Home
last modified time | relevance | path

Searched refs:kck (Results 1 – 22 of 22) sorted by relevance

/external/wpa_supplicant_8/src/common/
Dwpa_common.h212 u8 kck[WPA_KCK_MAX_LEN]; /* EAPOL-Key Key Confirmation Key (KCK) */ member
345 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr,
386 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa,
389 static inline int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, in rsn_pmkid_suite_b() argument
396 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa,
399 static inline int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, in rsn_pmkid_suite_b_192() argument
Dwpa_common.c194 os_memcpy(ptk->kck, tmp, ptk->kck_len); in wpa_pmk_to_ptk()
195 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len); in wpa_pmk_to_ptk()
209 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, in wpa_ft_mic() argument
277 if (omac1_aes_128_vector(kck, num_elem, addr, len, mic)) in wpa_ft_mic()
1015 os_memcpy(ptk->kck, tmp, ptk->kck_len); in wpa_pmk_r1_to_ptk()
1019 wpa_hexdump_key(MSG_DEBUG, "FT: KCK", ptk->kck, ptk->kck_len); in wpa_pmk_r1_to_ptk()
1079 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, in rsn_pmkid_suite_b() argument
1091 if (hmac_sha256_vector(kck, kck_len, 3, addr, len, hash) < 0) in rsn_pmkid_suite_b()
1112 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, in rsn_pmkid_suite_b_192() argument
1124 if (hmac_sha384_vector(kck, kck_len, 3, addr, len, hash) < 0) in rsn_pmkid_suite_b_192()
Dsae.h25 u8 kck[SAE_KCK_LEN]; member
Dsae.c818 os_memcpy(sae->tmp->kck, keys, SAE_KCK_LEN); in sae_derive_keys()
822 wpa_hexdump_key(MSG_DEBUG, "SAE: KCK", sae->tmp->kck, SAE_KCK_LEN); in sae_derive_keys()
1183 hmac_sha256_vector(sae->tmp->kck, sizeof(sae->tmp->kck), 5, addr, len, in sae_cn_confirm()
/external/wpa_supplicant_8/src/rsn_supp/
Dpmksa_cache.h60 const u8 *pmkid, const u8 *kck, size_t kck_len,
108 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add() argument
Dwpa_ft.c143 const u8 *kck, size_t kck_len, in wpa_ft_gen_req_ies() argument
261 if (kck) { in wpa_ft_gen_req_ies()
281 if (kck) { in wpa_ft_gen_req_ies()
296 if (wpa_ft_mic(kck, kck_len, sm->own_addr, target_ap, 5, in wpa_ft_gen_req_ies()
483 sm->ptk.kck, sm->ptk.kck_len, bssid, in wpa_ft_process_response()
767 if (wpa_ft_mic(sm->ptk.kck, sm->ptk.kck_len, sm->own_addr, src_addr, 6, in wpa_ft_validate_reassoc_resp()
Dpmksa_cache.c128 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add() argument
137 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_add()
148 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_add()
150 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_add()
Dtdls.c111 u8 kck[16]; /* TPK-KCK */ member
437 peer->tpk.kck, sizeof(peer->tpk.kck)); in wpa_tdls_generate_tpk()
455 static int wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid, in wpa_tdls_ftie_mic() argument
497 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16); in wpa_tdls_ftie_mic()
498 ret = omac1_aes_128(kck, buf, pos - buf, mic); in wpa_tdls_ftie_mic()
517 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, in wpa_tdls_key_mic_teardown() argument
556 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16); in wpa_tdls_key_mic_teardown()
557 ret = omac1_aes_128(kck, buf, pos - buf, mic); in wpa_tdls_key_mic_teardown()
572 wpa_tdls_ftie_mic(peer->tpk.kck, trans_seq, lnkid, in wpa_supplicant_verify_tdls_mic()
