| /src/external/bsd/wpa/dist/src/ap/ |
| pmksa_cache_auth.h | 22 u8 kck[WPA_KCK_MAX_LEN]; member in struct:rsn_pmksa_cache_entry 57 const u8 *kck, size_t kck_len, 62 const u8 *kck, size_t kck_len, const u8 *aa,
|
| wpa_auth_ft.c | 2574 const u8 *kck; local 2844 kck = sm->PTK.kck2; 2847 kck = sm->PTK.kck; 2851 wpa_ft_mic(sm->wpa_key_mgmt, kck, kck_len, 3497 const u8 *kck; local 3641 kck = sm->PTK.kck2; 3644 kck = sm->PTK.kck; 3647 if (wpa_ft_mic(sm->wpa_key_mgmt, kck, kck_len [all...] |
| /src/external/bsd/wpa/dist/src/rsn_supp/ |
| pmksa_cache.h | 20 u8 kck[WPA_KCK_MAX_LEN]; member in struct:rsn_pmksa_cache_entry 85 const u8 *pmkid, const u8 *kck, size_t kck_len,
|
| wpa_ft.c | 195 * @kck: KCK for MIC or %NULL if no MIC is used 196 * @kck_len: KCK length in octets 208 const u8 *kck, size_t kck_len, 396 if (kck) { 409 if (kck && wpa_sm_ocv_enabled(sm)) { 455 if (kck) { 472 if (wpa_ft_mic(sm->key_mgmt, kck, kck_len, 595 const u8 *kck; local 731 kck = sm->ptk.kck2 1028 const u8 *kck; local [all...] |
| tdls.c | 112 u8 kck[16]; /* TPK-KCK */ member in struct:wpa_tdls_peer::tpk 472 wpa_hexdump_key(MSG_DEBUG, "TDLS: TPK-KCK", 473 peer->tpk.kck, sizeof(peer->tpk.kck)); 482 * @kck: TPK-KCK 493 static int wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid, 536 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16) [all...] |
| /src/external/bsd/wpa/dist/src/common/ |
| common_module_tests.c | 307 const u8 kck[] = { local 435 if (os_memcmp(kck, sae.tmp->kck, SAE_KCK_LEN) != 0) { 436 wpa_printf(MSG_ERROR, "SAE: Mismatch in KCK"); 631 const u8 kck[] = { local 659 if (ptk.kck_len != sizeof(kck) || 660 os_memcmp(kck, ptk.kck, sizeof(kck)) != 0) { 661 wpa_printf(MSG_ERROR, "PASN: Mismatched KCK"); 708 const u8 kck[] = { local [all...] |
| sae.h | 42 u8 kck[SAE_MAX_HASH_LEN]; member in struct:sae_temporary_data
|
| wpa_common.h | 259 u8 kck[WPA_KCK_MAX_LEN]; /* EAPOL-Key Key Confirmation Key (KCK) */ member in struct:wpa_ptk 488 int wpa_ft_mic(int key_mgmt, const u8 *kck, size_t kck_len, const u8 *sta_addr, 539 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, 542 static inline int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, 549 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, 552 static inline int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, 760 int pasn_mic(const u8 *kck, int akmp, int cipher,
|