Home
last modified time | relevance | path

Searched refs:kek (Results 1 – 25 of 42) sorted by relevance

12

/freebsd/contrib/wpa/src/crypto/
H A Daes-wrap.c26 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument
40 ctx = aes_encrypt_init(kek, kek_len); in aes_wrap()
H A Daes-unwrap.c26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument
39 ctx = aes_decrypt_init(kek, kek_len); in aes_unwrap()
H A Daes_wrap.h21 int __must_check aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain,
23 int __must_check aes_unwrap(const u8 *kek, size_t kek_len, int n,
H A Dcrypto_wolfssl.c412 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument
419 ret = wc_AesKeyWrap(kek, kek_len, plain, n * 8, cipher, (n + 1) * 8, in aes_wrap()
425 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument
433 ret = wc_AesKeyUnWrap(kek, kek_len, cipher, (n + 1) * 8, plain, n * 8, in aes_unwrap()
H A Dcrypto_linux.c784 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument
797 skcipher = linux_af_alg_skcipher("kw(aes)", kek, kek_len); in aes_unwrap()
H A Dcrypto_openssl.c504 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument
511 if (AES_set_encrypt_key(kek, kek_len << 3, &actx)) in aes_wrap()
519 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument
527 if (AES_set_decrypt_key(kek, kek_len << 3, &actx)) in aes_unwrap()
/freebsd/contrib/wpa/src/rsn_supp/
H A Dwpa_ft.c761 const u8 *kek; in wpa_ft_process_gtk_subelem() local
765 kek = sm->ptk.kek2; in wpa_ft_process_gtk_subelem()
768 kek = sm->ptk.kek; in wpa_ft_process_gtk_subelem()
787 if (aes_unwrap(kek, kek_len, gtk_len / 8, gtk_elem + 11, gtk)) { in wpa_ft_process_gtk_subelem()
844 const u8 *kek; in wpa_ft_process_igtk_subelem() local
848 kek = sm->ptk.kek2; in wpa_ft_process_igtk_subelem()
851 kek = sm->ptk.kek; in wpa_ft_process_igtk_subelem()
881 if (aes_unwrap(kek, kek_len, igtk_len / 8, igtk_elem + 9, igtk)) { in wpa_ft_process_igtk_subelem()
914 const u8 *kek; in wpa_ft_process_bigtk_subelem() local
925 kek = sm->ptk.kek2; in wpa_ft_process_bigtk_subelem()
[all …]
H A Dwpa.h85 void (*set_rekey_offload)(void *ctx, const u8 *kek, size_t kek_len,
546 struct wpabuf * fils_build_assoc_req(struct wpa_sm *sm, const u8 **kek,
H A Dwpa.c139 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); in wpa_eapol_key_send()
144 if (aes_siv_encrypt(ptk->kek, ptk->kek_len, in wpa_eapol_key_send()
1974 os_memcpy(ek + 16, sm->ptk.kek, sm->ptk.kek_len); in wpa_supplicant_process_1_of_2_wpa()
1999 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, maxkeylen / 8, in wpa_supplicant_process_1_of_2_wpa()
2271 os_memcpy(ek + 16, sm->ptk.kek, sm->ptk.kek_len); in wpa_supplicant_decrypt_key_data()
2304 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, *key_data_len / 8, in wpa_supplicant_decrypt_key_data()
2431 if (aes_siv_decrypt(ptk->kek, ptk->kek_len, pos, *key_data_len, in wpa_supp_aead_decrypt()
4000 os_memcpy(sm->ptk.kek, ptk_kek, ptk_kek_len); in wpa_sm_set_ptk_kck_kek()
4573 struct wpabuf * fils_build_assoc_req(struct wpa_sm *sm, const u8 **kek, in fils_build_assoc_req() argument
4689 *kek = sm->ptk.kek; in fils_build_assoc_req()
[all …]
H A Dwpa_i.h356 sm->ctx->set_rekey_offload(sm->ctx->ctx, sm->ptk.kek, sm->ptk.kek_len, in wpa_sm_set_rekey_offload()
/freebsd/contrib/wpa/src/common/
H A Ddpp_backup.c269 u8 kek[DPP_MAX_HASH_LEN]; in dpp_build_pw_recipient_info() local
288 kek, hash_len)) { in dpp_build_pw_recipient_info()
293 kek, hash_len); in dpp_build_pw_recipient_info()
297 aes_siv_encrypt(kek, hash_len, wpabuf_head(cont_enc_key), in dpp_build_pw_recipient_info()
342 forced_memzero(kek, sizeof(kek)); in dpp_build_pw_recipient_info()
1137 u8 kek[DPP_MAX_HASH_LEN]; in dpp_conf_resp_env_data() local
1160 kek, data.pbkdf2_key_len)) { in dpp_conf_resp_env_data()
1165 kek, data.pbkdf2_key_len); in dpp_conf_resp_env_data()
1172 res = aes_siv_decrypt(kek, data.pbkdf2_key_len, in dpp_conf_resp_env_data()
1175 forced_memzero(kek, data.pbkdf2_key_len); in dpp_conf_resp_env_data()
H A Dcommon_module_tests.c712 const u8 kek[] = { in pasn_test_no_pasn_auth() local
