/external/wpa_supplicant_8/hostapd/src/pae/ |
H A D | ieee802_1x_key.h | 13 const u8 *mac2, u8 *cak); 17 int ieee802_1x_kek_128bits_aes_cmac(const u8 *cak, const u8 *ckn, 19 int ieee802_1x_ick_128bits_aes_cmac(const u8 *cak, const u8 *ckn, 23 int ieee802_1x_sak_128bits_aes_cmac(const u8 *cak, const u8 *ctx,
|
H A D | ieee802_1x_key.c | 83 const u8 *mac2, u8 *cak) 89 context, sizeof(context) * 8, 128, cak); 128 int ieee802_1x_kek_128bits_aes_cmac(const u8 *cak, const u8 *ckn, argument 137 return aes_kdf_128(cak, "IEEE8021 KEK", context, sizeof(context) * 8, 148 int ieee802_1x_ick_128bits_aes_cmac(const u8 *cak, const u8 *ckn, argument 157 return aes_kdf_128(cak, "IEEE8021 ICK", context, sizeof(context) * 8, 185 int ieee802_1x_sak_128bits_aes_cmac(const u8 *cak, const u8 *ctx, argument 188 return aes_kdf_128(cak, "IEEE8021 SAK", ctx, ctx_bytes * 8, 128, sak); 82 ieee802_1x_cak_128bits_aes_cmac(const u8 *msk, const u8 *mac1, const u8 *mac2, u8 *cak) argument
|
H A D | ieee802_1x_kay_i.h | 165 int (*cak_trfm)(const u8 *msk, const u8 *mac1, const u8 *mac2, u8 *cak); 168 int (*kek_trfm)(const u8 *cak, const u8 *ckn, size_t ckn_len, u8 *kek); 169 int (*ick_trfm)(const u8 *cak, const u8 *ckn, size_t ckn_len, u8 *ick); 181 struct mka_key cak; member in struct:ieee802_1x_mka_participant
|
H A D | ieee802_1x_kay.h | 164 struct mka_key_name *ckn, struct mka_key *cak,
|
H A D | ieee802_1x_kay.c | 1884 /* distribute cak parameter set */ 2014 ieee802_1x_sak_128bits_aes_cmac(participant->cak.key, 2017 ieee802_1x_sak_128bits_aes_cmac(participant->cak.key, 3247 struct mka_key *cak, u32 life, 3253 if (!kay || !ckn || !cak) { 3254 wpa_printf(MSG_ERROR, "KaY: ckn or cak is null"); 3258 if (cak->len != mka_alg_tbl[kay->mka_algindex].cak_len) { 3279 participant->cak.len = cak->len; 3280 os_memcpy(participant->cak 3246 ieee802_1x_kay_create_mka(struct ieee802_1x_kay *kay, struct mka_key_name *ckn, struct mka_key *cak, u32 life, enum mka_created_mode mode, Boolean is_authenticator) argument [all...] |
/external/wpa_supplicant_8/src/pae/ |
H A D | ieee802_1x_key.h | 13 const u8 *mac2, u8 *cak); 17 int ieee802_1x_kek_128bits_aes_cmac(const u8 *cak, const u8 *ckn, 19 int ieee802_1x_ick_128bits_aes_cmac(const u8 *cak, const u8 *ckn, 23 int ieee802_1x_sak_128bits_aes_cmac(const u8 *cak, const u8 *ctx,
|
H A D | ieee802_1x_key.c | 83 const u8 *mac2, u8 *cak) 89 context, sizeof(context) * 8, 128, cak); 128 int ieee802_1x_kek_128bits_aes_cmac(const u8 *cak, const u8 *ckn, argument 137 return aes_kdf_128(cak, "IEEE8021 KEK", context, sizeof(context) * 8, 148 int ieee802_1x_ick_128bits_aes_cmac(const u8 *cak, const u8 *ckn, argument 157 return aes_kdf_128(cak, "IEEE8021 ICK", context, sizeof(context) * 8, 185 int ieee802_1x_sak_128bits_aes_cmac(const u8 *cak, const u8 *ctx, argument 188 return aes_kdf_128(cak, "IEEE8021 SAK", ctx, ctx_bytes * 8, 128, sak); 82 ieee802_1x_cak_128bits_aes_cmac(const u8 *msk, const u8 *mac1, const u8 *mac2, u8 *cak) argument
|
H A D | ieee802_1x_kay_i.h | 165 int (*cak_trfm)(const u8 *msk, const u8 *mac1, const u8 *mac2, u8 *cak); 168 int (*kek_trfm)(const u8 *cak, const u8 *ckn, size_t ckn_len, u8 *kek); 169 int (*ick_trfm)(const u8 *cak, const u8 *ckn, size_t ckn_len, u8 *ick); 181 struct mka_key cak; member in struct:ieee802_1x_mka_participant
