/external/wpa_supplicant_8/src/common/ |
D | wpa_common.h | 212 u8 kck[WPA_KCK_MAX_LEN]; /* EAPOL-Key Key Confirmation Key (KCK) */ member 345 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, 386 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, 389 static inline int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, in rsn_pmkid_suite_b() argument 396 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, 399 static inline int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, in rsn_pmkid_suite_b_192() argument
|
D | wpa_common.c | 194 os_memcpy(ptk->kck, tmp, ptk->kck_len); in wpa_pmk_to_ptk() 195 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len); in wpa_pmk_to_ptk() 209 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, in wpa_ft_mic() argument 277 if (omac1_aes_128_vector(kck, num_elem, addr, len, mic)) in wpa_ft_mic() 1015 os_memcpy(ptk->kck, tmp, ptk->kck_len); in wpa_pmk_r1_to_ptk() 1019 wpa_hexdump_key(MSG_DEBUG, "FT: KCK", ptk->kck, ptk->kck_len); in wpa_pmk_r1_to_ptk() 1079 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, in rsn_pmkid_suite_b() argument 1091 if (hmac_sha256_vector(kck, kck_len, 3, addr, len, hash) < 0) in rsn_pmkid_suite_b() 1112 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, in rsn_pmkid_suite_b_192() argument 1124 if (hmac_sha384_vector(kck, kck_len, 3, addr, len, hash) < 0) in rsn_pmkid_suite_b_192()
|
D | sae.h | 25 u8 kck[SAE_KCK_LEN]; member
|
D | sae.c | 818 os_memcpy(sae->tmp->kck, keys, SAE_KCK_LEN); in sae_derive_keys() 822 wpa_hexdump_key(MSG_DEBUG, "SAE: KCK", sae->tmp->kck, SAE_KCK_LEN); in sae_derive_keys() 1183 hmac_sha256_vector(sae->tmp->kck, sizeof(sae->tmp->kck), 5, addr, len, in sae_cn_confirm()
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | pmksa_cache.h | 60 const u8 *pmkid, const u8 *kck, size_t kck_len, 108 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add() argument
|
D | wpa_ft.c | 143 const u8 *kck, size_t kck_len, in wpa_ft_gen_req_ies() argument 261 if (kck) { in wpa_ft_gen_req_ies() 281 if (kck) { in wpa_ft_gen_req_ies() 296 if (wpa_ft_mic(kck, kck_len, sm->own_addr, target_ap, 5, in wpa_ft_gen_req_ies() 483 sm->ptk.kck, sm->ptk.kck_len, bssid, in wpa_ft_process_response() 767 if (wpa_ft_mic(sm->ptk.kck, sm->ptk.kck_len, sm->own_addr, src_addr, 6, in wpa_ft_validate_reassoc_resp()
|
D | pmksa_cache.c | 128 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add() argument 137 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_add() 148 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_add() 150 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_add()
|
D | tdls.c | 111 u8 kck[16]; /* TPK-KCK */ member 437 peer->tpk.kck, sizeof(peer->tpk.kck)); in wpa_tdls_generate_tpk() 455 static int wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid, in wpa_tdls_ftie_mic() argument 497 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16); in wpa_tdls_ftie_mic() 498 ret = omac1_aes_128(kck, buf, pos - buf, mic); in wpa_tdls_ftie_mic() 517 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, in wpa_tdls_key_mic_teardown() argument 556 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16); in wpa_tdls_key_mic_teardown() 557 ret = omac1_aes_128(kck, buf, pos - buf, mic); in wpa_tdls_key_mic_teardown() 572 wpa_tdls_ftie_mic(peer->tpk.kck, trans_seq, lnkid, in wpa_supplicant_verify_tdls_mic() 600 wpa_tdls_key_mic_teardown(peer->tpk.kck, trans_seq, rcode, in wpa_supplicant_verify_tdls_mic_teardown() [all …]
