/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
D | common_module_tests.c | 307 const u8 kck[] = { in sae_tests() local 435 if (os_memcmp(kck, sae.tmp->kck, SAE_KCK_LEN) != 0) { in sae_tests() 631 const u8 kck[] = { in pasn_test_pasn_auth() local 659 if (ptk.kck_len != sizeof(kck) || in pasn_test_pasn_auth() 660 os_memcmp(kck, ptk.kck, sizeof(kck)) != 0) { in pasn_test_pasn_auth() 708 const u8 kck[] = { in pasn_test_no_pasn_auth() local 738 if (ptk.kck_len != sizeof(kck) || in pasn_test_no_pasn_auth() 739 os_memcmp(kck, ptk.kck, sizeof(kck)) != 0) { in pasn_test_no_pasn_auth()
|
D | wpa_common.h | 236 u8 kck[WPA_KCK_MAX_LEN]; /* EAPOL-Key Key Confirmation Key (KCK) */ member 416 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, 465 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, 468 static inline int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, in rsn_pmkid_suite_b() argument 475 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, 478 static inline int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, in rsn_pmkid_suite_b_192() argument 654 int pasn_mic(const u8 *kck, int akmp, int cipher,
|
D | wpa_common.c | 495 os_memcpy(ptk->kck, tmp, ptk->kck_len); in wpa_pmk_to_ptk() 496 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len); in wpa_pmk_to_ptk() 822 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, in wpa_ft_mic() argument 911 if (hmac_sha384_vector(kck, kck_len, num_elem, addr, len, hash)) in wpa_ft_mic() 917 omac1_aes_128_vector(kck, num_elem, addr, len, mic)) in wpa_ft_mic() 1290 os_memcpy(ptk->kck, tmp, WPA_PASN_KCK_LEN); in pasn_pmk_to_ptk() 1291 wpa_hexdump_key(MSG_DEBUG, "PASN: KCK:", ptk->kck, WPA_PASN_KCK_LEN); in pasn_pmk_to_ptk() 1343 int pasn_mic(const u8 *kck, int akmp, int cipher, in pasn_mic() argument 1353 if (!kck) { in pasn_mic() 1381 wpa_hexdump_key(MSG_DEBUG, "PASN: MIC: KCK", kck, WPA_PASN_KCK_LEN); in pasn_mic() [all …]
|
D | sae.h | 41 u8 kck[SAE_MAX_HASH_LEN]; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/ |
D | wpa_ft.c | 163 const u8 *kck, size_t kck_len, in wpa_ft_gen_req_ies() argument 327 if (kck) { in wpa_ft_gen_req_ies() 340 if (kck && wpa_sm_ocv_enabled(sm)) { in wpa_ft_gen_req_ies() 367 if (kck) { in wpa_ft_gen_req_ies() 381 if (wpa_ft_mic(kck, kck_len, sm->own_addr, target_ap, 5, in wpa_ft_gen_req_ies() 496 const u8 *kck; in wpa_ft_process_response() local 623 kck = sm->ptk.kck2; in wpa_ft_process_response() 626 kck = sm->ptk.kck; in wpa_ft_process_response() 631 kck, kck_len, bssid, in wpa_ft_process_response() 848 const u8 *kck; in wpa_ft_validate_reassoc_resp() local [all …]
|
D | pmksa_cache.h | 70 const u8 *pmkid, const u8 *kck, size_t kck_len, 136 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add() argument
|
D | tdls.c | 112 u8 kck[16]; /* TPK-KCK */ member 453 peer->tpk.kck, sizeof(peer->tpk.kck)); in wpa_tdls_generate_tpk() 471 static int wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid, in wpa_tdls_ftie_mic() argument 513 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16); in wpa_tdls_ftie_mic() 514 ret = omac1_aes_128(kck, buf, pos - buf, mic); in wpa_tdls_ftie_mic() 533 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, in wpa_tdls_key_mic_teardown() argument 572 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16); in wpa_tdls_key_mic_teardown() 573 ret = omac1_aes_128(kck, buf, pos - buf, mic); in wpa_tdls_key_mic_teardown() 588 wpa_tdls_ftie_mic(peer->tpk.kck, trans_seq, lnkid, in wpa_supplicant_verify_tdls_mic() 616 wpa_tdls_key_mic_teardown(peer->tpk.kck, trans_seq, rcode, in wpa_supplicant_verify_tdls_mic_teardown() [all …]
