Searched refs:cak (Results 1 - 16 of 16) sorted by relevance

/external/wpa_supplicant_8/hostapd/src/pae/
H A Dieee802_1x_key.h13 const u8 *mac2, u8 *cak);
17 int ieee802_1x_kek_128bits_aes_cmac(const u8 *cak, const u8 *ckn,
19 int ieee802_1x_ick_128bits_aes_cmac(const u8 *cak, const u8 *ckn,
23 int ieee802_1x_sak_128bits_aes_cmac(const u8 *cak, const u8 *ctx,
H A Dieee802_1x_key.c83 const u8 *mac2, u8 *cak)
89 context, sizeof(context) * 8, 128, cak);
128 int ieee802_1x_kek_128bits_aes_cmac(const u8 *cak, const u8 *ckn, argument
137 return aes_kdf_128(cak, "IEEE8021 KEK", context, sizeof(context) * 8,
148 int ieee802_1x_ick_128bits_aes_cmac(const u8 *cak, const u8 *ckn, argument
157 return aes_kdf_128(cak, "IEEE8021 ICK", context, sizeof(context) * 8,
185 int ieee802_1x_sak_128bits_aes_cmac(const u8 *cak, const u8 *ctx, argument
188 return aes_kdf_128(cak, "IEEE8021 SAK", ctx, ctx_bytes * 8, 128, sak);
82 ieee802_1x_cak_128bits_aes_cmac(const u8 *msk, const u8 *mac1, const u8 *mac2, u8 *cak) argument
H A Dieee802_1x_kay_i.h165 int (*cak_trfm)(const u8 *msk, const u8 *mac1, const u8 *mac2, u8 *cak);
168 int (*kek_trfm)(const u8 *cak, const u8 *ckn, size_t ckn_len, u8 *kek);
169 int (*ick_trfm)(const u8 *cak, const u8 *ckn, size_t ckn_len, u8 *ick);
181 struct mka_key cak; member in struct:ieee802_1x_mka_participant
H A Dieee802_1x_kay.h164 struct mka_key_name *ckn, struct mka_key *cak,
H A Dieee802_1x_kay.c1884 /* distribute cak parameter set */
2014 ieee802_1x_sak_128bits_aes_cmac(participant->cak.key,
2017 ieee802_1x_sak_128bits_aes_cmac(participant->cak.key,
3247 struct mka_key *cak, u32 life,
3253 if (!kay || !ckn || !cak) {
3254 wpa_printf(MSG_ERROR, "KaY: ckn or cak is null");
3258 if (cak->len != mka_alg_tbl[kay->mka_algindex].cak_len) {
3279 participant->cak.len = cak->len;
3280 os_memcpy(participant->cak
3246 ieee802_1x_kay_create_mka(struct ieee802_1x_kay *kay, struct mka_key_name *ckn, struct mka_key *cak, u32 life, enum mka_created_mode mode, Boolean is_authenticator) argument
[all...]
/external/wpa_supplicant_8/src/pae/
H A Dieee802_1x_key.h13 const u8 *mac2, u8 *cak);
17 int ieee802_1x_kek_128bits_aes_cmac(const u8 *cak, const u8 *ckn,
19 int ieee802_1x_ick_128bits_aes_cmac(const u8 *cak, const u8 *ckn,
23 int ieee802_1x_sak_128bits_aes_cmac(const u8 *cak, const u8 *ctx,
H A Dieee802_1x_key.c83 const u8 *mac2, u8 *cak)
89 context, sizeof(context) * 8, 128, cak);
128 int ieee802_1x_kek_128bits_aes_cmac(const u8 *cak, const u8 *ckn, argument
137 return aes_kdf_128(cak, "IEEE8021 KEK", context, sizeof(context) * 8,
148 int ieee802_1x_ick_128bits_aes_cmac(const u8 *cak, const u8 *ckn, argument
157 return aes_kdf_128(cak, "IEEE8021 ICK", context, sizeof(context) * 8,
185 int ieee802_1x_sak_128bits_aes_cmac(const u8 *cak, const u8 *ctx, argument
188 return aes_kdf_128(cak, "IEEE8021 SAK", ctx, ctx_bytes * 8, 128, sak);
82 ieee802_1x_cak_128bits_aes_cmac(const u8 *msk, const u8 *mac1, const u8 *mac2, u8 *cak) argument
H A Dieee802_1x_kay_i.h165 int (*cak_trfm)(const u8 *msk, const u8 *mac1, const u8 *mac2, u8 *cak);
168 int (*kek_trfm)(const u8 *cak, const u8 *ckn, size_t ckn_len, u8 *kek);
