/external/wpa_supplicant_8/hostapd/src/pae/ |
H A D | ieee802_1x_key.c | 101 size_t sid_bytes, u8 *ckn) 116 128, ckn); 128 int ieee802_1x_kek_128bits_aes_cmac(const u8 *cak, const u8 *ckn, argument 135 os_memcpy(context, ckn, (ckn_bytes < 16) ? ckn_bytes : 16); 148 int ieee802_1x_ick_128bits_aes_cmac(const u8 *cak, const u8 *ckn, argument 155 os_memcpy(context, ckn, (ckn_bytes < 16) ? ckn_bytes : 16); 99 ieee802_1x_ckn_128bits_aes_cmac(const u8 *msk, const u8 *mac1, const u8 *mac2, const u8 *sid, size_t sid_bytes, u8 *ckn) argument
|
H A D | ieee802_1x_kay_i.h | 75 const u8 *sid, size_t sid_len, u8 *ckn); 76 int (*kek_trfm)(const u8 *cak, const u8 *ckn, size_t ckn_len, u8 *kek); 77 int (*ick_trfm)(const u8 *cak, const u8 *ckn, size_t ckn_len, u8 *ick); 88 struct mka_key_name ckn; member in struct:ieee802_1x_mka_participant 186 * @ckn: CAK Name 214 u8 ckn[0]; member in struct:ieee802_1x_mka_basic_body 378 * @ckn: CAK Name 400 u8 ckn[0]; member in struct:ieee802_1x_mka_dist_cak_body
|
H A D | ieee802_1x_kay.c | 133 wpa_hexdump_ascii(MSG_DEBUG, "\tCAK Name......:", body->ckn, 248 ieee802_1x_kay_get_participant(struct ieee802_1x_kay *kay, const u8 *ckn) argument 254 if (os_memcmp(participant->ckn.name, ckn, 255 participant->ckn.len) == 0) 682 length += participant->ckn.len; 722 os_memcpy(body->ckn, participant->ckn.name, participant->ckn.len); 764 participant = ieee802_1x_kay_get_participant(kay, body->ckn); 3237 ieee802_1x_kay_create_mka(struct ieee802_1x_kay *kay, struct mka_key_name *ckn, struct mka_key *cak, u32 life, enum mka_created_mode mode, Boolean is_authenticator) argument 3393 ieee802_1x_kay_delete_mka(struct ieee802_1x_kay *kay, struct mka_key_name *ckn) argument 3456 ieee802_1x_kay_mka_participate(struct ieee802_1x_kay *kay, struct mka_key_name *ckn, Boolean status) argument [all...] |
/external/wpa_supplicant_8/src/pae/ |
H A D | ieee802_1x_key.c | 101 size_t sid_bytes, u8 *ckn) 116 128, ckn); 128 int ieee802_1x_kek_128bits_aes_cmac(const u8 *cak, const u8 *ckn, argument 135 os_memcpy(context, ckn, (ckn_bytes < 16) ? ckn_bytes : 16); 148 int ieee802_1x_ick_128bits_aes_cmac(const u8 *cak, const u8 *ckn, argument 155 os_memcpy(context, ckn, (ckn_bytes < 16) ? ckn_bytes : 16); 99 ieee802_1x_ckn_128bits_aes_cmac(const u8 *msk, const u8 *mac1, const u8 *mac2, const u8 *sid, size_t sid_bytes, u8 *ckn) argument
|
H A D | ieee802_1x_kay_i.h | 75 const u8 *sid, size_t sid_len, u8 *ckn); 76 int (*kek_trfm)(const u8 *cak, const u8 *ckn, size_t ckn_len, u8 *kek); 77 int (*ick_trfm)(const u8 *cak, const u8 *ckn, size_t ckn_len, u8 *ick); 88 struct mka_key_name ckn; member in struct:ieee802_1x_mka_participant 186 * @ckn: CAK Name 214 u8 ckn[0]; member in struct:ieee802_1x_mka_basic_body 378 * @ckn: CAK Name 400 u8 ckn[0]; member in struct:ieee802_1x_mka_dist_cak_body
|