|
D | pmksa_cache.c | 132 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add() argument 142 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_add() 153 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_add() 155 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_add()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/ |
D | wpa_ft.c | 187 const u8 *kck, size_t kck_len, in wpa_ft_gen_req_ies() argument 353 if (kck) { in wpa_ft_gen_req_ies() 366 if (kck && wpa_sm_ocv_enabled(sm)) { in wpa_ft_gen_req_ies() 412 if (kck) { in wpa_ft_gen_req_ies() 429 if (wpa_ft_mic(kck, kck_len, sm->own_addr, target_ap, 5, in wpa_ft_gen_req_ies() 548 const u8 *kck; in wpa_ft_process_response() local 689 kck = sm->ptk.kck2; in wpa_ft_process_response() 692 kck = sm->ptk.kck; in wpa_ft_process_response() 697 kck, kck_len, bssid, in wpa_ft_process_response() 983 const u8 *kck; in wpa_ft_validate_reassoc_resp() local [all …]
|
D | pmksa_cache.h | 74 const u8 *pmkid, const u8 *kck, size_t kck_len, 143 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add() argument
|
D | tdls.c | 112 u8 kck[16]; /* TPK-KCK */ member 457 peer->tpk.kck, sizeof(peer->tpk.kck)); in wpa_tdls_generate_tpk() 475 static int wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid, in wpa_tdls_ftie_mic() argument 517 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16); in wpa_tdls_ftie_mic() 518 ret = omac1_aes_128(kck, buf, pos - buf, mic); in wpa_tdls_ftie_mic() 537 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, in wpa_tdls_key_mic_teardown() argument 576 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16); in wpa_tdls_key_mic_teardown() 577 ret = omac1_aes_128(kck, buf, pos - buf, mic); in wpa_tdls_key_mic_teardown() 592 wpa_tdls_ftie_mic(peer->tpk.kck, trans_seq, lnkid, in wpa_supplicant_verify_tdls_mic() 620 wpa_tdls_key_mic_teardown(peer->tpk.kck, trans_seq, rcode, in wpa_supplicant_verify_tdls_mic_teardown() [all …]
|
D | pmksa_cache.c | 174 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add() argument 184 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_add() 195 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_add() 197 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_add()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/ |
D | wpa_common.h | 211 u8 kck[WPA_KCK_MAX_LEN]; /* EAPOL-Key Key Confirmation Key (KCK) */ member 370 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, 416 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, 419 static inline int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, in rsn_pmkid_suite_b() argument 426 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, 429 static inline int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, in rsn_pmkid_suite_b_192() argument
|
D | common_module_tests.c | 309 const u8 kck[] = { in sae_tests() local 384 if (os_memcmp(kck, sae.tmp->kck, SAE_KCK_LEN) != 0) { in sae_tests()
|
D | wpa_common.c | 458 os_memcpy(ptk->kck, tmp, ptk->kck_len); in wpa_pmk_to_ptk() 459 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len); in wpa_pmk_to_ptk() 754 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, in wpa_ft_mic() argument 835 if (hmac_sha384_vector(kck, kck_len, num_elem, addr, len, hash)) in wpa_ft_mic() 841 omac1_aes_128_vector(kck, num_elem, addr, len, mic)) in wpa_ft_mic() 1787 os_memcpy(ptk->kck, tmp, ptk->kck_len); in wpa_pmk_r1_to_ptk() 1797 wpa_hexdump_key(MSG_DEBUG, "FT: KCK", ptk->kck, ptk->kck_len); in wpa_pmk_r1_to_ptk() 1882 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, in rsn_pmkid_suite_b() argument 1894 if (hmac_sha256_vector(kck, kck_len, 3, addr, len, hash) < 0) in rsn_pmkid_suite_b() 1915 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, in rsn_pmkid_suite_b_192() argument [all …]
