/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | aes-unwrap.c | 18 * @kek: Key encryption key (KEK) 26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, argument 39 ctx = aes_decrypt_init(kek, kek_len);
|
H A D | aes-wrap.c | 18 * @kek: Key encryption key (KEK) 26 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) argument 40 ctx = aes_encrypt_init(kek, kek_len);
|
H A D | aes_wrap.h | 21 int __must_check aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, 23 int __must_check aes_unwrap(const u8 *kek, size_t kek_len, int n,
|
H A D | crypto_wolfssl.c | 412 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) argument 419 ret = wc_AesKeyWrap(kek, kek_len, plain, n * 8, cipher, (n + 1) * 8, 425 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, argument 433 ret = wc_AesKeyUnWrap(kek, kek_len, cipher, (n + 1) * 8, plain, n * 8,
|
H A D | crypto_linux.c | 784 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, argument 797 skcipher = linux_af_alg_skcipher("kw(aes)", kek, kek_len);
|
H A D | crypto_openssl.c | 431 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) argument 438 if (AES_set_encrypt_key(kek, kek_len << 3, &actx)) 446 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, argument 454 if (AES_set_decrypt_key(kek, kek_len << 3, &actx))
|
/freebsd-11-stable/contrib/wpa/src/pae/ |
H A D | ieee802_1x_key.h | 18 size_t ckn_bytes, u8 *kek, size_t kek_bytes);
|
H A D | ieee802_1x_key.c | 138 size_t ckn_bytes, u8 *kek, size_t kek_bytes) 148 8 * kek_bytes, kek); 137 ieee802_1x_kek_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn, size_t ckn_bytes, u8 *kek, size_t kek_bytes) argument
|
H A D | ieee802_1x_kay_i.h | 75 u8 *kek, size_t kek_bytes); 108 struct mka_key kek; member in struct:ieee802_1x_mka_participant
|
H A D | ieee802_1x_kay.c | 1611 if (aes_wrap(participant->kek.key, participant->kek.len, 1752 if (aes_unwrap(participant->kek.key, participant->kek.len, 3701 participant->kek.len = participant->cak.len; 3706 participant->kek.key, 3707 participant->kek.len)) { 3712 participant->kek.key, participant->kek.len); 3812 os_memset(&participant->kek, [all...] |
/freebsd-11-stable/contrib/wpa/src/rsn_supp/ |
H A D | wpa_ft.c | 694 const u8 *kek; local 698 kek = sm->ptk.kek2; 701 kek = sm->ptk.kek; 720 if (aes_unwrap(kek, kek_len, gtk_len / 8, gtk_elem + 11, gtk)) { 777 const u8 *kek; local 781 kek = sm->ptk.kek2; 784 kek = sm->ptk.kek; 814 if (aes_unwrap(kek, kek_le [all...] |
H A D | wpa.h | 80 void (*set_rekey_offload)(void *ctx, const u8 *kek, size_t kek_len, 455 struct wpabuf * fils_build_assoc_req(struct wpa_sm *sm, const u8 **kek,
|
H A D | wpa.c | 137 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); 142 if (aes_siv_encrypt(ptk->kek, ptk->kek_len, 1714 os_memcpy(ek + 16, sm->ptk.kek, sm->ptk.kek_len); 1739 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, maxkeylen / 8, 2002 os_memcpy(ek + 16, sm->ptk.kek, sm->ptk.kek_len); 2035 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, *key_data_len / 8, 2152 if (aes_siv_decrypt(ptk->kek, ptk->kek_len, pos, *key_data_len, 3508 os_memcpy(sm->ptk.kek, ptk_kek, ptk_kek_len); 4079 struct wpabuf * fils_build_assoc_req(struct wpa_sm *sm, const u8 **kek, argument 4186 *kek [all...] |
