| /src/external/bsd/wpa/dist/src/ap/ |
| pmksa_cache_auth.h | 22 u8 kck[WPA_KCK_MAX_LEN]; member in struct:rsn_pmksa_cache_entry 57 const u8 *kck, size_t kck_len, 62 const u8 *kck, size_t kck_len, const u8 *aa,
|
| pmksa_cache_auth.c | 267 * @kck: Key confirmation key or %NULL if not yet derived 268 * @kck_len: KCK length in bytes 284 const u8 *kck, size_t kck_len, 290 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len, 306 * @kck: Key confirmation key or %NULL if not yet derived 307 * @kck_len: KCK length in bytes 319 const u8 *kck, size_t kck_len, const u8 *aa, 329 if (wpa_key_mgmt_suite_b(akmp) && !kck) 337 if (kck && kck_len && kck_len < WPA_KCK_MAX_LEN) { 338 os_memcpy(entry->kck, kck, kck_len) [all...] |
| wpa_auth_ft.c | 2574 const u8 *kck; local 2844 kck = sm->PTK.kck2; 2847 kck = sm->PTK.kck; 2851 wpa_ft_mic(sm->wpa_key_mgmt, kck, kck_len, 3497 const u8 *kck; local 3641 kck = sm->PTK.kck2; 3644 kck = sm->PTK.kck; 3647 if (wpa_ft_mic(sm->wpa_key_mgmt, kck, kck_len [all...] |
| wpa_auth.c | 2157 if (wpa_eapol_key_mic(sm->PTK.kck, sm->PTK.kck_len, 2269 if (wpa_eapol_key_mic(PTK->kck, PTK->kck_len, akmp, 2772 /* No KCK available to derive PMKID */ 2774 "RSN: No KCK available to derive PMKID for message 1/4"); 6240 sm->PTK.kck, sm->PTK.kck_len,
|
| /src/external/bsd/wpa/dist/src/rsn_supp/ |
| pmksa_cache.h | 20 u8 kck[WPA_KCK_MAX_LEN]; member in struct:rsn_pmksa_cache_entry 85 const u8 *pmkid, const u8 *kck, size_t kck_len,
|
| wpa_ft.c | 195 * @kck: KCK for MIC or %NULL if no MIC is used 196 * @kck_len: KCK length in octets 208 const u8 *kck, size_t kck_len, 396 if (kck) { 409 if (kck && wpa_sm_ocv_enabled(sm)) { 455 if (kck) { 472 if (wpa_ft_mic(sm->key_mgmt, kck, kck_len, 595 const u8 *kck; local 731 kck = sm->ptk.kck2 1028 const u8 *kck; local [all...] |
| pmksa_cache.c | 217 * @kck: Key confirmation key or %NULL if not yet derived 218 * @kck_len: KCK length in bytes 233 const u8 *pmkid, const u8 *kck, size_t kck_len, 248 if (wpa_key_mgmt_suite_b(akmp) && !kck) 257 os_memcpy(entry->kck, kck, kck_len); 262 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); 264 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); 517 pmkid, old_entry->kck, old_entry->kck_len, 913 const u8 *pmkid, const u8 *kck, size_t kck_len [all...] |
| tdls.c | 112 u8 kck[16]; /* TPK-KCK */ member in struct:wpa_tdls_peer::tpk 472 wpa_hexdump_key(MSG_DEBUG, "TDLS: TPK-KCK", 473 peer->tpk.kck, sizeof(peer->tpk.kck)); 482 * @kck: TPK-KCK 493 static int wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid, 536 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16) [all...] |
| wpa.h | 91 const u8 *kck, size_t kck_len,
|
| wpa_i.h | 370 sm->ptk.kck, sm->ptk.kck_len,
|
| wpa.c | 124 wpa_eapol_key_mic(ptk->kck, ptk->kck_len, sm->key_mgmt, ver, 132 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", 133 ptk->kck, ptk->kck_len); 2784 * calculated only after KCK has been derived. Though, do not replace an 2785 * existing PMKSA entry after each 4-way handshake (i.e., new KCK/PMKID) 2793 sm->ptk.kck, sm->ptk.kck_len, 3259 if (wpa_eapol_key_mic(sm->tptk.kck, sm->tptk.kck_len, 3293 if (wpa_eapol_key_mic(sm->ptk.kck, sm->ptk.kck_len, 5366 os_memcpy(sm->ptk.kck, ptk_kck, ptk_kck_len); 5368 wpa_printf(MSG_DEBUG, "Updated PTK KCK"); [all...] |
