/external/wpa_supplicant_8/src/rsn_supp/ |
D | wpa_ft.c | 147 const u8 *kck, const u8 *target_ap, in wpa_ft_gen_req_ies() argument 266 if (kck) { in wpa_ft_gen_req_ies() 286 if (kck) { in wpa_ft_gen_req_ies() 301 if (wpa_ft_mic(kck, sm->own_addr, target_ap, 5, in wpa_ft_gen_req_ies() 490 sm->pmk_r1_name, sm->ptk.kck, bssid, in wpa_ft_process_response() 773 if (wpa_ft_mic(sm->ptk.kck, sm->own_addr, src_addr, 6, in wpa_ft_validate_reassoc_resp()
|
D | tdls.c | 110 u8 kck[16]; /* TPK-KCK */ member 433 peer->tpk.kck, sizeof(peer->tpk.kck)); in wpa_tdls_generate_tpk() 451 static int wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid, in wpa_tdls_ftie_mic() argument 493 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16); in wpa_tdls_ftie_mic() 494 ret = omac1_aes_128(kck, buf, pos - buf, mic); in wpa_tdls_ftie_mic() 513 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, in wpa_tdls_key_mic_teardown() argument 552 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16); in wpa_tdls_key_mic_teardown() 553 ret = omac1_aes_128(kck, buf, pos - buf, mic); in wpa_tdls_key_mic_teardown() 568 wpa_tdls_ftie_mic(peer->tpk.kck, trans_seq, lnkid, in wpa_supplicant_verify_tdls_mic() 596 wpa_tdls_key_mic_teardown(peer->tpk.kck, trans_seq, rcode, in wpa_supplicant_verify_tdls_mic_teardown() [all …]
|
D | peerkey.c | 115 wpa_eapol_key_send(sm, sm->ptk.kck, ver, dst, ETH_P_EAPOL, in wpa_supplicant_send_smk_error() 167 wpa_eapol_key_send(sm, sm->ptk.kck, ver, src_addr, ETH_P_EAPOL, in wpa_supplicant_send_smk_m3() 429 wpa_eapol_key_send(sm, peerkey->stk.kck, ver, peerkey->addr, in wpa_supplicant_send_stk_3_of_4() 930 wpa_eapol_key_mic(peerkey->tstk.kck, ver, buf, len, in peerkey_verify_eapol_key_mic() 946 wpa_eapol_key_mic(peerkey->stk.kck, ver, buf, len, in peerkey_verify_eapol_key_mic() 1087 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL, in wpa_sm_stkstart()
|
D | wpa_i.h | 254 sm->ptk.kck, sm->rx_replay_counter); in wpa_sm_set_rekey_offload() 315 void wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck,
|
D | wpa.c | 37 void wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, in wpa_eapol_key_send() argument 59 wpa_eapol_key_mic(kck, ver, msg, msg_len, key_mic)) { in wpa_eapol_key_send() 65 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", kck, 16); in wpa_eapol_key_send() 135 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL, in wpa_sm_key_request() 354 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL, in wpa_supplicant_send_2_of_4() 1063 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL, in wpa_supplicant_send_4_of_4() 1345 wpa_eapol_key_send(sm, sm->ptk.kck, ver, sm->bssid, ETH_P_EAPOL, in wpa_supplicant_send_2_of_2() 1421 wpa_eapol_key_mic(sm->tptk.kck, ver, buf, len, in wpa_supplicant_verify_eapol_key_mic() 1438 wpa_eapol_key_mic(sm->ptk.kck, ver, buf, len, in wpa_supplicant_verify_eapol_key_mic()
|
D | wpa.h | 71 void (*set_rekey_offload)(void *ctx, const u8 *kek, const u8 *kck,
|
/external/wpa_supplicant_8/src/common/ |
D | sae.h | 22 u8 kck[SAE_KCK_LEN]; member
|
D | wpa_common.h | 199 u8 kck[16]; /* EAPOL-Key Key Confirmation Key (KCK) */ member 338 int wpa_ft_mic(const u8 *kck, const u8 *sta_addr, const u8 *ap_addr,
|
D | sae.c | 626 os_memcpy(sae->tmp->kck, keys, SAE_KCK_LEN); in sae_derive_keys() 628 wpa_hexdump_key(MSG_DEBUG, "SAE: KCK", sae->tmp->kck, SAE_KCK_LEN); in sae_derive_keys() 953 hmac_sha256_vector(sae->tmp->kck, sizeof(sae->tmp->kck), 5, addr, len, in sae_cn_confirm()
|
D | wpa_common.c | 139 int wpa_ft_mic(const u8 *kck, const u8 *sta_addr, const u8 *ap_addr, in wpa_ft_mic() argument 184 if (omac1_aes_128(kck, buf, pos - buf, mic)) { in wpa_ft_mic()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | wpas_glue.c | 892 const u8 *kck, in wpa_supplicant_set_rekey_offload() argument 897 wpa_drv_set_rekey_info(wpa_s, kek, kck, replay_ctr); in wpa_supplicant_set_rekey_offload()
|
D | driver_i.h | 566 const u8 *kek, const u8 *kck, in wpa_drv_set_rekey_info() argument 571 wpa_s->driver->set_rekey_info(wpa_s->drv_priv, kek, kck, replay_ctr); in wpa_drv_set_rekey_info()
|
/external/wpa_supplicant_8/src/ap/ |
D | wpa_auth_ft.c | 747 wpa_ft_mic(sm->PTK.kck, sm->addr, sm->wpa_auth->addr, 6, in wpa_sm_write_assoc_resp_ies() 1110 if (wpa_ft_mic(sm->PTK.kck, sm->addr, sm->wpa_auth->addr, 5, in wpa_ft_validate_reassoc()
|
D | wpa_auth.c | 1423 wpa_eapol_key_mic(sm->PTK.kck, version, (u8 *) hdr, len, in __wpa_send_eapol() 1492 if (wpa_eapol_key_mic(PTK->kck, key_info & WPA_KEY_INFO_TYPE_MASK, in wpa_verify_key_mic()
|
/external/wpa_supplicant_8/src/drivers/ |
D | driver.h | 2624 void (*set_rekey_info)(void *priv, const u8 *kek, const u8 *kck,
|
D | driver_nl80211.c | 11487 static void nl80211_set_rekey_info(void *priv, const u8 *kek, const u8 *kck, in nl80211_set_rekey_info() argument 11508 NLA_PUT(msg, NL80211_REKEY_DATA_KCK, NL80211_KCK_LEN, kck); in nl80211_set_rekey_info()
|
/external/icu/icu4c/source/data/misc/ |
D | likelySubtags.txt | 214 kck{"kck_Latn_ZW"}
|
D | supplementalData.txt | 5385 kck{ 16491 kck{
|
/external/chromium_org/third_party/icu/source/data/misc/ |
D | supplementalData.txt | 15453 kck{
|