Home
last modified time | relevance | path

Searched refs:kck_len (Results 1 – 18 of 18) sorted by relevance

/external/wpa_supplicant_8/src/common/
Dwpa_common.c273 ptk->kck_len = wpa_kck_len(akmp, pmk_len); in wpa_pmk_to_ptk()
276 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len; in wpa_pmk_to_ptk()
331 os_memcpy(ptk->kck, tmp, ptk->kck_len); in wpa_pmk_to_ptk()
332 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len); in wpa_pmk_to_ptk()
334 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); in wpa_pmk_to_ptk()
337 os_memcpy(ptk->tk, tmp + ptk->kck_len + ptk->kek_len, ptk->tk_len); in wpa_pmk_to_ptk()
458 ptk->kck_len = 0; in fils_pmk_to_ptk()
618 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, in wpa_ft_mic() argument
630 if (kck_len != 16) { in wpa_ft_mic()
632 (unsigned int) kck_len); in wpa_ft_mic()
[all …]
Dwpa_common.h213 size_t kck_len; member
355 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr,
396 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa,
399 static inline int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, in rsn_pmkid_suite_b() argument
406 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa,
409 static inline int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, in rsn_pmkid_suite_b_192() argument
/external/syslinux/gpxe/src/net/80211/
Dwpa_ccmp.c482 size_t kck_len = 16; in ccmp_kie_mic() local
484 memcpy ( kckb, kck, kck_len ); in ccmp_kie_mic()
486 hmac_init ( &sha1_algorithm, sha1_ctx, kckb, &kck_len ); in ccmp_kie_mic()
488 hmac_final ( &sha1_algorithm, sha1_ctx, kckb, &kck_len, hash ); in ccmp_kie_mic()
Dwpa_tkip.c548 size_t kck_len = 16; in tkip_kie_mic() local
550 memcpy ( kckb, kck, kck_len ); in tkip_kie_mic()
552 hmac_init ( &md5_algorithm, &md5, kckb, &kck_len ); in tkip_kie_mic()
554 hmac_final ( &md5_algorithm, &md5, kckb, &kck_len, mic ); in tkip_kie_mic()
/external/wpa_supplicant_8/src/ap/
Dpmksa_cache_auth.h53 const u8 *kck, size_t kck_len,
58 const u8 *kck, size_t kck_len, const u8 *aa,
Dpmksa_cache_auth.c281 const u8 *kck, size_t kck_len, in pmksa_cache_auth_add() argument
287 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len, in pmksa_cache_auth_add()
316 const u8 *kck, size_t kck_len, const u8 *aa, in pmksa_cache_auth_create_entry() argument
337 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_auth_create_entry()
339 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_auth_create_entry()
Dwpa_auth.c1563 wpa_eapol_key_mic(sm->PTK.kck, sm->PTK.kck_len, in __wpa_send_eapol()
1639 if (wpa_eapol_key_mic(PTK->kck, PTK->kck_len, akmp, in wpa_verify_key_mic()
4006 sm->PTK.kck, sm->PTK.kck_len, in wpa_auth_pmksa_add()
Dwpa_auth_ft.c1897 wpa_ft_mic(sm->PTK.kck, sm->PTK.kck_len, sm->addr, in wpa_sm_write_assoc_resp_ies()
2367 if (wpa_ft_mic(sm->PTK.kck, sm->PTK.kck_len, sm->addr, in wpa_ft_validate_reassoc()
/external/wpa_supplicant_8/src/rsn_supp/
Dpmksa_cache.h69 const u8 *pmkid, const u8 *kck, size_t kck_len,
134 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add() argument
Dwpa_ft.c143 const u8 *kck, size_t kck_len, in wpa_ft_gen_req_ies() argument
303 if (wpa_ft_mic(kck, kck_len, sm->own_addr, target_ap, 5, in wpa_ft_gen_req_ies()
490 sm->ptk.kck, sm->ptk.kck_len, bssid, in wpa_ft_process_response()
779 if (wpa_ft_mic(sm->ptk.kck, sm->ptk.kck_len, sm->own_addr, src_addr, 6, in wpa_ft_validate_reassoc_resp()
Dpmksa_cache.c132 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add() argument
153 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_add()
155 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_add()
Dwpa.c77 if (key_mic && (!ptk || !ptk->kck_len)) in wpa_eapol_key_send()
81 wpa_eapol_key_mic(ptk->kck, ptk->kck_len, sm->key_mgmt, ver, in wpa_eapol_key_send()
90 ptk->kck, ptk->kck_len); in wpa_eapol_key_send()
1450 sm->ptk.kck, sm->ptk.kck_len, in wpa_supplicant_process_3_of_4()
1727 if (wpa_eapol_key_mic(sm->tptk.kck, sm->tptk.kck_len, in wpa_supplicant_verify_eapol_key_mic()
1753 if (wpa_eapol_key_mic(sm->ptk.kck, sm->ptk.kck_len, in wpa_supplicant_verify_eapol_key_mic()
3280 sm->ptk.kck_len = ptk_kck_len; in wpa_sm_set_ptk_kck_kek()
Dwpa_i.h296 sm->ptk.kck, sm->ptk.kck_len, in wpa_sm_set_rekey_offload()
Dwpa.h80 const u8 *kck, size_t kck_len,
/external/wpa_supplicant_8/wpa_supplicant/
Ddriver_i.h575 const u8 *kck, size_t kck_len, in wpa_drv_set_rekey_info() argument
581 kck, kck_len, replay_ctr); in wpa_drv_set_rekey_info()
Dwpas_glue.c1144 const u8 *kck, size_t kck_len, in wpa_supplicant_set_rekey_offload() argument
1149 wpa_drv_set_rekey_info(wpa_s, kek, kek_len, kck, kck_len, replay_ctr); in wpa_supplicant_set_rekey_offload()
/external/wpa_supplicant_8/src/drivers/
Ddriver.h3374 const u8 *kck, size_t kck_len,
Ddriver_nl80211.c7811 const u8 *kck, size_t kck_len, in nl80211_set_rekey_info() argument
7827 (kck_len && nla_put(msg, NL80211_REKEY_DATA_KCK, kck_len, kck)) || in nl80211_set_rekey_info()