/freebsd/contrib/wpa/src/rsn_supp/ |
H A D | wpa_ft.c | 187 const u8 *kck, size_t kck_len, in wpa_ft_gen_req_ies() argument 429 if (wpa_ft_mic(kck, kck_len, sm->own_addr, target_ap, 5, in wpa_ft_gen_req_ies() 549 size_t kck_len, kdk_len; in wpa_ft_process_response() local 690 kck_len = sm->ptk.kck2_len; in wpa_ft_process_response() 693 kck_len = sm->ptk.kck_len; in wpa_ft_process_response() 697 kck, kck_len, bssid, in wpa_ft_process_response() 984 size_t kck_len; in wpa_ft_validate_reassoc_resp() local 1114 kck_len = sm->ptk.kck2_len; in wpa_ft_validate_reassoc_resp() 1117 kck_len = sm->ptk.kck_len; in wpa_ft_validate_reassoc_resp() 1120 if (wpa_ft_mic(kck, kck_len, sm->own_addr, src_addr, 6, in wpa_ft_validate_reassoc_resp()
|
H A D | pmksa_cache.h | 74 const u8 *pmkid, const u8 *kck, size_t kck_len, 143 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add() argument
|
H A D | pmksa_cache.c | 174 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add() argument 195 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_add() 197 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_add()
|
H A D | wpa_i.h | 357 sm->ptk.kck, sm->ptk.kck_len, in wpa_sm_set_rekey_offload()
|
H A D | wpa.c | 81 if (key_mic && (!ptk || !ptk->kck_len)) in wpa_eapol_key_send() 85 wpa_eapol_key_mic(ptk->kck, ptk->kck_len, sm->key_mgmt, ver, in wpa_eapol_key_send() 94 ptk->kck, ptk->kck_len); in wpa_eapol_key_send() 1833 sm->ptk.kck, sm->ptk.kck_len, in wpa_supplicant_process_3_of_4() 2176 if (wpa_eapol_key_mic(sm->tptk.kck, sm->tptk.kck_len, in wpa_supplicant_verify_eapol_key_mic() 2210 if (wpa_eapol_key_mic(sm->ptk.kck, sm->ptk.kck_len, in wpa_supplicant_verify_eapol_key_mic() 3996 sm->ptk.kck_len = ptk_kck_len; in wpa_sm_set_ptk_kck_kek()
|
H A D | wpa.h | 86 const u8 *kck, size_t kck_len,
|
/freebsd/contrib/wpa/src/ap/ |
H A D | pmksa_cache_auth.h | 53 const u8 *kck, size_t kck_len, 58 const u8 *kck, size_t kck_len, const u8 *aa,
|
H A D | pmksa_cache_auth.c | 281 const u8 *kck, size_t kck_len, in pmksa_cache_auth_add() argument 287 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len, in pmksa_cache_auth_add() 316 const u8 *kck, size_t kck_len, const u8 *aa, in pmksa_cache_auth_create_entry() argument 337 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_auth_create_entry() 339 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_auth_create_entry()
|
H A D | wpa_auth_ft.c | 2522 size_t kck_len; in wpa_sm_write_assoc_resp_ies() local 2768 kck_len = sm->PTK.kck2_len; in wpa_sm_write_assoc_resp_ies() 2771 kck_len = sm->PTK.kck_len; in wpa_sm_write_assoc_resp_ies() 2774 wpa_ft_mic(kck, kck_len, sm->addr, sm->wpa_auth->addr, 6, in wpa_sm_write_assoc_resp_ies() 3319 size_t kck_len; in wpa_ft_validate_reassoc() local 3468 kck_len = sm->PTK.kck2_len; in wpa_ft_validate_reassoc() 3471 kck_len = sm->PTK.kck_len; in wpa_ft_validate_reassoc() 3473 if (wpa_ft_mic(kck, kck_len, sm->addr, sm->wpa_auth->addr, 5, in wpa_ft_validate_reassoc()
|
H A D | wpa_auth.c | 1680 if (wpa_eapol_key_mic(sm->PTK.kck, sm->PTK.kck_len, in __wpa_send_eapol() 1761 if (wpa_eapol_key_mic(PTK->kck, PTK->kck_len, akmp, in wpa_verify_key_mic() 4793 sm->PTK.kck, sm->PTK.kck_len, in wpa_auth_pmksa_add()