H A D | wpa_i.h | 304 sm->ctx->set_rekey_offload(sm->ctx->ctx, sm->ptk.kek, sm->ptk.kek_len,
|
/freebsd-11-stable/crypto/openssl/crypto/cms/ |
H A D | cms_kari.c | 244 unsigned char kek[EVP_MAX_KEY_LENGTH]; local 253 if (EVP_PKEY_derive(kari->pctx, kek, &keklen) <= 0) 256 if (!EVP_CipherInit_ex(&kari->ctx, NULL, NULL, kek, NULL, enc)) 271 OPENSSL_cleanse(kek, keklen);
|
/freebsd-11-stable/contrib/wpa/src/common/ |
H A D | wpa_common.c | 461 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); 462 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); 638 os_memcpy(ptk->kek, tmp + *ick_len, ptk->kek_len); 639 wpa_hexdump_key(MSG_DEBUG, "FILS: KEK", ptk->kek, ptk->kek_len); 1789 os_memcpy(ptk->kek, tmp + offset, ptk->kek_len); 1798 wpa_hexdump_key(MSG_DEBUG, "FT: KEK", ptk->kek, ptk->kek_len);
|
H A D | wpa_common.h | 212 u8 kek[WPA_KEK_MAX_LEN]; /* EAPOL-Key Key Encryption Key (KEK) */ member in struct:wpa_ptk
|
/freebsd-11-stable/contrib/wpa/wpa_supplicant/ |
H A D | driver_i.h | 592 const u8 *kek, size_t kek_len, 598 wpa_s->driver->set_rekey_info(wpa_s->drv_priv, kek, kek_len, 591 wpa_drv_set_rekey_info(struct wpa_supplicant *wpa_s, const u8 *kek, size_t kek_len, const u8 *kck, size_t kck_len, const u8 *replay_ctr) argument
|
H A D | wpas_glue.c | 1142 const u8 *kek, size_t kek_len, 1148 wpa_drv_set_rekey_info(wpa_s, kek, kek_len, kck, kck_len, replay_ctr); 1141 wpa_supplicant_set_rekey_offload(void *ctx, const u8 *kek, size_t kek_len, const u8 *kck, size_t kck_len, const u8 *replay_ctr) argument
|
/freebsd-11-stable/contrib/wpa/src/ap/ |
H A D | wpa_auth_ft.c | 2173 const u8 *kek; local 2177 kek = sm->PTK.kek2; 2180 kek = sm->PTK.kek; 2221 if (aes_wrap(kek, kek_len, key_len / 8, key, subelem + 13)) { 2241 const u8 *kek; local 2246 kek = sm->PTK.kek2; 2249 kek = sm->PTK.kek; 2270 if (aes_wrap(kek, kek_le [all...] |
H A D | wpa_auth.c | 1545 sm->PTK.kek, sm->PTK.kek_len); 1550 if (aes_siv_encrypt(sm->PTK.kek, sm->PTK.kek_len, kde, kde_len, 1580 if (aes_wrap(sm->PTK.kek, sm->PTK.kek_len, 1597 os_memcpy(ek + 16, sm->PTK.kek, sm->PTK.kek_len); 2355 if (aes_siv_decrypt(ptk->kek, ptk->kek_len, pos, key_data_len, 2546 if (aes_siv_decrypt(sm->PTK.kek, sm->PTK.kek_len, crypt, end - crypt, 2623 if (aes_siv_encrypt(sm->PTK.kek, sm->PTK.kek_len, 4918 os_memcpy(fils_kek, sm->PTK.kek, WPA_KEK_MAX_LEN);
|
/freebsd-11-stable/contrib/wpa/src/drivers/ |
H A D | driver_atheros.c | 1092 os_memcpy(mlme.fils_aad.kek, params->fils_kek, 1101 mlme.fils_aad.kek, mlme.fils_aad.kek_len);
|
H A D | driver.h | 3547 * @kek: Current KEK 3557 void (*set_rekey_info)(void *priv, const u8 *kek, size_t kek_len,
|