/freebsd/contrib/wpa/wpa_supplicant/ |
H A D | wpas_kay.c | 308 struct mka_key *cak; in ieee802_1x_notify_create_actor() local 321 cak = os_zalloc(sizeof(*cak)); in ieee802_1x_notify_create_actor() 322 if (!msk || !ckn || !cak) in ieee802_1x_notify_create_actor() 339 cak->len = DEFAULT_KEY_LEN; in ieee802_1x_notify_create_actor() 341 peer_addr, cak->key, cak->len)) { in ieee802_1x_notify_create_actor() 346 wpa_hexdump_key(MSG_DEBUG, "Derived CAK", cak->key, cak->len); in ieee802_1x_notify_create_actor() 358 res = ieee802_1x_kay_create_mka(wpa_s->kay, ckn, cak, 0, in ieee802_1x_notify_create_actor() 367 if (cak) { in ieee802_1x_notify_create_actor() 368 os_memset(cak, 0, sizeof(*cak)); in ieee802_1x_notify_create_actor() 369 os_free(cak); in ieee802_1x_notify_create_actor() [all …]
|
/freebsd/contrib/wpa/src/ap/ |
H A D | wpa_auth_kay.c | 390 struct mka_key *cak; in ieee802_1x_notify_create_actor_hapd() local 403 cak = os_zalloc(sizeof(*cak)); in ieee802_1x_notify_create_actor_hapd() 404 if (!msk || !ckn || !cak) in ieee802_1x_notify_create_actor_hapd() 424 cak->len = DEFAULT_KEY_LEN; in ieee802_1x_notify_create_actor_hapd() 426 sta->addr, cak->key, cak->len)) { in ieee802_1x_notify_create_actor_hapd() 430 wpa_hexdump_key(MSG_DEBUG, "Derived CAK", cak->key, cak->len); in ieee802_1x_notify_create_actor_hapd() 441 res = ieee802_1x_kay_create_mka(hapd->kay, ckn, cak, 0, EAP_EXCHANGE, in ieee802_1x_notify_create_actor_hapd() 447 bin_clear_free(cak, sizeof(*cak)); in ieee802_1x_notify_create_actor_hapd() 456 struct mka_key *cak; in ieee802_1x_create_preshared_mka_hapd() local 467 cak = os_zalloc(sizeof(*cak)); in ieee802_1x_create_preshared_mka_hapd() [all …]
|
/freebsd/contrib/wpa/src/pae/ |
H A D | ieee802_1x_key.c | 92 const u8 *mac2, u8 *cak, size_t cak_bytes) in ieee802_1x_cak_aes_cmac() argument 98 context, sizeof(context) * 8, 8 * cak_bytes, cak); in ieee802_1x_cak_aes_cmac() 137 int ieee802_1x_kek_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn, in ieee802_1x_kek_aes_cmac() argument 146 return aes_kdf(cak, 8 * cak_bytes, "IEEE8021 KEK", in ieee802_1x_kek_aes_cmac() 158 int ieee802_1x_ick_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn, in ieee802_1x_ick_aes_cmac() argument 167 return aes_kdf(cak, 8 *cak_bytes, "IEEE8021 ICK", in ieee802_1x_ick_aes_cmac() 205 int ieee802_1x_sak_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ctx, in ieee802_1x_sak_aes_cmac() argument 208 return aes_kdf(cak, cak_bytes * 8, "IEEE8021 SAK", ctx, ctx_bytes * 8, in ieee802_1x_sak_aes_cmac()
|
H A D | ieee802_1x_key.h | 13 const u8 *mac2, u8 *cak, size_t cak_bytes); 17 int ieee802_1x_kek_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn, 19 int ieee802_1x_ick_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn, 23 int ieee802_1x_sak_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ctx,
|
H A D | ieee802_1x_kay_i.h | 70 const u8 *mac2, u8 *cak, size_t cak_bytes); 73 int (*kek_trfm)(const u8 *cak, size_t cak_bytes, 76 int (*ick_trfm)(const u8 *cak, size_t cak_bytes, 89 struct mka_key cak; member 399 u8 cak[24]; member
|
H A D | ieee802_1x_kay.c | 2205 if (ieee802_1x_sak_aes_cmac(participant->cak.key, in ieee802_1x_kay_generate_new_sak() 2206 participant->cak.len, in ieee802_1x_kay_generate_new_sak() 3666 const struct mka_key *cak, u32 life, in ieee802_1x_kay_create_mka() argument 3676 if (!kay || !ckn || !cak) { in ieee802_1x_kay_create_mka() 3681 if (cak->len != 16 && cak->len != 32) { in ieee802_1x_kay_create_mka() 3683 (unsigned int) cak->len); in ieee802_1x_kay_create_mka() 3705 participant->cak.len = cak->len; in ieee802_1x_kay_create_mka() 3706 os_memcpy(participant->cak.key, cak->key, cak->len); in ieee802_1x_kay_create_mka() 3707 wpa_hexdump_key(MSG_DEBUG, "KaY: CAK", participant->cak.key, in ieee802_1x_kay_create_mka() 3708 participant->cak.len); in ieee802_1x_kay_create_mka() [all …]
|
H A D | ieee802_1x_kay.h | 252 const struct mka_key *cak,
|