|
/freebsd/contrib/wpa/src/common/ |
H A D | wpa_common.c | 407 ptk->kck_len = wpa_kck_len(akmp, pmk_len); in wpa_pmk_to_ptk() 492 os_memcpy(ptk->kck, tmp, ptk->kck_len); in wpa_pmk_to_ptk() 635 ptk->kck_len = 0; in fils_pmk_to_ptk() 834 if (kck_len == 16) { in wpa_ft_mic() 837 } else if (kck_len == 24) { in wpa_ft_mic() 842 (unsigned int) kck_len); in wpa_ft_mic() 905 if (kck_len == 24) { in wpa_ft_mic() 913 if (kck_len == 16 && in wpa_ft_mic() 1247 ptk->kck_len = WPA_PASN_KCK_LEN; in pasn_pmk_to_ptk() 2139 os_memcpy(ptk->kck, tmp, ptk->kck_len); in wpa_pmk_r1_to_ptk() [all …]
|
H A D | wpa_common.h | 237 size_t kck_len; member 411 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, 460 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, 463 static inline int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, in rsn_pmkid_suite_b() argument 470 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, 473 static inline int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, in rsn_pmkid_suite_b_192() argument
|
H A D | common_module_tests.c | 659 if (ptk.kck_len != sizeof(kck) || in pasn_test_pasn_auth() 738 if (ptk.kck_len != sizeof(kck) || in pasn_test_no_pasn_auth()
|
H A D | sae.h | 42 size_t kck_len; member
|
H A D | sae.c | 1622 sae->tmp->kck_len = hash_len; in sae_derive_keys() 1636 sae->tmp->kck, sae->tmp->kck_len); in sae_derive_keys() 2197 return hkdf_extract(sae->tmp->kck_len, sae->tmp->kck, sae->tmp->kck_len, in sae_cn_confirm() 2256 hash_len = sae->tmp->kck_len; in sae_write_confirm() 2296 hash_len = sae->tmp->kck_len; in sae_check_confirm()
|
/freebsd/sys/contrib/dev/iwlwifi/fw/api/ |
H A D | d3.h | 484 __le16 kck_len; member 492 __le16 kck_len; member 505 __le16 kck_len; member
|
/freebsd/sys/contrib/dev/iwlwifi/mvm/ |
H A D | d3.c | 32 mvmvif->rekey_data.kck_len = data->kck_len; in iwl_mvm_set_rekey_data() 34 memcpy(mvmvif->rekey_data.kck, data->kck, data->kck_len); in iwl_mvm_set_rekey_data() 1078 mvmvif->rekey_data.kck_len); in iwl_mvm_wowlan_config_key_params() 1079 kek_kck_cmd.kck_len = cpu_to_le16(mvmvif->rekey_data.kck_len); in iwl_mvm_wowlan_config_key_params()
|
H A D | mvm.h | 401 size_t kck_len; member
|
/freebsd/contrib/wpa/wpa_supplicant/ |
H A D | driver_i.h | 614 const u8 *kck, size_t kck_len, in wpa_drv_set_rekey_info() argument 620 kck, kck_len, replay_ctr); in wpa_drv_set_rekey_info()
|
H A D | wpas_glue.c | 1216 const u8 *kck, size_t kck_len, in wpa_supplicant_set_rekey_offload() argument 1221 wpa_drv_set_rekey_info(wpa_s, kek, kek_len, kck, kck_len, replay_ctr); in wpa_supplicant_set_rekey_offload()
|
/freebsd/sys/compat/linuxkpi/common/include/net/ |
H A D | cfg80211.h | 1028 uint8_t kck_len, kek_len; member
|
/freebsd/contrib/wpa/src/drivers/ |
H A D | driver.h | 3861 const u8 *kck, size_t kck_len,
|
H A D | driver_nl80211.c | 9037 const u8 *kck, size_t kck_len, in nl80211_set_rekey_info() argument 9053 (kck_len && nla_put(msg, NL80211_REKEY_DATA_KCK, kck_len, kck)) || in nl80211_set_rekey_info()
|