/external/wpa_supplicant_8/src/rsn_supp/ |
D | wpa_ft.c | 147 const u8 *kck, const u8 *target_ap, in wpa_ft_gen_req_ies() argument 266 if (kck) { in wpa_ft_gen_req_ies() 286 if (kck) { in wpa_ft_gen_req_ies() 301 if (wpa_ft_mic(kck, sm->own_addr, target_ap, 5, in wpa_ft_gen_req_ies() 495 sm->pmk_r1_name, sm->ptk.kck, bssid, in wpa_ft_process_response() 781 if (wpa_ft_mic(sm->ptk.kck, sm->own_addr, src_addr, 6, in wpa_ft_validate_reassoc_resp()
|
D | tdls.c | 102 u8 kck[16]; /* TPK-KCK */ member 400 peer->tpk.kck, sizeof(peer->tpk.kck)); in wpa_tdls_generate_tpk() 418 static int wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid, in wpa_tdls_ftie_mic() argument 460 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16); in wpa_tdls_ftie_mic() 461 ret = omac1_aes_128(kck, buf, pos - buf, mic); in wpa_tdls_ftie_mic() 480 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, in wpa_tdls_key_mic_teardown() argument 519 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16); in wpa_tdls_key_mic_teardown() 520 ret = omac1_aes_128(kck, buf, pos - buf, mic); in wpa_tdls_key_mic_teardown() 535 wpa_tdls_ftie_mic(peer->tpk.kck, trans_seq, lnkid, in wpa_supplicant_verify_tdls_mic() 563 wpa_tdls_key_mic_teardown(peer->tpk.kck, trans_seq, rcode, in wpa_supplicant_verify_tdls_mic_teardown() [all …]
|
D | peerkey.c | 115 wpa_eapol_key_send(sm, sm->ptk.kck, ver, dst, ETH_P_EAPOL, in wpa_supplicant_send_smk_error() 167 wpa_eapol_key_send(sm, sm->ptk.kck, ver, src_addr, ETH_P_EAPOL, in wpa_supplicant_send_smk_m3() 435 wpa_eapol_key_send(sm, peerkey->stk.kck, ver, peerkey->addr, in wpa_supplicant_send_stk_3_of_4() 950 wpa_eapol_key_mic(peerkey->tstk.kck, ver, buf, len, in peerkey_verify_eapol_key_mic() 966 wpa_eapol_key_mic(peerkey->stk.kck, ver, buf, len, in peerkey_verify_eapol_key_mic() 1116 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL, in wpa_sm_stkstart()
|
D | wpa_i.h | 255 sm->ptk.kck, sm->rx_replay_counter); in wpa_sm_set_rekey_offload() 302 void wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck,
|
D | wpa.c | 37 void wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, in wpa_eapol_key_send() argument 59 wpa_eapol_key_mic(kck, ver, msg, msg_len, key_mic)) { in wpa_eapol_key_send() 65 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", kck, 16); in wpa_eapol_key_send() 131 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL, in wpa_sm_key_request() 342 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL, in wpa_supplicant_send_2_of_4() 1061 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL, in wpa_supplicant_send_4_of_4() 1345 wpa_eapol_key_send(sm, sm->ptk.kck, ver, sm->bssid, ETH_P_EAPOL, in wpa_supplicant_send_2_of_2() 1421 wpa_eapol_key_mic(sm->tptk.kck, ver, buf, len, in wpa_supplicant_verify_eapol_key_mic() 1437 wpa_eapol_key_mic(sm->ptk.kck, ver, buf, len, in wpa_supplicant_verify_eapol_key_mic()
|
D | wpa.h | 63 void (*set_rekey_offload)(void *ctx, const u8 *kek, const u8 *kck,
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
D | wpa_ft.c | 121 const u8 *kck, const u8 *target_ap) in wpa_ft_gen_req_ies() argument 244 if (kck) { in wpa_ft_gen_req_ies() 257 if (wpa_ft_mic(kck, sm->own_addr, target_ap, 5, in wpa_ft_gen_req_ies() 557 sm->pmk_r1_name, sm->ptk.kck, bssid); in wpa_ft_process_response() 813 if (wpa_ft_mic(sm->ptk.kck, sm->own_addr, src_addr, 6, in wpa_ft_validate_reassoc_resp()
|
