Home
last modified time | relevance | path

Searched refs:kck_len (Results 1 – 25 of 35) sorted by relevance

12

/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/
Dwpa_ft.c163 const u8 *kck, size_t kck_len, in wpa_ft_gen_req_ies() argument
381 if (wpa_ft_mic(kck, kck_len, sm->own_addr, target_ap, 5, in wpa_ft_gen_req_ies()
497 size_t kck_len; in wpa_ft_process_response() local
624 kck_len = sm->ptk.kck2_len; in wpa_ft_process_response()
627 kck_len = sm->ptk.kck_len; in wpa_ft_process_response()
631 kck, kck_len, bssid, in wpa_ft_process_response()
849 size_t kck_len; in wpa_ft_validate_reassoc_resp() local
974 kck_len = sm->ptk.kck2_len; in wpa_ft_validate_reassoc_resp()
977 kck_len = sm->ptk.kck_len; in wpa_ft_validate_reassoc_resp()
980 if (wpa_ft_mic(kck, kck_len, sm->own_addr, src_addr, 6, in wpa_ft_validate_reassoc_resp()
Dpmksa_cache.h70 const u8 *pmkid, const u8 *kck, size_t kck_len,
136 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add() argument
Dpmksa_cache.c132 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add() argument
153 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_add()
155 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_add()
Dwpa_i.h305 sm->ptk.kck, sm->ptk.kck_len, in wpa_sm_set_rekey_offload()
Dwpa.c79 if (key_mic && (!ptk || !ptk->kck_len)) in wpa_eapol_key_send()
83 wpa_eapol_key_mic(ptk->kck, ptk->kck_len, sm->key_mgmt, ver, in wpa_eapol_key_send()
92 ptk->kck, ptk->kck_len); in wpa_eapol_key_send()
1584 sm->ptk.kck, sm->ptk.kck_len, in wpa_supplicant_process_3_of_4()
1907 if (wpa_eapol_key_mic(sm->tptk.kck, sm->tptk.kck_len, in wpa_supplicant_verify_eapol_key_mic()
1941 if (wpa_eapol_key_mic(sm->ptk.kck, sm->ptk.kck_len, in wpa_supplicant_verify_eapol_key_mic()
3504 sm->ptk.kck_len = ptk_kck_len; in wpa_sm_set_ptk_kck_kek()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/
Dwpa_common.c392 ptk->kck_len = wpa_kck_len(akmp, pmk_len); in wpa_pmk_to_ptk()
401 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len; in wpa_pmk_to_ptk()
458 os_memcpy(ptk->kck, tmp, ptk->kck_len); in wpa_pmk_to_ptk()
459 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len); in wpa_pmk_to_ptk()
461 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); in wpa_pmk_to_ptk()
464 os_memcpy(ptk->tk, tmp + ptk->kck_len + ptk->kek_len, ptk->tk_len); in wpa_pmk_to_ptk()
591 ptk->kck_len = 0; in fils_pmk_to_ptk()
754 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, in wpa_ft_mic() argument
767 if (kck_len == 16) { in wpa_ft_mic()
770 } else if (kck_len == 24) { in wpa_ft_mic()
[all …]
Dwpa_common.h216 size_t kck_len; member
370 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr,
416 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa,
419 static inline int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, in rsn_pmkid_suite_b() argument
426 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa,
429 static inline int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, in rsn_pmkid_suite_b_192() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/
Dwpa_ft.c187 const u8 *kck, size_t kck_len, in wpa_ft_gen_req_ies() argument
429 if (wpa_ft_mic(kck, kck_len, sm->own_addr, target_ap, 5, in wpa_ft_gen_req_ies()
549 size_t kck_len, kdk_len; in wpa_ft_process_response() local
690 kck_len = sm->ptk.kck2_len; in wpa_ft_process_response()
693 kck_len = sm->ptk.kck_len; in wpa_ft_process_response()
697 kck, kck_len, bssid, in wpa_ft_process_response()
984 size_t kck_len; in wpa_ft_validate_reassoc_resp() local
1114 kck_len = sm->ptk.kck2_len; in wpa_ft_validate_reassoc_resp()
1117 kck_len = sm->ptk.kck_len; in wpa_ft_validate_reassoc_resp()
1120 if (wpa_ft_mic(kck, kck_len, sm->own_addr, src_addr, 6, in wpa_ft_validate_reassoc_resp()
Dpmksa_cache.h74 const u8 *pmkid, const u8 *kck, size_t kck_len,
143 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add() argument
Dpmksa_cache.c174 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add() argument
195 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_add()
197 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_add()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/
Dwpa_common.c407 ptk->kck_len = wpa_kck_len(akmp, pmk_len); in wpa_pmk_to_ptk()
417 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len + ptk->kdk_len; in wpa_pmk_to_ptk()
492 os_memcpy(ptk->kck, tmp, ptk->kck_len); in wpa_pmk_to_ptk()
493 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len); in wpa_pmk_to_ptk()