H A D | ieee802_1x_kay.c | 133 wpa_hexdump_ascii(MSG_DEBUG, "\tCAK Name......:", body->ckn, 248 ieee802_1x_kay_get_participant(struct ieee802_1x_kay *kay, const u8 *ckn) argument 254 if (os_memcmp(participant->ckn.name, ckn, 255 participant->ckn.len) == 0) 682 length += participant->ckn.len; 722 os_memcpy(body->ckn, participant->ckn.name, participant->ckn.len); 764 participant = ieee802_1x_kay_get_participant(kay, body->ckn); 3237 ieee802_1x_kay_create_mka(struct ieee802_1x_kay *kay, struct mka_key_name *ckn, struct mka_key *cak, u32 life, enum mka_created_mode mode, Boolean is_authenticator) argument 3393 ieee802_1x_kay_delete_mka(struct ieee802_1x_kay *kay, struct mka_key_name *ckn) argument 3456 ieee802_1x_kay_mka_participate(struct ieee802_1x_kay *kay, struct mka_key_name *ckn, Boolean status) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/pae/ |
H A D | ieee802_1x_key.c | 101 size_t sid_bytes, u8 *ckn) 116 128, ckn); 128 int ieee802_1x_kek_128bits_aes_cmac(const u8 *cak, const u8 *ckn, argument 135 os_memcpy(context, ckn, (ckn_bytes < 16) ? ckn_bytes : 16); 148 int ieee802_1x_ick_128bits_aes_cmac(const u8 *cak, const u8 *ckn, argument 155 os_memcpy(context, ckn, (ckn_bytes < 16) ? ckn_bytes : 16); 99 ieee802_1x_ckn_128bits_aes_cmac(const u8 *msk, const u8 *mac1, const u8 *mac2, const u8 *sid, size_t sid_bytes, u8 *ckn) argument
|
H A D | ieee802_1x_kay_i.h | 75 const u8 *sid, size_t sid_len, u8 *ckn); 76 int (*kek_trfm)(const u8 *cak, const u8 *ckn, size_t ckn_len, u8 *kek); 77 int (*ick_trfm)(const u8 *cak, const u8 *ckn, size_t ckn_len, u8 *ick); 88 struct mka_key_name ckn; member in struct:ieee802_1x_mka_participant 186 * @ckn: CAK Name 214 u8 ckn[0]; member in struct:ieee802_1x_mka_basic_body 378 * @ckn: CAK Name 400 u8 ckn[0]; member in struct:ieee802_1x_mka_dist_cak_body
|
H A D | ieee802_1x_kay.c | 133 wpa_hexdump_ascii(MSG_DEBUG, "\tCAK Name......:", body->ckn, 248 ieee802_1x_kay_get_participant(struct ieee802_1x_kay *kay, const u8 *ckn) argument 254 if (os_memcmp(participant->ckn.name, ckn, 255 participant->ckn.len) == 0) 682 length += participant->ckn.len; 722 os_memcpy(body->ckn, participant->ckn.name, participant->ckn.len); 764 participant = ieee802_1x_kay_get_participant(kay, body->ckn); 3237 ieee802_1x_kay_create_mka(struct ieee802_1x_kay *kay, struct mka_key_name *ckn, struct mka_key *cak, u32 life, enum mka_created_mode mode, Boolean is_authenticator) argument 3393 ieee802_1x_kay_delete_mka(struct ieee802_1x_kay *kay, struct mka_key_name *ckn) argument 3456 ieee802_1x_kay_mka_participate(struct ieee802_1x_kay *kay, struct mka_key_name *ckn, Boolean status) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wpas_kay.c | 318 struct mka_key_name *ckn; local 332 ckn = os_zalloc(sizeof(*ckn)); 334 if (!msk || !sid || !ckn || !cak) 361 ckn->len = DEFAULT_CKN_LEN; 364 ckn->name)) { 369 wpa_hexdump(MSG_DEBUG, "Derived CKN", ckn->name, ckn->len); 371 res = ieee802_1x_kay_create_mka(wpa_s->kay, ckn, cak, 0, 380 os_free(ckn); 394 struct mka_key_name *ckn; local [all...] |