744 if (ptk.kek_len != sizeof(kek) || in pasn_test_no_pasn_auth()
745 os_memcmp(kek, ptk.kek, sizeof(kek)) != 0) { in pasn_test_no_pasn_auth()
H A Dsae.h68 u8 kek[SAE_MAX_HASH_LEN]; member
H A Dsae_pk.c688 if (aes_siv_encrypt(tmp->kek, tmp->kek_len, in sae_write_confirm_pk()
825 if (aes_siv_decrypt(tmp->kek, tmp->kek_len, in sae_check_confirm_pk()
H A Dwpa_common.c495 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); in wpa_pmk_to_ptk()
496 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); in wpa_pmk_to_ptk()
696 os_memcpy(ptk->kek, tmp + offset, ptk->kek_len); in fils_pmk_to_ptk()
697 wpa_hexdump_key(MSG_DEBUG, "FILS: KEK", ptk->kek, ptk->kek_len); in fils_pmk_to_ptk()
2141 os_memcpy(ptk->kek, tmp + offset, ptk->kek_len); in wpa_pmk_r1_to_ptk()
2152 wpa_hexdump_key(MSG_DEBUG, "FT: KEK", ptk->kek, ptk->kek_len); in wpa_pmk_r1_to_ptk()
/freebsd/contrib/wpa/src/pae/
H A Dieee802_1x_key.c138 size_t ckn_bytes, u8 *kek, size_t kek_bytes) in ieee802_1x_kek_aes_cmac() argument
148 8 * kek_bytes, kek); in ieee802_1x_kek_aes_cmac()
H A Dieee802_1x_key.h18 size_t ckn_bytes, u8 *kek, size_t kek_bytes);
H A Dieee802_1x_kay_i.h75 u8 *kek, size_t kek_bytes);
108 struct mka_key kek; member
H A Dieee802_1x_kay.c1648 if (aes_wrap(participant->kek.key, participant->kek.len, in ieee802_1x_mka_encode_dist_sak_body()
1789 if (aes_unwrap(participant->kek.key, participant->kek.len, in ieee802_1x_mka_decode_dist_sak_body()
3738 participant->kek.len = participant->cak.len; in ieee802_1x_kay_create_mka()
3743 participant->kek.key, in ieee802_1x_kay_create_mka()
3744 participant->kek.len)) { in ieee802_1x_kay_create_mka()
3749 participant->kek.key, participant->kek.len); in ieee802_1x_kay_create_mka()
3849 os_memset(&participant->kek, 0, sizeof(participant->kek)); in ieee802_1x_kay_delete_mka()
/freebsd/crypto/openssl/crypto/cms/
H A Dcms_kari.c215 unsigned char kek[EVP_MAX_KEY_LENGTH]; in cms_kek_cipher() local
225 if (EVP_PKEY_derive(kari->pctx, kek, &keklen) <= 0) in cms_kek_cipher()
228 if (!EVP_CipherInit_ex(kari->ctx, NULL, NULL, kek, NULL, enc)) in cms_kek_cipher()
243 OPENSSL_cleanse(kek, keklen); in cms_kek_cipher()
/freebsd/sys/contrib/dev/iwlwifi/fw/api/
H A Dd3.h483 u8 kek[IWL_KEK_MAX_SIZE]; member
491 u8 kek[IWL_KEK_MAX_SIZE]; member
504 u8 kek[IWL_KEK_MAX_SIZE]; member
/freebsd/contrib/wpa/src/ap/
H A Dwpa_auth_ft.c2173 const u8 *kek; in wpa_ft_gtk_subelem() local
2177 kek = sm->PTK.kek2; in wpa_ft_gtk_subelem()
2180 kek = sm->PTK.kek; in wpa_ft_gtk_subelem()
2259 const u8 *kek, *igtk; in wpa_ft_igtk_subelem() local
2265 kek = sm->PTK.kek2; in wpa_ft_igtk_subelem()
2268 kek = sm->PTK.kek; in wpa_ft_igtk_subelem()
2301 if (aes_wrap(kek, kek_len, igtk_len / 8, igtk, pos)) { in wpa_ft_igtk_subelem()
2319 const u8 *kek, *bigtk; in wpa_ft_bigtk_subelem() local
2325 kek = sm->PTK.kek2; in wpa_ft_bigtk_subelem()
2328 kek = sm->PTK.kek; in wpa_ft_bigtk_subelem()
[all …]
H A Dwpa_auth.c1607 sm->PTK.kek, sm->PTK.kek_len); in __wpa_send_eapol()
1612 if (aes_siv_encrypt(sm->PTK.kek, sm->PTK.kek_len, kde, kde_len, in __wpa_send_eapol()
1642 if (aes_wrap(sm->PTK.kek, sm->PTK.kek_len, in __wpa_send_eapol()
1659 os_memcpy(ek + 16, sm->PTK.kek, sm->PTK.kek_len); in __wpa_send_eapol()
2452 if (aes_siv_decrypt(ptk->kek, ptk->kek_len, pos, key_data_len, in wpa_aead_decrypt()
2643 if (aes_siv_decrypt(sm->PTK.kek, sm->PTK.kek_len, crypt, end - crypt, in fils_decrypt_assoc()
2720 if (aes_siv_encrypt(sm->PTK.kek, sm->PTK.kek_len, in fils_encrypt_assoc()
5324 os_memcpy(fils_kek, sm->PTK.kek, WPA_KEK_MAX_LEN); in wpa_auth_get_fils_aead_params()
/freebsd/contrib/wpa/wpa_supplicant/
H A Ddriver_i.h613 const u8 *kek, size_t kek_len, in wpa_drv_set_rekey_info() argument
619 wpa_s->driver->set_rekey_info(wpa_s->drv_priv, kek, kek_len, in wpa_drv_set_rekey_info()
H A Dwpas_glue.c1215 const u8 *kek, size_t kek_len, in wpa_supplicant_set_rekey_offload() argument
1221 wpa_drv_set_rekey_info(wpa_s, kek, kek_len, kck, kck_len, replay_ctr); in wpa_supplicant_set_rekey_offload()

12