/external/wpa_supplicant_8/src/ap/ |
pmksa_cache_auth.h | 52 const u8 *kck, size_t kck_len, 57 const u8 *kck, size_t kck_len, const u8 *aa,
|
pmksa_cache_auth.c | 265 * @kck_len: KCK length in bytes 281 const u8 *kck, size_t kck_len, 287 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len, 304 * @kck_len: KCK length in bytes 316 const u8 *kck, size_t kck_len, const u8 *aa, 337 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); 339 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid);
|
wpa_auth_ft.c | 757 wpa_ft_mic(sm->PTK.kck, sm->PTK.kck_len, sm->addr, [all...] |
wpa_auth.c | [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
pmksa_cache.h | 61 const u8 *pmkid, const u8 *kck, size_t kck_len, 125 const u8 *pmkid, const u8 *kck, size_t kck_len,
|
pmksa_cache.c | 115 * @kck_len: KCK length in bytes 129 const u8 *pmkid, const u8 *kck, size_t kck_len, 149 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); 151 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid);
|
wpa_ft.c | 132 * @kck_len: KCK length in octets 143 const u8 *kck, size_t kck_len, 296 if (wpa_ft_mic(kck, kck_len, sm->own_addr, target_ap, 5, 483 sm->ptk.kck, sm->ptk.kck_len, bssid, 767 if (wpa_ft_mic(sm->ptk.kck, sm->ptk.kck_len, sm->own_addr, src_addr, 6,
|
wpa.h | 79 const u8 *kck, size_t kck_len,
|
wpa_i.h | 277 sm->ptk.kck, sm->ptk.kck_len,
|
wpa.c | 72 if (key_mic && (!ptk || !ptk->kck_len)) 76 wpa_eapol_key_mic(ptk->kck, ptk->kck_len, sm->key_mgmt, ver, 85 ptk->kck, ptk->kck_len); [all...] |
peerkey.c | 938 wpa_eapol_key_mic(peerkey->tstk.kck, peerkey->tstk.kck_len, 955 wpa_eapol_key_mic(peerkey->stk.kck, peerkey->stk.kck_len, [all...] |
/external/wpa_supplicant_8/src/common/ |
wpa_common.c | 192 ptk->kck_len = wpa_kck_len(akmp); 195 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len; 218 os_memcpy(ptk->kck, tmp, ptk->kck_len); 219 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len); 221 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); 224 os_memcpy(ptk->tk, tmp + ptk->kck_len + ptk->kek_len, ptk->tk_len); 329 ptk->kck_len = 0; 454 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, 466 if (kck_len != 16) { 468 (unsigned int) kck_len); [all...] |
wpa_common.h | 211 size_t kck_len; member in struct:wpa_ptk 355 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, 396 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, 399 static inline int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, 406 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, 409 static inline int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len,
|
/external/syslinux/gpxe/src/net/80211/ |
wpa_ccmp.c | 482 size_t kck_len = 16; local 484 memcpy ( kckb, kck, kck_len ); 486 hmac_init ( &sha1_algorithm, sha1_ctx, kckb, &kck_len ); 488 hmac_final ( &sha1_algorithm, sha1_ctx, kckb, &kck_len, hash );
|
wpa_tkip.c | 548 size_t kck_len = 16; local 550 memcpy ( kckb, kck, kck_len ); 552 hmac_init ( &md5_algorithm, &md5, kckb, &kck_len ); 554 hmac_final ( &md5_algorithm, &md5, kckb, &kck_len, mic );
|
/external/wpa_supplicant_8/wpa_supplicant/ |
driver_i.h | 575 const u8 *kck, size_t kck_len, 581 kck, kck_len, replay_ctr);
|
wpas_glue.c | 1096 const u8 *kck, size_t kck_len, 1101 wpa_drv_set_rekey_info(wpa_s, kek, kek_len, kck, kck_len, replay_ctr); [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver.h | [all...] |
driver_nl80211.c | [all...] |