Searched refs:kck (Results 1 - 25 of 58) sorted by relevance

123

/external/wpa_supplicant_8/hostapd/src/ap/
H A Dpmksa_cache_auth.h53 const u8 *kck, size_t kck_len,
58 const u8 *kck, size_t kck_len, const u8 *aa,
H A Dpmksa_cache_auth.c264 * @kck: Key confirmation key or %NULL if not yet derived
281 const u8 *kck, size_t kck_len,
287 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len,
303 * @kck: Key confirmation key or %NULL if not yet derived
316 const u8 *kck, size_t kck_len, const u8 *aa,
326 if (wpa_key_mgmt_suite_b(akmp) && !kck)
337 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid);
339 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid);
279 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument
315 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument
/external/wpa_supplicant_8/src/ap/
H A Dpmksa_cache_auth.h53 const u8 *kck, size_t kck_len,
58 const u8 *kck, size_t kck_len, const u8 *aa,
H A Dpmksa_cache_auth.c264 * @kck: Key confirmation key or %NULL if not yet derived
281 const u8 *kck, size_t kck_len,
287 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len,
303 * @kck: Key confirmation key or %NULL if not yet derived
316 const u8 *kck, size_t kck_len, const u8 *aa,
326 if (wpa_key_mgmt_suite_b(akmp) && !kck)
337 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid);
339 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid);
279 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument
315 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dpmksa_cache_auth.h53 const u8 *kck, size_t kck_len,
58 const u8 *kck, size_t kck_len, const u8 *aa,
H A Dpmksa_cache_auth.c264 * @kck: Key confirmation key or %NULL if not yet derived
281 const u8 *kck, size_t kck_len,
287 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len,
303 * @kck: Key confirmation key or %NULL if not yet derived
316 const u8 *kck, size_t kck_len, const u8 *aa,
326 if (wpa_key_mgmt_suite_b(akmp) && !kck)
337 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid);
339 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid);
279 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument
315 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dpmksa_cache.h69 const u8 *pmkid, const u8 *kck, size_t kck_len,
134 const u8 *pmkid, const u8 *kck, size_t kck_len,
133 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp, const u8 *cache_id) argument
H A Dpmksa_cache.c116 * @kck: Key confirmation key or %NULL if not yet derived
132 const u8 *pmkid, const u8 *kck, size_t kck_len,
142 if (wpa_key_mgmt_suite_b(akmp) && !kck)
153 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid);
155 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid);
131 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp, const u8 *cache_id) argument
H A Dwpa_ft.c131 * @kck: 128-bit KCK for MIC or %NULL if no MIC is used
143 const u8 *kck, size_t kck_len,
268 if (kck) {
288 if (kck) {
303 if (wpa_ft_mic(kck, kck_len, sm->own_addr, target_ap, 5,
490 sm->ptk.kck, sm->ptk.kck_len, bssid,
779 if (wpa_ft_mic(sm->ptk.kck, sm->ptk.kck_len, sm->own_addr, src_addr, 6,
141 wpa_ft_gen_req_ies(struct wpa_sm *sm, size_t *len, const u8 *anonce, const u8 *pmk_name, const u8 *kck, size_t kck_len, const u8 *target_ap, const u8 *ric_ies, size_t ric_ies_len, const u8 *ap_mdie) argument
/external/wpa_supplicant_8/src/rsn_supp/
H A Dpmksa_cache.h69 const u8 *pmkid, const u8 *kck, size_t kck_len,
134 const u8 *pmkid, const u8 *kck, size_t kck_len,
133 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp, const u8 *cache_id) argument
H A Dpmksa_cache.c116 * @kck: Key confirmation key or %NULL if not yet derived
132 const u8 *pmkid, const u8 *kck, size_t kck_len,
142 if (wpa_key_mgmt_suite_b(akmp) && !kck)
153 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid);
155 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid);
131 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp, const u8 *cache_id) argument
H A Dwpa_ft.c131 * @kck: 128-bit KCK for MIC or %NULL if no MIC is used
143 const u8 *kck, size_t kck_len,
268 if (kck) {
288 if (kck) {
303 if (wpa_ft_mic(kck, kck_len, sm->own_addr, target_ap, 5,
490 sm->ptk.kck, sm->ptk.kck_len, bssid,
779 if (wpa_ft_mic(sm->ptk.kck, sm->ptk.kck_len, sm->own_addr, src_addr, 6,
141 wpa_ft_gen_req_ies(struct wpa_sm *sm, size_t *len, const u8 *anonce, const u8 *pmk_name, const u8 *kck, size_t kck_len, const u8 *target_ap, const u8 *ric_ies, size_t ric_ies_len, const u8 *ap_mdie) argument
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dpmksa_cache.h69 const u8 *pmkid, const u8 *kck, size_t kck_len,
134 const u8 *pmkid, const u8 *kck, size_t kck_len,
133 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp, const u8 *cache_id) argument
