/hal_espressif-3.7.0/components/wpa_supplicant/src/crypto/ |
D | aes-wrap.c | 26 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument 40 ctx = aes_encrypt_init(kek, kek_len); in aes_wrap()
|
D | aes-unwrap.c | 26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument 39 ctx = aes_decrypt_init(kek, kek_len); in aes_unwrap()
|
D | aes_wrap.h | 21 int __must_check aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, 23 int __must_check aes_unwrap(const u8 *kek, size_t kek_len, int n,
|
/hal_espressif-3.7.0/components/wpa_supplicant/src/common/ |
D | wpa_common.c | 787 ptk->kek_len = wpa_kek_len(akmp); in wpa_pmk_r1_to_ptk() 789 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len; in wpa_pmk_r1_to_ptk() 814 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); in wpa_pmk_r1_to_ptk() 815 os_memcpy(ptk->tk, tmp + ptk->kck_len + ptk->kek_len, ptk->tk_len); in wpa_pmk_r1_to_ptk() 818 wpa_hexdump_key(MSG_DEBUG, "FT: KEK", ptk->kek, ptk->kek_len); in wpa_pmk_r1_to_ptk() 1124 ptk->kek_len = wpa_kek_len(akmp); in wpa_pmk_to_ptk() 1126 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len; in wpa_pmk_to_ptk() 1151 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); in wpa_pmk_to_ptk() 1152 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); in wpa_pmk_to_ptk() 1154 os_memcpy(ptk->tk, tmp + ptk->kck_len + ptk->kek_len, ptk->tk_len); in wpa_pmk_to_ptk()
|
D | sae_pk.c | 631 if (tmp->kek_len != 32 && tmp->kek_len != 48 && tmp->kek_len != 64) { in sae_check_confirm_pk() 667 if (aes_siv_decrypt(tmp->kek, tmp->kek_len, in sae_check_confirm_pk()
|
D | sae.h | 70 size_t kek_len; member
|
D | wpa_common.h | 205 size_t kek_len; member
|
D | sae.c | 1577 sae->tmp->kek_len = hash_len; in sae_derive_keys() 1579 sae->tmp->kek, sae->tmp->kek_len); in sae_derive_keys()
|
/hal_espressif-3.7.0/components/wpa_supplicant/esp_supplicant/src/crypto/ |
D | crypto_mbedtls.c | 680 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument 688 kek, kek_len * 8, 1); in aes_wrap() 700 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument 709 kek, kek_len * 8, 0); in aes_unwrap()
|
/hal_espressif-3.7.0/components/wpa_supplicant/src/rsn_supp/ |
D | wpa_ft.c | 608 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, gtk_len / 8, gtk_elem + 11, gtk)) { in wpa_ft_process_gtk_subelem() 686 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, WPA_IGTK_LEN / 8,
|
D | wpa.c | 1512 if (ver == WPA_KEY_INFO_TYPE_HMAC_MD5_RC4 && sm->ptk.kek_len == 16) { in wpa_supplicant_process_1_of_2_wpa() 1514 os_memcpy(ek + 16, sm->ptk.kek, sm->ptk.kek_len); in wpa_supplicant_process_1_of_2_wpa() 1540 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, maxkeylen / 8, key_data, gd->gtk)) { in wpa_supplicant_process_1_of_2_wpa() 1735 if (ver == WPA_KEY_INFO_TYPE_HMAC_MD5_RC4 && sm->ptk.kek_len == 16) { in wpa_supplicant_decrypt_key_data() 1738 os_memcpy(ek + 16, sm->ptk.kek, sm->ptk.kek_len); in wpa_supplicant_decrypt_key_data() 1767 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, *key_data_len / 8, in wpa_supplicant_decrypt_key_data()
|
/hal_espressif-3.7.0/components/wpa_supplicant/src/ap/ |
D | wpa_auth.c | 1116 if (aes_wrap(sm->PTK.kek, sm->PTK.kek_len, (key_data_len - 8) / 8, buf, in __wpa_send_eapol() 1123 } else if (sm->PTK.kek_len == 16) { in __wpa_send_eapol() 1129 memcpy(ek + 16, sm->PTK.kek, sm->PTK.kek_len); in __wpa_send_eapol()
|