/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | pmksa_cache.h | 60 const u8 *pmkid, const u8 *kck, size_t kck_len, 108 const u8 *pmkid, const u8 *kck, size_t kck_len, 107 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp) argument
|
H A D | pmksa_cache.c | 114 * @kck_len: KCK length in bytes 128 const u8 *pmkid, const u8 *kck, size_t kck_len, 148 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); 150 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); 127 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp) argument
|
H A D | wpa_ft.c | 132 * @kck_len: KCK length in octets 143 const u8 *kck, size_t kck_len, 296 if (wpa_ft_mic(kck, kck_len, sm->own_addr, target_ap, 5, 483 sm->ptk.kck, sm->ptk.kck_len, bssid, 767 if (wpa_ft_mic(sm->ptk.kck, sm->ptk.kck_len, sm->own_addr, src_addr, 6, 141 wpa_ft_gen_req_ies(struct wpa_sm *sm, size_t *len, const u8 *anonce, const u8 *pmk_name, const u8 *kck, size_t kck_len, const u8 *target_ap, const u8 *ric_ies, size_t ric_ies_len, const u8 *ap_mdie) argument
|
H A D | wpa.c | 34 * @kck_len: KCK length in octets 43 int wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, size_t kck_len, argument 68 wpa_eapol_key_mic(kck, kck_len, sm->key_mgmt, ver, msg, msg_len, 75 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", kck, kck_len); 158 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, bssid, 424 return wpa_eapol_key_send(sm, ptk->kck, ptk->kck_len, ver, dst, 1181 return wpa_eapol_key_send(sm, ptk->kck, ptk->kck_len, ver, dst, 1301 sm->ptk.kck, sm->ptk.kck_len, 1490 return wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, 1578 wpa_eapol_key_mic(sm->tptk.kck, sm->tptk.kck_len, s [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | pmksa_cache.h | 60 const u8 *pmkid, const u8 *kck, size_t kck_len, 108 const u8 *pmkid, const u8 *kck, size_t kck_len, 107 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp) argument
|
H A D | pmksa_cache.c | 114 * @kck_len: KCK length in bytes 128 const u8 *pmkid, const u8 *kck, size_t kck_len, 148 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); 150 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); 127 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp) argument
|
H A D | wpa_ft.c | 132 * @kck_len: KCK length in octets 143 const u8 *kck, size_t kck_len, 296 if (wpa_ft_mic(kck, kck_len, sm->own_addr, target_ap, 5, 483 sm->ptk.kck, sm->ptk.kck_len, bssid, 767 if (wpa_ft_mic(sm->ptk.kck, sm->ptk.kck_len, sm->own_addr, src_addr, 6, 141 wpa_ft_gen_req_ies(struct wpa_sm *sm, size_t *len, const u8 *anonce, const u8 *pmk_name, const u8 *kck, size_t kck_len, const u8 *target_ap, const u8 *ric_ies, size_t ric_ies_len, const u8 *ap_mdie) argument
|
H A D | wpa.c | 34 * @kck_len: KCK length in octets 43 int wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, size_t kck_len, argument 68 wpa_eapol_key_mic(kck, kck_len, sm->key_mgmt, ver, msg, msg_len, 75 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", kck, kck_len); 158 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, bssid, 424 return wpa_eapol_key_send(sm, ptk->kck, ptk->kck_len, ver, dst, 1181 return wpa_eapol_key_send(sm, ptk->kck, ptk->kck_len, ver, dst, 1301 sm->ptk.kck, sm->ptk.kck_len, 1490 return wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, 1578 wpa_eapol_key_mic(sm->tptk.kck, sm->tptk.kck_len, s [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | pmksa_cache.h | 60 const u8 *pmkid, const u8 *kck, size_t kck_len, 108 const u8 *pmkid, const u8 *kck, size_t kck_len, 107 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp) argument
|
H A D | pmksa_cache.c | 114 * @kck_len: KCK length in bytes 128 const u8 *pmkid, const u8 *kck, size_t kck_len, 148 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); 150 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); 127 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp) argument
|
H A D | wpa_ft.c | 132 * @kck_len: KCK length in octets 143 const u8 *kck, size_t kck_len, 296 if (wpa_ft_mic(kck, kck_len, sm->own_addr, target_ap, 5, 483 sm->ptk.kck, sm->ptk.kck_len, bssid, 767 if (wpa_ft_mic(sm->ptk.kck, sm->ptk.kck_len, sm->own_addr, src_addr, 6, 141 wpa_ft_gen_req_ies(struct wpa_sm *sm, size_t *len, const u8 *anonce, const u8 *pmk_name, const u8 *kck, size_t kck_len, const u8 *target_ap, const u8 *ric_ies, size_t ric_ies_len, const u8 *ap_mdie) argument
|
H A D | wpa.c | 34 * @kck_len: KCK length in octets 43 int wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, size_t kck_len, argument 68 wpa_eapol_key_mic(kck, kck_len, sm->key_mgmt, ver, msg, msg_len, 75 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", kck, kck_len); 158 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, bssid, 424 return wpa_eapol_key_send(sm, ptk->kck, ptk->kck_len, ver, dst, 1181 return wpa_eapol_key_send(sm, ptk->kck, ptk->kck_len, ver, dst, 1301 sm->ptk.kck, sm->ptk.kck_len, 1490 return wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, 1578 wpa_eapol_key_mic(sm->tptk.kck, sm->tptk.kck_len, s [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | pmksa_cache_auth.c | 265 * @kck_len: KCK length in bytes 281 const u8 *kck, size_t kck_len, 302 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); 304 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); 279 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument
|
/external/wpa_supplicant_8/src/ap/ |
H A D | pmksa_cache_auth.c | 265 * @kck_len: KCK length in bytes 281 const u8 *kck, size_t kck_len, 302 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); 304 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); 279 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | pmksa_cache_auth.c | 265 * @kck_len: KCK length in bytes 281 const u8 *kck, size_t kck_len, 302 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); 304 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); 279 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | wpa_common.c | 168 ptk->kck_len = wpa_kck_len(akmp); 171 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len; 194 os_memcpy(ptk->kck, tmp, ptk->kck_len); 195 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len); 197 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); 200 os_memcpy(ptk->tk, tmp + ptk->kck_len + ptk->kek_len, ptk->tk_len); 209 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, argument 221 if (kck_len != 16) { 223 (unsigned int) kck_len); 988 ptk->kck_len 1079 rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, u8 *pmkid) argument 1112 rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, u8 *pmkid) argument [all...] |
H A D | wpa_common.h | 215 size_t kck_len; member in struct:wpa_ptk 345 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, 386 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, 389 static inline int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, argument 396 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, 399 static inline int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, argument
|
/external/wpa_supplicant_8/src/common/ |
H A D | wpa_common.c | 168 ptk->kck_len = wpa_kck_len(akmp); 171 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len; 194 os_memcpy(ptk->kck, tmp, ptk->kck_len); 195 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len); 197 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); 200 os_memcpy(ptk->tk, tmp + ptk->kck_len + ptk->kek_len, ptk->tk_len); 209 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, argument 221 if (kck_len != 16) { 223 (unsigned int) kck_len); 988 ptk->kck_len 1079 rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, u8 *pmkid) argument 1112 rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, u8 *pmkid) argument [all...] |
H A D | wpa_common.h | 215 size_t kck_len; member in struct:wpa_ptk 345 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, 386 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, 389 static inline int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, argument 396 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, 399 static inline int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | wpa_common.c | 168 ptk->kck_len = wpa_kck_len(akmp); 171 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len; 194 os_memcpy(ptk->kck, tmp, ptk->kck_len); 195 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len); 197 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); 200 os_memcpy(ptk->tk, tmp + ptk->kck_len + ptk->kek_len, ptk->tk_len); 209 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, argument 221 if (kck_len != 16) { 223 (unsigned int) kck_len); 988 ptk->kck_len 1079 rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, u8 *pmkid) argument 1112 rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, u8 *pmkid) argument [all...] |
H A D | wpa_common.h | 215 size_t kck_len; member in struct:wpa_ptk 345 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, 386 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, 389 static inline int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, argument 396 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, 399 static inline int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, argument
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wpas_glue.c | 1017 const u8 *kck, size_t kck_len, 1022 wpa_drv_set_rekey_info(wpa_s, kek, kek_len, kck, kck_len, replay_ctr); 1015 wpa_supplicant_set_rekey_offload(void *ctx, const u8 *kek, size_t kek_len, const u8 *kck, size_t kck_len, const u8 *replay_ctr) argument
|
H A D | driver_i.h | 566 const u8 *kck, size_t kck_len, 572 kck, kck_len, replay_ctr); 564 wpa_drv_set_rekey_info(struct wpa_supplicant *wpa_s, const u8 *kek, size_t kek_len, const u8 *kck, size_t kck_len, const u8 *replay_ctr) argument
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_nl80211.c | 7217 const u8 *kck, size_t kck_len, 7233 nla_put(msg, NL80211_REKEY_DATA_KCK, kck_len, kck) || 7216 nl80211_set_rekey_info(void *priv, const u8 *kek, size_t kek_len, const u8 *kck, size_t kck_len, const u8 *replay_ctr) argument
|
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_nl80211.c | 7217 const u8 *kck, size_t kck_len, 7233 nla_put(msg, NL80211_REKEY_DATA_KCK, kck_len, kck) || 7216 nl80211_set_rekey_info(void *priv, const u8 *kek, size_t kek_len, const u8 *kck, size_t kck_len, const u8 *replay_ctr) argument
|