/external/wpa_supplicant_8/src/rsn_supp/ |
D | wpa_ft.c | 728 const u8 *kek; in wpa_ft_process_gtk_subelem() local 732 kek = sm->ptk.kek2; in wpa_ft_process_gtk_subelem() 735 kek = sm->ptk.kek; in wpa_ft_process_gtk_subelem() 754 if (aes_unwrap(kek, kek_len, gtk_len / 8, gtk_elem + 11, gtk)) { in wpa_ft_process_gtk_subelem() 811 const u8 *kek; in wpa_ft_process_igtk_subelem() local 815 kek = sm->ptk.kek2; in wpa_ft_process_igtk_subelem() 818 kek = sm->ptk.kek; in wpa_ft_process_igtk_subelem() 848 if (aes_unwrap(kek, kek_len, igtk_len / 8, igtk_elem + 9, igtk)) { in wpa_ft_process_igtk_subelem() 881 const u8 *kek; in wpa_ft_process_bigtk_subelem() local 892 kek = sm->ptk.kek2; in wpa_ft_process_bigtk_subelem() [all …]
|
D | wpa.h | 82 void (*set_rekey_offload)(void *ctx, const u8 *kek, size_t kek_len, 490 struct wpabuf * fils_build_assoc_req(struct wpa_sm *sm, const u8 **kek,
|
D | wpa.c | 138 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); in wpa_eapol_key_send() 143 if (aes_siv_encrypt(ptk->kek, ptk->kek_len, in wpa_eapol_key_send() 1936 os_memcpy(ek + 16, sm->ptk.kek, sm->ptk.kek_len); in wpa_supplicant_process_1_of_2_wpa() 1961 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, maxkeylen / 8, in wpa_supplicant_process_1_of_2_wpa() 2224 os_memcpy(ek + 16, sm->ptk.kek, sm->ptk.kek_len); in wpa_supplicant_decrypt_key_data() 2257 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, *key_data_len / 8, in wpa_supplicant_decrypt_key_data() 2374 if (aes_siv_decrypt(ptk->kek, ptk->kek_len, pos, *key_data_len, in wpa_supp_aead_decrypt() 3890 os_memcpy(sm->ptk.kek, ptk_kek, ptk_kek_len); in wpa_sm_set_ptk_kck_kek() 4461 struct wpabuf * fils_build_assoc_req(struct wpa_sm *sm, const u8 **kek, in fils_build_assoc_req() argument 4568 *kek = sm->ptk.kek; in fils_build_assoc_req() [all …]
|
D | wpa_i.h | 325 sm->ctx->set_rekey_offload(sm->ctx->ctx, sm->ptk.kek, sm->ptk.kek_len, in wpa_sm_set_rekey_offload()
|
/external/wpa_supplicant_8/src/crypto/ |
D | aes-wrap.c | 26 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument 40 ctx = aes_encrypt_init(kek, kek_len); in aes_wrap()
|
D | aes-unwrap.c | 26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument 39 ctx = aes_decrypt_init(kek, kek_len); in aes_unwrap()
|
D | aes_wrap.h | 21 int __must_check aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, 23 int __must_check aes_unwrap(const u8 *kek, size_t kek_len, int n,
|
D | crypto_wolfssl.c | 412 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument 419 ret = wc_AesKeyWrap(kek, kek_len, plain, n * 8, cipher, (n + 1) * 8, in aes_wrap() 425 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument 433 ret = wc_AesKeyUnWrap(kek, kek_len, cipher, (n + 1) * 8, plain, n * 8, in aes_unwrap()
|
D | crypto_openssl.c | 431 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument 438 if (AES_set_encrypt_key(kek, kek_len << 3, &actx)) in aes_wrap() 446 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument 454 if (AES_set_decrypt_key(kek, kek_len << 3, &actx)) in aes_unwrap()
|
D | crypto_linux.c | 784 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument 797 skcipher = linux_af_alg_skcipher("kw(aes)", kek, kek_len); in aes_unwrap()
|
/external/wpa_supplicant_8/src/common/ |
D | dpp_backup.c | 277 u8 kek[DPP_MAX_HASH_LEN]; in dpp_build_pw_recipient_info() local 293 kek, hash_len)) { in dpp_build_pw_recipient_info() 298 kek, hash_len); in dpp_build_pw_recipient_info() 302 aes_siv_encrypt(kek, hash_len, wpabuf_head(cont_enc_key), in dpp_build_pw_recipient_info() 347 forced_memzero(kek, sizeof(kek)); in dpp_build_pw_recipient_info() 1156 u8 kek[DPP_MAX_HASH_LEN]; in dpp_conf_resp_env_data() local 1177 kek, data.pbkdf2_key_len)) { in dpp_conf_resp_env_data() 1182 kek, data.pbkdf2_key_len); in dpp_conf_resp_env_data() 1189 res = aes_siv_decrypt(kek, data.pbkdf2_key_len, in dpp_conf_resp_env_data() 1192 forced_memzero(kek, data.pbkdf2_key_len); in dpp_conf_resp_env_data()
