/external/wpa_supplicant_8/src/ap/ |
pmksa_cache_auth.h | 53 const u8 *kck, size_t kck_len, 58 const u8 *kck, size_t kck_len, const u8 *aa,
|
pmksa_cache_auth.c | 264 * @kck: Key confirmation key or %NULL if not yet derived 265 * @kck_len: KCK length in bytes 281 const u8 *kck, size_t kck_len, 287 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len, 303 * @kck: Key confirmation key or %NULL if not yet derived 304 * @kck_len: KCK length in bytes 316 const u8 *kck, size_t kck_len, const u8 *aa, 326 if (wpa_key_mgmt_suite_b(akmp) && !kck) 337 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); 339 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid) [all...] |
wpa_auth.c | [all...] |
wpa_auth_ft.c | [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
pmksa_cache.h | 69 const u8 *pmkid, const u8 *kck, size_t kck_len, 134 const u8 *pmkid, const u8 *kck, size_t kck_len,
|
pmksa_cache.c | 116 * @kck: Key confirmation key or %NULL if not yet derived 117 * @kck_len: KCK length in bytes 132 const u8 *pmkid, const u8 *kck, size_t kck_len, 142 if (wpa_key_mgmt_suite_b(akmp) && !kck) 153 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); 155 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid);
|
wpa_ft.c | 131 * @kck: 128-bit KCK for MIC or %NULL if no MIC is used 132 * @kck_len: KCK length in octets 143 const u8 *kck, size_t kck_len, 268 if (kck) { 288 if (kck) { 303 if (wpa_ft_mic(kck, kck_len, sm->own_addr, target_ap, 5, 490 sm->ptk.kck, sm->ptk.kck_len, bssid, 779 if (wpa_ft_mic(sm->ptk.kck, sm->ptk.kck_len, sm->own_addr, src_addr, 6,
|
tdls.c | 111 u8 kck[16]; /* TPK-KCK */ member in struct:wpa_tdls_peer::tpk 451 wpa_hexdump_key(MSG_DEBUG, "TDLS: TPK-KCK", 452 peer->tpk.kck, sizeof(peer->tpk.kck)); 461 * @kck: TPK-KCK 470 static int wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid, 512 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16) [all...] |
wpa.h | 80 const u8 *kck, size_t kck_len,
|
wpa_i.h | 296 sm->ptk.kck, sm->ptk.kck_len,
|
wpa.c | 81 wpa_eapol_key_mic(ptk->kck, ptk->kck_len, sm->key_mgmt, ver, 89 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", 90 ptk->kck, ptk->kck_len); [all...] |
/external/syslinux/gpxe/src/include/gpxe/ |
wpa.h | 256 /** EAPOL-Key Key Confirmation Key (KCK) */ 257 u8 kck[WPA_KCK_LEN]; member in struct:wpa_ptk 379 * @v kck Key Confirmation Key, 16 bytes 387 void ( * mic ) ( const void *kck, const void *msg, size_t len,
|
/external/wpa_supplicant_8/src/common/ |
sae.h | 25 u8 kck[SAE_KCK_LEN]; member in struct:sae_temporary_data
|
wpa_common.h | 210 u8 kck[WPA_KCK_MAX_LEN]; /* EAPOL-Key Key Confirmation Key (KCK) */ member in struct:wpa_ptk 355 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, 396 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, 399 static inline int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, 406 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, 409 static inline int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len,
|
wpa_common.c | 86 * @key: EAPOL-Key Key Confirmation Key (KCK) 87 * @key_len: KCK length in octets 111 "WPA: KCK not set - cannot calculate MIC"); 174 "OWE: Unsupported KCK length: %u", 197 "DPP: Unsupported KCK length: %u", 331 os_memcpy(ptk->kck, tmp, ptk->kck_len); 332 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len); 618 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, 631 wpa_printf(MSG_WARNING, "FT: Unsupported KCK length %u" [all...] |
sae.c | 799 * KCK || PMK = KDF-512(keyseed, "SAE KCK and PMK", 814 if (sha256_prf(keyseed, sizeof(keyseed), "SAE KCK and PMK", 818 os_memcpy(sae->tmp->kck, keys, SAE_KCK_LEN); 822 wpa_hexdump_key(MSG_DEBUG, "SAE: KCK", sae->tmp->kck, SAE_KCK_LEN); 1164 * confirm = CN(KCK, send-confirm, commit-scalar, COMMIT-ELEMENT, 1166 * verifier = CN(KCK, peer-send-confirm, peer-commit-scalar, 1183 hmac_sha256_vector(sae->tmp->kck, sizeof(sae->tmp->kck), 5, addr, len [all...] |
/external/scapy/scapy/modules/krack/ |
automaton.py | 165 PTK, KCK, KEK, TK, MIC (AP -> STA), MIC (STA -> AP) 177 self.kck = self.ptk[:16] 559 assert hmac.new(self.kck, client_data, hashlib.md5).digest() == client_mic 582 key_mic=self.kck, 643 key_mic=self.kck, 752 key_mic=self.kck,
|
/external/syslinux/gpxe/src/net/80211/ |
wpa_ccmp.c | 471 * @v kck Key Confirmation Key, 16 bytes 476 static void ccmp_kie_mic ( const void *kck, const void *msg, size_t len, 484 memcpy ( kckb, kck, kck_len );
|
wpa_tkip.c | 538 * @v kck Key Confirmation Key, 16 bytes 543 static void tkip_kie_mic ( const void *kck, const void *msg, size_t len, 550 memcpy ( kckb, kck, kck_len );
|
wpa.c | 491 kie->mic ( &ctx->ptk.kck, eapol, EAPOL_HDR_LEN + 900 kie->mic ( &ctx->ptk.kck, ( void * ) pkt - EAPOL_HDR_LEN,
|
/external/wpa_supplicant_8/wpa_supplicant/ |
driver_i.h | 575 const u8 *kck, size_t kck_len, 581 kck, kck_len, replay_ctr);
|
wpas_glue.c | 1144 const u8 *kck, size_t kck_len, 1149 wpa_drv_set_rekey_info(wpa_s, kek, kek_len, kck, kck_len, replay_ctr); [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver.h | [all...] |
driver_nl80211.c | [all...] |