/hostap-latest/src/common/ |
D | common_module_tests.c | 307 const u8 kck[] = { in sae_tests() local 631 const u8 kck[] = { in pasn_test_pasn_auth() local 708 const u8 kck[] = { in pasn_test_no_pasn_auth() local
|
D | wpa_common.c | 894 int wpa_ft_mic(int key_mgmt, const u8 *kck, size_t kck_len, const u8 *sta_addr, in wpa_ft_mic() 1648 int pasn_mic(const u8 *kck, int akmp, int cipher, in pasn_mic() 2647 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, in rsn_pmkid_suite_b() 2680 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, in rsn_pmkid_suite_b_192()
|
D | sae.h | 42 u8 kck[SAE_MAX_HASH_LEN]; member
|
D | wpa_common.h | 258 u8 kck[WPA_KCK_MAX_LEN]; /* EAPOL-Key Key Confirmation Key (KCK) */ member 541 static inline int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, in rsn_pmkid_suite_b() 551 static inline int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, in rsn_pmkid_suite_b_192()
|
/hostap-latest/src/rsn_supp/ |
D | wpa_ft.c | 208 const u8 *kck, size_t kck_len, in wpa_ft_gen_req_ies() 595 const u8 *kck; in wpa_ft_process_response() local 1031 const u8 *kck; in wpa_ft_validate_reassoc_resp() local
|
D | pmksa_cache.h | 20 u8 kck[WPA_KCK_MAX_LEN]; member
|
D | pmksa_cache.c | 233 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add() 913 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add()
|
D | tdls.c | 112 u8 kck[16]; /* TPK-KCK */ member 493 static int wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid, in wpa_tdls_ftie_mic() 557 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, in wpa_tdls_key_mic_teardown()
|
/hostap-latest/tests/fuzzing/pasn-resp/ |
D | pasn-resp.c | 28 const u8 *kck, size_t kck_len, in pmksa_cache_auth_add()
|
/hostap-latest/wlantest/ |
D | rx_eapol.c | 57 static int check_mic(struct wlantest_sta *sta, const u8 *kck, size_t kck_len, in check_mic() 361 const u8 *key_data, *kck, *mic; in rx_data_eapol_key_2_of_4() local 937 const u8 *key_data, *kck, *kek, *mic; in rx_data_eapol_key_3_of_4() local 1179 const u8 *kck; in rx_data_eapol_key_4_of_4() local
|
D | rx_mgmt.c | 1572 const u8 *kck; in rx_mgmt_reassoc_req() local 2189 const u8 *kck, *kek; in rx_mgmt_reassoc_resp() local
|
D | wlantest.h | 133 u8 kck[16]; member
|
/hostap-latest/src/ap/ |
D | pmksa_cache_auth.h | 22 u8 kck[WPA_KCK_MAX_LEN]; member
|
D | pmksa_cache_auth.c | 284 const u8 *kck, size_t kck_len, in pmksa_cache_auth_add() 319 const u8 *kck, size_t kck_len, const u8 *aa, in pmksa_cache_auth_create_entry()
|
D | wpa_auth_ft.c | 2574 const u8 *kck; in wpa_sm_write_assoc_resp_ies() local 3497 const u8 *kck; in wpa_ft_validate_reassoc() local
|
/hostap-latest/tests/hwsim/ |
D | test_ocv.py | 44 def build_eapol_key_1_2(kck, key_data, replay_counter=3, key_info=0x1382, argument 64 def build_eapol_key_2_2(kck, key_data, replay_counter=3, key_info=0x0302, argument
|
D | test_ap_psk.py | 1476 def eapol_key_mic(kck, msg): argument 1510 def reply_eapol(info, hapd, addr, msg, key_info, nonce, data, kck): argument 1813 def build_eapol_key_3_4(anonce, kck, key_data, replay_counter=2, argument
|
/hostap-latest/wpa_supplicant/ |
D | wpas_glue.c | 1256 const u8 *kck, size_t kck_len, in wpa_supplicant_set_rekey_offload()
|
D | driver_i.h | 616 const u8 *kck, size_t kck_len, in wpa_drv_set_rekey_info()
|
/hostap-latest/src/drivers/ |
D | driver_nl80211.c | 10340 const u8 *kck, size_t kck_len, in nl80211_set_rekey_info()
|