HomeSort by: relevance | last modified time | path
    Searched refs:kck (Results 1 - 22 of 22) sorted by relevancy

  /src/external/bsd/wpa/dist/src/ap/
pmksa_cache_auth.h 22 u8 kck[WPA_KCK_MAX_LEN]; member in struct:rsn_pmksa_cache_entry
57 const u8 *kck, size_t kck_len,
62 const u8 *kck, size_t kck_len, const u8 *aa,
pmksa_cache_auth.c 267 * @kck: Key confirmation key or %NULL if not yet derived
268 * @kck_len: KCK length in bytes
284 const u8 *kck, size_t kck_len,
290 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len,
306 * @kck: Key confirmation key or %NULL if not yet derived
307 * @kck_len: KCK length in bytes
319 const u8 *kck, size_t kck_len, const u8 *aa,
329 if (wpa_key_mgmt_suite_b(akmp) && !kck)
337 if (kck && kck_len && kck_len < WPA_KCK_MAX_LEN) {
338 os_memcpy(entry->kck, kck, kck_len)
    [all...]
wpa_auth_ft.c 2574 const u8 *kck; local
2844 kck = sm->PTK.kck2;
2847 kck = sm->PTK.kck;
2851 wpa_ft_mic(sm->wpa_key_mgmt, kck, kck_len,
3497 const u8 *kck; local
3641 kck = sm->PTK.kck2;
3644 kck = sm->PTK.kck;
3647 if (wpa_ft_mic(sm->wpa_key_mgmt, kck, kck_len
    [all...]
wpa_auth.c 2157 if (wpa_eapol_key_mic(sm->PTK.kck, sm->PTK.kck_len,
2269 if (wpa_eapol_key_mic(PTK->kck, PTK->kck_len, akmp,
2772 /* No KCK available to derive PMKID */
2774 "RSN: No KCK available to derive PMKID for message 1/4");
6240 sm->PTK.kck, sm->PTK.kck_len,
  /src/external/bsd/wpa/dist/src/rsn_supp/
pmksa_cache.h 20 u8 kck[WPA_KCK_MAX_LEN]; member in struct:rsn_pmksa_cache_entry
85 const u8 *pmkid, const u8 *kck, size_t kck_len,
wpa_ft.c 195 * @kck: KCK for MIC or %NULL if no MIC is used
196 * @kck_len: KCK length in octets
208 const u8 *kck, size_t kck_len,
396 if (kck) {
409 if (kck && wpa_sm_ocv_enabled(sm)) {
455 if (kck) {
472 if (wpa_ft_mic(sm->key_mgmt, kck, kck_len,
595 const u8 *kck; local
731 kck = sm->ptk.kck2
1028 const u8 *kck; local
    [all...]
pmksa_cache.c 217 * @kck: Key confirmation key or %NULL if not yet derived
218 * @kck_len: KCK length in bytes
233 const u8 *pmkid, const u8 *kck, size_t kck_len,
248 if (wpa_key_mgmt_suite_b(akmp) && !kck)
257 os_memcpy(entry->kck, kck, kck_len);
262 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid);
264 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid);
517 pmkid, old_entry->kck, old_entry->kck_len,
913 const u8 *pmkid, const u8 *kck, size_t kck_len
    [all...]
tdls.c 112 u8 kck[16]; /* TPK-KCK */ member in struct:wpa_tdls_peer::tpk
472 wpa_hexdump_key(MSG_DEBUG, "TDLS: TPK-KCK",
473 peer->tpk.kck, sizeof(peer->tpk.kck));
482 * @kck: TPK-KCK
493 static int wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid,
536 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16)
    [all...]
wpa.h 91 const u8 *kck, size_t kck_len,
wpa_i.h 370 sm->ptk.kck, sm->ptk.kck_len,
wpa.c 124 wpa_eapol_key_mic(ptk->kck, ptk->kck_len, sm->key_mgmt, ver,
132 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK",
133 ptk->kck, ptk->kck_len);
2784 * calculated only after KCK has been derived. Though, do not replace an
2785 * existing PMKSA entry after each 4-way handshake (i.e., new KCK/PMKID)
2793 sm->ptk.kck, sm->ptk.kck_len,
3259 if (wpa_eapol_key_mic(sm->tptk.kck, sm->tptk.kck_len,
3293 if (wpa_eapol_key_mic(sm->ptk.kck, sm->ptk.kck_len,
5366 os_memcpy(sm->ptk.kck, ptk_kck, ptk_kck_len);
5368 wpa_printf(MSG_DEBUG, "Updated PTK KCK");
    [all...]
