Searched defs:kck (Results 1 - 25 of 32) sorted by relevance

12

/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dpmksa_cache.h60 const u8 *pmkid, const u8 *kck, size_t kck_len,
108 const u8 *pmkid, const u8 *kck, size_t kck_len,
107 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp) argument
H A Dpmksa_cache.c113 * @kck: Key confirmation key or %NULL if not yet derived
128 const u8 *pmkid, const u8 *kck, size_t kck_len,
137 if (wpa_key_mgmt_suite_b(akmp) && !kck)
148 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid);
150 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid);
127 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp) argument
H A Dwpa_ft.c131 * @kck: 128-bit KCK for MIC or %NULL if no MIC is used
143 const u8 *kck, size_t kck_len,
261 if (kck) {
281 if (kck) {
296 if (wpa_ft_mic(kck, kck_len, sm->own_addr, target_ap, 5,
483 sm->ptk.kck, sm->ptk.kck_len, bssid,
767 if (wpa_ft_mic(sm->ptk.kck, sm->ptk.kck_len, sm->own_addr, src_addr, 6,
141 wpa_ft_gen_req_ies(struct wpa_sm *sm, size_t *len, const u8 *anonce, const u8 *pmk_name, const u8 *kck, size_t kck_len, const u8 *target_ap, const u8 *ric_ies, size_t ric_ies_len, const u8 *ap_mdie) argument
H A Dtdls.c111 u8 kck[16]; /* TPK-KCK */ member in struct:wpa_tdls_peer::tpk
437 peer->tpk.kck, sizeof(peer->tpk.kck));
446 * @kck: TPK-KCK
455 static int wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid, argument
497 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16);
498 ret = omac1_aes_128(kck, buf, pos - buf, mic);
507 * @kck: TPK-KCK
517 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, argument
556 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 1
[all...]
H A Dwpa.c33 * @kck: Key Confirmation Key (KCK, part of PTK)
43 int wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, size_t kck_len, argument
68 wpa_eapol_key_mic(kck, kck_len, sm->key_mgmt, ver, msg, msg_len,
75 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", kck, kck_len);
158 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, bssid,
424 return wpa_eapol_key_send(sm, ptk->kck, ptk->kck_len, ver, dst,
1181 return wpa_eapol_key_send(sm, ptk->kck, ptk->kck_len, ver, dst,
1301 sm->ptk.kck, sm->ptk.kck_len,
1490 return wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver,
1578 wpa_eapol_key_mic(sm->tptk.kck, s
[all...]
/external/wpa_supplicant_8/src/rsn_supp/
H A Dpmksa_cache.h60 const u8 *pmkid, const u8 *kck, size_t kck_len,
108 const u8 *pmkid, const u8 *kck, size_t kck_len,
107 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp) argument
H A Dpmksa_cache.c113 * @kck: Key confirmation key or %NULL if not yet derived
128 const u8 *pmkid, const u8 *kck, size_t kck_len,
137 if (wpa_key_mgmt_suite_b(akmp) && !kck)
148 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid);
150 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid);
127 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp) argument
H A Dwpa_ft.c131 * @kck: 128-bit KCK for MIC or %NULL if no MIC is used
143 const u8 *kck, size_t kck_len,
261 if (kck) {
281 if (kck) {
296 if (wpa_ft_mic(kck, kck_len, sm->own_addr, target_ap, 5,
483 sm->ptk.kck, sm->ptk.kck_len, bssid,
767 if (wpa_ft_mic(sm->ptk.kck, sm->ptk.kck_len, sm->own_addr, src_addr, 6,
141 wpa_ft_gen_req_ies(struct wpa_sm *sm, size_t *len, const u8 *anonce, const u8 *pmk_name, const u8 *kck, size_t kck_len, const u8 *target_ap, const u8 *ric_ies, size_t ric_ies_len, const u8 *ap_mdie) argument
H A Dtdls.c111 u8 kck[16]; /* TPK-KCK */ member in struct:wpa_tdls_peer::tpk
437 peer->tpk.kck, sizeof(peer->tpk.kck));
446 * @kck: TPK-KCK
455 static int wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid, argument
497 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16);
498 ret = omac1_aes_128(kck, buf, pos - buf, mic);
507 * @kck: TPK-KCK
517 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, argument
556 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 1
[all...]
H A Dwpa.c33 * @kck: Key Confirmation Key (KCK, part of PTK)
43 int wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, size_t kck_len, argument
68 wpa_eapol_key_mic(kck, kck_len, sm->key_mgmt, ver, msg, msg_len,
75 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", kck, kck_len);
158 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, bssid,
424 return wpa_eapol_key_send(sm, ptk->kck, ptk->kck_len, ver, dst,
1181 return wpa_eapol_key_send(sm, ptk->kck, ptk->kck_len, ver, dst,
1301 sm->ptk.kck, sm->ptk.kck_len,
1490 return wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver,
1578 wpa_eapol_key_mic(sm->tptk.kck, s
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dpmksa_cache.h60 const u8 *pmkid, const u8 *kck, size_t kck_len,
108 const u8 *pmkid, const u8 *kck, size_t kck_len,
107 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp) argument
H A Dpmksa_cache.c113 * @kck: Key confirmation key or %NULL if not yet derived
128 const u8 *pmkid, const u8 *kck, size_t kck_len,
137 if (wpa_key_mgmt_suite_b(akmp) && !kck)
148 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid);
150 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid);
127 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp) argument
