Searched defs:ckn (Results 1 - 10 of 10) sorted by relevance

/external/wpa_supplicant_8/hostapd/src/pae/
H A Dieee802_1x_key.c101 size_t sid_bytes, u8 *ckn)
116 128, ckn);
128 int ieee802_1x_kek_128bits_aes_cmac(const u8 *cak, const u8 *ckn, argument
135 os_memcpy(context, ckn, (ckn_bytes < 16) ? ckn_bytes : 16);
148 int ieee802_1x_ick_128bits_aes_cmac(const u8 *cak, const u8 *ckn, argument
155 os_memcpy(context, ckn, (ckn_bytes < 16) ? ckn_bytes : 16);
99 ieee802_1x_ckn_128bits_aes_cmac(const u8 *msk, const u8 *mac1, const u8 *mac2, const u8 *sid, size_t sid_bytes, u8 *ckn) argument
H A Dieee802_1x_kay_i.h75 const u8 *sid, size_t sid_len, u8 *ckn);
76 int (*kek_trfm)(const u8 *cak, const u8 *ckn, size_t ckn_len, u8 *kek);
77 int (*ick_trfm)(const u8 *cak, const u8 *ckn, size_t ckn_len, u8 *ick);
88 struct mka_key_name ckn; member in struct:ieee802_1x_mka_participant
186 * @ckn: CAK Name
214 u8 ckn[0]; member in struct:ieee802_1x_mka_basic_body
378 * @ckn: CAK Name
400 u8 ckn[0]; member in struct:ieee802_1x_mka_dist_cak_body
H A Dieee802_1x_kay.c133 wpa_hexdump_ascii(MSG_DEBUG, "\tCAK Name......:", body->ckn,
248 ieee802_1x_kay_get_participant(struct ieee802_1x_kay *kay, const u8 *ckn) argument
254 if (os_memcmp(participant->ckn.name, ckn,
255 participant->ckn.len) == 0)
682 length += participant->ckn.len;
722 os_memcpy(body->ckn, participant->ckn.name, participant->ckn.len);
764 participant = ieee802_1x_kay_get_participant(kay, body->ckn);
3237 ieee802_1x_kay_create_mka(struct ieee802_1x_kay *kay, struct mka_key_name *ckn, struct mka_key *cak, u32 life, enum mka_created_mode mode, Boolean is_authenticator) argument
3393 ieee802_1x_kay_delete_mka(struct ieee802_1x_kay *kay, struct mka_key_name *ckn) argument
3456 ieee802_1x_kay_mka_participate(struct ieee802_1x_kay *kay, struct mka_key_name *ckn, Boolean status) argument
[all...]
/external/wpa_supplicant_8/src/pae/
H A Dieee802_1x_key.c101 size_t sid_bytes, u8 *ckn)
116 128, ckn);
128 int ieee802_1x_kek_128bits_aes_cmac(const u8 *cak, const u8 *ckn, argument
135 os_memcpy(context, ckn, (ckn_bytes < 16) ? ckn_bytes : 16);
148 int ieee802_1x_ick_128bits_aes_cmac(const u8 *cak, const u8 *ckn, argument
155 os_memcpy(context, ckn, (ckn_bytes < 16) ? ckn_bytes : 16);
99 ieee802_1x_ckn_128bits_aes_cmac(const u8 *msk, const u8 *mac1, const u8 *mac2, const u8 *sid, size_t sid_bytes, u8 *ckn) argument
H A Dieee802_1x_kay_i.h75 const u8 *sid, size_t sid_len, u8 *ckn);
76 int (*kek_trfm)(const u8 *cak, const u8 *ckn, size_t ckn_len, u8 *kek);
77 int (*ick_trfm)(const u8 *cak, const u8 *ckn, size_t ckn_len, u8 *ick);
88 struct mka_key_name ckn; member in struct:ieee802_1x_mka_participant
186 * @ckn: CAK Name
214 u8 ckn[0]; member in struct:ieee802_1x_mka_basic_body
378 * @ckn: CAK Name
400 u8 ckn[0]; member in struct:ieee802_1x_mka_dist_cak_body
H A Dieee802_1x_kay.c133 wpa_hexdump_ascii(MSG_DEBUG, "\tCAK Name......:", body->ckn,
