Home
last modified time | relevance | path

Searched refs:cak (Results 1 – 7 of 7) sorted by relevance

/freebsd/contrib/wpa/wpa_supplicant/
H A Dwpas_kay.c308 struct mka_key *cak; in ieee802_1x_notify_create_actor() local
321 cak = os_zalloc(sizeof(*cak)); in ieee802_1x_notify_create_actor()
322 if (!msk || !ckn || !cak) in ieee802_1x_notify_create_actor()
339 cak->len = DEFAULT_KEY_LEN; in ieee802_1x_notify_create_actor()
341 peer_addr, cak->key, cak->len)) { in ieee802_1x_notify_create_actor()
346 wpa_hexdump_key(MSG_DEBUG, "Derived CAK", cak->key, cak->len); in ieee802_1x_notify_create_actor()
358 res = ieee802_1x_kay_create_mka(wpa_s->kay, ckn, cak, 0, in ieee802_1x_notify_create_actor()
367 if (cak) { in ieee802_1x_notify_create_actor()
368 os_memset(cak, 0, sizeof(*cak)); in ieee802_1x_notify_create_actor()
369 os_free(cak); in ieee802_1x_notify_create_actor()
[all …]
/freebsd/contrib/wpa/src/ap/
H A Dwpa_auth_kay.c390 struct mka_key *cak; in ieee802_1x_notify_create_actor_hapd() local
403 cak = os_zalloc(sizeof(*cak)); in ieee802_1x_notify_create_actor_hapd()
404 if (!msk || !ckn || !cak) in ieee802_1x_notify_create_actor_hapd()
424 cak->len = DEFAULT_KEY_LEN; in ieee802_1x_notify_create_actor_hapd()
426 sta->addr, cak->key, cak->len)) { in ieee802_1x_notify_create_actor_hapd()
430 wpa_hexdump_key(MSG_DEBUG, "Derived CAK", cak->key, cak->len); in ieee802_1x_notify_create_actor_hapd()
441 res = ieee802_1x_kay_create_mka(hapd->kay, ckn, cak, 0, EAP_EXCHANGE, in ieee802_1x_notify_create_actor_hapd()
447 bin_clear_free(cak, sizeof(*cak)); in ieee802_1x_notify_create_actor_hapd()
456 struct mka_key *cak; in ieee802_1x_create_preshared_mka_hapd() local
467 cak = os_zalloc(sizeof(*cak)); in ieee802_1x_create_preshared_mka_hapd()
[all …]
/freebsd/contrib/wpa/src/pae/
H A Dieee802_1x_key.c92 const u8 *mac2, u8 *cak, size_t cak_bytes) in ieee802_1x_cak_aes_cmac() argument
98 context, sizeof(context) * 8, 8 * cak_bytes, cak); in ieee802_1x_cak_aes_cmac()
137 int ieee802_1x_kek_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn, in ieee802_1x_kek_aes_cmac() argument
146 return aes_kdf(cak, 8 * cak_bytes, "IEEE8021 KEK", in ieee802_1x_kek_aes_cmac()
158 int ieee802_1x_ick_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn, in ieee802_1x_ick_aes_cmac() argument
167 return aes_kdf(cak, 8 *cak_bytes, "IEEE8021 ICK", in ieee802_1x_ick_aes_cmac()
205 int ieee802_1x_sak_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ctx, in ieee802_1x_sak_aes_cmac() argument
208 return aes_kdf(cak, cak_bytes * 8, "IEEE8021 SAK", ctx, ctx_bytes * 8, in ieee802_1x_sak_aes_cmac()
H A Dieee802_1x_key.h13 const u8 *mac2, u8 *cak, size_t cak_bytes);
17 int ieee802_1x_kek_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn,
19 int ieee802_1x_ick_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn,
23 int ieee802_1x_sak_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ctx,
H A Dieee802_1x_kay_i.h70 const u8 *mac2, u8 *cak, size_t cak_bytes);
73 int (*kek_trfm)(const u8 *cak, size_t cak_bytes,
76 int (*ick_trfm)(const u8 *cak, size_t cak_bytes,
89 struct mka_key cak; member
399 u8 cak[24]; member
H A Dieee802_1x_kay.c2205 if (ieee802_1x_sak_aes_cmac(participant->cak.key, in ieee802_1x_kay_generate_new_sak()
2206 participant->cak.len, in ieee802_1x_kay_generate_new_sak()
3666 const struct mka_key *cak, u32 life, in ieee802_1x_kay_create_mka() argument
3676 if (!kay || !ckn || !cak) { in ieee802_1x_kay_create_mka()
3681 if (cak->len != 16 && cak->len != 32) { in ieee802_1x_kay_create_mka()
3683 (unsigned int) cak->len); in ieee802_1x_kay_create_mka()
3705 participant->cak.len = cak->len; in ieee802_1x_kay_create_mka()
3706 os_memcpy(participant->cak.key, cak->key, cak->len); in ieee802_1x_kay_create_mka()
3707 wpa_hexdump_key(MSG_DEBUG, "KaY: CAK", participant->cak.key, in ieee802_1x_kay_create_mka()
3708 participant->cak.len); in ieee802_1x_kay_create_mka()
[all …]
H A Dieee802_1x_kay.h252 const struct mka_key *cak,