H A Dwpa_ft.c131 * @kck: 128-bit KCK for MIC or %NULL if no MIC is used
143 const u8 *kck, size_t kck_len,
261 if (kck) {
281 if (kck) {
296 if (wpa_ft_mic(kck, kck_len, sm->own_addr, target_ap, 5,
483 sm->ptk.kck, sm->ptk.kck_len, bssid,
767 if (wpa_ft_mic(sm->ptk.kck, sm->ptk.kck_len, sm->own_addr, src_addr, 6,
141 wpa_ft_gen_req_ies(struct wpa_sm *sm, size_t *len, const u8 *anonce, const u8 *pmk_name, const u8 *kck, size_t kck_len, const u8 *target_ap, const u8 *ric_ies, size_t ric_ies_len, const u8 *ap_mdie) argument
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dpmksa_cache_auth.c264 * @kck: Key confirmation key or %NULL if not yet derived
281 const u8 *kck, size_t kck_len,
291 if (wpa_key_mgmt_suite_b(akmp) && !kck)
302 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid);
304 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid);
279 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument
/external/wpa_supplicant_8/hostapd/src/common/
H A Dsae.h25 u8 kck[SAE_KCK_LEN]; member in struct:sae_temporary_data
H A Dwpa_common.c194 os_memcpy(ptk->kck, tmp, ptk->kck_len);
195 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len);
209 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, argument
277 if (omac1_aes_128_vector(kck, num_elem, addr, len, mic))
1015 os_memcpy(ptk->kck, tmp, ptk->kck_len);
1019 wpa_hexdump_key(MSG_DEBUG, "FT: KCK", ptk->kck, ptk->kck_len);
1069 * @kck: Key confirmation key
1070 * @kck_len: Length of kck in bytes
1079 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, argument
1091 if (hmac_sha256_vector(kck, kck_le
1112 rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, u8 *pmkid) argument
[all...]
H A Dwpa_common.h212 u8 kck[WPA_KCK_MAX_LEN]; /* EAPOL-Key Key Confirmation Key (KCK) */ member in struct:wpa_ptk
345 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr,
386 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa,
389 static inline int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, argument
396 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa,
399 static inline int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, argument
/external/wpa_supplicant_8/src/ap/
H A Dpmksa_cache_auth.c264 * @kck: Key confirmation key or %NULL if not yet derived
281 const u8 *kck, size_t kck_len,
291 if (wpa_key_mgmt_suite_b(akmp) && !kck)
302 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid);
304 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid);
279 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument
/external/wpa_supplicant_8/src/common/
H A Dsae.h25 u8 kck[SAE_KCK_LEN]; member in struct:sae_temporary_data
H A Dwpa_common.c194 os_memcpy(ptk->kck, tmp, ptk->kck_len);
195 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len);
209 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, argument
277 if (omac1_aes_128_vector(kck, num_elem, addr, len, mic))
1015 os_memcpy(ptk->kck, tmp, ptk->kck_len);
1019 wpa_hexdump_key(MSG_DEBUG, "FT: KCK", ptk->kck, ptk->kck_len);
1069 * @kck: Key confirmation key
1070 * @kck_len: Length of kck in bytes
1079 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, argument
1091 if (hmac_sha256_vector(kck, kck_le
1112 rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, u8 *pmkid) argument
[all...]
H A Dwpa_common.h212 u8 kck[WPA_KCK_MAX_LEN]; /* EAPOL-Key Key Confirmation Key (KCK) */ member in struct:wpa_ptk
345 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr,
386 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa,
389 static inline int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, argument
396 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa,
399 static inline int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, argument
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dpmksa_cache_auth.c264 * @kck: Key confirmation key or %NULL if not yet derived
281 const u8 *kck, size_t kck_len,
291 if (wpa_key_mgmt_suite_b(akmp) && !kck)
302 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid);
304 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid);
279 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument
/external/wpa_supplicant_8/wpa_supplicant/src/common/
H A Dsae.h25 u8 kck[SAE_KCK_LEN]; member in struct:sae_temporary_data
H A Dwpa_common.c194 os_memcpy(ptk->kck, tmp, ptk->kck_len);
195 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len);
209 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, argument
277 if (omac1_aes_128_vector(kck, num_elem, addr, len, mic))
1015 os_memcpy(ptk->kck, tmp, ptk->kck_len);
1019 wpa_hexdump_key(MSG_DEBUG, "FT: KCK", ptk->kck, ptk->kck_len);
1069 * @kck: Key confirmation key
1070 * @kck_len: Length of kck in bytes
1079 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, argument
1091 if (hmac_sha256_vector(kck, kck_le
1112 rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, u8 *pmkid) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/
H A Dwpas_glue.c1017 const u8 *kck, size_t kck_len,
1022 wpa_drv_set_rekey_info(wpa_s, kek, kek_len, kck, kck_len, replay_ctr);
1015 wpa_supplicant_set_rekey_offload(void *ctx, const u8 *kek, size_t kek_len, const u8 *kck, size_t kck_len, const u8 *replay_ctr) argument

Completed in 548 milliseconds

12