| /src/external/bsd/wpa/dist/src/common/ |
| common_module_tests.c | 307 const u8 kck[] = { local 435 if (os_memcmp(kck, sae.tmp->kck, SAE_KCK_LEN) != 0) { 436 wpa_printf(MSG_ERROR, "SAE: Mismatch in KCK"); 631 const u8 kck[] = { local 659 if (ptk.kck_len != sizeof(kck) || 660 os_memcmp(kck, ptk.kck, sizeof(kck)) != 0) { 661 wpa_printf(MSG_ERROR, "PASN: Mismatched KCK"); 708 const u8 kck[] = { local [all...] |
| wpa_common.h | 259 u8 kck[WPA_KCK_MAX_LEN]; /* EAPOL-Key Key Confirmation Key (KCK) */ member in struct:wpa_ptk 488 int wpa_ft_mic(int key_mgmt, const u8 *kck, size_t kck_len, const u8 *sta_addr, 539 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, 542 static inline int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, 549 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, 552 static inline int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, 760 int pasn_mic(const u8 *kck, int akmp, int cipher,
|
| wpa_common.c | 190 * @key: EAPOL-Key Key Confirmation Key (KCK) 191 * @key_len: KCK length in octets 215 "WPA: KCK not set - cannot calculate MIC"); 262 "SAE: Unsupported KCK length: %u", 309 "OWE: Unsupported KCK length: %u", 332 "DPP: Unsupported KCK length: %u", 567 os_memcpy(ptk->kck, tmp, ptk->kck_len); 568 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len); 894 int wpa_ft_mic(int key_mgmt, const u8 *kck, size_t kck_len, const u8 *sta_addr [all...] |
| sae.h | 42 u8 kck[SAE_MAX_HASH_LEN]; member in struct:sae_temporary_data
|
| sae.c | 1545 * KCK || PMK = KDF-Hash-Length(keyseed, "SAE KCK and PMK", 1550 * KCK || PMK || KEK = KDF-Hash-Length(keyseed, "SAE-PK keys", context) 1611 * string that is needed for KCK, PMK, and PMKID derivation, but it 1628 if (sae_kdf_hash(hash_len, keyseed, "SAE KCK and PMK", 1634 if (sae_kdf_hash(hash_len, keyseed, "SAE KCK and PMK", 1641 os_memcpy(sae->tmp->kck, keys, hash_len); 1656 wpa_hexdump_key(MSG_DEBUG, "SAE: KCK", 1657 sae->tmp->kck, sae->tmp->kck_len); 2290 * confirm = CN(KCK, send-confirm, commit-scalar, COMMIT-ELEMENT [all...] |
| /src/external/bsd/wpa/dist/src/pasn/ |
| pasn_initiator.c | 668 ret = pasn_mic(pasn->ptk.kck, pasn->akmp, pasn->cipher, 1270 ret = pasn_mic(pasn->ptk.kck, pasn->akmp, pasn->cipher, 1305 ret = pasn_mic(pasn->ptk.kck, pasn->akmp, pasn->cipher,
|
| pasn_responder.c | 558 ret = pasn_mic(pasn->ptk.kck, pasn->akmp, pasn->cipher, 976 ret = pasn_mic(pasn->ptk.kck, pasn->akmp, pasn->cipher,
|
| /src/external/bsd/wpa/dist/wpa_supplicant/ |
| driver_i.h | 613 const u8 *kck, size_t kck_len, 619 kck, kck_len, replay_ctr);
|
| wpas_glue.c | 1240 const u8 *kck, size_t kck_len, 1245 wpa_drv_set_rekey_info(wpa_s, kek, kek_len, kck, kck_len, replay_ctr);
|
| /src/external/bsd/wpa/dist/src/drivers/ |
| driver.h | 4389 * @kck: Current KCK 4390 * @kck_len: KCK length in octets 4398 const u8 *kck, size_t kck_len, 6043 * ptk_kck - The derived PTK KCK
|
| driver_nl80211.c | 10282 const u8 *kck, size_t kck_len, 10298 (kck_len && nla_put(msg, NL80211_REKEY_DATA_KCK, kck_len, kck)) ||
|