/freebsd/contrib/wpa/wpa_supplicant/ |
H A D | wpas_kay.c | 307 struct mka_key_name *ckn; in ieee802_1x_notify_create_actor() local 320 ckn = os_zalloc(sizeof(*ckn)); in ieee802_1x_notify_create_actor() 322 if (!msk || !ckn || !cak) in ieee802_1x_notify_create_actor() 349 ckn->len = DEFAULT_CKN_LEN; in ieee802_1x_notify_create_actor() 351 peer_addr, sid, sid_len, ckn->name)) { in ieee802_1x_notify_create_actor() 356 wpa_hexdump(MSG_DEBUG, "Derived CKN", ckn->name, ckn->len); in ieee802_1x_notify_create_actor() 358 res = ieee802_1x_kay_create_mka(wpa_s->kay, ckn, cak, 0, in ieee802_1x_notify_create_actor() 366 os_free(ckn); in ieee802_1x_notify_create_actor() 380 struct mka_key_name *ckn; in ieee802_1x_create_preshared_mka() local 386 ckn = os_zalloc(sizeof(*ckn)); in ieee802_1x_create_preshared_mka() [all …]
|
/freebsd/contrib/wpa/src/ap/ |
H A D | wpa_auth_kay.c | 389 struct mka_key_name *ckn; in ieee802_1x_notify_create_actor_hapd() local 402 ckn = os_zalloc(sizeof(*ckn)); in ieee802_1x_notify_create_actor_hapd() 404 if (!msk || !ckn || !cak) in ieee802_1x_notify_create_actor_hapd() 433 ckn->len = DEFAULT_CKN_LEN; in ieee802_1x_notify_create_actor_hapd() 435 sta->addr, sid, sid_len, ckn->name)) { in ieee802_1x_notify_create_actor_hapd() 439 wpa_hexdump(MSG_DEBUG, "Derived CKN", ckn->name, ckn->len); in ieee802_1x_notify_create_actor_hapd() 441 res = ieee802_1x_kay_create_mka(hapd->kay, ckn, cak, 0, EAP_EXCHANGE, in ieee802_1x_notify_create_actor_hapd() 446 os_free(ckn); in ieee802_1x_notify_create_actor_hapd() 457 struct mka_key_name *ckn; in ieee802_1x_create_preshared_mka_hapd() local 463 ckn = os_zalloc(sizeof(*ckn)); in ieee802_1x_create_preshared_mka_hapd() [all …]
|
/freebsd/contrib/wpa/src/pae/ |
H A D | ieee802_1x_key.c | 110 size_t sid_bytes, u8 *ckn) in ieee802_1x_ckn_aes_cmac() argument 125 context, ctx_len * 8, 128, ckn); in ieee802_1x_ckn_aes_cmac() 137 int ieee802_1x_kek_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn, in ieee802_1x_kek_aes_cmac() argument 144 os_memcpy(context, ckn, (ckn_bytes < 16) ? ckn_bytes : 16); in ieee802_1x_kek_aes_cmac() 158 int ieee802_1x_ick_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn, in ieee802_1x_ick_aes_cmac() argument 165 os_memcpy(context, ckn, (ckn_bytes < 16) ? ckn_bytes : 16); in ieee802_1x_ick_aes_cmac()
|
H A D | ieee802_1x_key.h | 16 size_t sid_bytes, u8 *ckn); 17 int ieee802_1x_kek_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn, 19 int ieee802_1x_ick_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn,
|
H A D | ieee802_1x_kay_i.h | 72 const u8 *mac2, const u8 *sid, size_t sid_len, u8 *ckn); 74 const u8 *ckn, size_t ckn_len, 77 const u8 *ckn, size_t ckn_len, 88 struct mka_key_name ckn; member 216 u8 ckn[0]; member 402 u8 ckn[0]; member
|
H A D | ieee802_1x_kay.c | 163 wpa_hexdump(MSG_DEBUG, "\tCAK Name", body->ckn, in ieee802_1x_mka_dump_basic_body() 288 ieee802_1x_kay_get_participant(struct ieee802_1x_kay *kay, const u8 *ckn, in ieee802_1x_kay_get_participant() argument 295 if (participant->ckn.len == len && in ieee802_1x_kay_get_participant() 296 os_memcmp(participant->ckn.name, ckn, in ieee802_1x_kay_get_participant() 297 participant->ckn.len) == 0) in ieee802_1x_kay_get_participant() 734 length += participant->ckn.len; in ieee802_1x_mka_basic_body_length() 751 length += participant->ckn.len; in ieee802_1x_mka_encode_basic_body() 777 os_memcpy(body->ckn, participant->ckn.name, participant->ckn.len); in ieee802_1x_mka_encode_basic_body() 829 participant = ieee802_1x_kay_get_participant(kay, body->ckn, ckn_len); in ieee802_1x_mka_decode_basic_body() 2700 ieee802_1x_kay_delete_mka(kay, &participant->ckn); in ieee802_1x_participant_timer() [all …]
|
H A D | ieee802_1x_kay.h | 251 const struct mka_key_name *ckn, 256 struct mka_key_name *ckn); 258 struct mka_key_name *ckn,
|