/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/ |
D | wpa_ft.c | 762 size_t kek_len; in wpa_ft_process_gtk_subelem() local 766 kek_len = sm->ptk.kek2_len; in wpa_ft_process_gtk_subelem() 769 kek_len = sm->ptk.kek_len; in wpa_ft_process_gtk_subelem() 787 if (aes_unwrap(kek, kek_len, gtk_len / 8, gtk_elem + 11, gtk)) { in wpa_ft_process_gtk_subelem() 845 size_t kek_len; in wpa_ft_process_igtk_subelem() local 849 kek_len = sm->ptk.kek2_len; in wpa_ft_process_igtk_subelem() 852 kek_len = sm->ptk.kek_len; in wpa_ft_process_igtk_subelem() 881 if (aes_unwrap(kek, kek_len, igtk_len / 8, igtk_elem + 9, igtk)) { in wpa_ft_process_igtk_subelem() 915 size_t kek_len; in wpa_ft_process_bigtk_subelem() local 926 kek_len = sm->ptk.kek2_len; in wpa_ft_process_bigtk_subelem() [all …]
|
D | wpa.c | 114 if (!ptk || !ptk->kek_len) in wpa_eapol_key_send() 144 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); in wpa_eapol_key_send() 149 if (aes_siv_encrypt(ptk->kek, ptk->kek_len, in wpa_eapol_key_send() 1998 if (ver == WPA_KEY_INFO_TYPE_HMAC_MD5_RC4 && sm->ptk.kek_len == 16) { in wpa_supplicant_process_1_of_2_wpa() 2012 os_memcpy(ek + 16, sm->ptk.kek, sm->ptk.kek_len); in wpa_supplicant_process_1_of_2_wpa() 2037 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, maxkeylen / 8, in wpa_supplicant_process_1_of_2_wpa() 2304 if (ver == WPA_KEY_INFO_TYPE_HMAC_MD5_RC4 && sm->ptk.kek_len == 16) { in wpa_supplicant_decrypt_key_data() 2314 os_memcpy(ek + 16, sm->ptk.kek, sm->ptk.kek_len); in wpa_supplicant_decrypt_key_data() 2330 (unsigned int) sm->ptk.kek_len); in wpa_supplicant_decrypt_key_data() 2347 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, *key_data_len / 8, in wpa_supplicant_decrypt_key_data() [all …]
|
D | wpa.h | 85 void (*set_rekey_offload)(void *ctx, const u8 *kek, size_t kek_len, 557 size_t *kek_len, const u8 **snonce,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
D | sae_pk.c | 629 if (tmp->kek_len != 32 && tmp->kek_len != 48 && tmp->kek_len != 64) { in sae_write_confirm_pk() 688 if (aes_siv_encrypt(tmp->kek, tmp->kek_len, in sae_write_confirm_pk() 789 if (tmp->kek_len != 32 && tmp->kek_len != 48 && tmp->kek_len != 64) { in sae_check_confirm_pk() 825 if (aes_siv_decrypt(tmp->kek, tmp->kek_len, in sae_check_confirm_pk()
|
D | wpa_common.c | 411 ptk->kek_len = wpa_kek_len(akmp, pmk_len); in wpa_pmk_to_ptk() 420 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len + ptk->kdk_len; in wpa_pmk_to_ptk() 498 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); in wpa_pmk_to_ptk() 499 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); in wpa_pmk_to_ptk() 501 os_memcpy(ptk->tk, tmp + ptk->kck_len + ptk->kek_len, ptk->tk_len); in wpa_pmk_to_ptk() 505 os_memcpy(ptk->kdk, tmp + ptk->kck_len + ptk->kek_len + in wpa_pmk_to_ptk() 639 ptk->kek_len = wpa_kek_len(akmp, pmk_len); in fils_pmk_to_ptk() 647 key_data_len = *ick_len + ptk->kek_len + ptk->tk_len; in fils_pmk_to_ptk() 699 os_memcpy(ptk->kek, tmp + offset, ptk->kek_len); in fils_pmk_to_ptk() 700 wpa_hexdump_key(MSG_DEBUG, "FILS: KEK", ptk->kek, ptk->kek_len); in fils_pmk_to_ptk() [all …]
|
D | sae.h | 69 size_t kek_len; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
D | aes-wrap.c | 26 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument 40 ctx = aes_encrypt_init(kek, kek_len); in aes_wrap()
|
D | aes-unwrap.c | 26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument 39 ctx = aes_decrypt_init(kek, kek_len); in aes_unwrap()
|
D | aes_wrap.h | 21 int __must_check aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, 23 int __must_check aes_unwrap(const u8 *kek, size_t kek_len, int n,