D | peerkey.c | 120 wpa_eapol_key_send(sm, sm->ptk.kck, ver, dst, ETH_P_EAPOL, in wpa_supplicant_send_smk_error() 172 wpa_eapol_key_send(sm, sm->ptk.kck, ver, src_addr, ETH_P_EAPOL, in wpa_supplicant_send_smk_m3() 440 wpa_eapol_key_send(sm, peerkey->stk.kck, ver, peerkey->addr, in wpa_supplicant_send_stk_3_of_4() 953 wpa_eapol_key_mic(peerkey->tstk.kck, ver, buf, len, in peerkey_verify_eapol_key_mic() 969 wpa_eapol_key_mic(peerkey->stk.kck, ver, buf, len, in peerkey_verify_eapol_key_mic() 1119 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL, in wpa_sm_stkstart()
|
D | wpa.c | 103 void wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, in wpa_eapol_key_send() argument 123 wpa_eapol_key_mic(kck, ver, msg, msg_len, key_mic); in wpa_eapol_key_send() 186 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL, in wpa_sm_key_request() 351 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL, in wpa_supplicant_send_2_of_4() 935 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL, in wpa_supplicant_send_4_of_4() 1198 wpa_eapol_key_send(sm, sm->ptk.kck, ver, sm->bssid, ETH_P_EAPOL, in wpa_supplicant_send_2_of_2() 1272 wpa_eapol_key_mic(sm->tptk.kck, ver, buf, len, in wpa_supplicant_verify_eapol_key_mic() 1287 wpa_eapol_key_mic(sm->ptk.kck, ver, buf, len, in wpa_supplicant_verify_eapol_key_mic()
|
D | wpa_i.h | 227 void wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck,
|
/external/wpa_supplicant_6/wpa_supplicant/src/common/ |
D | wpa_common.h | 168 u8 kck[16]; /* EAPOL-Key Key Confirmation Key (KCK) */ member 300 int wpa_ft_mic(const u8 *kck, const u8 *sta_addr, const u8 *ap_addr,
|
D | wpa_common.c | 135 int wpa_ft_mic(const u8 *kck, const u8 *sta_addr, const u8 *ap_addr, in wpa_ft_mic() argument 180 if (omac1_aes_128(kck, buf, pos - buf, mic)) { in wpa_ft_mic()
|
/external/wpa_supplicant_8/src/common/ |
D | wpa_common.h | 170 u8 kck[16]; /* EAPOL-Key Key Confirmation Key (KCK) */ member 308 int wpa_ft_mic(const u8 *kck, const u8 *sta_addr, const u8 *ap_addr,
|
D | wpa_common.c | 131 int wpa_ft_mic(const u8 *kck, const u8 *sta_addr, const u8 *ap_addr, in wpa_ft_mic() argument 176 if (omac1_aes_128(kck, buf, pos - buf, mic)) { in wpa_ft_mic()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | wpas_glue.c | 769 const u8 *kck, in wpa_supplicant_set_rekey_offload() argument 774 wpa_drv_set_rekey_info(wpa_s, kek, kck, replay_ctr); in wpa_supplicant_set_rekey_offload()
|
D | driver_i.h | 662 const u8 *kek, const u8 *kck, in wpa_drv_set_rekey_info() argument 667 wpa_s->driver->set_rekey_info(wpa_s->drv_priv, kek, kck, replay_ctr); in wpa_drv_set_rekey_info()
|
/external/wpa_supplicant_8/src/ap/ |
D | wpa_auth_ft.c | 691 wpa_ft_mic(sm->PTK.kck, sm->addr, sm->wpa_auth->addr, 6, in wpa_sm_write_assoc_resp_ies() 1052 if (wpa_ft_mic(sm->PTK.kck, sm->addr, sm->wpa_auth->addr, 5, in wpa_ft_validate_reassoc()
|
D | wpa_auth.c | 1374 wpa_eapol_key_mic(sm->PTK.kck, version, (u8 *) hdr, len, in __wpa_send_eapol() 1433 if (wpa_eapol_key_mic(PTK->kck, key_info & WPA_KEY_INFO_TYPE_MASK, in wpa_verify_key_mic()
|
/external/wpa_supplicant_8/src/drivers/ |
D | driver.h | 2407 void (*set_rekey_info)(void *priv, const u8 *kek, const u8 *kck,
|
D | driver_nl80211.c | 8598 static void nl80211_set_rekey_info(void *priv, const u8 *kek, const u8 *kck, in nl80211_set_rekey_info() argument 8619 NLA_PUT(msg, NL80211_REKEY_DATA_KCK, NL80211_KCK_LEN, kck); in nl80211_set_rekey_info()
|