/freebsd-current/contrib/wpa/src/pae/ |
H A D | ieee802_1x_key.h | 16 size_t sid_bytes, u8 *ckn); 17 int ieee802_1x_kek_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn, 19 int ieee802_1x_ick_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn,
|
H A D | ieee802_1x_key.c | 110 size_t sid_bytes, u8 *ckn) 125 context, ctx_len * 8, 128, ckn); 137 int ieee802_1x_kek_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn, argument 144 os_memcpy(context, ckn, (ckn_bytes < 16) ? ckn_bytes : 16); 158 int ieee802_1x_ick_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn, argument 165 os_memcpy(context, ckn, (ckn_bytes < 16) ? ckn_bytes : 16); 108 ieee802_1x_ckn_aes_cmac(const u8 *msk, size_t msk_bytes, const u8 *mac1, const u8 *mac2, const u8 *sid, size_t sid_bytes, u8 *ckn) argument
|
H A D | ieee802_1x_kay_i.h | 72 const u8 *mac2, const u8 *sid, size_t sid_len, u8 *ckn); 74 const u8 *ckn, size_t ckn_len, 77 const u8 *ckn, size_t ckn_len, 88 struct mka_key_name ckn; member in struct:ieee802_1x_mka_participant 188 * @ckn: CAK Name 216 u8 ckn[0]; member in struct:ieee802_1x_mka_basic_body 380 * @ckn: CAK Name 402 u8 ckn[0]; member in struct:ieee802_1x_mka_dist_cak_body
|
H A D | ieee802_1x_kay.h | 248 const struct mka_key_name *ckn, 253 struct mka_key_name *ckn); 255 struct mka_key_name *ckn,
|
H A D | ieee802_1x_kay.c | 163 wpa_hexdump(MSG_DEBUG, "\tCAK Name", body->ckn, 280 ieee802_1x_kay_get_participant(struct ieee802_1x_kay *kay, const u8 *ckn, argument 287 if (participant->ckn.len == len && 288 os_memcmp(participant->ckn.name, ckn, 289 participant->ckn.len) == 0) 726 length += participant->ckn.len; 743 length += participant->ckn.len; 769 os_memcpy(body->ckn, participant->ckn 3623 ieee802_1x_kay_create_mka(struct ieee802_1x_kay *kay, const struct mka_key_name *ckn, const struct mka_key *cak, u32 life, enum mka_created_mode mode, bool is_authenticator) argument 3795 ieee802_1x_kay_delete_mka(struct ieee802_1x_kay *kay, struct mka_key_name *ckn) argument 3858 ieee802_1x_kay_mka_participate(struct ieee802_1x_kay *kay, struct mka_key_name *ckn, bool status) argument [all...] |
/freebsd-current/contrib/wpa/wpa_supplicant/ |
H A D | wpas_kay.c | 326 struct mka_key_name *ckn; local 340 ckn = os_zalloc(sizeof(*ckn)); 342 if (!msk || !sid || !ckn || !cak) 369 ckn->len = DEFAULT_CKN_LEN; 371 peer_addr, sid, sid_len, ckn->name)) { 376 wpa_hexdump(MSG_DEBUG, "Derived CKN", ckn->name, ckn->len); 378 res = ieee802_1x_kay_create_mka(wpa_s->kay, ckn, cak, 0, 387 os_free(ckn); 401 struct mka_key_name *ckn; local [all...] |
/freebsd-current/contrib/wpa/src/ap/ |
H A D | wpa_auth_kay.c | 414 struct mka_key_name *ckn; local 428 ckn = os_zalloc(sizeof(*ckn)); 430 if (!msk || !sid || !ckn || !cak) 459 ckn->len = DEFAULT_CKN_LEN; 461 sta->addr, sid, sid_len, ckn->name)) { 465 wpa_hexdump(MSG_DEBUG, "Derived CKN", ckn->name, ckn->len); 467 res = ieee802_1x_kay_create_mka(hapd->kay, ckn, cak, 0, EAP_EXCHANGE, 473 os_free(ckn); 484 struct mka_key_name *ckn; local [all...] |