|
D | crypto_wolfssl.c | 412 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument 419 ret = wc_AesKeyWrap(kek, kek_len, plain, n * 8, cipher, (n + 1) * 8, in aes_wrap() 425 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument 433 ret = wc_AesKeyUnWrap(kek, kek_len, cipher, (n + 1) * 8, plain, n * 8, in aes_unwrap()
|
D | crypto_linux.c | 784 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument 797 skcipher = linux_af_alg_skcipher("kw(aes)", kek, kek_len); in aes_unwrap()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
D | aes-wrap.c | 26 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument 40 ctx = aes_encrypt_init(kek, kek_len); in aes_wrap()
|
D | aes-unwrap.c | 26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument 39 ctx = aes_decrypt_init(kek, kek_len); in aes_unwrap()
|
D | aes_wrap.h | 21 int __must_check aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, 23 int __must_check aes_unwrap(const u8 *kek, size_t kek_len, int n,
|
D | crypto_wolfssl.c | 412 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument 419 ret = wc_AesKeyWrap(kek, kek_len, plain, n * 8, cipher, (n + 1) * 8, in aes_wrap() 425 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument 433 ret = wc_AesKeyUnWrap(kek, kek_len, cipher, (n + 1) * 8, plain, n * 8, in aes_unwrap()
|
D | crypto_openssl.c | 431 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument 438 if (AES_set_encrypt_key(kek, kek_len << 3, &actx)) in aes_wrap() 446 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument 454 if (AES_set_decrypt_key(kek, kek_len << 3, &actx)) in aes_unwrap()
|
D | crypto_linux.c | 784 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument 797 skcipher = linux_af_alg_skcipher("kw(aes)", kek, kek_len); in aes_unwrap()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/ |
D | wpa_ft.c | 695 size_t kek_len; in wpa_ft_process_gtk_subelem() local 699 kek_len = sm->ptk.kek2_len; in wpa_ft_process_gtk_subelem() 702 kek_len = sm->ptk.kek_len; in wpa_ft_process_gtk_subelem() 720 if (aes_unwrap(kek, kek_len, gtk_len / 8, gtk_elem + 11, gtk)) { in wpa_ft_process_gtk_subelem() 778 size_t kek_len; in wpa_ft_process_igtk_subelem() local 782 kek_len = sm->ptk.kek2_len; in wpa_ft_process_igtk_subelem() 785 kek_len = sm->ptk.kek_len; in wpa_ft_process_igtk_subelem() 814 if (aes_unwrap(kek, kek_len, igtk_len / 8, igtk_elem + 9, igtk)) { in wpa_ft_process_igtk_subelem()
|
D | wpa.c | 107 if (!ptk || !ptk->kek_len) in wpa_eapol_key_send() 137 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); in wpa_eapol_key_send() 142 if (aes_siv_encrypt(ptk->kek, ptk->kek_len, in wpa_eapol_key_send() 1700 if (ver == WPA_KEY_INFO_TYPE_HMAC_MD5_RC4 && sm->ptk.kek_len == 16) { in wpa_supplicant_process_1_of_2_wpa() 1714 os_memcpy(ek + 16, sm->ptk.kek, sm->ptk.kek_len); in wpa_supplicant_process_1_of_2_wpa() 1739 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, maxkeylen / 8, in wpa_supplicant_process_1_of_2_wpa() 1992 if (ver == WPA_KEY_INFO_TYPE_HMAC_MD5_RC4 && sm->ptk.kek_len == 16) { in wpa_supplicant_decrypt_key_data() 2002 os_memcpy(ek + 16, sm->ptk.kek, sm->ptk.kek_len); in wpa_supplicant_decrypt_key_data() 2018 (unsigned int) sm->ptk.kek_len); in wpa_supplicant_decrypt_key_data() 2035 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, *key_data_len / 8, in wpa_supplicant_decrypt_key_data() [all …]
|
D | wpa.h | 80 void (*set_rekey_offload)(void *ctx, const u8 *kek, size_t kek_len, 456 size_t *kek_len, const u8 **snonce,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/ |