169 int (*ick_trfm)(const u8 *cak, const u8 *ckn, size_t ckn_len, u8 *ick);
181 struct mka_key cak; member in struct:ieee802_1x_mka_participant
H A Dieee802_1x_kay.h164 struct mka_key_name *ckn, struct mka_key *cak,
H A Dieee802_1x_kay.c1884 /* distribute cak parameter set */
2014 ieee802_1x_sak_128bits_aes_cmac(participant->cak.key,
2017 ieee802_1x_sak_128bits_aes_cmac(participant->cak.key,
3247 struct mka_key *cak, u32 life,
3253 if (!kay || !ckn || !cak) {
3254 wpa_printf(MSG_ERROR, "KaY: ckn or cak is null");
3258 if (cak->len != mka_alg_tbl[kay->mka_algindex].cak_len) {
3279 participant->cak.len = cak->len;
3280 os_memcpy(participant->cak
3246 ieee802_1x_kay_create_mka(struct ieee802_1x_kay *kay, struct mka_key_name *ckn, struct mka_key *cak, u32 life, enum mka_created_mode mode, Boolean is_authenticator) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/pae/
H A Dieee802_1x_key.h13 const u8 *mac2, u8 *cak);
17 int ieee802_1x_kek_128bits_aes_cmac(const u8 *cak, const u8 *ckn,
19 int ieee802_1x_ick_128bits_aes_cmac(const u8 *cak, const u8 *ckn,
23 int ieee802_1x_sak_128bits_aes_cmac(const u8 *cak, const u8 *ctx,
H A Dieee802_1x_key.c83 const u8 *mac2, u8 *cak)
89 context, sizeof(context) * 8, 128, cak);
128 int ieee802_1x_kek_128bits_aes_cmac(const u8 *cak, const u8 *ckn, argument
137 return aes_kdf_128(cak, "IEEE8021 KEK", context, sizeof(context) * 8,
148 int ieee802_1x_ick_128bits_aes_cmac(const u8 *cak, const u8 *ckn, argument
157 return aes_kdf_128(cak, "IEEE8021 ICK", context, sizeof(context) * 8,
185 int ieee802_1x_sak_128bits_aes_cmac(const u8 *cak, const u8 *ctx, argument
188 return aes_kdf_128(cak, "IEEE8021 SAK", ctx, ctx_bytes * 8, 128, sak);
82 ieee802_1x_cak_128bits_aes_cmac(const u8 *msk, const u8 *mac1, const u8 *mac2, u8 *cak) argument
H A Dieee802_1x_kay_i.h165 int (*cak_trfm)(const u8 *msk, const u8 *mac1, const u8 *mac2, u8 *cak);
168 int (*kek_trfm)(const u8 *cak, const u8 *ckn, size_t ckn_len, u8 *kek);
169 int (*ick_trfm)(const u8 *cak, const u8 *ckn, size_t ckn_len, u8 *ick);
181 struct mka_key cak; member in struct:ieee802_1x_mka_participant
H A Dieee802_1x_kay.h164 struct mka_key_name *ckn, struct mka_key *cak,
H A Dieee802_1x_kay.c1884 /* distribute cak parameter set */
2014 ieee802_1x_sak_128bits_aes_cmac(participant->cak.key,
2017 ieee802_1x_sak_128bits_aes_cmac(participant->cak.key,
3247 struct mka_key *cak, u32 life,
3253 if (!kay || !ckn || !cak) {
3254 wpa_printf(MSG_ERROR, "KaY: ckn or cak is null");
3258 if (cak->len != mka_alg_tbl[kay->mka_algindex].cak_len) {
3279 participant->cak.len = cak->len;
3280 os_memcpy(participant->cak
3246 ieee802_1x_kay_create_mka(struct ieee802_1x_kay *kay, struct mka_key_name *ckn, struct mka_key *cak, u32 life, enum mka_created_mode mode, Boolean is_authenticator) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/
H A Dwpas_kay.c310 struct mka_key *cak; local
324 cak = os_zalloc(sizeof(*cak));
325 if (!msk || !sid || !ckn || !cak)
342 cak->len = DEFAULT_KEY_LEN;
344 peer_addr, cak->key)) {
349 wpa_hexdump_key(MSG_DEBUG, "Derived CAK", cak->key, cak->len);
362 res = ieee802_1x_kay_create_mka(wpa_s->kay, ckn, cak, 0,
372 if (cak) {
[all...]

Completed in 136 milliseconds