Home
last modified time | relevance | path

Searched refs:kck (Results 1 – 20 of 20) sorted by relevance

/external/wpa_supplicant_8/src/rsn_supp/
Dwpa_ft.c147 const u8 *kck, const u8 *target_ap, in wpa_ft_gen_req_ies() argument
266 if (kck) { in wpa_ft_gen_req_ies()
286 if (kck) { in wpa_ft_gen_req_ies()
301 if (wpa_ft_mic(kck, sm->own_addr, target_ap, 5, in wpa_ft_gen_req_ies()
495 sm->pmk_r1_name, sm->ptk.kck, bssid, in wpa_ft_process_response()
781 if (wpa_ft_mic(sm->ptk.kck, sm->own_addr, src_addr, 6, in wpa_ft_validate_reassoc_resp()
Dtdls.c102 u8 kck[16]; /* TPK-KCK */ member
400 peer->tpk.kck, sizeof(peer->tpk.kck)); in wpa_tdls_generate_tpk()
418 static int wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid, in wpa_tdls_ftie_mic() argument
460 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16); in wpa_tdls_ftie_mic()
461 ret = omac1_aes_128(kck, buf, pos - buf, mic); in wpa_tdls_ftie_mic()
480 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, in wpa_tdls_key_mic_teardown() argument
519 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16); in wpa_tdls_key_mic_teardown()
520 ret = omac1_aes_128(kck, buf, pos - buf, mic); in wpa_tdls_key_mic_teardown()
535 wpa_tdls_ftie_mic(peer->tpk.kck, trans_seq, lnkid, in wpa_supplicant_verify_tdls_mic()
563 wpa_tdls_key_mic_teardown(peer->tpk.kck, trans_seq, rcode, in wpa_supplicant_verify_tdls_mic_teardown()
[all …]
Dpeerkey.c115 wpa_eapol_key_send(sm, sm->ptk.kck, ver, dst, ETH_P_EAPOL, in wpa_supplicant_send_smk_error()
167 wpa_eapol_key_send(sm, sm->ptk.kck, ver, src_addr, ETH_P_EAPOL, in wpa_supplicant_send_smk_m3()
435 wpa_eapol_key_send(sm, peerkey->stk.kck, ver, peerkey->addr, in wpa_supplicant_send_stk_3_of_4()
950 wpa_eapol_key_mic(peerkey->tstk.kck, ver, buf, len, in peerkey_verify_eapol_key_mic()
966 wpa_eapol_key_mic(peerkey->stk.kck, ver, buf, len, in peerkey_verify_eapol_key_mic()
1116 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL, in wpa_sm_stkstart()
Dwpa_i.h255 sm->ptk.kck, sm->rx_replay_counter); in wpa_sm_set_rekey_offload()
302 void wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck,
Dwpa.c37 void wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, in wpa_eapol_key_send() argument
59 wpa_eapol_key_mic(kck, ver, msg, msg_len, key_mic)) { in wpa_eapol_key_send()
65 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", kck, 16); in wpa_eapol_key_send()
131 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL, in wpa_sm_key_request()
342 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL, in wpa_supplicant_send_2_of_4()
1061 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL, in wpa_supplicant_send_4_of_4()
1345 wpa_eapol_key_send(sm, sm->ptk.kck, ver, sm->bssid, ETH_P_EAPOL, in wpa_supplicant_send_2_of_2()
1421 wpa_eapol_key_mic(sm->tptk.kck, ver, buf, len, in wpa_supplicant_verify_eapol_key_mic()
1437 wpa_eapol_key_mic(sm->ptk.kck, ver, buf, len, in wpa_supplicant_verify_eapol_key_mic()
Dwpa.h63 void (*set_rekey_offload)(void *ctx, const u8 *kek, const u8 *kck,
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
Dwpa_ft.c121 const u8 *kck, const u8 *target_ap) in wpa_ft_gen_req_ies() argument
244 if (kck) { in wpa_ft_gen_req_ies()
257 if (wpa_ft_mic(kck, sm->own_addr, target_ap, 5, in wpa_ft_gen_req_ies()
557 sm->pmk_r1_name, sm->ptk.kck, bssid); in wpa_ft_process_response()
