/freebsd/contrib/wpa/src/ap/ |
H A D | pmksa_cache_auth.c | 284 const u8 *kck, size_t kck_len, in pmksa_cache_auth_add() argument 290 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len, in pmksa_cache_auth_add() 319 const u8 *kck, size_t kck_len, const u8 *aa, in pmksa_cache_auth_create_entry() argument 337 if (kck && kck_len && kck_len < WPA_KCK_MAX_LEN) { in pmksa_cache_auth_create_entry() 338 os_memcpy(entry->kck, kck, kck_len); in pmksa_cache_auth_create_entry() 339 entry->kck_len = kck_len; in pmksa_cache_auth_create_entry() 344 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_auth_create_entry() 346 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_auth_create_entry() 533 entry->kck_len > 0) in pmksa_cache_get_okc() 534 rsn_pmkid_suite_b_192(entry->kck, entry->kck_len, in pmksa_cache_get_okc() [all …]
|
H A D | pmksa_cache_auth.h | 23 size_t kck_len; member 57 const u8 *kck, size_t kck_len, 62 const u8 *kck, size_t kck_len, const u8 *aa,
|
H A D | wpa_auth_ft.c | 2575 size_t kck_len; in wpa_sm_write_assoc_resp_ies() local 2845 kck_len = sm->PTK.kck2_len; in wpa_sm_write_assoc_resp_ies() 2848 kck_len = sm->PTK.kck_len; in wpa_sm_write_assoc_resp_ies() 2851 wpa_ft_mic(sm->wpa_key_mgmt, kck, kck_len, in wpa_sm_write_assoc_resp_ies() 3498 size_t kck_len; in wpa_ft_validate_reassoc() local 3642 kck_len = sm->PTK.kck2_len; in wpa_ft_validate_reassoc() 3645 kck_len = sm->PTK.kck_len; in wpa_ft_validate_reassoc() 3647 if (wpa_ft_mic(sm->wpa_key_mgmt, kck, kck_len, in wpa_ft_validate_reassoc()
|
H A D | ieee802_11_eht.c | 930 sta->sae->tmp->kck_len); in sae_confirm_skip_fixed_fields() 932 pos += sta->sae->tmp->kck_len; in sae_confirm_skip_fixed_fields()
|
H A D | wpa_auth.c | 2157 if (wpa_eapol_key_mic(sm->PTK.kck, sm->PTK.kck_len, 2269 if (wpa_eapol_key_mic(PTK->kck, PTK->kck_len, akmp, 6240 sm->PTK.kck, sm->PTK.kck_len,
|
/freebsd/contrib/wpa/src/rsn_supp/ |
H A D | pmksa_cache.c | 233 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add() argument 245 if (kck_len > WPA_KCK_MAX_LEN) in pmksa_cache_add() 256 if (kck_len > 0) in pmksa_cache_add() 257 os_memcpy(entry->kck, kck, kck_len); in pmksa_cache_add() 258 entry->kck_len = kck_len; in pmksa_cache_add() 262 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_add() 264 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_add() 517 pmkid, old_entry->kck, old_entry->kck_len, in pmksa_cache_clone_entry() 913 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add() argument
|
H A D | pmksa_cache.h | 21 size_t kck_len; member 85 const u8 *pmkid, const u8 *kck, size_t kck_len,
|
H A D | wpa_ft.c | 208 const u8 *kck, size_t kck_len, in wpa_ft_gen_req_ies() argument 472 if (wpa_ft_mic(sm->key_mgmt, kck, kck_len, in wpa_ft_gen_req_ies() 596 size_t kck_len, kdk_len; in wpa_ft_process_response() local 732 kck_len = sm->ptk.kck2_len; in wpa_ft_process_response() 735 kck_len = sm->ptk.kck_len; in wpa_ft_process_response() 739 kck, kck_len, bssid, in wpa_ft_process_response() 1029 size_t kck_len; in wpa_ft_validate_reassoc_resp() local 1148 kck_len = sm->ptk.kck2_len; in wpa_ft_validate_reassoc_resp() 1151 kck_len = sm->ptk.kck_len; in wpa_ft_validate_reassoc_resp() 1154 if (wpa_ft_mic(sm->key_mgmt, kck, kck_len, sm->own_addr, src_addr, 6, in wpa_ft_validate_reassoc_resp()
|
H A D | wpa_i.h | 370 sm->ptk.kck, sm->ptk.kck_len, in wpa_sm_set_rekey_offload()
|
H A D | wpa.h | 91 const u8 *kck, size_t kck_len,
|
