/external/wpa_supplicant_6/wpa_supplicant/src/common/ |
wpa_common.h | 168 u8 kck[16]; /* EAPOL-Key Key Confirmation Key (KCK) */ member in struct:wpa_ptk 300 int wpa_ft_mic(const u8 *kck, const u8 *sta_addr, const u8 *ap_addr,
|
wpa_common.c | 30 * @key: EAPOL-Key Key Confirmation Key (KCK) 135 int wpa_ft_mic(const u8 *kck, const u8 *sta_addr, const u8 *ap_addr, 180 if (omac1_aes_128(kck, buf, pos - buf, mic)) {
|
/external/wpa_supplicant_8/src/rsn_supp/ |
tdls.c | 106 u8 kck[16]; /* TPK-KCK */ member in struct:wpa_tdls_peer::tpk 379 wpa_hexdump_key(MSG_DEBUG, "TDLS: TPK-KCK", 380 peer->tpk.kck, sizeof(peer->tpk.kck)); 389 * @kck: TPK-KCK 398 static int wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid, 440 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16) [all...] |
wpa_ft.c | 168 * @kck: 128-bit KCK for MIC or %NULL if no MIC is used 179 const u8 *kck, const u8 *target_ap, 298 if (kck) { 318 if (kck) { 333 if (wpa_ft_mic(kck, sm->own_addr, target_ap, 5, 676 sm->pmk_r1_name, sm->ptk.kck, bssid, 962 if (wpa_ft_mic(sm->ptk.kck, sm->own_addr, src_addr, 6,
|
peerkey.c | 121 wpa_eapol_key_send(sm, sm->ptk.kck, ver, dst, ETH_P_EAPOL, 173 wpa_eapol_key_send(sm, sm->ptk.kck, ver, src_addr, ETH_P_EAPOL, 441 wpa_eapol_key_send(sm, peerkey->stk.kck, ver, peerkey->addr, 956 wpa_eapol_key_mic(peerkey->tstk.kck, ver, buf, len, 972 wpa_eapol_key_mic(peerkey->stk.kck, ver, buf, len, [all...] |
wpa.c | 35 * @kck: Key Confirmation Key (KCK, part of PTK) 43 void wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, 65 wpa_eapol_key_mic(kck, ver, msg, msg_len, key_mic)) { 71 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", kck, 16); 137 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL, 346 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL, 1064 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL, [all...] |
wpa_i.h | 269 void wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck,
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
wpa_ft.c | 113 * @kck: 128-bit KCK for MIC or %NULL if no MIC is used 121 const u8 *kck, const u8 *target_ap) 244 if (kck) { 257 if (wpa_ft_mic(kck, sm->own_addr, target_ap, 5, 557 sm->pmk_r1_name, sm->ptk.kck, bssid); 813 if (wpa_ft_mic(sm->ptk.kck, sm->own_addr, src_addr, 6,
|
peerkey.c | 120 wpa_eapol_key_send(sm, sm->ptk.kck, ver, dst, ETH_P_EAPOL, 172 wpa_eapol_key_send(sm, sm->ptk.kck, ver, src_addr, ETH_P_EAPOL, 440 wpa_eapol_key_send(sm, peerkey->stk.kck, ver, peerkey->addr, 953 wpa_eapol_key_mic(peerkey->tstk.kck, ver, buf, len, 969 wpa_eapol_key_mic(peerkey->stk.kck, ver, buf, len, [all...] |
wpa.c | 95 * @kck: Key Confirmation Key (KCK, part of PTK) 103 void wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, 123 wpa_eapol_key_mic(kck, ver, msg, msg_len, key_mic); 186 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL, 351 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL, 935 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL, [all...] |
wpa_i.h | 227 void wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck,
|
/external/wpa_supplicant_8/src/common/ |
wpa_common.h | 176 u8 kck[16]; /* EAPOL-Key Key Confirmation Key (KCK) */ member in struct:wpa_ptk 314 int wpa_ft_mic(const u8 *kck, const u8 *sta_addr, const u8 *ap_addr,
|
wpa_common.c | 30 * @key: EAPOL-Key Key Confirmation Key (KCK) 137 int wpa_ft_mic(const u8 *kck, const u8 *sta_addr, const u8 *ap_addr, 182 if (omac1_aes_128(kck, buf, pos - buf, mic)) {
|
/external/wpa_supplicant/ |
wpa_i.h | 29 u8 kck[16]; /* EAPOL-Key Key Confirmation Key (KCK) */ member in struct:wpa_ptk
|
wpa.c | 912 * @key: EAPOL-Key Key Confirmation Key (KCK) 940 static void wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, 961 wpa_eapol_key_mic(kck, ver, msg, msg_len, key_mic); 1024 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL, [all...] |
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_ft.c | 720 wpa_ft_mic(sm->PTK.kck, sm->addr, sm->wpa_auth->addr, 6, 1218 if (wpa_ft_mic(sm->PTK.kck, sm->addr, sm->wpa_auth->addr, 5, [all...] |
wpa_auth.c | [all...] |