Home
last modified time | relevance | path

Searched refs:kek_len (Results 1 – 23 of 23) sorted by relevance

/external/wpa_supplicant_8/src/crypto/
Daes-wrap.c26 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument
40 ctx = aes_encrypt_init(kek, kek_len); in aes_wrap()
Daes-unwrap.c26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument
39 ctx = aes_decrypt_init(kek, kek_len); in aes_unwrap()
Daes_wrap.h21 int __must_check aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain,
23 int __must_check aes_unwrap(const u8 *kek, size_t kek_len, int n,
Dcrypto_wolfssl.c412 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument
419 ret = wc_AesKeyWrap(kek, kek_len, plain, n * 8, cipher, (n + 1) * 8, in aes_wrap()
425 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument
433 ret = wc_AesKeyUnWrap(kek, kek_len, cipher, (n + 1) * 8, plain, n * 8, in aes_unwrap()
Dcrypto_linux.c784 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument
797 skcipher = linux_af_alg_skcipher("kw(aes)", kek, kek_len); in aes_unwrap()
Dcrypto_openssl.c440 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument
447 if (AES_set_encrypt_key(kek, kek_len << 3, &actx)) in aes_wrap()
455 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument
463 if (AES_set_decrypt_key(kek, kek_len << 3, &actx)) in aes_unwrap()
/external/wpa_supplicant_8/src/rsn_supp/
Dwpa_ft.c780 size_t kek_len; in wpa_ft_process_gtk_subelem() local
784 kek_len = sm->ptk.kek2_len; in wpa_ft_process_gtk_subelem()
787 kek_len = sm->ptk.kek_len; in wpa_ft_process_gtk_subelem()
805 if (aes_unwrap(kek, kek_len, gtk_len / 8, gtk_elem + 11, gtk)) { in wpa_ft_process_gtk_subelem()
863 size_t kek_len; in wpa_ft_process_igtk_subelem() local
867 kek_len = sm->ptk.kek2_len; in wpa_ft_process_igtk_subelem()
870 kek_len = sm->ptk.kek_len; in wpa_ft_process_igtk_subelem()
899 if (aes_unwrap(kek, kek_len, igtk_len / 8, igtk_elem + 9, igtk)) { in wpa_ft_process_igtk_subelem()
933 size_t kek_len; in wpa_ft_process_bigtk_subelem() local
944 kek_len = sm->ptk.kek2_len; in wpa_ft_process_bigtk_subelem()
[all …]
Dwpa.c110 if (!ptk || !ptk->kek_len) in wpa_eapol_key_send()
140 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); in wpa_eapol_key_send()
145 if (aes_siv_encrypt(ptk->kek, ptk->kek_len, in wpa_eapol_key_send()
1957 if (ver == WPA_KEY_INFO_TYPE_HMAC_MD5_RC4 && sm->ptk.kek_len == 16) { in wpa_supplicant_process_1_of_2_wpa()
1971 os_memcpy(ek + 16, sm->ptk.kek, sm->ptk.kek_len); in wpa_supplicant_process_1_of_2_wpa()
1996 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, maxkeylen / 8, in wpa_supplicant_process_1_of_2_wpa()
2258 if (ver == WPA_KEY_INFO_TYPE_HMAC_MD5_RC4 && sm->ptk.kek_len == 16) { in wpa_supplicant_decrypt_key_data()
2268 os_memcpy(ek + 16, sm->ptk.kek, sm->ptk.kek_len); in wpa_supplicant_decrypt_key_data()
2284 (unsigned int) sm->ptk.kek_len); in wpa_supplicant_decrypt_key_data()
2301 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, *key_data_len / 8, in wpa_supplicant_decrypt_key_data()
[all …]
Dwpa.h82 void (*set_rekey_offload)(void *ctx, const u8 *kek, size_t kek_len,
547 size_t *kek_len, const u8 **snonce,
Dwpa_i.h356 sm->ctx->set_rekey_offload(sm->ctx->ctx, sm->ptk.kek, sm->ptk.kek_len, in wpa_sm_set_rekey_offload()
/external/wpa_supplicant_8/src/common/
Dsae_pk.c629 if (tmp->kek_len != 32 && tmp->kek_len != 48 && tmp->kek_len != 64) { in sae_write_confirm_pk()
688 if (aes_siv_encrypt(tmp->kek, tmp->kek_len, in sae_write_confirm_pk()
789 if (tmp->kek_len != 32 && tmp->kek_len != 48 && tmp->kek_len != 64) { in sae_check_confirm_pk()
