Searched refs:kck (Results 1 - 19 of 19) sorted by relevance

/freebsd-11-stable/contrib/wpa/src/ap/
H A Dpmksa_cache_auth.h53 const u8 *kck, size_t kck_len,
58 const u8 *kck, size_t kck_len, const u8 *aa,
H A Dpmksa_cache_auth.c264 * @kck: Key confirmation key or %NULL if not yet derived
281 const u8 *kck, size_t kck_len,
287 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len,
303 * @kck: Key confirmation key or %NULL if not yet derived
316 const u8 *kck, size_t kck_len, const u8 *aa,
326 if (wpa_key_mgmt_suite_b(akmp) && !kck)
337 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid);
339 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid);
279 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument
315 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument
H A Dwpa_auth_ft.c2428 const u8 *kck; local
2588 kck = sm->PTK.kck2;
2591 kck = sm->PTK.kck;
2595 wpa_ft_mic(kck, kck_len, sm->addr, sm->wpa_auth->addr, 6,
3121 const u8 *kck; local
3264 kck = sm->PTK.kck2;
3267 kck = sm->PTK.kck;
3270 if (wpa_ft_mic(kck, kck_le
[all...]
H A Dwpa_auth.c1619 if (wpa_eapol_key_mic(sm->PTK.kck, sm->PTK.kck_len,
1701 if (wpa_eapol_key_mic(PTK->kck, PTK->kck_len, akmp,
4388 sm->PTK.kck, sm->PTK.kck_len,
/freebsd-11-stable/contrib/wpa/src/rsn_supp/
H A Dpmksa_cache.h70 const u8 *pmkid, const u8 *kck, size_t kck_len,
136 const u8 *pmkid, const u8 *kck, size_t kck_len,
135 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp, const u8 *cache_id) argument
H A Dwpa_ft.c151 * @kck: 128-bit KCK for MIC or %NULL if no MIC is used
163 const u8 *kck, size_t kck_len,
327 if (kck) {
340 if (kck && wpa_sm_ocv_enabled(sm)) {
367 if (kck) {
381 if (wpa_ft_mic(kck, kck_len, sm->own_addr, target_ap, 5,
496 const u8 *kck; local
623 kck = sm->ptk.kck2;
626 kck = sm->ptk.kck;
161 wpa_ft_gen_req_ies(struct wpa_sm *sm, size_t *len, const u8 *anonce, const u8 *pmk_name, const u8 *kck, size_t kck_len, const u8 *target_ap, const u8 *ric_ies, size_t ric_ies_len, const u8 *ap_mdie) argument
848 const u8 *kck; local
[all...]
H A Dpmksa_cache.c116 * @kck: Key confirmation key or %NULL if not yet derived
132 const u8 *pmkid, const u8 *kck, size_t kck_len,
142 if (wpa_key_mgmt_suite_b(akmp) && !kck)
153 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid);
155 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid);
131 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp, const u8 *cache_id) argument
H A Dtdls.c112 u8 kck[16]; /* TPK-KCK */ member in struct:wpa_tdls_peer::tpk
453 peer->tpk.kck, sizeof(peer->tpk.kck));
462 * @kck: TPK-KCK
471 static int wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid, argument
513 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16);
514 ret = omac1_aes_128(kck, buf, pos - buf, mic);
523 * @kck: TPK-KCK
533 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, argument
572 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 1
[all...]
H A Dwpa_i.h305 sm->ptk.kck, sm->ptk.kck_len,
H A Dwpa.h81 const u8 *kck, size_t kck_len,
H A Dwpa.c83 wpa_eapol_key_mic(ptk->kck, ptk->kck_len, sm->key_mgmt, ver,
92 ptk->kck, ptk->kck_len);
1584 sm->ptk.kck, sm->ptk.kck_len,
1907 if (wpa_eapol_key_mic(sm->tptk.kck, sm->tptk.kck_len,
1941 if (wpa_eapol_key_mic(sm->ptk.kck, sm->ptk.kck_len,
3503 os_memcpy(sm->ptk.kck, ptk_kck, ptk_kck_len);
/freebsd-11-stable/contrib/wpa/src/common/
H A Dsae.h25 u8 kck[SAE_KCK_LEN]; member in struct:sae_temporary_data
H A Dwpa_common.h211 u8 kck[WPA_KCK_MAX_LEN]; /* EAPOL-Key Key Confirmation Key (KCK) */ member in struct:wpa_ptk
370 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr,
416 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa,
419 static inline int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, argument
426 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa,
429 static inline int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, argument
H A Dcommon_module_tests.c309 const u8 kck[] = { local
384 if (os_memcmp(kck, sae.tmp->kck, SAE_KCK_LEN) != 0) {
H A Dwpa_common.c458 os_memcpy(ptk->kck, tmp, ptk->kck_len);
459 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len);
754 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, argument
835 if (hmac_sha384_vector(kck, kck_len, num_elem, addr, len, hash))
841 omac1_aes_128_vector(kck, num_elem, addr, len, mic))
1787 os_memcpy(ptk->kck, tmp, ptk->kck_len);
1797 wpa_hexdump_key(MSG_DEBUG, "FT: KCK", ptk->kck, ptk->kck_len);
1872 * @kck: Key confirmation key
1873 * @kck_len: Length of kck in bytes
1882 int rsn_pmkid_suite_b(const u8 *kck, size_ argument
1915 rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, u8 *pmkid) argument
[all...]
H A Dsae.c726 os_memcpy(sae->tmp->kck, keys, SAE_KCK_LEN);
730 wpa_hexdump_key(MSG_DEBUG, "SAE: KCK", sae->tmp->kck, SAE_KCK_LEN);
1193 hmac_sha256_vector(sae->tmp->kck, sizeof(sae->tmp->kck), 5, addr, len,
/freebsd-11-stable/contrib/wpa/wpa_supplicant/
H A Ddriver_i.h593 const u8 *kck, size_t kck_len,
599 kck, kck_len, replay_ctr);
591 wpa_drv_set_rekey_info(struct wpa_supplicant *wpa_s, const u8 *kek, size_t kek_len, const u8 *kck, size_t kck_len, const u8 *replay_ctr) argument
H A Dwpas_glue.c1143 const u8 *kck, size_t kck_len,
1148 wpa_drv_set_rekey_info(wpa_s, kek, kek_len, kck, kck_len, replay_ctr);
1141 wpa_supplicant_set_rekey_offload(void *ctx, const u8 *kek, size_t kek_len, const u8 *kck, size_t kck_len, const u8 *replay_ctr) argument
/freebsd-11-stable/contrib/wpa/src/drivers/
H A Ddriver.h3549 * @kck: Current KCK
3558 const u8 *kck, size_t kck_len,

Completed in 314 milliseconds