Home
last modified time | relevance | path

Searched refs:kck (Results 1 – 25 of 32) sorted by relevance

12

/external/wpa_supplicant_8/src/rsn_supp/
Dwpa_ft.c172 const u8 *kck, size_t kck_len, in wpa_ft_gen_req_ies() argument
338 if (kck) { in wpa_ft_gen_req_ies()
351 if (kck && wpa_sm_ocv_enabled(sm)) { in wpa_ft_gen_req_ies()
389 if (kck) { in wpa_ft_gen_req_ies()
406 if (wpa_ft_mic(kck, kck_len, sm->own_addr, target_ap, 5, in wpa_ft_gen_req_ies()
523 const u8 *kck; in wpa_ft_process_response() local
656 kck = sm->ptk.kck2; in wpa_ft_process_response()
659 kck = sm->ptk.kck; in wpa_ft_process_response()
664 kck, kck_len, bssid, in wpa_ft_process_response()
950 const u8 *kck; in wpa_ft_validate_reassoc_resp() local
[all …]
Dpmksa_cache.h71 const u8 *pmkid, const u8 *kck, size_t kck_len,
137 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add() argument
Dtdls.c112 u8 kck[16]; /* TPK-KCK */ member
454 peer->tpk.kck, sizeof(peer->tpk.kck)); in wpa_tdls_generate_tpk()
472 static int wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid, in wpa_tdls_ftie_mic() argument
514 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16); in wpa_tdls_ftie_mic()
515 ret = omac1_aes_128(kck, buf, pos - buf, mic); in wpa_tdls_ftie_mic()
534 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, in wpa_tdls_key_mic_teardown() argument
573 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16); in wpa_tdls_key_mic_teardown()
574 ret = omac1_aes_128(kck, buf, pos - buf, mic); in wpa_tdls_key_mic_teardown()
589 wpa_tdls_ftie_mic(peer->tpk.kck, trans_seq, lnkid, in wpa_supplicant_verify_tdls_mic()
617 wpa_tdls_key_mic_teardown(peer->tpk.kck, trans_seq, rcode, in wpa_supplicant_verify_tdls_mic_teardown()
[all …]
Dpmksa_cache.c134 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add() argument
144 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_add()
155 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_add()
157 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_add()
Dwpa_i.h326 sm->ptk.kck, sm->ptk.kck_len, in wpa_sm_set_rekey_offload()
Dwpa.h83 const u8 *kck, size_t kck_len,
Dwpa.c84 wpa_eapol_key_mic(ptk->kck, ptk->kck_len, sm->key_mgmt, ver, in wpa_eapol_key_send()
93 ptk->kck, ptk->kck_len); in wpa_eapol_key_send()
1804 sm->ptk.kck, sm->ptk.kck_len, in wpa_supplicant_process_3_of_4()
2129 if (wpa_eapol_key_mic(sm->tptk.kck, sm->tptk.kck_len, in wpa_supplicant_verify_eapol_key_mic()
2163 if (wpa_eapol_key_mic(sm->ptk.kck, sm->ptk.kck_len, in wpa_supplicant_verify_eapol_key_mic()
3885 os_memcpy(sm->ptk.kck, ptk_kck, ptk_kck_len); in wpa_sm_set_ptk_kck_kek()
/external/wpa_supplicant_8/src/ap/
Dpmksa_cache_auth.h53 const u8 *kck, size_t kck_len,
58 const u8 *kck, size_t kck_len, const u8 *aa,
Dpmksa_cache_auth.c281 const u8 *kck, size_t kck_len, in pmksa_cache_auth_add() argument
287 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len, in pmksa_cache_auth_add()
316 const u8 *kck, size_t kck_len, const u8 *aa, in pmksa_cache_auth_create_entry() argument
326 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_auth_create_entry()
337 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_auth_create_entry()
339 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_auth_create_entry()
Dwpa_auth_ft.c2480 const u8 *kck; in wpa_sm_write_assoc_resp_ies() local
2717 kck = sm->PTK.kck2; in wpa_sm_write_assoc_resp_ies()
2720 kck = sm->PTK.kck; in wpa_sm_write_assoc_resp_ies()
2724 wpa_ft_mic(kck, kck_len, sm->addr, sm->wpa_auth->addr, 6, in wpa_sm_write_assoc_resp_ies()