|
D | wpa_common.c | 485 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); in wpa_pmk_to_ptk() 486 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); in wpa_pmk_to_ptk() 662 os_memcpy(ptk->kek, tmp + *ick_len, ptk->kek_len); in fils_pmk_to_ptk() 663 wpa_hexdump_key(MSG_DEBUG, "FILS: KEK", ptk->kek, ptk->kek_len); in fils_pmk_to_ptk() 1823 os_memcpy(ptk->kek, tmp + offset, ptk->kek_len); in wpa_pmk_r1_to_ptk() 1832 wpa_hexdump_key(MSG_DEBUG, "FT: KEK", ptk->kek, ptk->kek_len); in wpa_pmk_r1_to_ptk()
|
D | wpa_common.h | 223 u8 kek[WPA_KEK_MAX_LEN]; /* EAPOL-Key Key Encryption Key (KEK) */ member
|
/external/wpa_supplicant_8/src/pae/ |
D | ieee802_1x_key.c | 138 size_t ckn_bytes, u8 *kek, size_t kek_bytes) in ieee802_1x_kek_aes_cmac() argument 148 8 * kek_bytes, kek); in ieee802_1x_kek_aes_cmac()
|
D | ieee802_1x_key.h | 18 size_t ckn_bytes, u8 *kek, size_t kek_bytes);
|
D | ieee802_1x_kay_i.h | 75 u8 *kek, size_t kek_bytes); 108 struct mka_key kek; member
|
D | ieee802_1x_kay.c | 1648 if (aes_wrap(participant->kek.key, participant->kek.len, in ieee802_1x_mka_encode_dist_sak_body() 1789 if (aes_unwrap(participant->kek.key, participant->kek.len, in ieee802_1x_mka_decode_dist_sak_body() 3738 participant->kek.len = participant->cak.len; in ieee802_1x_kay_create_mka() 3743 participant->kek.key, in ieee802_1x_kay_create_mka() 3744 participant->kek.len)) { in ieee802_1x_kay_create_mka() 3749 participant->kek.key, participant->kek.len); in ieee802_1x_kay_create_mka() 3849 os_memset(&participant->kek, 0, sizeof(participant->kek)); in ieee802_1x_kay_delete_mka()
|
/external/perfetto/src/traced/probes/ftrace/test/data/android_flounder_lte_LRX16F_3.10.40/events/mac80211/drv_set_rekey_data/ |
D | format | 14 field:u8 kek[16]; offset:64; size:16; signed:0;
|
/external/scapy/scapy/modules/krack/ |
D | automaton.py | 178 self.kek = self.ptk[16:32] 583 key_data_encrypt=self.kek, 644 key_data_encrypt=self.kek, 753 key_data_encrypt=self.kek,
|
/external/wpa_supplicant_8/src/ap/ |
D | wpa_auth_ft.c | 2175 const u8 *kek; in wpa_ft_gtk_subelem() local 2179 kek = sm->PTK.kek2; in wpa_ft_gtk_subelem() 2182 kek = sm->PTK.kek; in wpa_ft_gtk_subelem() 2223 if (aes_wrap(kek, kek_len, key_len / 8, key, subelem + 13)) { in wpa_ft_gtk_subelem() 2242 const u8 *kek; in wpa_ft_igtk_subelem() local 2247 kek = sm->PTK.kek2; in wpa_ft_igtk_subelem() 2250 kek = sm->PTK.kek; in wpa_ft_igtk_subelem() 2271 if (aes_wrap(kek, kek_len, igtk_len / 8, in wpa_ft_igtk_subelem() 2290 const u8 *kek; in wpa_ft_bigtk_subelem() local 2295 kek = sm->PTK.kek2; in wpa_ft_bigtk_subelem() [all …]
|
D | wpa_auth.c | 1573 sm->PTK.kek, sm->PTK.kek_len); in __wpa_send_eapol() 1578 if (aes_siv_encrypt(sm->PTK.kek, sm->PTK.kek_len, kde, kde_len, in __wpa_send_eapol() 1608 if (aes_wrap(sm->PTK.kek, sm->PTK.kek_len, in __wpa_send_eapol() 1625 os_memcpy(ek + 16, sm->PTK.kek, sm->PTK.kek_len); in __wpa_send_eapol() 2405 if (aes_siv_decrypt(ptk->kek, ptk->kek_len, pos, key_data_len, in wpa_aead_decrypt() 2596 if (aes_siv_decrypt(sm->PTK.kek, sm->PTK.kek_len, crypt, end - crypt, in fils_decrypt_assoc() 2673 if (aes_siv_encrypt(sm->PTK.kek, sm->PTK.kek_len, in fils_encrypt_assoc() 5196 os_memcpy(fils_kek, sm->PTK.kek, WPA_KEK_MAX_LEN); in wpa_auth_get_fils_aead_params()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | driver_i.h | 613 const u8 *kek, size_t kek_len, in wpa_drv_set_rekey_info() argument 619 wpa_s->driver->set_rekey_info(wpa_s->drv_priv, kek, kek_len, in wpa_drv_set_rekey_info()
|
D | wpas_glue.c | 1194 const u8 *kek, size_t kek_len, in wpa_supplicant_set_rekey_offload() argument 1200 wpa_drv_set_rekey_info(wpa_s, kek, kek_len, kck, kck_len, replay_ctr); in wpa_supplicant_set_rekey_offload()
|
/external/cldr/common/testData/transforms/ |
D | am-Latn-t-am-m0-bgn.txt | 363 ከቁጥጥሩ kek’ut’it’iru
|
D | ky-fonipa-t-ky.txt | 11 Бишкек biʃkek 72 Бишкек biʃkek
|