Searched refs:kek_len (Results 1 - 18 of 18) sorted by relevance

/freebsd-11-stable/contrib/wpa/src/crypto/
H A Daes-unwrap.c19 * @kek_len: Length of KEK in octets
26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, argument
39 ctx = aes_decrypt_init(kek, kek_len);
H A Daes-wrap.c19 * @kek_len: Length of KEK in octets
26 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) argument
40 ctx = aes_encrypt_init(kek, kek_len);
H A Daes_wrap.h21 int __must_check aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain,
23 int __must_check aes_unwrap(const u8 *kek, size_t kek_len, int n,
H A Dcrypto_wolfssl.c412 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) argument
419 ret = wc_AesKeyWrap(kek, kek_len, plain, n * 8, cipher, (n + 1) * 8,
425 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, argument
433 ret = wc_AesKeyUnWrap(kek, kek_len, cipher, (n + 1) * 8, plain, n * 8,
H A Dcrypto_linux.c784 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, argument
797 skcipher = linux_af_alg_skcipher("kw(aes)", kek, kek_len);
H A Dcrypto_openssl.c431 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) argument
438 if (AES_set_encrypt_key(kek, kek_len << 3, &actx))
446 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, argument
454 if (AES_set_decrypt_key(kek, kek_len << 3, &actx))
/freebsd-11-stable/contrib/wpa/src/rsn_supp/
H A Dwpa_ft.c695 size_t kek_len; local
699 kek_len = sm->ptk.kek2_len;
702 kek_len = sm->ptk.kek_len;
720 if (aes_unwrap(kek, kek_len, gtk_len / 8, gtk_elem + 11, gtk)) {
778 size_t kek_len; local
782 kek_len = sm->ptk.kek2_len;
785 kek_len = sm->ptk.kek_len;
814 if (aes_unwrap(kek, kek_len, igtk_le
[all...]
H A Dwpa.c107 if (!ptk || !ptk->kek_len)
137 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len);
142 if (aes_siv_encrypt(ptk->kek, ptk->kek_len,
1700 if (ver == WPA_KEY_INFO_TYPE_HMAC_MD5_RC4 && sm->ptk.kek_len == 16) {
1714 os_memcpy(ek + 16, sm->ptk.kek, sm->ptk.kek_len);
1739 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, maxkeylen / 8,
1992 if (ver == WPA_KEY_INFO_TYPE_HMAC_MD5_RC4 && sm->ptk.kek_len == 16) {
2002 os_memcpy(ek + 16, sm->ptk.kek, sm->ptk.kek_len);
2018 (unsigned int) sm->ptk.kek_len);
2035 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, *key_data_le
4079 fils_build_assoc_req(struct wpa_sm *sm, const u8 **kek, size_t *kek_len, const u8 **snonce, const u8 **anonce, const struct wpabuf **hlp, unsigned int num_hlp) argument
[all...]
H A Dwpa.h80 void (*set_rekey_offload)(void *ctx, const u8 *kek, size_t kek_len,
456 size_t *kek_len, const u8 **snonce,
H A Dwpa_i.h304 sm->ctx->set_rekey_offload(sm->ctx->ctx, sm->ptk.kek, sm->ptk.kek_len,
/freebsd-11-stable/contrib/wpa/src/common/
H A Dwpa_common.c393 ptk->kek_len = wpa_kek_len(akmp, pmk_len);
401 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len;
461 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len);
462 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len);
464 os_memcpy(ptk->tk, tmp + ptk->kck_len + ptk->kek_len, ptk->tk_len);
592 ptk->kek_len = wpa_kek_len(akmp, pmk_len);
600 key_data_len = *ick_len + ptk->kek_len + ptk->tk_len;
638 os_memcpy(ptk->kek, tmp + *ick_len, ptk->kek_len);
639 wpa_hexdump_key(MSG_DEBUG, "FILS: KEK", ptk->kek, ptk->kek_len);
641 os_memcpy(ptk->tk, tmp + *ick_len + ptk->kek_len, pt
[all...]
H A Dwpa_common.h217 size_t kek_len; member in struct:wpa_ptk
/freebsd-11-stable/contrib/wpa/src/ap/
H A Dwpa_auth_ft.c2174 size_t kek_len; local
2178 kek_len = sm->PTK.kek2_len;
2181 kek_len = sm->PTK.kek_len;
2221 if (aes_wrap(kek, kek_len, key_len / 8, key, subelem + 13)) {
2223 "FT: GTK subelem encryption failed: kek_len=%d",
2224 (int) kek_len);
2242 size_t kek_len; local
2247 kek_len = sm->PTK.kek2_len;
2250 kek_len
[all...]
H A Dwpa_auth.c1545 sm->PTK.kek, sm->PTK.kek_len);
1550 if (aes_siv_encrypt(sm->PTK.kek, sm->PTK.kek_len, kde, kde_len,
1579 (unsigned int) sm->PTK.kek_len);
1580 if (aes_wrap(sm->PTK.kek, sm->PTK.kek_len,
1588 } else if (sm->PTK.kek_len == 16) {
1597 os_memcpy(ek + 16, sm->PTK.kek, sm->PTK.kek_len);
2355 if (aes_siv_decrypt(ptk->kek, ptk->kek_len, pos, key_data_len,
2546 if (aes_siv_decrypt(sm->PTK.kek, sm->PTK.kek_len, crypt, end - crypt,
2623 if (aes_siv_encrypt(sm->PTK.kek, sm->PTK.kek_len,
4919 *fils_kek_len = sm->PTK.kek_len;
[all...]
/freebsd-11-stable/contrib/wpa/wpa_supplicant/
H A Ddriver_i.h592 const u8 *kek, size_t kek_len,
598 wpa_s->driver->set_rekey_info(wpa_s->drv_priv, kek, kek_len,
591 wpa_drv_set_rekey_info(struct wpa_supplicant *wpa_s, const u8 *kek, size_t kek_len, const u8 *kck, size_t kck_len, const u8 *replay_ctr) argument
H A Dwpas_glue.c1142 const u8 *kek, size_t kek_len,
1148 wpa_drv_set_rekey_info(wpa_s, kek, kek_len, kck, kck_len, replay_ctr);
1141 wpa_supplicant_set_rekey_offload(void *ctx, const u8 *kek, size_t kek_len, const u8 *kck, size_t kck_len, const u8 *replay_ctr) argument
/freebsd-11-stable/contrib/wpa/src/drivers/
H A Ddriver_atheros.c1094 mlme.fils_aad.kek_len = params->fils_kek_len;
1101 mlme.fils_aad.kek, mlme.fils_aad.kek_len);
H A Ddriver.h3548 * @kek_len: KEK length in octets
3557 void (*set_rekey_info)(void *priv, const u8 *kek, size_t kek_len,

Completed in 164 milliseconds