Home
last modified time | relevance | path

Searched defs:kck (Results 1 – 20 of 20) sorted by relevance

/hostap-latest/src/common/
Dcommon_module_tests.c307 const u8 kck[] = { in sae_tests() local
631 const u8 kck[] = { in pasn_test_pasn_auth() local
708 const u8 kck[] = { in pasn_test_no_pasn_auth() local
Dwpa_common.c894 int wpa_ft_mic(int key_mgmt, const u8 *kck, size_t kck_len, const u8 *sta_addr, in wpa_ft_mic()
1648 int pasn_mic(const u8 *kck, int akmp, int cipher, in pasn_mic()
2647 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, in rsn_pmkid_suite_b()
2680 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, in rsn_pmkid_suite_b_192()
Dsae.h42 u8 kck[SAE_MAX_HASH_LEN]; member
Dwpa_common.h258 u8 kck[WPA_KCK_MAX_LEN]; /* EAPOL-Key Key Confirmation Key (KCK) */ member
541 static inline int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, in rsn_pmkid_suite_b()
551 static inline int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, in rsn_pmkid_suite_b_192()
/hostap-latest/src/rsn_supp/
Dwpa_ft.c208 const u8 *kck, size_t kck_len, in wpa_ft_gen_req_ies()
595 const u8 *kck; in wpa_ft_process_response() local
1031 const u8 *kck; in wpa_ft_validate_reassoc_resp() local
Dpmksa_cache.h20 u8 kck[WPA_KCK_MAX_LEN]; member
Dpmksa_cache.c233 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add()
913 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add()
Dtdls.c112 u8 kck[16]; /* TPK-KCK */ member
493 static int wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid, in wpa_tdls_ftie_mic()
557 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, in wpa_tdls_key_mic_teardown()
/hostap-latest/tests/fuzzing/pasn-resp/
Dpasn-resp.c28 const u8 *kck, size_t kck_len, in pmksa_cache_auth_add()
/hostap-latest/wlantest/
Drx_eapol.c57 static int check_mic(struct wlantest_sta *sta, const u8 *kck, size_t kck_len, in check_mic()
361 const u8 *key_data, *kck, *mic; in rx_data_eapol_key_2_of_4() local
937 const u8 *key_data, *kck, *kek, *mic; in rx_data_eapol_key_3_of_4() local
1179 const u8 *kck; in rx_data_eapol_key_4_of_4() local
Drx_mgmt.c1572 const u8 *kck; in rx_mgmt_reassoc_req() local
2189 const u8 *kck, *kek; in rx_mgmt_reassoc_resp() local
Dwlantest.h133 u8 kck[16]; member
/hostap-latest/src/ap/
Dpmksa_cache_auth.h22 u8 kck[WPA_KCK_MAX_LEN]; member
Dpmksa_cache_auth.c284 const u8 *kck, size_t kck_len, in pmksa_cache_auth_add()
319 const u8 *kck, size_t kck_len, const u8 *aa, in pmksa_cache_auth_create_entry()
Dwpa_auth_ft.c2574 const u8 *kck; in wpa_sm_write_assoc_resp_ies() local
3497 const u8 *kck; in wpa_ft_validate_reassoc() local
/hostap-latest/tests/hwsim/
Dtest_ocv.py44 def build_eapol_key_1_2(kck, key_data, replay_counter=3, key_info=0x1382, argument
64 def build_eapol_key_2_2(kck, key_data, replay_counter=3, key_info=0x0302, argument
Dtest_ap_psk.py1476 def eapol_key_mic(kck, msg): argument
1510 def reply_eapol(info, hapd, addr, msg, key_info, nonce, data, kck): argument
1813 def build_eapol_key_3_4(anonce, kck, key_data, replay_counter=2, argument
/hostap-latest/wpa_supplicant/
Dwpas_glue.c1256 const u8 *kck, size_t kck_len, in wpa_supplicant_set_rekey_offload()
Ddriver_i.h616 const u8 *kck, size_t kck_len, in wpa_drv_set_rekey_info()
/hostap-latest/src/drivers/
Ddriver_nl80211.c10340 const u8 *kck, size_t kck_len, in nl80211_set_rekey_info()