Home
last modified time | relevance | path

Searched refs:kek (Results 1 – 25 of 47) sorted by relevance

12

/external/syslinux/gpxe/src/crypto/
Daes_wrap.c37 int aes_wrap ( const void *kek, const void *src, void *dest, int nblk ) in aes_wrap() argument
48 cipher_setkey ( &aes_algorithm, aes_ctx, kek, 16 ); in aes_wrap()
84 int aes_unwrap ( const void *kek, const void *src, void *dest, int nblk ) in aes_unwrap() argument
94 cipher_setkey ( &aes_algorithm, aes_ctx, kek, 16 ); in aes_unwrap()
/external/syslinux/gpxe/src/include/gpxe/
Daes.h27 int aes_wrap ( const void *kek, const void *src, void *dest, int nblk );
28 int aes_unwrap ( const void *kek, const void *src, void *dest, int nblk );
Dwpa.h260 u8 kek[WPA_KEK_LEN]; member
402 int ( * decrypt ) ( const void *kek, const void *iv, void *msg,
/external/wpa_supplicant_8/src/crypto/
Daes-wrap.c26 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument
40 ctx = aes_encrypt_init(kek, kek_len); in aes_wrap()
Daes-unwrap.c26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument
39 ctx = aes_decrypt_init(kek, kek_len); in aes_unwrap()
Daes_wrap.h21 int __must_check aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain,
23 int __must_check aes_unwrap(const u8 *kek, size_t kek_len, int n,
Dcrypto_openssl.c396 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument
403 if (AES_set_encrypt_key(kek, kek_len << 3, &actx)) in aes_wrap()
411 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument
419 if (AES_set_decrypt_key(kek, kek_len << 3, &actx)) in aes_unwrap()
Dcrypto_linux.c781 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument
794 skcipher = linux_af_alg_skcipher("kw(aes)", kek, kek_len); in aes_unwrap()
/external/wpa_supplicant_8/src/pae/
Dieee802_1x_key.c129 size_t ckn_bytes, u8 *kek) in ieee802_1x_kek_128bits_aes_cmac() argument
138 128, kek); in ieee802_1x_kek_128bits_aes_cmac()
Dieee802_1x_key.h18 size_t ckn_bytes, u8 *kek);
Dieee802_1x_kay_i.h76 int (*kek_trfm)(const u8 *cak, const u8 *ckn, size_t ckn_len, u8 *kek);
108 struct mka_key kek; member
Dieee802_1x_kay.c1475 if (aes_wrap(participant->kek.key, 16, in ieee802_1x_mka_encode_dist_sak_body()
1611 if (aes_unwrap(participant->kek.key, 16, sak_len >> 3, wrap_sak, in ieee802_1x_mka_decode_dist_sak_body()
3339 participant->kek.len = mka_alg_tbl[kay->mka_algindex].kek_len; in ieee802_1x_kay_create_mka()
3343 participant->kek.key)) { in ieee802_1x_kay_create_mka()
3348 participant->kek.key, participant->kek.len); in ieee802_1x_kay_create_mka()
3447 os_memset(&participant->kek, 0, sizeof(participant->kek)); in ieee802_1x_kay_delete_mka()
/external/perfetto/src/ftrace_reader/test/data/android_flounder_lte_LRX16F_3.10.40/events/mac80211/drv_set_rekey_data/
Dformat14 field:u8 kek[16]; offset:64; size:16; signed:0;
/external/syslinux/gpxe/src/net/80211/
Dwpa_ccmp.c509 static int ccmp_kie_decrypt ( const void *kek, const void *iv __unused, in ccmp_kie_decrypt() argument
515 if ( aes_unwrap ( kek, msg, msg, *len / 8 - 1 ) != 0 ) in ccmp_kie_decrypt()
Dwpa_tkip.c568 static int tkip_kie_decrypt ( const void *kek, const void *iv, in tkip_kie_decrypt() argument
573 memcpy ( key + 16, kek, 16 ); in tkip_kie_decrypt()
Dwpa.c796 rc = kie->decrypt ( &ctx->ptk.kek, pkt->iv, pkt->data, in wpa_handle_1_of_2()
931 rc = kie->decrypt ( &ctx->ptk.kek, pkt->iv, pkt->data, in eapol_key_rx()
