
H A Dwpa_i.h249 sm->ptk.kck, sm->rx_replay_counter);
301 void wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck,
H A Dwpa_ft.c136 * @kck: 128-bit KCK for MIC or %NULL if no MIC is used
147 const u8 *kck, const u8 *target_ap,
264 if (kck) {
284 if (kck) {
299 if (wpa_ft_mic(kck, sm->own_addr, target_ap, 5,
487 sm->pmk_r1_name, sm->ptk.kck, bssid,
769 if (wpa_ft_mic(sm->ptk.kck, sm->own_addr, src_addr, 6,
145 wpa_ft_gen_req_ies(struct wpa_sm *sm, size_t *len, const u8 *anonce, const u8 *pmk_name, const u8 *kck, const u8 *target_ap, const u8 *ric_ies, size_t ric_ies_len, const u8 *ap_mdie) argument
H A Dtdls.c107 u8 kck[16]; /* TPK-KCK */ member in struct:wpa_tdls_peer::tpk
414 peer->tpk.kck, sizeof(peer->tpk.kck));
423 * @kck: TPK-KCK
432 static int wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid, argument
474 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16);
475 ret = omac1_aes_128(kck, buf, pos - buf, mic);
484 * @kck: TPK-KCK
494 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, argument
533 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 1
[all...]
H A Dpeerkey.c115 wpa_eapol_key_send(sm, sm->ptk.kck, ver, dst, ETH_P_EAPOL,
167 wpa_eapol_key_send(sm, sm->ptk.kck, ver, src_addr, ETH_P_EAPOL,
429 wpa_eapol_key_send(sm, peerkey->stk.kck, ver, peerkey->addr,
942 wpa_eapol_key_mic(peerkey->tstk.kck, ver, buf, len,
958 wpa_eapol_key_mic(peerkey->stk.kck, ver, buf, len,
1099 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL,
H A Dwpa.c29 * @kck: Key Confirmation Key (KCK, part of PTK)
37 void wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, argument
59 wpa_eapol_key_mic(kck, ver, msg, msg_len, key_mic)) {
65 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", kck, 16);
131 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL,
348 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL,
1026 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL,
1299 wpa_eapol_key_send(sm, sm->ptk.kck, ver, sm->bssid, ETH_P_EAPOL,
1375 wpa_eapol_key_mic(sm->tptk.kck, ver, buf, len,
1391 wpa_eapol_key_mic(sm->ptk.kck, ve
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dwpa_i.h249 sm->ptk.kck, sm->rx_replay_counter);
301 void wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck,
H A Dwpa_ft.c136 * @kck: 128-bit KCK for MIC or %NULL if no MIC is used
147 const u8 *kck, const u8 *target_ap,
264 if (kck) {
284 if (kck) {
299 if (wpa_ft_mic(kck, sm->own_addr, target_ap, 5,
487 sm->pmk_r1_name, sm->ptk.kck, bssid,
769 if (wpa_ft_mic(sm->ptk.kck, sm->own_addr, src_addr, 6,
145 wpa_ft_gen_req_ies(struct wpa_sm *sm, size_t *len, const u8 *anonce, const u8 *pmk_name, const u8 *kck, const u8 *target_ap, const u8 *ric_ies, size_t ric_ies_len, const u8 *ap_mdie) argument
H A Dtdls.c107 u8 kck[16]; /* TPK-KCK */ member in struct:wpa_tdls_peer::tpk
414 peer->tpk.kck, sizeof(peer->tpk.kck));
423 * @kck: TPK-KCK
432 static int wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid, argument
474 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16);
475 ret = omac1_aes_128(kck, buf, pos - buf, mic);
484 * @kck: TPK-KCK
494 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, argument
533 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 1
[all...]
H A Dpeerkey.c115 wpa_eapol_key_send(sm, sm->ptk.kck, ver, dst, ETH_P_EAPOL,
167 wpa_eapol_key_send(sm, sm->ptk.kck, ver, src_addr, ETH_P_EAPOL,
429 wpa_eapol_key_send(sm, peerkey->stk.kck, ver, peerkey->addr,
942 wpa_eapol_key_mic(peerkey->tstk.kck, ver, buf, len,
958 wpa_eapol_key_mic(peerkey->stk.kck, ver, buf, len,
1099 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL,
H A Dwpa.c29 * @kck: Key Confirmation Key (KCK, part of PTK)
37 void wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, argument
59 wpa_eapol_key_mic(kck, ver, msg, msg_len, key_mic)) {
65 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", kck, 16);
131 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL,
348 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL,
1026 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL,
1299 wpa_eapol_key_send(sm, sm->ptk.kck, ver, sm->bssid, ETH_P_EAPOL,
1375 wpa_eapol_key_mic(sm->tptk.kck, ver, buf, len,
1391 wpa_eapol_key_mic(sm->ptk.kck, ve
[all...]
/external/wpa_supplicant_8/wpa_supplicant/
H A Ddriver_i.h679 const u8 *kek, const u8 *kck,
684 wpa_s->driver->set_rekey_info(wpa_s->drv_priv, kek, kck, replay_ctr);
678 wpa_drv_set_rekey_info(struct wpa_supplicant *wpa_s, const u8 *kek, const u8 *kck, const u8 *replay_ctr) argument

Completed in 219 milliseconds

12