H A D | wpa.c | 120 if (key_mic && (!ptk || !ptk->kck_len)) in wpa_eapol_key_send() 124 wpa_eapol_key_mic(ptk->kck, ptk->kck_len, sm->key_mgmt, ver, in wpa_eapol_key_send() 133 ptk->kck, ptk->kck_len); in wpa_eapol_key_send() 2793 sm->ptk.kck, sm->ptk.kck_len, in wpa_supplicant_process_3_of_4() 3259 if (wpa_eapol_key_mic(sm->tptk.kck, sm->tptk.kck_len, in wpa_supplicant_verify_eapol_key_mic() 3293 if (wpa_eapol_key_mic(sm->ptk.kck, sm->ptk.kck_len, in wpa_supplicant_verify_eapol_key_mic() 5367 sm->ptk.kck_len = ptk_kck_len; in wpa_sm_set_ptk_kck_kek()
|
/freebsd/contrib/wpa/src/common/ |
H A D | wpa_common.c | 452 ptk->kck_len = wpa_kck_len(akmp, pmk_len); in wpa_pmk_to_ptk() 462 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len + ptk->kdk_len; in wpa_pmk_to_ptk() 567 os_memcpy(ptk->kck, tmp, ptk->kck_len); in wpa_pmk_to_ptk() 568 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len); in wpa_pmk_to_ptk() 570 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); in wpa_pmk_to_ptk() 573 os_memcpy(ptk->tk, tmp + ptk->kck_len + ptk->kek_len, ptk->tk_len); in wpa_pmk_to_ptk() 577 os_memcpy(ptk->kdk, tmp + ptk->kck_len + ptk->kek_len + in wpa_pmk_to_ptk() 710 ptk->kck_len = 0; in fils_pmk_to_ptk() 894 int wpa_ft_mic(int key_mgmt, const u8 *kck, size_t kck_len, const u8 *sta_addr, in wpa_ft_mic() argument 911 if (kck_len == 16) { in wpa_ft_mic() [all …]
|
H A D | wpa_common.h | 264 size_t kck_len; member 486 int wpa_ft_mic(int key_mgmt, const u8 *kck, size_t kck_len, const u8 *sta_addr, 537 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, 540 static inline int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, in rsn_pmkid_suite_b() argument 547 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, 550 static inline int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, in rsn_pmkid_suite_b_192() argument
|
H A D | common_module_tests.c | 659 if (ptk.kck_len != sizeof(kck) || in pasn_test_pasn_auth() 738 if (ptk.kck_len != sizeof(kck) || in pasn_test_no_pasn_auth()
|
H A D | sae.h | 43 size_t kck_len; member
|
H A D | sae.c | 1635 sae->tmp->kck_len = hash_len; in sae_derive_keys() 1650 sae->tmp->kck, sae->tmp->kck_len); in sae_derive_keys() 2303 return hkdf_extract(sae->tmp->kck_len, sae->tmp->kck, sae->tmp->kck_len, in sae_cn_confirm() 2362 hash_len = sae->tmp->kck_len; in sae_write_confirm() 2403 hash_len = sae->tmp->kck_len; in sae_check_confirm()
|
/freebsd/sys/contrib/dev/iwlwifi/fw/api/ |
H A D | d3.h | 486 __le16 kck_len; 494 __le16 kck_len; 507 __le16 kck_len; 484 __le16 kck_len; global() member 492 __le16 kck_len; global() member 505 __le16 kck_len; global() member
|
/freebsd/sys/contrib/dev/iwlwifi/mvm/ |
H A D | d3.c | 33 mvmvif->rekey_data.kck_len = data->kck_len; in iwl_mvm_set_rekey_data() 35 memcpy(mvmvif->rekey_data.kck, data->kck, data->kck_len); in iwl_mvm_set_rekey_data() 1091 mvmvif->rekey_data.kck_len); in iwl_mvm_wowlan_config_key_params() 1092 kek_kck_cmd.kck_len = cpu_to_le16(mvmvif->rekey_data.kck_len); in iwl_mvm_wowlan_config_key_params()
|
H A D | mvm.h | 522 size_t kck_len; 401 size_t kck_len; global() member
|
/freebsd/contrib/wpa/wpa_supplicant/ |
H A D | driver_i.h | 613 const u8 *kck, size_t kck_len, in wpa_drv_set_rekey_info() argument 619 kck, kck_len, replay_ctr); in wpa_drv_set_rekey_info()
|
H A D | wpas_glue.c | 1240 const u8 *kck, size_t kck_len, in wpa_supplicant_set_rekey_offload() argument 1245 wpa_drv_set_rekey_info(wpa_s, kek, kek_len, kck, kck_len, replay_ctr); in wpa_supplicant_set_rekey_offload()
|
/freebsd/contrib/wpa/src/drivers/ |
H A D | driver.h | 4398 const u8 *kck, size_t kck_len,
|
H A D | driver_nl80211.c | 10282 const u8 *kck, size_t kck_len, in nl80211_set_rekey_info() argument 10298 (kck_len && nla_put(msg, NL80211_REKEY_DATA_KCK, kck_len, kck)) || in nl80211_set_rekey_info()
|
/freebsd/sys/compat/linuxkpi/common/include/net/ |
H A D | cfg80211.h | 1095 uint8_t kck_len, kek_len; member
|