/external/wpa_supplicant_8/src/rsn_supp/ |
D | wpa_ft.c | 154 const u8 *kck, size_t kck_len, in wpa_ft_gen_req_ies() argument 372 if (wpa_ft_mic(kck, kck_len, sm->own_addr, target_ap, 5, in wpa_ft_gen_req_ies() 488 size_t kck_len; in wpa_ft_process_response() local 615 kck_len = sm->ptk.kck2_len; in wpa_ft_process_response() 618 kck_len = sm->ptk.kck_len; in wpa_ft_process_response() 622 kck, kck_len, bssid, in wpa_ft_process_response() 840 size_t kck_len; in wpa_ft_validate_reassoc_resp() local 965 kck_len = sm->ptk.kck2_len; in wpa_ft_validate_reassoc_resp() 968 kck_len = sm->ptk.kck_len; in wpa_ft_validate_reassoc_resp() 971 if (wpa_ft_mic(kck, kck_len, sm->own_addr, src_addr, 6, in wpa_ft_validate_reassoc_resp()
|
D | pmksa_cache.h | 70 const u8 *pmkid, const u8 *kck, size_t kck_len, 136 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add() argument
|
D | pmksa_cache.c | 132 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add() argument 153 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_add() 155 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_add()
|
D | wpa.c | 79 if (key_mic && (!ptk || !ptk->kck_len)) in wpa_eapol_key_send() 83 wpa_eapol_key_mic(ptk->kck, ptk->kck_len, sm->key_mgmt, ver, in wpa_eapol_key_send() 92 ptk->kck, ptk->kck_len); in wpa_eapol_key_send() 1558 sm->ptk.kck, sm->ptk.kck_len, in wpa_supplicant_process_3_of_4() 1881 if (wpa_eapol_key_mic(sm->tptk.kck, sm->tptk.kck_len, in wpa_supplicant_verify_eapol_key_mic() 1915 if (wpa_eapol_key_mic(sm->ptk.kck, sm->ptk.kck_len, in wpa_supplicant_verify_eapol_key_mic() 3474 sm->ptk.kck_len = ptk_kck_len; in wpa_sm_set_ptk_kck_kek()
|
D | wpa_i.h | 304 sm->ptk.kck, sm->ptk.kck_len, in wpa_sm_set_rekey_offload()
|
D | wpa.h | 81 const u8 *kck, size_t kck_len,
|
/external/wpa_supplicant_8/src/common/ |
D | wpa_common.c | 392 ptk->kck_len = wpa_kck_len(akmp, pmk_len); in wpa_pmk_to_ptk() 401 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len; in wpa_pmk_to_ptk() 458 os_memcpy(ptk->kck, tmp, ptk->kck_len); in wpa_pmk_to_ptk() 459 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len); in wpa_pmk_to_ptk() 461 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); in wpa_pmk_to_ptk() 464 os_memcpy(ptk->tk, tmp + ptk->kck_len + ptk->kek_len, ptk->tk_len); in wpa_pmk_to_ptk() 591 ptk->kck_len = 0; in fils_pmk_to_ptk() 754 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, in wpa_ft_mic() argument 767 if (kck_len == 16) { in wpa_ft_mic() 770 } else if (kck_len == 24) { in wpa_ft_mic() [all …]
|
D | wpa_common.h | 216 size_t kck_len; member 370 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, 416 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, 419 static inline int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, in rsn_pmkid_suite_b() argument 426 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, 429 static inline int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, in rsn_pmkid_suite_b_192() argument
|
/external/wpa_supplicant_8/src/ap/ |
D | pmksa_cache_auth.h | 53 const u8 *kck, size_t kck_len, 58 const u8 *kck, size_t kck_len, const u8 *aa,
|
D | pmksa_cache_auth.c | 281 const u8 *kck, size_t kck_len, in pmksa_cache_auth_add() argument 287 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len, in pmksa_cache_auth_add() 316 const u8 *kck, size_t kck_len, const u8 *aa, in pmksa_cache_auth_create_entry() argument 337 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_auth_create_entry() 339 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_auth_create_entry()
|
D | wpa_auth_ft.c | 2420 size_t kck_len; in wpa_sm_write_assoc_resp_ies() local 2580 kck_len = sm->PTK.kck2_len; in wpa_sm_write_assoc_resp_ies() 2583 kck_len = sm->PTK.kck_len; in wpa_sm_write_assoc_resp_ies() 2586 wpa_ft_mic(kck, kck_len, sm->addr, sm->wpa_auth->addr, 6, in wpa_sm_write_assoc_resp_ies() 3110 size_t kck_len; in wpa_ft_validate_reassoc() local 3253 kck_len = sm->PTK.kck2_len; in wpa_ft_validate_reassoc() 3256 kck_len = sm->PTK.kck_len; in wpa_ft_validate_reassoc() 3258 if (wpa_ft_mic(kck, kck_len, sm->addr, sm->wpa_auth->addr, 5, in wpa_ft_validate_reassoc()
|
D | wpa_auth.c | 1603 if (wpa_eapol_key_mic(sm->PTK.kck, sm->PTK.kck_len, in __wpa_send_eapol() 1685 if (wpa_eapol_key_mic(PTK->kck, PTK->kck_len, akmp, in wpa_verify_key_mic() 4318 sm->PTK.kck, sm->PTK.kck_len, in wpa_auth_pmksa_add()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | driver_i.h | 583 const u8 *kck, size_t kck_len, in wpa_drv_set_rekey_info() argument 589 kck, kck_len, replay_ctr); in wpa_drv_set_rekey_info()
|
D | wpas_glue.c | 1146 const u8 *kck, size_t kck_len, in wpa_supplicant_set_rekey_offload() argument 1151 wpa_drv_set_rekey_info(wpa_s, kek, kek_len, kck, kck_len, replay_ctr); in wpa_supplicant_set_rekey_offload()
|
/external/wpa_supplicant_8/src/drivers/ |
D | driver.h | 3502 const u8 *kck, size_t kck_len,
|
D | driver_nl80211.c | 8210 const u8 *kck, size_t kck_len, in nl80211_set_rekey_info() argument 8226 (kck_len && nla_put(msg, NL80211_REKEY_DATA_KCK, kck_len, kck)) || in nl80211_set_rekey_info()
|