  /src/external/bsd/wpa/dist/src/common/
common_module_tests.c 307 const u8 kck[] = { local
435 if (os_memcmp(kck, sae.tmp->kck, SAE_KCK_LEN) != 0) {
436 wpa_printf(MSG_ERROR, "SAE: Mismatch in KCK");
631 const u8 kck[] = { local
659 if (ptk.kck_len != sizeof(kck) ||
660 os_memcmp(kck, ptk.kck, sizeof(kck)) != 0) {
661 wpa_printf(MSG_ERROR, "PASN: Mismatched KCK");
708 const u8 kck[] = { local
    [all...]
wpa_common.h 259 u8 kck[WPA_KCK_MAX_LEN]; /* EAPOL-Key Key Confirmation Key (KCK) */ member in struct:wpa_ptk
488 int wpa_ft_mic(int key_mgmt, const u8 *kck, size_t kck_len, const u8 *sta_addr,
539 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa,
542 static inline int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa,
549 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa,
552 static inline int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len,
760 int pasn_mic(const u8 *kck, int akmp, int cipher,
wpa_common.c 190 * @key: EAPOL-Key Key Confirmation Key (KCK)
191 * @key_len: KCK length in octets
215 "WPA: KCK not set - cannot calculate MIC");
262 "SAE: Unsupported KCK length: %u",
309 "OWE: Unsupported KCK length: %u",
332 "DPP: Unsupported KCK length: %u",
567 os_memcpy(ptk->kck, tmp, ptk->kck_len);
568 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len);
894 int wpa_ft_mic(int key_mgmt, const u8 *kck, size_t kck_len, const u8 *sta_addr
    [all...]
sae.h 42 u8 kck[SAE_MAX_HASH_LEN]; member in struct:sae_temporary_data
sae.c 1545 * KCK || PMK = KDF-Hash-Length(keyseed, "SAE KCK and PMK",
1550 * KCK || PMK || KEK = KDF-Hash-Length(keyseed, "SAE-PK keys", context)
1611 * string that is needed for KCK, PMK, and PMKID derivation, but it
1628 if (sae_kdf_hash(hash_len, keyseed, "SAE KCK and PMK",
1634 if (sae_kdf_hash(hash_len, keyseed, "SAE KCK and PMK",
1641 os_memcpy(sae->tmp->kck, keys, hash_len);
1656 wpa_hexdump_key(MSG_DEBUG, "SAE: KCK",
1657 sae->tmp->kck, sae->tmp->kck_len);
2290 * confirm = CN(KCK, send-confirm, commit-scalar, COMMIT-ELEMENT
    [all...]
  /src/external/bsd/wpa/dist/src/pasn/
pasn_initiator.c 668 ret = pasn_mic(pasn->ptk.kck, pasn->akmp, pasn->cipher,
1270 ret = pasn_mic(pasn->ptk.kck, pasn->akmp, pasn->cipher,
1305 ret = pasn_mic(pasn->ptk.kck, pasn->akmp, pasn->cipher,
pasn_responder.c 558 ret = pasn_mic(pasn->ptk.kck, pasn->akmp, pasn->cipher,
976 ret = pasn_mic(pasn->ptk.kck, pasn->akmp, pasn->cipher,
  /src/external/bsd/wpa/dist/wpa_supplicant/
driver_i.h 613 const u8 *kck, size_t kck_len,
619 kck, kck_len, replay_ctr);
wpas_glue.c 1240 const u8 *kck, size_t kck_len,
1245 wpa_drv_set_rekey_info(wpa_s, kek, kek_len, kck, kck_len, replay_ctr);
  /src/external/bsd/wpa/dist/src/drivers/
driver.h 4389 * @kck: Current KCK
4390 * @kck_len: KCK length in octets
4398 const u8 *kck, size_t kck_len,
6043 * ptk_kck - The derived PTK KCK
driver_nl80211.c 10282 const u8 *kck, size_t kck_len,
10298 (kck_len && nla_put(msg, NL80211_REKEY_DATA_KCK, kck_len, kck)) ||

Completed in 225 milliseconds