/external/wpa_supplicant_8/src/rsn_supp/ |
pmksa_cache.h | 60 const u8 *pmkid, const u8 *kck, size_t kck_len, 108 const u8 *pmkid, const u8 *kck, size_t kck_len,
|
pmksa_cache.c | 113 * @kck: Key confirmation key or %NULL if not yet derived 114 * @kck_len: KCK length in bytes 128 const u8 *pmkid, const u8 *kck, size_t kck_len, 137 if (wpa_key_mgmt_suite_b(akmp) && !kck) 148 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); 150 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid);
|
wpa_ft.c | 131 * @kck: 128-bit KCK for MIC or %NULL if no MIC is used 132 * @kck_len: KCK length in octets 143 const u8 *kck, size_t kck_len, 261 if (kck) { 281 if (kck) { 296 if (wpa_ft_mic(kck, kck_len, sm->own_addr, target_ap, 5, 483 sm->ptk.kck, sm->ptk.kck_len, bssid, 767 if (wpa_ft_mic(sm->ptk.kck, sm->ptk.kck_len, sm->own_addr, src_addr, 6,
|
tdls.c | 111 u8 kck[16]; /* TPK-KCK */ member in struct:wpa_tdls_peer::tpk 436 wpa_hexdump_key(MSG_DEBUG, "TDLS: TPK-KCK", 437 peer->tpk.kck, sizeof(peer->tpk.kck)); 446 * @kck: TPK-KCK 455 static int wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid, 497 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16) [all...] |
peerkey.c | 117 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, dst, 171 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, src_addr, 429 wpa_eapol_key_send(sm, peerkey->stk.kck, peerkey->stk.kck_len, ver, 932 wpa_eapol_key_mic(peerkey->tstk.kck, peerkey->tstk.kck_len, 949 wpa_eapol_key_mic(peerkey->stk.kck, peerkey->stk.kck_len, 1087 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, bssid, [all...] |
wpa_i.h | 265 sm->ptk.kck, sm->ptk.kck_len, 356 int wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, size_t kck_len,
|
wpa.c | 33 * @kck: Key Confirmation Key (KCK, part of PTK) 34 * @kck_len: KCK length in octets 43 int wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, size_t kck_len, 68 wpa_eapol_key_mic(kck, kck_len, sm->key_mgmt, ver, msg, msg_len, 75 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", kck, kck_len); 158 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, bssid, 424 return wpa_eapol_key_send(sm, ptk->kck, ptk->kck_len, ver, dst, [all...] |
wpa.h | 77 const u8 *kck, size_t kck_len,
|
/external/wpa_supplicant_8/src/ap/ |
pmksa_cache_auth.h | 52 const u8 *kck, size_t kck_len,
|
pmksa_cache_auth.c | 264 * @kck: Key confirmation key or %NULL if not yet derived 265 * @kck_len: KCK length in bytes 281 const u8 *kck, size_t kck_len, 291 if (wpa_key_mgmt_suite_b(akmp) && !kck) 302 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); 304 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid);
|
wpa_auth_ft.c | 740 wpa_ft_mic(sm->PTK.kck, sm->PTK.kck_len, sm->addr, 1108 if (wpa_ft_mic(sm->PTK.kck, sm->PTK.kck_len, sm->addr, [all...] |
wpa_auth.c | [all...] |
/external/wpa_supplicant_8/src/common/ |
wpa_common.h | 212 u8 kck[WPA_KCK_MAX_LEN]; /* EAPOL-Key Key Confirmation Key (KCK) */ member in struct:wpa_ptk 345 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, 386 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, 389 static inline int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, 396 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, 399 static inline int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len,
|
sae.h | 25 u8 kck[SAE_KCK_LEN]; member in struct:sae_temporary_data
|
wpa_common.c | 49 * @key: EAPOL-Key Key Confirmation Key (KCK) 50 * @key_len: KCK length in octets 194 os_memcpy(ptk->kck, tmp, ptk->kck_len); 195 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len); 209 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, 222 wpa_printf(MSG_WARNING, "FT: Unsupported KCK length %u", 277 if (omac1_aes_128_vector(kck, num_elem, addr, len, mic)) 1015 os_memcpy(ptk->kck, tmp, ptk->kck_len); 1019 wpa_hexdump_key(MSG_DEBUG, "FT: KCK", ptk->kck, ptk->kck_len) [all...] |
sae.c | 799 * KCK || PMK = KDF-512(keyseed, "SAE KCK and PMK", 814 if (sha256_prf(keyseed, sizeof(keyseed), "SAE KCK and PMK", 818 os_memcpy(sae->tmp->kck, keys, SAE_KCK_LEN); 822 wpa_hexdump_key(MSG_DEBUG, "SAE: KCK", sae->tmp->kck, SAE_KCK_LEN); 1164 * confirm = CN(KCK, send-confirm, commit-scalar, COMMIT-ELEMENT, 1166 * verifier = CN(KCK, peer-send-confirm, peer-commit-scalar, 1183 hmac_sha256_vector(sae->tmp->kck, sizeof(sae->tmp->kck), 5, addr, len [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
driver_i.h | 566 const u8 *kck, size_t kck_len, 572 kck, kck_len, replay_ctr);
|
wpas_glue.c | 1017 const u8 *kck, size_t kck_len, 1022 wpa_drv_set_rekey_info(wpa_s, kek, kek_len, kck, kck_len, replay_ctr);
|
/external/wpa_supplicant_8/src/drivers/ |
driver.h | [all...] |
driver_nl80211.c | [all...] |