/freebsd/contrib/wpa/src/crypto/ |
H A D | aes-wrap.c | 26 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument 40 ctx = aes_encrypt_init(kek, kek_len); in aes_wrap()
|
H A D | aes-unwrap.c | 26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument 39 ctx = aes_decrypt_init(kek, kek_len); in aes_unwrap()
|
H A D | aes_wrap.h | 21 int __must_check aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, 23 int __must_check aes_unwrap(const u8 *kek, size_t kek_len, int n,
|
H A D | crypto_linux.c | 784 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument 797 skcipher = linux_af_alg_skcipher("kw(aes)", kek, kek_len); in aes_unwrap()
|
H A D | crypto_wolfssl.c | 692 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument 700 ret = wc_AesKeyWrap(kek, kek_len, plain, n * 8, cipher, (n + 1) * 8, in aes_wrap() 709 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument 718 ret = wc_AesKeyUnWrap(kek, kek_len, cipher, (n + 1) * 8, plain, n * 8, in aes_unwrap()
|
H A D | crypto_openssl.c | 595 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument 614 if (EVP_EncryptInit_ex(ctx, type, NULL, kek, NULL) == 1 && in aes_wrap() 629 if (AES_set_encrypt_key(kek, kek_len << 3, &actx)) in aes_wrap() 638 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument 658 if (EVP_DecryptInit_ex(ctx, type, NULL, kek, NULL) == 1 && in aes_unwrap() 673 if (AES_set_decrypt_key(kek, kek_len << 3, &actx)) in aes_unwrap()
|
/freebsd/contrib/wpa/src/rsn_supp/ |
H A D | wpa_ft.c | 806 const u8 *kek; in wpa_ft_process_gtk_subelem() local 810 kek = sm->ptk.kek2; in wpa_ft_process_gtk_subelem() 813 kek = sm->ptk.kek; in wpa_ft_process_gtk_subelem() 832 if (aes_unwrap(kek, kek_len, gtk_len / 8, gtk_elem + 11, gtk)) { in wpa_ft_process_gtk_subelem() 889 const u8 *kek; in wpa_ft_process_igtk_subelem() local 893 kek = sm->ptk.kek2; in wpa_ft_process_igtk_subelem() 896 kek = sm->ptk.kek; in wpa_ft_process_igtk_subelem() 926 if (aes_unwrap(kek, kek_len, igtk_len / 8, igtk_elem + 9, igtk)) { in wpa_ft_process_igtk_subelem() 959 const u8 *kek; in wpa_ft_process_bigtk_subelem() local 970 kek = sm->ptk.kek2; in wpa_ft_process_bigtk_subelem() [all …]
|
H A D | wpa.h | 90 void (*set_rekey_offload)(void *ctx, const u8 *kek, size_t kek_len, 602 struct wpabuf * fils_build_assoc_req(struct wpa_sm *sm, const u8 **kek,
|
H A D | wpa.c | 178 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); in wpa_eapol_key_send() 183 if (aes_siv_encrypt(ptk->kek, ptk->kek_len, in wpa_eapol_key_send() 661 ptk->kek, ptk->kek_len); in wpa_supplicant_send_2_of_4() 662 if (aes_wrap(ptk->kek, ptk->kek_len, plain_len / 8, plain, in wpa_supplicant_send_2_of_4() 2320 ptk->kek, ptk->kek_len); in wpa_supplicant_send_4_of_4() 2321 if (aes_wrap(ptk->kek, ptk->kek_len, plain_len / 8, plain, in