/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth.c | 1531 if (aes_wrap(sm->PTK.kek, sm->PTK.kek_len, 1543 } else if (sm->PTK.kek_len == 16) { 1549 os_memcpy(ek + 16, sm->PTK.kek, sm->PTK.kek_len);
|
H A D | wpa_auth_ft.c | 459 if (aes_wrap(sm->PTK.kek, sm->PTK.kek_len, key_len / 8, key, 492 if (aes_wrap(sm->PTK.kek, sm->PTK.kek_len, WPA_IGTK_LEN / 8,
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | wpa_common.c | 169 ptk->kek_len = wpa_kek_len(akmp); 171 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len; 191 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); 192 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); 194 os_memcpy(ptk->tk, tmp + ptk->kck_len + ptk->kek_len, ptk->tk_len); 962 ptk->kek_len = wpa_kek_len(akmp); 964 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len; 989 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); 990 os_memcpy(ptk->tk, tmp + ptk->kck_len + ptk->kek_len, ptk->tk_len); 993 wpa_hexdump_key(MSG_DEBUG, "FT: KEK", ptk->kek, ptk->kek_len); [all...] |
H A D | wpa_common.h | 214 size_t kek_len; member in struct:wpa_ptk
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | aes-unwrap.c | 19 * @kek_len: Length of KEK in octets 26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, argument 39 ctx = aes_decrypt_init(kek, kek_len);
|
H A D | aes-wrap.c | 19 * @kek_len: Length of KEK in octets 26 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) argument 40 ctx = aes_encrypt_init(kek, kek_len);
|
H A D | aes_wrap.h | 21 int __must_check aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, 23 int __must_check aes_unwrap(const u8 *kek, size_t kek_len, int n,
|
H A D | crypto_openssl.c | 300 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) argument 305 if (AES_set_encrypt_key(kek, kek_len << 3, &actx)) 313 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, argument 319 if (AES_set_decrypt_key(kek, kek_len << 3, &actx))
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver.h | 2894 * @kek_len: KEK length in octets 2903 void (*set_rekey_info)(void *priv, const u8 *kek, size_t kek_len,
|
H A D | driver_nl80211.c | 6872 static void nl80211_set_rekey_info(void *priv, const u8 *kek, size_t kek_len, argument 6888 nla_put(msg, NL80211_REKEY_DATA_KEK, kek_len, kek) ||
|
/external/wpa_supplicant_8/hostapd/src/pae/ |
H A D | ieee802_1x_kay.c | 3360 participant->kek.len = mka_alg_tbl[kay->mka_algindex].kek_len;
|
H A D | ieee802_1x_kay_i.h | 161 size_t kek_len; member in struct:mka_alg
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa.c | 1335 if (ver == WPA_KEY_INFO_TYPE_HMAC_MD5_RC4 && sm->ptk.kek_len == 16) { 1344 os_memcpy(ek + 16, sm->ptk.kek, sm->ptk.kek_len); 1368 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, maxkeylen / 8, 1566 if (ver == WPA_KEY_INFO_TYPE_HMAC_MD5_RC4 && sm->ptk.kek_len == 16) { 1569 os_memcpy(ek + 16, sm->ptk.kek, sm->ptk.kek_len); 1595 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, *key_data_len / 8, 2950 sm->ptk.kek_len = ptk_kek_len;
|
H A D | wpa.h | 76 void (*set_rekey_offload)(void *ctx, const u8 *kek, size_t kek_len,
|
H A D | wpa_ft.c | 564 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, gtk_len / 8, gtk_elem + 11, 644 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, WPA_IGTK_LEN / 8,
|
H A D | wpa_i.h | 258 sm->ctx->set_rekey_offload(sm->ctx->ctx, sm->ptk.kek, sm->ptk.kek_len,
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth.c | 1531 if (aes_wrap(sm->PTK.kek, sm->PTK.kek_len, 1543 } else if (sm->PTK.kek_len == 16) { 1549 os_memcpy(ek + 16, sm->PTK.kek, sm->PTK.kek_len);
|
H A D | wpa_auth_ft.c | 459 if (aes_wrap(sm->PTK.kek, sm->PTK.kek_len, key_len / 8, key, 492 if (aes_wrap(sm->PTK.kek, sm->PTK.kek_len, WPA_IGTK_LEN / 8,
|
/external/wpa_supplicant_8/src/common/ |
H A D | wpa_common.c | 169 ptk->kek_len = wpa_kek_len(akmp); 171 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len; 191 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); 192 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); 194 os_memcpy(ptk->tk, tmp + ptk->kck_len + ptk->kek_len, ptk->tk_len); 962 ptk->kek_len = wpa_kek_len(akmp); 964 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len; 989 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); 990 os_memcpy(ptk->tk, tmp + ptk->kck_len + ptk->kek_len, ptk->tk_len); 993 wpa_hexdump_key(MSG_DEBUG, "FT: KEK", ptk->kek, ptk->kek_len); [all...] |
H A D | wpa_common.h | 214 size_t kek_len; member in struct:wpa_ptk
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | aes-unwrap.c | 19 * @kek_len: Length of KEK in octets 26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, argument 39 ctx = aes_decrypt_init(kek, kek_len);
|
H A D | aes-wrap.c | 19 * @kek_len: Length of KEK in octets 26 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) argument 40 ctx = aes_encrypt_init(kek, kek_len);
|
H A D | aes_wrap.h | 21 int __must_check aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, 23 int __must_check aes_unwrap(const u8 *kek, size_t kek_len, int n,
|
H A D | crypto_openssl.c | 300 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) argument 305 if (AES_set_encrypt_key(kek, kek_len << 3, &actx)) 313 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, argument 319 if (AES_set_decrypt_key(kek, kek_len << 3, &actx))
|
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver.h | 2894 * @kek_len: KEK length in octets 2903 void (*set_rekey_info)(void *priv, const u8 *kek, size_t kek_len,
|