495 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); in wpa_pmk_to_ptk()
498 os_memcpy(ptk->tk, tmp + ptk->kck_len + ptk->kek_len, ptk->tk_len); in wpa_pmk_to_ptk()
502 os_memcpy(ptk->kdk, tmp + ptk->kck_len + ptk->kek_len + in wpa_pmk_to_ptk()
635 ptk->kck_len = 0; in fils_pmk_to_ptk()
819 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, in wpa_ft_mic() argument
834 if (kck_len == 16) { in wpa_ft_mic()
[all …]
Dwpa_common.h239 size_t kck_len; member
413 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr,
462 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa,
465 static inline int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, in rsn_pmkid_suite_b() argument
472 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa,
475 static inline int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, in rsn_pmkid_suite_b_192() argument
Dcommon_module_tests.c659 if (ptk.kck_len != sizeof(kck) || in pasn_test_pasn_auth()
738 if (ptk.kck_len != sizeof(kck) || in pasn_test_no_pasn_auth()
Dsae.h42 size_t kck_len; member
Dsae.c1622 sae->tmp->kck_len = hash_len; in sae_derive_keys()
1636 sae->tmp->kck, sae->tmp->kck_len); in sae_derive_keys()
2197 return hkdf_extract(sae->tmp->kck_len, sae->tmp->kck, sae->tmp->kck_len, in sae_cn_confirm()
2256 hash_len = sae->tmp->kck_len; in sae_write_confirm()
2296 hash_len = sae->tmp->kck_len; in sae_check_confirm()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
Dpmksa_cache_auth.h53 const u8 *kck, size_t kck_len,
58 const u8 *kck, size_t kck_len, const u8 *aa,
Dpmksa_cache_auth.c281 const u8 *kck, size_t kck_len, in pmksa_cache_auth_add() argument
287 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len, in pmksa_cache_auth_add()
316 const u8 *kck, size_t kck_len, const u8 *aa, in pmksa_cache_auth_create_entry() argument
337 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_auth_create_entry()
339 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_auth_create_entry()
Dwpa_auth_ft.c2429 size_t kck_len; in wpa_sm_write_assoc_resp_ies() local
2589 kck_len = sm->PTK.kck2_len; in wpa_sm_write_assoc_resp_ies()
2592 kck_len = sm->PTK.kck_len; in wpa_sm_write_assoc_resp_ies()
2595 wpa_ft_mic(kck, kck_len, sm->addr, sm->wpa_auth->addr, 6, in wpa_sm_write_assoc_resp_ies()
3122 size_t kck_len; in wpa_ft_validate_reassoc() local
3265 kck_len = sm->PTK.kck2_len; in wpa_ft_validate_reassoc()
3268 kck_len = sm->PTK.kck_len; in wpa_ft_validate_reassoc()
3270 if (wpa_ft_mic(kck, kck_len, sm->addr, sm->wpa_auth->addr, 5, in wpa_ft_validate_reassoc()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
Dpmksa_cache_auth.h53 const u8 *kck, size_t kck_len,
58 const u8 *kck, size_t kck_len, const u8 *aa,
Dpmksa_cache_auth.c281 const u8 *kck, size_t kck_len, in pmksa_cache_auth_add() argument
287 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len, in pmksa_cache_auth_add()
316 const u8 *kck, size_t kck_len, const u8 *aa, in pmksa_cache_auth_create_entry() argument
337 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_auth_create_entry()
339 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_auth_create_entry()
Dwpa_auth_ft.c2522 size_t kck_len; in wpa_sm_write_assoc_resp_ies() local
2768 kck_len = sm->PTK.kck2_len; in wpa_sm_write_assoc_resp_ies()
2771 kck_len = sm->PTK.kck_len; in wpa_sm_write_assoc_resp_ies()
2774 wpa_ft_mic(kck, kck_len, sm->addr, sm->wpa_auth->addr, 6, in wpa_sm_write_assoc_resp_ies()
3319 size_t kck_len; in wpa_ft_validate_reassoc() local
3468 kck_len = sm->PTK.kck2_len; in wpa_ft_validate_reassoc()
3471 kck_len = sm->PTK.kck_len; in wpa_ft_validate_reassoc()
3473 if (wpa_ft_mic(kck, kck_len, sm->addr, sm->wpa_auth->addr, 5, in wpa_ft_validate_reassoc()
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
Ddriver_i.h593 const u8 *kck, size_t kck_len, in wpa_drv_set_rekey_info() argument
599 kck, kck_len, replay_ctr); in wpa_drv_set_rekey_info()
Dwpas_glue.c1147 const u8 *kck, size_t kck_len, in wpa_supplicant_set_rekey_offload() argument
1152 wpa_drv_set_rekey_info(wpa_s, kek, kek_len, kck, kck_len, replay_ctr); in wpa_supplicant_set_rekey_offload()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
Ddriver_i.h621 const u8 *kck, size_t kck_len, in wpa_drv_set_rekey_info() argument
627 kck, kck_len, replay_ctr); in wpa_drv_set_rekey_info()
Dwpas_glue.c1220 const u8 *kck, size_t kck_len, in wpa_supplicant_set_rekey_offload() argument
1225 wpa_drv_set_rekey_info(wpa_s, kek, kek_len, kck, kck_len, replay_ctr); in wpa_supplicant_set_rekey_offload()

12