|
D | peerkey.c | 117 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, dst, in wpa_supplicant_send_smk_error() 171 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, src_addr, in wpa_supplicant_send_smk_m3() 429 wpa_eapol_key_send(sm, peerkey->stk.kck, peerkey->stk.kck_len, ver, in wpa_supplicant_send_stk_3_of_4() 932 wpa_eapol_key_mic(peerkey->tstk.kck, peerkey->tstk.kck_len, in peerkey_verify_eapol_key_mic() 949 wpa_eapol_key_mic(peerkey->stk.kck, peerkey->stk.kck_len, in peerkey_verify_eapol_key_mic() 1087 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, bssid, in wpa_sm_stkstart()
|
D | wpa.c | 43 int wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, size_t kck_len, in wpa_eapol_key_send() argument 68 wpa_eapol_key_mic(kck, kck_len, sm->key_mgmt, ver, msg, msg_len, in wpa_eapol_key_send() 75 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", kck, kck_len); in wpa_eapol_key_send() 158 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, bssid, in wpa_sm_key_request() 424 return wpa_eapol_key_send(sm, ptk->kck, ptk->kck_len, ver, dst, in wpa_supplicant_send_2_of_4() 1181 return wpa_eapol_key_send(sm, ptk->kck, ptk->kck_len, ver, dst, in wpa_supplicant_send_4_of_4() 1301 sm->ptk.kck, sm->ptk.kck_len, in wpa_supplicant_process_3_of_4() 1490 return wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, in wpa_supplicant_send_2_of_2() 1578 wpa_eapol_key_mic(sm->tptk.kck, sm->tptk.kck_len, sm->key_mgmt, in wpa_supplicant_verify_eapol_key_mic() 1595 wpa_eapol_key_mic(sm->ptk.kck, sm->ptk.kck_len, sm->key_mgmt, in wpa_supplicant_verify_eapol_key_mic() [all …]
|
D | wpa_i.h | 265 sm->ptk.kck, sm->ptk.kck_len, in wpa_sm_set_rekey_offload() 356 int wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, size_t kck_len,
|
D | wpa.h | 77 const u8 *kck, size_t kck_len,
|
/external/wpa_supplicant_8/src/ap/ |
D | pmksa_cache_auth.c | 281 const u8 *kck, size_t kck_len, in pmksa_cache_auth_add() argument 291 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_auth_add() 302 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_auth_add() 304 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_auth_add()
|
D | pmksa_cache_auth.h | 52 const u8 *kck, size_t kck_len,
|
D | wpa_auth_ft.c | 740 wpa_ft_mic(sm->PTK.kck, sm->PTK.kck_len, sm->addr, in wpa_sm_write_assoc_resp_ies() 1108 if (wpa_ft_mic(sm->PTK.kck, sm->PTK.kck_len, sm->addr, in wpa_ft_validate_reassoc()
|
D | wpa_auth.c | 1585 wpa_eapol_key_mic(sm->PTK.kck, sm->PTK.kck_len, in __wpa_send_eapol() 1659 if (wpa_eapol_key_mic(PTK->kck, PTK->kck_len, akmp, in wpa_verify_key_mic() 3302 sm->PTK.kck, sm->PTK.kck_len, in wpa_auth_pmksa_add()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | wpas_glue.c | 1017 const u8 *kck, size_t kck_len, in wpa_supplicant_set_rekey_offload() argument 1022 wpa_drv_set_rekey_info(wpa_s, kek, kek_len, kck, kck_len, replay_ctr); in wpa_supplicant_set_rekey_offload()
|
D | driver_i.h | 566 const u8 *kck, size_t kck_len, in wpa_drv_set_rekey_info() argument 572 kck, kck_len, replay_ctr); in wpa_drv_set_rekey_info()
|
/external/wpa_supplicant_8/src/drivers/ |
D | driver.h | 3016 const u8 *kck, size_t kck_len,
|
D | driver_nl80211.c | 7217 const u8 *kck, size_t kck_len, in nl80211_set_rekey_info() argument 7233 nla_put(msg, NL80211_REKEY_DATA_KCK, kck_len, kck) || in nl80211_set_rekey_info()
|
/external/icu/icu4c/source/data/misc/ |
D | likelySubtags.txt | 297 kck{"kck_Latn_ZW"}
|
D | supplementalData.txt | 12533 kck{ 30457 kck{
|