H A Dpmksa_cache.c116 * @kck: Key confirmation key or %NULL if not yet derived
132 const u8 *pmkid, const u8 *kck, size_t kck_len,
142 if (wpa_key_mgmt_suite_b(akmp) && !kck)
153 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid);
155 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid);
131 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp, const u8 *cache_id) argument
H A Dwpa_ft.c131 * @kck: 128-bit KCK for MIC or %NULL if no MIC is used
143 const u8 *kck, size_t kck_len,
268 if (kck) {
288 if (kck) {
303 if (wpa_ft_mic(kck, kck_len, sm->own_addr, target_ap, 5,
490 sm->ptk.kck, sm->ptk.kck_len, bssid,
779 if (wpa_ft_mic(sm->ptk.kck, sm->ptk.kck_len, sm->own_addr, src_addr, 6,
141 wpa_ft_gen_req_ies(struct wpa_sm *sm, size_t *len, const u8 *anonce, const u8 *pmk_name, const u8 *kck, size_t kck_len, const u8 *target_ap, const u8 *ric_ies, size_t ric_ies_len, const u8 *ap_mdie) argument
/external/syslinux/gpxe/src/include/gpxe/
H A Dwpa.h257 u8 kck[WPA_KCK_LEN]; member in struct:wpa_ptk
379 * @v kck Key Confirmation Key, 16 bytes
387 void ( * mic ) ( const void *kck, const void *msg, size_t len,
/external/wpa_supplicant_8/hostapd/src/common/
H A Dsae.h25 u8 kck[SAE_KCK_LEN]; member in struct:sae_temporary_data
H A Dwpa_common.h210 u8 kck[WPA_KCK_MAX_LEN]; /* EAPOL-Key Key Confirmation Key (KCK) */ member in struct:wpa_ptk
355 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr,
396 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa,
399 static inline int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, argument
406 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa,
409 static inline int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, argument
H A Dwpa_common.c331 os_memcpy(ptk->kck, tmp, ptk->kck_len);
332 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len);
618 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, argument
686 if (omac1_aes_128_vector(kck, num_elem, addr, len, mic))
1453 os_memcpy(ptk->kck, tmp, ptk->kck_len);
1457 wpa_hexdump_key(MSG_DEBUG, "FT: KCK", ptk->kck, ptk->kck_len);
1526 * @kck: Key confirmation key
1527 * @kck_len: Length of kck in bytes
1536 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, argument
1548 if (hmac_sha256_vector(kck, kck_le
1569 rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, u8 *pmkid) argument
[all...]
/external/wpa_supplicant_8/src/common/
H A Dsae.h25 u8 kck[SAE_KCK_LEN]; member in struct:sae_temporary_data
H A Dwpa_common.h210 u8 kck[WPA_KCK_MAX_LEN]; /* EAPOL-Key Key Confirmation Key (KCK) */ member in struct:wpa_ptk
355 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr,
396 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa,
399 static inline int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, argument
406 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa,
409 static inline int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, argument
H A Dwpa_common.c331 os_memcpy(ptk->kck, tmp, ptk->kck_len);
332 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len);
618 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, argument
686 if (omac1_aes_128_vector(kck, num_elem, addr, len, mic))
1453 os_memcpy(ptk->kck, tmp, ptk->kck_len);
1457 wpa_hexdump_key(MSG_DEBUG, "FT: KCK", ptk->kck, ptk->kck_len);
1526 * @kck: Key confirmation key
1527 * @kck_len: Length of kck in bytes
1536 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, argument
1548 if (hmac_sha256_vector(kck, kck_le
1569 rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, u8 *pmkid) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/common/
H A Dsae.h25 u8 kck[SAE_KCK_LEN]; member in struct:sae_temporary_data
H A Dwpa_common.h210 u8 kck[WPA_KCK_MAX_LEN]; /* EAPOL-Key Key Confirmation Key (KCK) */ member in struct:wpa_ptk
355 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr,
396 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa,
399 static inline int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, argument
406 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa,
409 static inline int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, argument
H A Dwpa_common.c331 os_memcpy(ptk->kck, tmp, ptk->kck_len);
332 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len);
618 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, argument
686 if (omac1_aes_128_vector(kck, num_elem, addr, len, mic))
1453 os_memcpy(ptk->kck, tmp, ptk->kck_len);
1457 wpa_hexdump_key(MSG_DEBUG, "FT: KCK", ptk->kck, ptk->kck_len);
1526 * @kck: Key confirmation key
1527 * @kck_len: Length of kck in bytes
1536 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, argument
1548 if (hmac_sha256_vector(kck, kck_le
1569 rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, u8 *pmkid) argument
[all...]

Completed in 310 milliseconds

123