825 if (aes_siv_decrypt(tmp->kek, tmp->kek_len, in sae_check_confirm_pk()
Dwpa_common.c408 ptk->kek_len = wpa_kek_len(akmp, pmk_len); in wpa_pmk_to_ptk()
417 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len + ptk->kdk_len; in wpa_pmk_to_ptk()
495 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); in wpa_pmk_to_ptk()
496 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); in wpa_pmk_to_ptk()
498 os_memcpy(ptk->tk, tmp + ptk->kck_len + ptk->kek_len, ptk->tk_len); in wpa_pmk_to_ptk()
502 os_memcpy(ptk->kdk, tmp + ptk->kck_len + ptk->kek_len + in wpa_pmk_to_ptk()
636 ptk->kek_len = wpa_kek_len(akmp, pmk_len); in fils_pmk_to_ptk()
644 key_data_len = *ick_len + ptk->kek_len + ptk->tk_len; in fils_pmk_to_ptk()
696 os_memcpy(ptk->kek, tmp + offset, ptk->kek_len); in fils_pmk_to_ptk()
697 wpa_hexdump_key(MSG_DEBUG, "FILS: KEK", ptk->kek, ptk->kek_len); in fils_pmk_to_ptk()
[all …]
Dsae.h69 size_t kek_len; member
Dcommon_module_tests.c777 if (ptk.kek_len != sizeof(kek) || in pasn_test_no_pasn_auth()
Dwpa_common.h238 size_t kek_len; member
Dsae.c1641 sae->tmp->kek_len = hash_len; in sae_derive_keys()
1643 sae->tmp->kek, sae->tmp->kek_len); in sae_derive_keys()
/external/wpa_supplicant_8/src/ap/
Dwpa_auth_ft.c2174 size_t kek_len; in wpa_ft_gtk_subelem() local
2178 kek_len = sm->PTK.kek2_len; in wpa_ft_gtk_subelem()
2181 kek_len = sm->PTK.kek_len; in wpa_ft_gtk_subelem()
2239 if (aes_wrap(kek, kek_len, key_len / 8, key, subelem + 13)) { in wpa_ft_gtk_subelem()
2242 (int) kek_len); in wpa_ft_gtk_subelem()
2260 size_t kek_len; in wpa_ft_igtk_subelem() local
2266 kek_len = sm->PTK.kek2_len; in wpa_ft_igtk_subelem()
2269 kek_len = sm->PTK.kek_len; in wpa_ft_igtk_subelem()
2301 if (aes_wrap(kek, kek_len, igtk_len / 8, igtk, pos)) { in wpa_ft_igtk_subelem()
2304 (int) kek_len); in wpa_ft_igtk_subelem()
[all …]
Dwpa_auth.c1595 sm->PTK.kek, sm->PTK.kek_len); in __wpa_send_eapol()
1600 if (aes_siv_encrypt(sm->PTK.kek, sm->PTK.kek_len, kde, kde_len, in __wpa_send_eapol()
1629 sm->PTK.kek_len); in __wpa_send_eapol()
1630 if (aes_wrap(sm->PTK.kek, sm->PTK.kek_len, in __wpa_send_eapol()
1638 } else if (sm->PTK.kek_len == 16) { in __wpa_send_eapol()
1647 os_memcpy(ek + 16, sm->PTK.kek, sm->PTK.kek_len); in __wpa_send_eapol()
2447 if (aes_siv_decrypt(ptk->kek, ptk->kek_len, pos, key_data_len, in wpa_aead_decrypt()
2638 if (aes_siv_decrypt(sm->PTK.kek, sm->PTK.kek_len, crypt, end - crypt, in fils_decrypt_assoc()
2715 if (aes_siv_encrypt(sm->PTK.kek, sm->PTK.kek_len, in fils_encrypt_assoc()
5318 *fils_kek_len = sm->PTK.kek_len; in wpa_auth_get_fils_aead_params()
/external/wpa_supplicant_8/wpa_supplicant/
Ddriver_i.h613 const u8 *kek, size_t kek_len, in wpa_drv_set_rekey_info() argument
619 wpa_s->driver->set_rekey_info(wpa_s->drv_priv, kek, kek_len, in wpa_drv_set_rekey_info()
Dwpas_glue.c1219 const u8 *kek, size_t kek_len, in wpa_supplicant_set_rekey_offload() argument
1225 wpa_drv_set_rekey_info(wpa_s, kek, kek_len, kck, kck_len, replay_ctr); in wpa_supplicant_set_rekey_offload()
/external/wpa_supplicant_8/src/drivers/
Ddriver_atheros.c1087 mlme.fils_aad.kek_len = params->fils_kek_len; in atheros_sta_auth()
1094 mlme.fils_aad.kek, mlme.fils_aad.kek_len); in atheros_sta_auth()
Ddriver.h3849 void (*set_rekey_info)(void *priv, const u8 *kek, size_t kek_len,
Ddriver_nl80211.c9094 static void nl80211_set_rekey_info(void *priv, const u8 *kek, size_t kek_len, in nl80211_set_rekey_info() argument
9110 nla_put(msg, NL80211_REKEY_DATA_KEK, kek_len, kek) || in nl80211_set_rekey_info()