D | wpa_common.c | 393 ptk->kek_len = wpa_kek_len(akmp, pmk_len); in wpa_pmk_to_ptk() 401 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len; in wpa_pmk_to_ptk() 461 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); in wpa_pmk_to_ptk() 462 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); in wpa_pmk_to_ptk() 464 os_memcpy(ptk->tk, tmp + ptk->kck_len + ptk->kek_len, ptk->tk_len); in wpa_pmk_to_ptk() 592 ptk->kek_len = wpa_kek_len(akmp, pmk_len); in fils_pmk_to_ptk() 600 key_data_len = *ick_len + ptk->kek_len + ptk->tk_len; in fils_pmk_to_ptk() 638 os_memcpy(ptk->kek, tmp + *ick_len, ptk->kek_len); in fils_pmk_to_ptk() 639 wpa_hexdump_key(MSG_DEBUG, "FILS: KEK", ptk->kek, ptk->kek_len); in fils_pmk_to_ptk() 641 os_memcpy(ptk->tk, tmp + *ick_len + ptk->kek_len, ptk->tk_len); in fils_pmk_to_ptk() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
D | wpa_auth_ft.c | 2174 size_t kek_len; in wpa_ft_gtk_subelem() local 2178 kek_len = sm->PTK.kek2_len; in wpa_ft_gtk_subelem() 2181 kek_len = sm->PTK.kek_len; in wpa_ft_gtk_subelem() 2239 if (aes_wrap(kek, kek_len, key_len / 8, key, subelem + 13)) { in wpa_ft_gtk_subelem() 2242 (int) kek_len); in wpa_ft_gtk_subelem() 2260 size_t kek_len; in wpa_ft_igtk_subelem() local 2266 kek_len = sm->PTK.kek2_len; in wpa_ft_igtk_subelem() 2269 kek_len = sm->PTK.kek_len; in wpa_ft_igtk_subelem() 2301 if (aes_wrap(kek, kek_len, igtk_len / 8, igtk, pos)) { in wpa_ft_igtk_subelem() 2304 (int) kek_len); in wpa_ft_igtk_subelem() [all …]
|
D | wpa_auth.c | 1620 sm->PTK.kek, sm->PTK.kek_len); in __wpa_send_eapol() 1625 if (aes_siv_encrypt(sm->PTK.kek, sm->PTK.kek_len, kde, kde_len, in __wpa_send_eapol() 1654 sm->PTK.kek_len); in __wpa_send_eapol() 1655 if (aes_wrap(sm->PTK.kek, sm->PTK.kek_len, in __wpa_send_eapol() 1663 } else if (sm->PTK.kek_len == 16) { in __wpa_send_eapol() 1672 os_memcpy(ek + 16, sm->PTK.kek, sm->PTK.kek_len); in __wpa_send_eapol() 2468 if (aes_siv_decrypt(ptk->kek, ptk->kek_len, pos, key_data_len, in wpa_aead_decrypt() 2659 if (aes_siv_decrypt(sm->PTK.kek, sm->PTK.kek_len, crypt, end - crypt, in fils_decrypt_assoc() 2736 if (aes_siv_encrypt(sm->PTK.kek, sm->PTK.kek_len, in fils_encrypt_assoc() 5341 *fils_kek_len = sm->PTK.kek_len; in wpa_auth_get_fils_aead_params()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
D | wpa_auth_ft.c | 2174 size_t kek_len; in wpa_ft_gtk_subelem() local 2178 kek_len = sm->PTK.kek2_len; in wpa_ft_gtk_subelem() 2181 kek_len = sm->PTK.kek_len; in wpa_ft_gtk_subelem() 2221 if (aes_wrap(kek, kek_len, key_len / 8, key, subelem + 13)) { in wpa_ft_gtk_subelem() 2224 (int) kek_len); in wpa_ft_gtk_subelem() 2242 size_t kek_len; in wpa_ft_igtk_subelem() local 2247 kek_len = sm->PTK.kek2_len; in wpa_ft_igtk_subelem() 2250 kek_len = sm->PTK.kek_len; in wpa_ft_igtk_subelem() 2270 if (aes_wrap(kek, kek_len, igtk_len / 8, in wpa_ft_igtk_subelem() 2274 (int) kek_len); in wpa_ft_igtk_subelem()
|
D | wpa_auth.c | 1551 sm->PTK.kek, sm->PTK.kek_len); in __wpa_send_eapol() 1556 if (aes_siv_encrypt(sm->PTK.kek, sm->PTK.kek_len, kde, kde_len, in __wpa_send_eapol() 1585 (unsigned int) sm->PTK.kek_len); in __wpa_send_eapol() 1586 if (aes_wrap(sm->PTK.kek, sm->PTK.kek_len, in __wpa_send_eapol() 1594 } else if (sm->PTK.kek_len == 16) { in __wpa_send_eapol() 1603 os_memcpy(ek + 16, sm->PTK.kek, sm->PTK.kek_len); in __wpa_send_eapol() 2364 if (aes_siv_decrypt(ptk->kek, ptk->kek_len, pos, key_data_len, in wpa_aead_decrypt() 2555 if (aes_siv_decrypt(sm->PTK.kek, sm->PTK.kek_len, crypt, end - crypt, in fils_decrypt_assoc() 2632 if (aes_siv_encrypt(sm->PTK.kek, sm->PTK.kek_len, in fils_encrypt_assoc() 4928 *fils_kek_len = sm->PTK.kek_len; in wpa_auth_get_fils_aead_params()
|