|
D | sae.h | 25 u8 kck[SAE_KCK_LEN]; member
|
D | sae.c | 745 os_memcpy(sae->tmp->kck, keys, SAE_KCK_LEN); in sae_derive_keys() 749 wpa_hexdump_key(MSG_DEBUG, "SAE: KCK", sae->tmp->kck, SAE_KCK_LEN); in sae_derive_keys() 1212 hmac_sha256_vector(sae->tmp->kck, sizeof(sae->tmp->kck), 5, addr, len, in sae_cn_confirm()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
D | pmksa_cache_auth.c | 281 const u8 *kck, size_t kck_len, in pmksa_cache_auth_add() argument 287 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len, in pmksa_cache_auth_add() 316 const u8 *kck, size_t kck_len, const u8 *aa, in pmksa_cache_auth_create_entry() argument 326 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_auth_create_entry() 337 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_auth_create_entry() 339 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_auth_create_entry()
|
D | pmksa_cache_auth.h | 53 const u8 *kck, size_t kck_len, 58 const u8 *kck, size_t kck_len, const u8 *aa,
|
D | wpa_auth_ft.c | 2428 const u8 *kck; in wpa_sm_write_assoc_resp_ies() local 2588 kck = sm->PTK.kck2; in wpa_sm_write_assoc_resp_ies() 2591 kck = sm->PTK.kck; in wpa_sm_write_assoc_resp_ies() 2595 wpa_ft_mic(kck, kck_len, sm->addr, sm->wpa_auth->addr, 6, in wpa_sm_write_assoc_resp_ies() 3121 const u8 *kck; in wpa_ft_validate_reassoc() local 3264 kck = sm->PTK.kck2; in wpa_ft_validate_reassoc() 3267 kck = sm->PTK.kck; in wpa_ft_validate_reassoc() 3270 if (wpa_ft_mic(kck, kck_len, sm->addr, sm->wpa_auth->addr, 5, in wpa_ft_validate_reassoc()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
D | pmksa_cache_auth.c | 281 const u8 *kck, size_t kck_len, in pmksa_cache_auth_add() argument 287 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len, in pmksa_cache_auth_add() 316 const u8 *kck, size_t kck_len, const u8 *aa, in pmksa_cache_auth_create_entry() argument 326 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_auth_create_entry() 337 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_auth_create_entry() 339 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_auth_create_entry()
|
D | pmksa_cache_auth.h | 53 const u8 *kck, size_t kck_len, 58 const u8 *kck, size_t kck_len, const u8 *aa,
|
D | wpa_auth_ft.c | 2521 const u8 *kck; in wpa_sm_write_assoc_resp_ies() local 2767 kck = sm->PTK.kck2; in wpa_sm_write_assoc_resp_ies() 2770 kck = sm->PTK.kck; in wpa_sm_write_assoc_resp_ies() 2774 wpa_ft_mic(kck, kck_len, sm->addr, sm->wpa_auth->addr, 6, in wpa_sm_write_assoc_resp_ies() 3318 const u8 *kck; in wpa_ft_validate_reassoc() local 3467 kck = sm->PTK.kck2; in wpa_ft_validate_reassoc() 3470 kck = sm->PTK.kck; in wpa_ft_validate_reassoc() 3473 if (wpa_ft_mic(kck, kck_len, sm->addr, sm->wpa_auth->addr, 5, in wpa_ft_validate_reassoc()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
D | wpas_glue.c | 1147 const u8 *kck, size_t kck_len, in wpa_supplicant_set_rekey_offload() argument 1152 wpa_drv_set_rekey_info(wpa_s, kek, kek_len, kck, kck_len, replay_ctr); in wpa_supplicant_set_rekey_offload()
|
D | driver_i.h | 593 const u8 *kck, size_t kck_len, in wpa_drv_set_rekey_info() argument 599 kck, kck_len, replay_ctr); in wpa_drv_set_rekey_info()
|