HomeSort by relevance Sort by last modified time
    Searched refs:kck (Results 1 - 16 of 16) sorted by null

  /external/wpa_supplicant_8/src/common/
sae.h 22 u8 kck[SAE_KCK_LEN]; member in struct:sae_temporary_data
wpa_common.h 199 u8 kck[16]; /* EAPOL-Key Key Confirmation Key (KCK) */ member in struct:wpa_ptk
338 int wpa_ft_mic(const u8 *kck, const u8 *sta_addr, const u8 *ap_addr,
sae.c 609 * KCK || PMK = KDF-512(keyseed, "SAE KCK and PMK",
624 sha256_prf(keyseed, sizeof(keyseed), "SAE KCK and PMK",
626 os_memcpy(sae->tmp->kck, keys, SAE_KCK_LEN);
628 wpa_hexdump_key(MSG_DEBUG, "SAE: KCK", sae->tmp->kck, SAE_KCK_LEN);
934 * confirm = CN(KCK, send-confirm, commit-scalar, COMMIT-ELEMENT,
936 * verifier = CN(KCK, peer-send-confirm, peer-commit-scalar,
953 hmac_sha256_vector(sae->tmp->kck, sizeof(sae->tmp->kck), 5, addr, len
    [all...]
wpa_common.c 25 * @key: EAPOL-Key Key Confirmation Key (KCK)
139 int wpa_ft_mic(const u8 *kck, const u8 *sta_addr, const u8 *ap_addr,
184 if (omac1_aes_128(kck, buf, pos - buf, mic)) {
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
wpa_i.h 254 sm->ptk.kck, sm->rx_replay_counter);
315 void wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck,
wpa_ft.c 136 * @kck: 128-bit KCK for MIC or %NULL if no MIC is used
147 const u8 *kck, const u8 *target_ap,
266 if (kck) {
286 if (kck) {
301 if (wpa_ft_mic(kck, sm->own_addr, target_ap, 5,
490 sm->pmk_r1_name, sm->ptk.kck, bssid,
773 if (wpa_ft_mic(sm->ptk.kck, sm->own_addr, src_addr, 6,
tdls.c 110 u8 kck[16]; /* TPK-KCK */ member in struct:wpa_tdls_peer::tpk
432 wpa_hexdump_key(MSG_DEBUG, "TDLS: TPK-KCK",
433 peer->tpk.kck, sizeof(peer->tpk.kck));
442 * @kck: TPK-KCK
451 static int wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid,
493 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16)
    [all...]
peerkey.c 115 wpa_eapol_key_send(sm, sm->ptk.kck, ver, dst, ETH_P_EAPOL,
167 wpa_eapol_key_send(sm, sm->ptk.kck, ver, src_addr, ETH_P_EAPOL,
429 wpa_eapol_key_send(sm, peerkey->stk.kck, ver, peerkey->addr,
930 wpa_eapol_key_mic(peerkey->tstk.kck, ver, buf, len,
946 wpa_eapol_key_mic(peerkey->stk.kck, ver, buf, len,
1087 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL,
    [all...]
wpa.c 29 * @kck: Key Confirmation Key (KCK, part of PTK)
37 void wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck,
59 wpa_eapol_key_mic(kck, ver, msg, msg_len, key_mic)) {
65 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", kck, 16);
135 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL,
354 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL,
1063 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL,
    [all...]
wpa.h 71 void (*set_rekey_offload)(void *ctx, const u8 *kek, const u8 *kck,
  /external/wpa_supplicant_8/wpa_supplicant/
driver_i.h 566 const u8 *kek, const u8 *kck,
571 wpa_s->driver->set_rekey_info(wpa_s->drv_priv, kek, kck, replay_ctr);
wpas_glue.c 892 const u8 *kck,
897 wpa_drv_set_rekey_info(wpa_s, kek, kck, replay_ctr);
  /external/wpa_supplicant_8/src/ap/
wpa_auth_ft.c 747 wpa_ft_mic(sm->PTK.kck, sm->addr, sm->wpa_auth->addr, 6,
1110 if (wpa_ft_mic(sm->PTK.kck, sm->addr, sm->wpa_auth->addr, 5,
    [all...]
wpa_auth.c     [all...]
  /external/wpa_supplicant_8/src/drivers/
driver.h     [all...]
driver_nl80211.c     [all...]

Completed in 288 milliseconds