HomeSort by relevance Sort by last modified time
    Searched refs:kck (Results 1 - 20 of 20) sorted by null

  /external/wpa_supplicant_8/src/rsn_supp/
pmksa_cache.h 60 const u8 *pmkid, const u8 *kck, size_t kck_len,
108 const u8 *pmkid, const u8 *kck, size_t kck_len,
pmksa_cache.c 113 * @kck: Key confirmation key or %NULL if not yet derived
114 * @kck_len: KCK length in bytes
128 const u8 *pmkid, const u8 *kck, size_t kck_len,
137 if (wpa_key_mgmt_suite_b(akmp) && !kck)
148 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid);
150 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid);
wpa_ft.c 131 * @kck: 128-bit KCK for MIC or %NULL if no MIC is used
132 * @kck_len: KCK length in octets
143 const u8 *kck, size_t kck_len,
261 if (kck) {
281 if (kck) {
296 if (wpa_ft_mic(kck, kck_len, sm->own_addr, target_ap, 5,
483 sm->ptk.kck, sm->ptk.kck_len, bssid,
767 if (wpa_ft_mic(sm->ptk.kck, sm->ptk.kck_len, sm->own_addr, src_addr, 6,
tdls.c 111 u8 kck[16]; /* TPK-KCK */ member in struct:wpa_tdls_peer::tpk
436 wpa_hexdump_key(MSG_DEBUG, "TDLS: TPK-KCK",
437 peer->tpk.kck, sizeof(peer->tpk.kck));
446 * @kck: TPK-KCK
455 static int wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid,
497 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16)
    [all...]
peerkey.c 117 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, dst,
171 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, src_addr,
429 wpa_eapol_key_send(sm, peerkey->stk.kck, peerkey->stk.kck_len, ver,
932 wpa_eapol_key_mic(peerkey->tstk.kck, peerkey->tstk.kck_len,
949 wpa_eapol_key_mic(peerkey->stk.kck, peerkey->stk.kck_len,
1087 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, bssid,
    [all...]
wpa_i.h 265 sm->ptk.kck, sm->ptk.kck_len,
356 int wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, size_t kck_len,
wpa.c 33 * @kck: Key Confirmation Key (KCK, part of PTK)
34 * @kck_len: KCK length in octets
43 int wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, size_t kck_len,
68 wpa_eapol_key_mic(kck, kck_len, sm->key_mgmt, ver, msg, msg_len,
75 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", kck, kck_len);
158 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, bssid,
424 return wpa_eapol_key_send(sm, ptk->kck, ptk->kck_len, ver, dst,
    [all...]
wpa.h 77 const u8 *kck, size_t kck_len,
  /external/wpa_supplicant_8/src/ap/
pmksa_cache_auth.h 52 const u8 *kck, size_t kck_len,
pmksa_cache_auth.c 264 * @kck: Key confirmation key or %NULL if not yet derived
265 * @kck_len: KCK length in bytes
281 const u8 *kck, size_t kck_len,
291 if (wpa_key_mgmt_suite_b(akmp) && !kck)
302 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid);
304 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid);
wpa_auth_ft.c 740 wpa_ft_mic(sm->PTK.kck, sm->PTK.kck_len, sm->addr,
1108 if (wpa_ft_mic(sm->PTK.kck, sm->PTK.kck_len, sm->addr,
    [all...]
wpa_auth.c     [all...]
  /external/wpa_supplicant_8/src/common/
wpa_common.h 212 u8 kck[WPA_KCK_MAX_LEN]; /* EAPOL-Key Key Confirmation Key (KCK) */ member in struct:wpa_ptk
345 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr,
386 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa,
389 static inline int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa,
396 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa,
399 static inline int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len,
sae.h 25 u8 kck[SAE_KCK_LEN]; member in struct:sae_temporary_data
wpa_common.c 49 * @key: EAPOL-Key Key Confirmation Key (KCK)
50 * @key_len: KCK length in octets
194 os_memcpy(ptk->kck, tmp, ptk->kck_len);
195 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len);
209 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr,
222 wpa_printf(MSG_WARNING, "FT: Unsupported KCK length %u",
277 if (omac1_aes_128_vector(kck, num_elem, addr, len, mic))
1015 os_memcpy(ptk->kck, tmp, ptk->kck_len);
1019 wpa_hexdump_key(MSG_DEBUG, "FT: KCK", ptk->kck, ptk->kck_len)
    [all...]
sae.c 799 * KCK || PMK = KDF-512(keyseed, "SAE KCK and PMK",
814 if (sha256_prf(keyseed, sizeof(keyseed), "SAE KCK and PMK",
818 os_memcpy(sae->tmp->kck, keys, SAE_KCK_LEN);
822 wpa_hexdump_key(MSG_DEBUG, "SAE: KCK", sae->tmp->kck, SAE_KCK_LEN);
1164 * confirm = CN(KCK, send-confirm, commit-scalar, COMMIT-ELEMENT,
1166 * verifier = CN(KCK, peer-send-confirm, peer-commit-scalar,
1183 hmac_sha256_vector(sae->tmp->kck, sizeof(sae->tmp->kck), 5, addr, len
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
driver_i.h 566 const u8 *kck, size_t kck_len,
572 kck, kck_len, replay_ctr);
wpas_glue.c 1017 const u8 *kck, size_t kck_len,
1022 wpa_drv_set_rekey_info(wpa_s, kek, kek_len, kck, kck_len, replay_ctr);
  /external/wpa_supplicant_8/src/drivers/
driver.h     [all...]
driver_nl80211.c     [all...]

Completed in 136 milliseconds