|
H A D | ieee802_1x_kay.h | 164 struct mka_key_name *ckn, struct mka_key *cak,
|
H A D | ieee802_1x_kay.c | 1884 /* distribute cak parameter set */ 2014 ieee802_1x_sak_128bits_aes_cmac(participant->cak.key, 2017 ieee802_1x_sak_128bits_aes_cmac(participant->cak.key, 3247 struct mka_key *cak, u32 life, 3253 if (!kay || !ckn || !cak) { 3254 wpa_printf(MSG_ERROR, "KaY: ckn or cak is null"); 3258 if (cak->len != mka_alg_tbl[kay->mka_algindex].cak_len) { 3279 participant->cak.len = cak->len; 3280 os_memcpy(participant->cak 3246 ieee802_1x_kay_create_mka(struct ieee802_1x_kay *kay, struct mka_key_name *ckn, struct mka_key *cak, u32 life, enum mka_created_mode mode, Boolean is_authenticator) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/pae/ |
H A D | ieee802_1x_key.h | 13 const u8 *mac2, u8 *cak); 17 int ieee802_1x_kek_128bits_aes_cmac(const u8 *cak, const u8 *ckn, 19 int ieee802_1x_ick_128bits_aes_cmac(const u8 *cak, const u8 *ckn, 23 int ieee802_1x_sak_128bits_aes_cmac(const u8 *cak, const u8 *ctx,
|
H A D | ieee802_1x_key.c | 83 const u8 *mac2, u8 *cak) 89 context, sizeof(context) * 8, 128, cak); 128 int ieee802_1x_kek_128bits_aes_cmac(const u8 *cak, const u8 *ckn, argument 137 return aes_kdf_128(cak, "IEEE8021 KEK", context, sizeof(context) * 8, 148 int ieee802_1x_ick_128bits_aes_cmac(const u8 *cak, const u8 *ckn, argument 157 return aes_kdf_128(cak, "IEEE8021 ICK", context, sizeof(context) * 8, 185 int ieee802_1x_sak_128bits_aes_cmac(const u8 *cak, const u8 *ctx, argument 188 return aes_kdf_128(cak, "IEEE8021 SAK", ctx, ctx_bytes * 8, 128, sak); 82 ieee802_1x_cak_128bits_aes_cmac(const u8 *msk, const u8 *mac1, const u8 *mac2, u8 *cak) argument
|
H A D | ieee802_1x_kay_i.h | 165 int (*cak_trfm)(const u8 *msk, const u8 *mac1, const u8 *mac2, u8 *cak); 168 int (*kek_trfm)(const u8 *cak, const u8 *ckn, size_t ckn_len, u8 *kek); 169 int (*ick_trfm)(const u8 *cak, const u8 *ckn, size_t ckn_len, u8 *ick); 181 struct mka_key cak; member in struct:ieee802_1x_mka_participant
|
H A D | ieee802_1x_kay.h | 164 struct mka_key_name *ckn, struct mka_key *cak,
|
H A D | ieee802_1x_kay.c | 1884 /* distribute cak parameter set */ 2014 ieee802_1x_sak_128bits_aes_cmac(participant->cak.key, 2017 ieee802_1x_sak_128bits_aes_cmac(participant->cak.key, 3247 struct mka_key *cak, u32 life, 3253 if (!kay || !ckn || !cak) { 3254 wpa_printf(MSG_ERROR, "KaY: ckn or cak is null"); 3258 if (cak->len != mka_alg_tbl[kay->mka_algindex].cak_len) { 3279 participant->cak.len = cak->len; 3280 os_memcpy(participant->cak 3246 ieee802_1x_kay_create_mka(struct ieee802_1x_kay *kay, struct mka_key_name *ckn, struct mka_key *cak, u32 life, enum mka_created_mode mode, Boolean is_authenticator) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wpas_kay.c | 310 struct mka_key *cak; local 324 cak = os_zalloc(sizeof(*cak)); 325 if (!msk || !sid || !ckn || !cak) 342 cak->len = DEFAULT_KEY_LEN; 344 peer_addr, cak->key)) { 349 wpa_hexdump_key(MSG_DEBUG, "Derived CAK", cak->key, cak->len); 362 res = ieee802_1x_kay_create_mka(wpa_s->kay, ckn, cak, 0, 372 if (cak) { [all...] |