/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | sae.h | 25 u8 kck[SAE_KCK_LEN]; member in struct:sae_temporary_data
|
H A D | wpa_common.c | 188 os_memcpy(ptk->kck, tmp, ptk->kck_len); 189 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len); 203 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, argument 271 if (omac1_aes_128_vector(kck, num_elem, addr, len, mic)) 988 os_memcpy(ptk->kck, tmp, ptk->kck_len); 992 wpa_hexdump_key(MSG_DEBUG, "FT: KCK", ptk->kck, ptk->kck_len); 1042 * @kck: Key confirmation key 1043 * @kck_len: Length of kck in bytes 1052 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, argument 1064 if (hmac_sha256_vector(kck, kck_le 1085 rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, u8 *pmkid) argument [all...] |
H A D | wpa_common.h | 210 u8 kck[WPA_KCK_MAX_LEN]; /* EAPOL-Key Key Confirmation Key (KCK) */ member in struct:wpa_ptk 343 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, 384 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, 387 static inline int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, argument 394 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, 397 static inline int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, argument
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | pmksa_cache.h | 60 const u8 *kck, size_t kck_len, 108 const u8 *kck, size_t kck_len, 107 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp) argument
|
H A D | pmksa_cache.c | 112 * @kck: Key confirmation key or %NULL if not yet derived 127 const u8 *kck, size_t kck_len, 136 if (wpa_key_mgmt_suite_b(akmp) && !kck) 145 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); 147 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); 126 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp) argument
|
H A D | wpa_ft.c | 131 * @kck: 128-bit KCK for MIC or %NULL if no MIC is used 143 const u8 *kck, size_t kck_len, 263 if (kck) { 283 if (kck) { 298 if (wpa_ft_mic(kck, kck_len, sm->own_addr, target_ap, 5, 485 sm->ptk.kck, sm->ptk.kck_len, bssid, 769 if (wpa_ft_mic(sm->ptk.kck, sm->ptk.kck_len, sm->own_addr, src_addr, 6, 141 wpa_ft_gen_req_ies(struct wpa_sm *sm, size_t *len, const u8 *anonce, const u8 *pmk_name, const u8 *kck, size_t kck_len, const u8 *target_ap, const u8 *ric_ies, size_t ric_ies_len, const u8 *ap_mdie) argument
|
H A D | tdls.c | 110 u8 kck[16]; /* TPK-KCK */ member in struct:wpa_tdls_peer::tpk 436 peer->tpk.kck, sizeof(peer->tpk.kck)); 445 * @kck: TPK-KCK 454 static int wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid, argument 496 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16); 497 ret = omac1_aes_128(kck, buf, pos - buf, mic); 506 * @kck: TPK-KCK 516 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, argument 555 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 1 [all...] |
H A D | wpa.c | 29 * @kck: Key Confirmation Key (KCK, part of PTK) 38 void wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, size_t kck_len, argument 62 wpa_eapol_key_mic(kck, kck_len, sm->key_mgmt, ver, msg, msg_len, 69 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", kck, kck_len); 151 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, bssid, 401 wpa_eapol_key_send(sm, ptk->kck, ptk->kck_len, ver, dst, ETH_P_EAPOL, 1118 wpa_eapol_key_send(sm, ptk->kck, ptk->kck_len, ver, dst, ETH_P_EAPOL, 1240 sm->ptk.kck, sm->ptk.kck_len, 1423 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, sm->bssid, 1508 wpa_eapol_key_mic(sm->tptk.kck, s [all...] |
/external/wpa_supplicant_8/src/common/ |
H A D | sae.h | 25 u8 kck[SAE_KCK_LEN]; member in struct:sae_temporary_data
|
H A D | wpa_common.c | 188 os_memcpy(ptk->kck, tmp, ptk->kck_len); 189 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len); 203 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, argument 271 if (omac1_aes_128_vector(kck, num_elem, addr, len, mic)) 988 os_memcpy(ptk->kck, tmp, ptk->kck_len); 992 wpa_hexdump_key(MSG_DEBUG, "FT: KCK", ptk->kck, ptk->kck_len); 1042 * @kck: Key confirmation key 1043 * @kck_len: Length of kck in bytes 1052 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, argument 1064 if (hmac_sha256_vector(kck, kck_le 1085 rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, u8 *pmkid) argument [all...] |
H A D | wpa_common.h | 210 u8 kck[WPA_KCK_MAX_LEN]; /* EAPOL-Key Key Confirmation Key (KCK) */ member in struct:wpa_ptk 343 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, 384 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, 387 static inline int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, argument 394 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, 397 static inline int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, argument
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | pmksa_cache.h | 60 const u8 *kck, size_t kck_len, 108 const u8 *kck, size_t kck_len, 107 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp) argument
|
