/external/wpa_supplicant_8/src/common/ |
sae.h | 22 u8 kck[SAE_KCK_LEN]; member in struct:sae_temporary_data
|
wpa_common.h | 184 u8 kck[16]; /* EAPOL-Key Key Confirmation Key (KCK) */ member in struct:wpa_ptk 322 int wpa_ft_mic(const u8 *kck, const u8 *sta_addr, const u8 *ap_addr,
|
sae.c | 605 * KCK || PMK = KDF-512(keyseed, "SAE KCK and PMK", 620 sha256_prf(keyseed, sizeof(keyseed), "SAE KCK and PMK", 622 os_memcpy(sae->tmp->kck, keys, SAE_KCK_LEN); 624 wpa_hexdump_key(MSG_DEBUG, "SAE: KCK", sae->tmp->kck, SAE_KCK_LEN); 920 * confirm = CN(KCK, send-confirm, commit-scalar, COMMIT-ELEMENT, 922 * verifier = CN(KCK, peer-send-confirm, peer-commit-scalar, 939 hmac_sha256_vector(sae->tmp->kck, sizeof(sae->tmp->kck), 5, addr, len [all...] |
wpa_common.c | 24 * @key: EAPOL-Key Key Confirmation Key (KCK) 133 int wpa_ft_mic(const u8 *kck, const u8 *sta_addr, const u8 *ap_addr, 178 if (omac1_aes_128(kck, buf, pos - buf, mic)) { [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_i.h | 249 sm->ptk.kck, sm->rx_replay_counter); 301 void wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck,
|
wpa_ft.c | 136 * @kck: 128-bit KCK for MIC or %NULL if no MIC is used 147 const u8 *kck, const u8 *target_ap, 264 if (kck) { 284 if (kck) { 299 if (wpa_ft_mic(kck, sm->own_addr, target_ap, 5, 487 sm->pmk_r1_name, sm->ptk.kck, bssid, 755 if (wpa_ft_mic(sm->ptk.kck, sm->own_addr, src_addr, 6,
|
tdls.c | 102 u8 kck[16]; /* TPK-KCK */ member in struct:wpa_tdls_peer::tpk 407 wpa_hexdump_key(MSG_DEBUG, "TDLS: TPK-KCK", 408 peer->tpk.kck, sizeof(peer->tpk.kck)); 417 * @kck: TPK-KCK 426 static int wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid, 468 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16) [all...] |
peerkey.c | 115 wpa_eapol_key_send(sm, sm->ptk.kck, ver, dst, ETH_P_EAPOL, 167 wpa_eapol_key_send(sm, sm->ptk.kck, ver, src_addr, ETH_P_EAPOL, 429 wpa_eapol_key_send(sm, peerkey->stk.kck, ver, peerkey->addr, 942 wpa_eapol_key_mic(peerkey->tstk.kck, ver, buf, len, 958 wpa_eapol_key_mic(peerkey->stk.kck, ver, buf, len, 1099 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL, [all...] |
wpa.c | 29 * @kck: Key Confirmation Key (KCK, part of PTK) 37 void wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, 59 wpa_eapol_key_mic(kck, ver, msg, msg_len, key_mic)) { 65 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", kck, 16); 131 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL, 348 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL, 1032 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL, [all...] |
wpa.h | 67 void (*set_rekey_offload)(void *ctx, const u8 *kek, const u8 *kck,
|
/external/wpa_supplicant_8/wpa_supplicant/ |
driver_i.h | 668 const u8 *kek, const u8 *kck, 673 wpa_s->driver->set_rekey_info(wpa_s->drv_priv, kek, kck, replay_ctr);
|
wpas_glue.c | 832 const u8 *kck, 837 wpa_drv_set_rekey_info(wpa_s, kek, kck, replay_ctr);
|
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_ft.c | 728 wpa_ft_mic(sm->PTK.kck, sm->addr, sm->wpa_auth->addr, 6, 1085 if (wpa_ft_mic(sm->PTK.kck, sm->addr, sm->wpa_auth->addr, 5, [all...] |
wpa_auth.c | [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver.h | [all...] |
driver_nl80211.c | [all...] |