813 if (wpa_ft_mic(sm->ptk.kck, sm->own_addr, src_addr, 6, in wpa_ft_validate_reassoc_resp()
Dpeerkey.c120 wpa_eapol_key_send(sm, sm->ptk.kck, ver, dst, ETH_P_EAPOL, in wpa_supplicant_send_smk_error()
172 wpa_eapol_key_send(sm, sm->ptk.kck, ver, src_addr, ETH_P_EAPOL, in wpa_supplicant_send_smk_m3()
440 wpa_eapol_key_send(sm, peerkey->stk.kck, ver, peerkey->addr, in wpa_supplicant_send_stk_3_of_4()
953 wpa_eapol_key_mic(peerkey->tstk.kck, ver, buf, len, in peerkey_verify_eapol_key_mic()
969 wpa_eapol_key_mic(peerkey->stk.kck, ver, buf, len, in peerkey_verify_eapol_key_mic()
1119 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL, in wpa_sm_stkstart()
Dwpa.c103 void wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, in wpa_eapol_key_send() argument
123 wpa_eapol_key_mic(kck, ver, msg, msg_len, key_mic); in wpa_eapol_key_send()
186 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL, in wpa_sm_key_request()
351 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL, in wpa_supplicant_send_2_of_4()
935 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL, in wpa_supplicant_send_4_of_4()
1198 wpa_eapol_key_send(sm, sm->ptk.kck, ver, sm->bssid, ETH_P_EAPOL, in wpa_supplicant_send_2_of_2()
1272 wpa_eapol_key_mic(sm->tptk.kck, ver, buf, len, in wpa_supplicant_verify_eapol_key_mic()
1287 wpa_eapol_key_mic(sm->ptk.kck, ver, buf, len, in wpa_supplicant_verify_eapol_key_mic()
Dwpa_i.h227 void wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck,
/external/wpa_supplicant_6/wpa_supplicant/src/common/
Dwpa_common.h168 u8 kck[16]; /* EAPOL-Key Key Confirmation Key (KCK) */ member
300 int wpa_ft_mic(const u8 *kck, const u8 *sta_addr, const u8 *ap_addr,
Dwpa_common.c135 int wpa_ft_mic(const u8 *kck, const u8 *sta_addr, const u8 *ap_addr, in wpa_ft_mic() argument
180 if (omac1_aes_128(kck, buf, pos - buf, mic)) { in wpa_ft_mic()
/external/wpa_supplicant_8/src/common/
Dwpa_common.h170 u8 kck[16]; /* EAPOL-Key Key Confirmation Key (KCK) */ member
308 int wpa_ft_mic(const u8 *kck, const u8 *sta_addr, const u8 *ap_addr,
Dwpa_common.c131 int wpa_ft_mic(const u8 *kck, const u8 *sta_addr, const u8 *ap_addr, in wpa_ft_mic() argument
176 if (omac1_aes_128(kck, buf, pos - buf, mic)) { in wpa_ft_mic()
/external/wpa_supplicant_8/wpa_supplicant/
Dwpas_glue.c769 const u8 *kck, in wpa_supplicant_set_rekey_offload() argument
774 wpa_drv_set_rekey_info(wpa_s, kek, kck, replay_ctr); in wpa_supplicant_set_rekey_offload()
Ddriver_i.h662 const u8 *kek, const u8 *kck, in wpa_drv_set_rekey_info() argument
667 wpa_s->driver->set_rekey_info(wpa_s->drv_priv, kek, kck, replay_ctr); in wpa_drv_set_rekey_info()
/external/wpa_supplicant_8/src/ap/
Dwpa_auth_ft.c691 wpa_ft_mic(sm->PTK.kck, sm->addr, sm->wpa_auth->addr, 6, in wpa_sm_write_assoc_resp_ies()
1052 if (wpa_ft_mic(sm->PTK.kck, sm->addr, sm->wpa_auth->addr, 5, in wpa_ft_validate_reassoc()
Dwpa_auth.c1374 wpa_eapol_key_mic(sm->PTK.kck, version, (u8 *) hdr, len, in __wpa_send_eapol()
1433 if (wpa_eapol_key_mic(PTK->kck, key_info & WPA_KEY_INFO_TYPE_MASK, in wpa_verify_key_mic()
/external/wpa_supplicant_8/src/drivers/
Ddriver.h2407 void (*set_rekey_info)(void *priv, const u8 *kek, const u8 *kck,
Ddriver_nl80211.c8598 static void nl80211_set_rekey_info(void *priv, const u8 *kek, const u8 *kck, in nl80211_set_rekey_info() argument
8619 NLA_PUT(msg, NL80211_REKEY_DATA_KCK, NL80211_KCK_LEN, kck); in nl80211_set_rekey_info()