H A D | pmksa_cache.c | 112 * @kck: Key confirmation key or %NULL if not yet derived 127 const u8 *kck, size_t kck_len, 136 if (wpa_key_mgmt_suite_b(akmp) && !kck) 145 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); 147 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); 126 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp) argument
|
H A D | wpa_ft.c | 131 * @kck: 128-bit KCK for MIC or %NULL if no MIC is used 143 const u8 *kck, size_t kck_len, 263 if (kck) { 283 if (kck) { 298 if (wpa_ft_mic(kck, kck_len, sm->own_addr, target_ap, 5, 485 sm->ptk.kck, sm->ptk.kck_len, bssid, 769 if (wpa_ft_mic(sm->ptk.kck, sm->ptk.kck_len, sm->own_addr, src_addr, 6, 141 wpa_ft_gen_req_ies(struct wpa_sm *sm, size_t *len, const u8 *anonce, const u8 *pmk_name, const u8 *kck, size_t kck_len, const u8 *target_ap, const u8 *ric_ies, size_t ric_ies_len, const u8 *ap_mdie) argument
|
H A D | tdls.c | 110 u8 kck[16]; /* TPK-KCK */ member in struct:wpa_tdls_peer::tpk 436 peer->tpk.kck, sizeof(peer->tpk.kck)); 445 * @kck: TPK-KCK 454 static int wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid, argument 496 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16); 497 ret = omac1_aes_128(kck, buf, pos - buf, mic); 506 * @kck: TPK-KCK 516 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, argument 555 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 1 [all...] |
H A D | wpa.c | 29 * @kck: Key Confirmation Key (KCK, part of PTK) 38 void wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, size_t kck_len, argument 62 wpa_eapol_key_mic(kck, kck_len, sm->key_mgmt, ver, msg, msg_len, 69 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", kck, kck_len); 151 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, bssid, 401 wpa_eapol_key_send(sm, ptk->kck, ptk->kck_len, ver, dst, ETH_P_EAPOL, 1118 wpa_eapol_key_send(sm, ptk->kck, ptk->kck_len, ver, dst, ETH_P_EAPOL, 1240 sm->ptk.kck, sm->ptk.kck_len, 1423 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, sm->bssid, 1508 wpa_eapol_key_mic(sm->tptk.kck, s [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | sae.h | 25 u8 kck[SAE_KCK_LEN]; member in struct:sae_temporary_data
|
H A D | wpa_common.c | 188 os_memcpy(ptk->kck, tmp, ptk->kck_len); 189 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len); 203 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, argument 271 if (omac1_aes_128_vector(kck, num_elem, addr, len, mic)) 988 os_memcpy(ptk->kck, tmp, ptk->kck_len); 992 wpa_hexdump_key(MSG_DEBUG, "FT: KCK", ptk->kck, ptk->kck_len); 1042 * @kck: Key confirmation key 1043 * @kck_len: Length of kck in bytes 1052 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, argument 1064 if (hmac_sha256_vector(kck, kck_le 1085 rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, u8 *pmkid) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | pmksa_cache.h | 60 const u8 *kck, size_t kck_len, 108 const u8 *kck, size_t kck_len, 107 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp) argument
|
H A D | pmksa_cache.c | 112 * @kck: Key confirmation key or %NULL if not yet derived 127 const u8 *kck, size_t kck_len, 136 if (wpa_key_mgmt_suite_b(akmp) && !kck) 145 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); 147 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); 126 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp) argument
|
H A D | wpa_ft.c | 131 * @kck: 128-bit KCK for MIC or %NULL if no MIC is used 143 const u8 *kck, size_t kck_len, 263 if (kck) { 283 if (kck) { 298 if (wpa_ft_mic(kck, kck_len, sm->own_addr, target_ap, 5, 485 sm->ptk.kck, sm->ptk.kck_len, bssid, 769 if (wpa_ft_mic(sm->ptk.kck, sm->ptk.kck_len, sm->own_addr, src_addr, 6, 141 wpa_ft_gen_req_ies(struct wpa_sm *sm, size_t *len, const u8 *anonce, const u8 *pmk_name, const u8 *kck, size_t kck_len, const u8 *target_ap, const u8 *ric_ies, size_t ric_ies_len, const u8 *ap_mdie) argument
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | pmksa_cache_auth.c | 237 * @kck: Key confirmation key or %NULL if not yet derived 254 const u8 *kck, size_t kck_len, 264 if (wpa_key_mgmt_suite_b(akmp) && !kck) 273 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); 275 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); 252 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument
|
/external/wpa_supplicant_8/src/ap/ |
H A D | pmksa_cache_auth.c | 237 * @kck: Key confirmation key or %NULL if not yet derived 254 const u8 *kck, size_t kck_len, 264 if (wpa_key_mgmt_suite_b(akmp) && !kck) 273 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); 275 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); 252 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | pmksa_cache_auth.c | 237 * @kck: Key confirmation key or %NULL if not yet derived 254 const u8 *kck, size_t kck_len, 264 if (wpa_key_mgmt_suite_b(akmp) && !kck) 273 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); 275 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); 252 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wpas_glue.c | 1009 const u8 *kck, size_t kck_len, 1014 wpa_drv_set_rekey_info(wpa_s, kek, kek_len, kck, kck_len, replay_ctr); 1007 wpa_supplicant_set_rekey_offload(void *ctx, const u8 *kek, size_t kek_len, const u8 *kck, size_t kck_len, const u8 *replay_ctr) argument
|