HomeSort by: relevance | last modified time | path
    Searched defs:kck (Results 1 - 8 of 8) sorted by relevancy

  /src/external/bsd/wpa/dist/src/ap/
pmksa_cache_auth.h 22 u8 kck[WPA_KCK_MAX_LEN]; member in struct:rsn_pmksa_cache_entry
57 const u8 *kck, size_t kck_len,
62 const u8 *kck, size_t kck_len, const u8 *aa,
wpa_auth_ft.c 2574 const u8 *kck; local
2844 kck = sm->PTK.kck2;
2847 kck = sm->PTK.kck;
2851 wpa_ft_mic(sm->wpa_key_mgmt, kck, kck_len,
3497 const u8 *kck; local
3641 kck = sm->PTK.kck2;
3644 kck = sm->PTK.kck;
3647 if (wpa_ft_mic(sm->wpa_key_mgmt, kck, kck_len
    [all...]
  /src/external/bsd/wpa/dist/src/rsn_supp/
pmksa_cache.h 20 u8 kck[WPA_KCK_MAX_LEN]; member in struct:rsn_pmksa_cache_entry
85 const u8 *pmkid, const u8 *kck, size_t kck_len,
wpa_ft.c 195 * @kck: KCK for MIC or %NULL if no MIC is used
196 * @kck_len: KCK length in octets
208 const u8 *kck, size_t kck_len,
396 if (kck) {
409 if (kck && wpa_sm_ocv_enabled(sm)) {
455 if (kck) {
472 if (wpa_ft_mic(sm->key_mgmt, kck, kck_len,
595 const u8 *kck; local
731 kck = sm->ptk.kck2
1028 const u8 *kck; local
    [all...]
tdls.c 112 u8 kck[16]; /* TPK-KCK */ member in struct:wpa_tdls_peer::tpk
472 wpa_hexdump_key(MSG_DEBUG, "TDLS: TPK-KCK",
473 peer->tpk.kck, sizeof(peer->tpk.kck));
482 * @kck: TPK-KCK
493 static int wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid,
536 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16)
    [all...]
  /src/external/bsd/wpa/dist/src/common/
common_module_tests.c 307 const u8 kck[] = { local
435 if (os_memcmp(kck, sae.tmp->kck, SAE_KCK_LEN) != 0) {
436 wpa_printf(MSG_ERROR, "SAE: Mismatch in KCK");
631 const u8 kck[] = { local
659 if (ptk.kck_len != sizeof(kck) ||
660 os_memcmp(kck, ptk.kck, sizeof(kck)) != 0) {
661 wpa_printf(MSG_ERROR, "PASN: Mismatched KCK");
708 const u8 kck[] = { local
    [all...]
sae.h 42 u8 kck[SAE_MAX_HASH_LEN]; member in struct:sae_temporary_data
wpa_common.h 259 u8 kck[WPA_KCK_MAX_LEN]; /* EAPOL-Key Key Confirmation Key (KCK) */ member in struct:wpa_ptk
488 int wpa_ft_mic(int key_mgmt, const u8 *kck, size_t kck_len, const u8 *sta_addr,
539 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa,
542 static inline int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa,
549 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa,
552 static inline int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len,
760 int pasn_mic(const u8 *kck, int akmp, int cipher,

Completed in 28 milliseconds