3265 const u8 *kck; in wpa_ft_validate_reassoc() local
3414 kck = sm->PTK.kck2; in wpa_ft_validate_reassoc()
3417 kck = sm->PTK.kck; in wpa_ft_validate_reassoc()
3420 if (wpa_ft_mic(kck, kck_len, sm->addr, sm->wpa_auth->addr, 5, in wpa_ft_validate_reassoc()
Dwpa_auth.c1646 if (wpa_eapol_key_mic(sm->PTK.kck, sm->PTK.kck_len, in __wpa_send_eapol()
1727 if (wpa_eapol_key_mic(PTK->kck, PTK->kck_len, akmp, in wpa_verify_key_mic()
4665 sm->PTK.kck, sm->PTK.kck_len, in wpa_auth_pmksa_add()
/external/wpa_supplicant_8/src/common/
Dwpa_common.h222 u8 kck[WPA_KCK_MAX_LEN]; /* EAPOL-Key Key Confirmation Key (KCK) */ member
400 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr,
448 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa,
451 static inline int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, in rsn_pmkid_suite_b() argument
458 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa,
461 static inline int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, in rsn_pmkid_suite_b_192() argument
Dcommon_module_tests.c311 const u8 kck[] = { in sae_tests() local
453 if (os_memcmp(kck, sae.tmp->kck, SAE_KCK_LEN) != 0) { in sae_tests()
Dwpa_common.c482 os_memcpy(ptk->kck, tmp, ptk->kck_len); in wpa_pmk_to_ptk()
483 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len); in wpa_pmk_to_ptk()
778 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, in wpa_ft_mic() argument
867 if (hmac_sha384_vector(kck, kck_len, num_elem, addr, len, hash)) in wpa_ft_mic()
873 omac1_aes_128_vector(kck, num_elem, addr, len, mic)) in wpa_ft_mic()
1821 os_memcpy(ptk->kck, tmp, ptk->kck_len); in wpa_pmk_r1_to_ptk()
1831 wpa_hexdump_key(MSG_DEBUG, "FT: KCK", ptk->kck, ptk->kck_len); in wpa_pmk_r1_to_ptk()
1914 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, in rsn_pmkid_suite_b() argument
1926 if (hmac_sha256_vector(kck, kck_len, 3, addr, len, hash) < 0) in rsn_pmkid_suite_b()
1947 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, in rsn_pmkid_suite_b_192() argument
[all …]
Dsae.h25 u8 kck[SAE_MAX_HASH_LEN]; member
Dsae.c1597 os_memcpy(sae->tmp->kck, keys, hash_len); in sae_derive_keys()
1603 sae->tmp->kck, sae->tmp->kck_len); in sae_derive_keys()
2142 return hkdf_extract(sae->tmp->kck_len, sae->tmp->kck, sae->tmp->kck_len, in sae_cn_confirm()
/external/perfetto/src/traced/probes/ftrace/test/data/android_flounder_lte_LRX16F_3.10.40/events/mac80211/drv_set_rekey_data/
Dformat15 field:u8 kck[16]; offset:80; size:16; signed:0;
/external/scapy/scapy/modules/krack/
Dautomaton.py177 self.kck = self.ptk[:16]
559 assert hmac.new(self.kck, client_data, hashlib.md5).digest() == client_mic
582 key_mic=self.kck,
643 key_mic=self.kck,
752 key_mic=self.kck,
/external/wpa_supplicant_8/wpa_supplicant/
Ddriver_i.h614 const u8 *kck, size_t kck_len, in wpa_drv_set_rekey_info() argument
620 kck, kck_len, replay_ctr); in wpa_drv_set_rekey_info()
Dwpas_glue.c1195 const u8 *kck, size_t kck_len, in wpa_supplicant_set_rekey_offload() argument
1200 wpa_drv_set_rekey_info(wpa_s, kek, kek_len, kck, kck_len, replay_ctr); in wpa_supplicant_set_rekey_offload()
/external/wpa_supplicant_8/src/drivers/
Ddriver.h3750 const u8 *kck, size_t kck_len,
Ddriver_nl80211.c8600 const u8 *kck, size_t kck_len, in nl80211_set_rekey_info() argument
8616 (kck_len && nla_put(msg, NL80211_REKEY_DATA_KCK, kck_len, kck)) || in nl80211_set_rekey_info()
/external/icu/icu4c/source/data/misc/
DlikelySubtags.txt559 kck{"kck_Latn_ZW"}
DlangInfo.txt1422 "kck","Latn","ZW",
/external/cldr/tools/java/org/unicode/cldr/util/data/
Dlanguage_script_raw.txt364 kck Kalanga primary Latn Latin

12