600 wpa_tdls_key_mic_teardown(peer->tpk.kck, trans_seq, rcode, in wpa_supplicant_verify_tdls_mic_teardown()
[all …]
Dpeerkey.c117 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, dst, in wpa_supplicant_send_smk_error()
171 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, src_addr, in wpa_supplicant_send_smk_m3()
429 wpa_eapol_key_send(sm, peerkey->stk.kck, peerkey->stk.kck_len, ver, in wpa_supplicant_send_stk_3_of_4()
932 wpa_eapol_key_mic(peerkey->tstk.kck, peerkey->tstk.kck_len, in peerkey_verify_eapol_key_mic()
949 wpa_eapol_key_mic(peerkey->stk.kck, peerkey->stk.kck_len, in peerkey_verify_eapol_key_mic()
1087 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, bssid, in wpa_sm_stkstart()
Dwpa.c43 int wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, size_t kck_len, in wpa_eapol_key_send() argument
68 wpa_eapol_key_mic(kck, kck_len, sm->key_mgmt, ver, msg, msg_len, in wpa_eapol_key_send()
75 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", kck, kck_len); in wpa_eapol_key_send()
158 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, bssid, in wpa_sm_key_request()
424 return wpa_eapol_key_send(sm, ptk->kck, ptk->kck_len, ver, dst, in wpa_supplicant_send_2_of_4()
1181 return wpa_eapol_key_send(sm, ptk->kck, ptk->kck_len, ver, dst, in wpa_supplicant_send_4_of_4()
1301 sm->ptk.kck, sm->ptk.kck_len, in wpa_supplicant_process_3_of_4()
1490 return wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, in wpa_supplicant_send_2_of_2()
1578 wpa_eapol_key_mic(sm->tptk.kck, sm->tptk.kck_len, sm->key_mgmt, in wpa_supplicant_verify_eapol_key_mic()
1595 wpa_eapol_key_mic(sm->ptk.kck, sm->ptk.kck_len, sm->key_mgmt, in wpa_supplicant_verify_eapol_key_mic()
[all …]
Dwpa_i.h265 sm->ptk.kck, sm->ptk.kck_len, in wpa_sm_set_rekey_offload()
356 int wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, size_t kck_len,
Dwpa.h77 const u8 *kck, size_t kck_len,
/external/wpa_supplicant_8/src/ap/
Dpmksa_cache_auth.c281 const u8 *kck, size_t kck_len, in pmksa_cache_auth_add() argument
291 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_auth_add()
302 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_auth_add()
304 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_auth_add()
Dpmksa_cache_auth.h52 const u8 *kck, size_t kck_len,
Dwpa_auth_ft.c740 wpa_ft_mic(sm->PTK.kck, sm->PTK.kck_len, sm->addr, in wpa_sm_write_assoc_resp_ies()
1108 if (wpa_ft_mic(sm->PTK.kck, sm->PTK.kck_len, sm->addr, in wpa_ft_validate_reassoc()
Dwpa_auth.c1585 wpa_eapol_key_mic(sm->PTK.kck, sm->PTK.kck_len, in __wpa_send_eapol()
1659 if (wpa_eapol_key_mic(PTK->kck, PTK->kck_len, akmp, in wpa_verify_key_mic()
3302 sm->PTK.kck, sm->PTK.kck_len, in wpa_auth_pmksa_add()
/external/wpa_supplicant_8/wpa_supplicant/
Dwpas_glue.c1017 const u8 *kck, size_t kck_len, in wpa_supplicant_set_rekey_offload() argument
1022 wpa_drv_set_rekey_info(wpa_s, kek, kek_len, kck, kck_len, replay_ctr); in wpa_supplicant_set_rekey_offload()
Ddriver_i.h566 const u8 *kck, size_t kck_len, in wpa_drv_set_rekey_info() argument
572 kck, kck_len, replay_ctr); in wpa_drv_set_rekey_info()
/external/wpa_supplicant_8/src/drivers/
Ddriver.h3016 const u8 *kck, size_t kck_len,
Ddriver_nl80211.c7217 const u8 *kck, size_t kck_len, in nl80211_set_rekey_info() argument
7233 nla_put(msg, NL80211_REKEY_DATA_KCK, kck_len, kck) || in nl80211_set_rekey_info()
/external/icu/icu4c/source/data/misc/
DlikelySubtags.txt297 kck{"kck_Latn_ZW"}
DsupplementalData.txt12533 kck{
30457 kck{