Home
last modified time | relevance | path

Searched refs:kdk (Results 1 – 17 of 17) sorted by relevance

/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
Deap_psk_common.c19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) in eap_psk_key_setup() argument
24 os_memcpy(kdk, ak, aes_block_size); in eap_psk_key_setup()
26 kdk[aes_block_size - 1] ^= 0x02; in eap_psk_key_setup()
28 aes_128_encrypt_block(psk, kdk, kdk)) in eap_psk_key_setup()
34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, in eap_psk_derive_keys() argument
41 if (aes_128_encrypt_block(kdk, rand_p, hash)) in eap_psk_derive_keys()
45 if (aes_128_encrypt_block(kdk, hash, tek)) in eap_psk_derive_keys()
52 if (aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size])) in eap_psk_derive_keys()
60 if (aes_128_encrypt_block(kdk, hash, in eap_psk_derive_keys()
Deap_psk_common.h68 int __must_check eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk);
69 int __must_check eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek,
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
Deap_psk_common.c19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) in eap_psk_key_setup() argument
24 os_memcpy(kdk, ak, aes_block_size); in eap_psk_key_setup()
26 kdk[aes_block_size - 1] ^= 0x02; in eap_psk_key_setup()
28 aes_128_encrypt_block(psk, kdk, kdk)) in eap_psk_key_setup()
34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, in eap_psk_derive_keys() argument
41 if (aes_128_encrypt_block(kdk, rand_p, hash)) in eap_psk_derive_keys()
45 if (aes_128_encrypt_block(kdk, hash, tek)) in eap_psk_derive_keys()
52 if (aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size])) in eap_psk_derive_keys()
60 if (aes_128_encrypt_block(kdk, hash, in eap_psk_derive_keys()
Deap_psk_common.h68 int __must_check eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk);
69 int __must_check eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek,
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/
Dcommon_module_tests.c641 const u8 kdk[] = { in pasn_test_pasn_auth() local
671 if (ptk.kdk_len != sizeof(kdk) || in pasn_test_pasn_auth()
672 os_memcmp(kdk, ptk.kdk, sizeof(kdk)) != 0) { in pasn_test_pasn_auth()
720 const u8 kdk[] = { in pasn_test_no_pasn_auth() local
756 if (ptk.kdk_len != sizeof(kdk) || in pasn_test_no_pasn_auth()
757 os_memcmp(kdk, ptk.kdk, sizeof(kdk)) != 0) { in pasn_test_no_pasn_auth()
Dwpa_common.c502 os_memcpy(ptk->kdk, tmp + ptk->kck_len + ptk->kek_len + in wpa_pmk_to_ptk()
504 wpa_hexdump_key(MSG_DEBUG, "WPA: KDK", ptk->kdk, ptk->kdk_len); in wpa_pmk_to_ptk()
712 os_memcpy(ptk->kdk, tmp + offset, ptk->kdk_len); in fils_pmk_to_ptk()
713 wpa_hexdump_key(MSG_DEBUG, "FILS: KDK", ptk->kdk, ptk->kdk_len); in fils_pmk_to_ptk()
1294 os_memcpy(ptk->kdk, tmp + WPA_PASN_KCK_LEN + ptk->tk_len, in pasn_pmk_to_ptk()
1297 ptk->kdk, ptk->kdk_len); in pasn_pmk_to_ptk()
2149 os_memcpy(ptk->kdk, tmp + offset, ptk->kdk_len); in wpa_pmk_r1_to_ptk()
2160 wpa_hexdump_key(MSG_DEBUG, "FT: KDK", ptk->kdk, ptk->kdk_len); in wpa_pmk_r1_to_ptk()
Dptksa_cache.c203 ret = wpa_snprintf_hex(pos, buf + len - pos, e->ptk.kdk, in ptksa_cache_list()
Dwpa_common.h236 u8 kdk[WPA_KDK_MAX_LEN]; /* Key Derivation Key */ member
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/pae/
Dieee802_1x_key.c34 static int aes_kdf(const u8 *kdk, size_t kdk_bits, in aes_kdf() argument
71 res = omac1_aes_128(kdk, buf, buf_len, ret); in aes_kdf()
73 res = omac1_aes_256(kdk, buf, buf_len, ret); in aes_kdf()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/pae/
Dieee802_1x_key.c34 static int aes_kdf(const u8 *kdk, size_t kdk_bits, in aes_kdf() argument
71 res = omac1_aes_128(kdk, buf, buf_len, ret); in aes_kdf()
73 res = omac1_aes_256(kdk, buf, buf_len, ret); in aes_kdf()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
Deap_psk.c25 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member
49 if (eap_psk_key_setup(password, data->ak, data->kdk)) { in eap_psk_init()
54 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: KDK", data->kdk, EAP_PSK_KDK_LEN); in eap_psk_init()
248 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, in eap_psk_process_3()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
Deap_server_psk.c27 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member
126 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk, in eap_psk_build_3()
284 if (eap_psk_key_setup(sm->user->password, data->ak, data->kdk)) { in eap_psk_process_2()
289 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: KDK", data->kdk, EAP_PSK_KDK_LEN); in eap_psk_process_2()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
Deap_server_psk.c27 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member
126 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk, in eap_psk_build_3()
284 if (eap_psk_key_setup(sm->user->password, data->ak, data->kdk)) { in eap_psk_process_2()
289 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: KDK", data->kdk, EAP_PSK_KDK_LEN); in eap_psk_process_2()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
Deap_psk.c25 u8 ak[EAP_PSK_AK_LEN], kdk[EAP_PSK_KDK_LEN], tek[EAP_PSK_TEK_LEN]; member
49 if (eap_psk_key_setup(password, data->ak, data->kdk)) { in eap_psk_init()
54 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: KDK", data->kdk, EAP_PSK_KDK_LEN); in eap_psk_init()
248 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, in eap_psk_process_3()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/wps/
Dwps_common.c65 u8 dhkey[SHA256_MAC_LEN], kdk[SHA256_MAC_LEN]; in wps_derive_keys() local
112 hmac_sha256_vector(dhkey, sizeof(dhkey), 3, addr, len, kdk); in wps_derive_keys()
113 wpa_hexdump_key(MSG_DEBUG, "WPS: KDK", kdk, sizeof(kdk)); in wps_derive_keys()
115 wps_kdf(kdk, NULL, 0, "Wi-Fi Easy and Secure Key Derivation", in wps_derive_keys()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/wps/
Dwps_common.c65 u8 dhkey[SHA256_MAC_LEN], kdk[SHA256_MAC_LEN]; in wps_derive_keys() local
112 hmac_sha256_vector(dhkey, sizeof(dhkey), 3, addr, len, kdk); in wps_derive_keys()
113 wpa_hexdump_key(MSG_DEBUG, "WPS: KDK", kdk, sizeof(kdk)); in wps_derive_keys()
115 wps_kdf(kdk, NULL, 0, "Wi-Fi Easy and Secure Key Derivation", in wps_derive_keys()
/third_party/chromium/patch/
D0001-cve.patch59487 zg#*XaEYITkmE~kdk$4ci6)Q|15qRPXZKN*XT4y7*r83-_Iue(3bso2)_W7xOv;QFn