248 ieee802_1x_kay_get_participant(struct ieee802_1x_kay *kay, const u8 *ckn) argument
254 if (os_memcmp(participant->ckn.name, ckn,
255 participant->ckn.len) == 0)
682 length += participant->ckn.len;
722 os_memcpy(body->ckn, participant->ckn.name, participant->ckn.len);
764 participant = ieee802_1x_kay_get_participant(kay, body->ckn);
3237 ieee802_1x_kay_create_mka(struct ieee802_1x_kay *kay, struct mka_key_name *ckn, struct mka_key *cak, u32 life, enum mka_created_mode mode, Boolean is_authenticator) argument
3393 ieee802_1x_kay_delete_mka(struct ieee802_1x_kay *kay, struct mka_key_name *ckn) argument
3456 ieee802_1x_kay_mka_participate(struct ieee802_1x_kay *kay, struct mka_key_name *ckn, Boolean status) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/pae/
H A Dieee802_1x_key.c101 size_t sid_bytes, u8 *ckn)
116 128, ckn);
128 int ieee802_1x_kek_128bits_aes_cmac(const u8 *cak, const u8 *ckn, argument
135 os_memcpy(context, ckn, (ckn_bytes < 16) ? ckn_bytes : 16);
148 int ieee802_1x_ick_128bits_aes_cmac(const u8 *cak, const u8 *ckn, argument
155 os_memcpy(context, ckn, (ckn_bytes < 16) ? ckn_bytes : 16);
99 ieee802_1x_ckn_128bits_aes_cmac(const u8 *msk, const u8 *mac1, const u8 *mac2, const u8 *sid, size_t sid_bytes, u8 *ckn) argument
H A Dieee802_1x_kay_i.h75 const u8 *sid, size_t sid_len, u8 *ckn);
76 int (*kek_trfm)(const u8 *cak, const u8 *ckn, size_t ckn_len, u8 *kek);
77 int (*ick_trfm)(const u8 *cak, const u8 *ckn, size_t ckn_len, u8 *ick);
88 struct mka_key_name ckn; member in struct:ieee802_1x_mka_participant
186 * @ckn: CAK Name
214 u8 ckn[0]; member in struct:ieee802_1x_mka_basic_body
378 * @ckn: CAK Name
400 u8 ckn[0]; member in struct:ieee802_1x_mka_dist_cak_body
H A Dieee802_1x_kay.c133 wpa_hexdump_ascii(MSG_DEBUG, "\tCAK Name......:", body->ckn,
248 ieee802_1x_kay_get_participant(struct ieee802_1x_kay *kay, const u8 *ckn) argument
254 if (os_memcmp(participant->ckn.name, ckn,
255 participant->ckn.len) == 0)
682 length += participant->ckn.len;
722 os_memcpy(body->ckn, participant->ckn.name, participant->ckn.len);
764 participant = ieee802_1x_kay_get_participant(kay, body->ckn);
3237 ieee802_1x_kay_create_mka(struct ieee802_1x_kay *kay, struct mka_key_name *ckn, struct mka_key *cak, u32 life, enum mka_created_mode mode, Boolean is_authenticator) argument
3393 ieee802_1x_kay_delete_mka(struct ieee802_1x_kay *kay, struct mka_key_name *ckn) argument
3456 ieee802_1x_kay_mka_participate(struct ieee802_1x_kay *kay, struct mka_key_name *ckn, Boolean status) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/
H A Dwpas_kay.c318 struct mka_key_name *ckn; local
332 ckn = os_zalloc(sizeof(*ckn));
334 if (!msk || !sid || !ckn || !cak)
361 ckn->len = DEFAULT_CKN_LEN;
364 ckn->name)) {
369 wpa_hexdump(MSG_DEBUG, "Derived CKN", ckn->name, ckn->len);
371 res = ieee802_1x_kay_create_mka(wpa_s->kay, ckn, cak, 0,
380 os_free(ckn);
394 struct mka_key_name *ckn; local
[all...]

Completed in 197 milliseconds