wpa_supplicant_send_4_of_4() 3055 os_memcpy(ek + 16, sm->ptk.kek, sm->ptk.kek_len); in wpa_supplicant_process_1_of_2_wpa() 3080 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, maxkeylen / 8, in wpa_supplicant_process_1_of_2_wpa() 3354 os_memcpy(ek + 16, sm->ptk.kek, sm->ptk.kek_len); in wpa_supplicant_decrypt_key_data() 3387 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, *key_data_len / 8, in wpa_supplicant_decrypt_key_data() [all …]
|
H A D | wpa_i.h | 369 sm->ctx->set_rekey_offload(sm->ctx->ctx, sm->ptk.kek, sm->ptk.kek_len, in wpa_sm_set_rekey_offload()
|
/freebsd/contrib/wpa/src/common/ |
H A D | dpp_backup.c | 269 u8 kek[DPP_MAX_HASH_LEN]; in dpp_build_pw_recipient_info() local 288 kek, hash_len)) { in dpp_build_pw_recipient_info() 293 kek, hash_len); in dpp_build_pw_recipient_info() 297 aes_siv_encrypt(kek, hash_len, wpabuf_head(cont_enc_key), in dpp_build_pw_recipient_info() 342 forced_memzero(kek, sizeof(kek)); in dpp_build_pw_recipient_info() 1137 u8 kek[DPP_MAX_HASH_LEN]; in dpp_conf_resp_env_data() local 1160 kek, data.pbkdf2_key_len)) { in dpp_conf_resp_env_data() 1165 kek, data.pbkdf2_key_len); in dpp_conf_resp_env_data() 1172 res = aes_siv_decrypt(kek, data.pbkdf2_key_len, in dpp_conf_resp_env_data() 1175 forced_memzero(kek, data.pbkdf2_key_len); in dpp_conf_resp_env_data()
|
H A D | common_module_tests.c | 712 const u8 kek[] = { in pasn_test_no_pasn_auth() local 744 if (ptk.kek_len != sizeof(kek) || in pasn_test_no_pasn_auth() 745 os_memcmp(kek, ptk.kek, sizeof(kek)) != 0) { in pasn_test_no_pasn_auth()
|
H A D | sae.h | 69 u8 kek[SAE_MAX_HASH_LEN]; member
|
H A D | sae_pk.c | 688 if (aes_siv_encrypt(tmp->kek, tmp->kek_len, in sae_write_confirm_pk() 825 if (aes_siv_decrypt(tmp->kek, tmp->kek_len, in sae_check_confirm_pk()
|
H A D | wpa_common.c | 570 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); in wpa_pmk_to_ptk() 571 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); in wpa_pmk_to_ptk() 771 os_memcpy(ptk->kek, tmp + offset, ptk->kek_len); in fils_pmk_to_ptk() 772 wpa_hexdump_key(MSG_DEBUG, "FILS: KEK", ptk->kek, ptk->kek_len); in fils_pmk_to_ptk() 2543 os_memcpy(ptk->kek, tmp + offset, ptk->kek_len); in wpa_pmk_r1_to_ptk() 2554 wpa_hexdump_key(MSG_DEBUG, "FT: KEK", ptk->kek, ptk->kek_len); in wpa_pmk_r1_to_ptk()
|
/freebsd/contrib/wpa/src/pae/ |
H A D | ieee802_1x_key.c | 138 size_t ckn_bytes, u8 *kek, size_t kek_bytes) in ieee802_1x_kek_aes_cmac() argument 148 8 * kek_bytes, kek); in ieee802_1x_kek_aes_cmac()
|
H A D | ieee802_1x_key.h | 18 size_t ckn_bytes, u8 *kek, size_t kek_bytes);
|
H A D | ieee802_1x_kay_i.h | 75 u8 *kek, size_t kek_bytes); 108 struct mka_key kek; member
|