/external/scapy/scapy/modules/krack/
Dautomaton.py178 self.kek = self.ptk[16:32]
583 key_data_encrypt=self.kek,
644 key_data_encrypt=self.kek,
753 key_data_encrypt=self.kek,
/external/wpa_supplicant_8/src/common/
Dwpa_common.c334 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); in wpa_pmk_to_ptk()
335 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); in wpa_pmk_to_ptk()
505 os_memcpy(ptk->kek, tmp + *ick_len, ptk->kek_len); in fils_pmk_to_ptk()
506 wpa_hexdump_key(MSG_DEBUG, "FILS: KEK", ptk->kek, ptk->kek_len); in fils_pmk_to_ptk()
1454 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); in wpa_pmk_r1_to_ptk()
1458 wpa_hexdump_key(MSG_DEBUG, "FT: KEK", ptk->kek, ptk->kek_len); in wpa_pmk_r1_to_ptk()
Dwpa_common.h211 u8 kek[WPA_KEK_MAX_LEN]; /* EAPOL-Key Key Encryption Key (KEK) */ member
/external/wpa_supplicant_8/src/rsn_supp/
Dwpa.h79 void (*set_rekey_offload)(void *ctx, const u8 *kek, size_t kek_len,
436 struct wpabuf * fils_build_assoc_req(struct wpa_sm *sm, const u8 **kek,
Dwpa.c135 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); in wpa_eapol_key_send()
140 if (aes_siv_encrypt(ptk->kek, ptk->kek_len, in wpa_eapol_key_send()
1560 os_memcpy(ek + 16, sm->ptk.kek, sm->ptk.kek_len); in wpa_supplicant_process_1_of_2_wpa()
1585 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, maxkeylen / 8, in wpa_supplicant_process_1_of_2_wpa()
1806 os_memcpy(ek + 16, sm->ptk.kek, sm->ptk.kek_len); in wpa_supplicant_decrypt_key_data()
1839 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, *key_data_len / 8, in wpa_supplicant_decrypt_key_data()
1948 if (aes_siv_decrypt(ptk->kek, ptk->kek_len, pos, *key_data_len, in wpa_supp_aead_decrypt()
3284 os_memcpy(sm->ptk.kek, ptk_kek, ptk_kek_len); in wpa_sm_set_ptk_kck_kek()
3839 struct wpabuf * fils_build_assoc_req(struct wpa_sm *sm, const u8 **kek, in fils_build_assoc_req() argument
3926 *kek = sm->ptk.kek; in fils_build_assoc_req()
[all …]
Dwpa_ft.c569 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, gtk_len / 8, gtk_elem + 11, in wpa_ft_process_gtk_subelem()
649 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, WPA_IGTK_LEN / 8, in wpa_ft_process_igtk_subelem()
/external/wpa_supplicant_8/wpa_supplicant/
Ddriver_i.h574 const u8 *kek, size_t kek_len, in wpa_drv_set_rekey_info() argument
580 wpa_s->driver->set_rekey_info(wpa_s->drv_priv, kek, kek_len, in wpa_drv_set_rekey_info()
Dwpas_glue.c1143 const u8 *kek, size_t kek_len, in wpa_supplicant_set_rekey_offload() argument
1149 wpa_drv_set_rekey_info(wpa_s, kek, kek_len, kck, kck_len, replay_ctr); in wpa_supplicant_set_rekey_offload()
/external/wpa_supplicant_8/src/ap/
Dwpa_auth.c1486 sm->PTK.kek, sm->PTK.kek_len); in __wpa_send_eapol()
1491 if (aes_siv_encrypt(sm->PTK.kek, sm->PTK.kek_len, kde, kde_len, in __wpa_send_eapol()
1524 if (aes_wrap(sm->PTK.kek, sm->PTK.kek_len, in __wpa_send_eapol()
1541 os_memcpy(ek + 16, sm->PTK.kek, sm->PTK.kek_len); in __wpa_send_eapol()
2184 if (aes_siv_decrypt(ptk->kek, ptk->kek_len, pos, key_data_len, in wpa_aead_decrypt()
2375 if (aes_siv_decrypt(sm->PTK.kek, sm->PTK.kek_len, crypt, end - crypt, in fils_decrypt_assoc()
2452 if (aes_siv_encrypt(sm->PTK.kek, sm->PTK.kek_len, in fils_encrypt_assoc()
4525 os_memcpy(fils_kek, sm->PTK.kek, WPA_KEK_MAX_LEN); in wpa_auth_get_fils_aead_params()

12