H A D | ieee802_1x_kay.c | 1656 if (aes_wrap(participant->kek.key, participant->kek.len, in ieee802_1x_mka_encode_dist_sak_body() 1797 if (aes_unwrap(participant->kek.key, participant->kek.len, in ieee802_1x_mka_decode_dist_sak_body() 3780 participant->kek.len = participant->cak.len; in ieee802_1x_kay_create_mka() 3785 participant->kek.key, in ieee802_1x_kay_create_mka() 3786 participant->kek.len)) { in ieee802_1x_kay_create_mka() 3791 participant->kek.key, participant->kek.len); in ieee802_1x_kay_create_mka() 3891 os_memset(&participant->kek, 0, sizeof(participant->kek)); in ieee802_1x_kay_delete_mka()
|
/freebsd/crypto/openssl/crypto/cms/ |
H A D | cms_kari.c | 215 unsigned char kek[EVP_MAX_KEY_LENGTH]; in cms_kek_cipher() local 225 if (EVP_PKEY_derive(kari->pctx, kek, &keklen) <= 0) in cms_kek_cipher() 228 if (!EVP_CipherInit_ex(kari->ctx, NULL, NULL, kek, NULL, enc)) in cms_kek_cipher() 243 OPENSSL_cleanse(kek, keklen); in cms_kek_cipher()
|
/freebsd/sys/contrib/dev/iwlwifi/fw/api/ |
H A D | d3.h | 485 u8 kek[IWL_KEK_MAX_SIZE]; 493 u8 kek[IWL_KEK_MAX_SIZE]; 506 u8 kek[IWL_KEK_MAX_SIZE]; 483 u8 kek[IWL_KEK_MAX_SIZE]; global() member 491 u8 kek[IWL_KEK_MAX_SIZE]; global() member 504 u8 kek[IWL_KEK_MAX_SIZE]; global() member
|
/freebsd/contrib/wpa/src/ap/ |
H A D | wpa_auth_ft.c | 2224 const u8 *kek; in wpa_ft_gtk_subelem() local 2228 kek = sm->PTK.kek2; in wpa_ft_gtk_subelem() 2231 kek = sm->PTK.kek; in wpa_ft_gtk_subelem() 2290 if (aes_wrap(kek, kek_len, key_len / 8, key, subelem + 13)) { in wpa_ft_gtk_subelem() 2311 const u8 *kek, *igtk; in wpa_ft_igtk_subelem() local 2317 kek = sm->PTK.kek2; in wpa_ft_igtk_subelem() 2320 kek = sm->PTK.kek; in wpa_ft_igtk_subelem() 2353 if (aes_wrap(kek, kek_len, igtk_len / 8, igtk, pos)) { in wpa_ft_igtk_subelem() 2372 const u8 *kek, *bigtk; in wpa_ft_bigtk_subelem() local 2378 kek = sm->PTK.kek2; in wpa_ft_bigtk_subelem() [all …]
|
H A D | wpa_auth.c | 1635 if (aes_unwrap(sm->PTK.kek, sm->PTK.kek_len, 2080 sm->PTK.kek, sm->PTK.kek_len); 2085 if (aes_siv_encrypt(sm->PTK.kek, sm->PTK.kek_len, kde, kde_len, 2114 sm->PTK.kek, sm->PTK.kek_len); 2115 if (aes_wrap(sm->PTK.kek, sm->PTK.kek_len, 2135 os_memcpy(ek + 16, sm->PTK.kek, sm->PTK.kek_len); 3075 if (aes_siv_decrypt(ptk->kek, ptk->kek_len, pos, key_data_len, 3266 if (aes_siv_decrypt(sm->PTK.kek, sm->PTK.kek_len, crypt, end - crypt, 3343 if (aes_siv_encrypt(sm->PTK.kek, sm->PTK.kek_len, 3808 if (aes_unwrap(PTK.kek, PTK.kek_len, key_data_length / 8, [all …]
|
/freebsd/contrib/wpa/wpa_supplicant/ |
H A D | driver_i.h | 612 const u8 *kek, size_t kek_len, in wpa_drv_set_rekey_info() argument 618 wpa_s->driver->set_rekey_info(wpa_s->drv_priv, kek, kek_len, in wpa_drv_set_rekey_info()
|
H A D | wpas_glue.c | 1239 const u8 *kek, size_t kek_len, in wpa_supplicant_set_rekey_offload() argument 1245 wpa_drv_set_rekey_info(wpa_s, kek, kek_len, kck, kck_len, replay_ctr); in wpa_supplicant_set_rekey_offload()
|