/hal_espressif-latest/components/wpa_supplicant/src/ap/ |
D | pmksa_cache_auth.c | 205 const u8 *kck, size_t kck_len, in pmksa_cache_auth_add() argument 211 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len, in pmksa_cache_auth_add() 240 const u8 *kck, size_t kck_len, const u8 *aa, in pmksa_cache_auth_create_entry() argument 250 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_auth_create_entry() 261 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_auth_create_entry() 263 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_auth_create_entry()
|
D | pmksa_cache_auth.h | 51 const u8 *kck, size_t kck_len, 56 const u8 *kck, size_t kck_len, const u8 *aa,
|
D | wpa_auth.c | 1152 wpa_eapol_key_mic(sm->PTK.kck, sm->PTK.kck_len, in __wpa_send_eapol() 1234 if (wpa_eapol_key_mic(PTK->kck, PTK->kck_len, akmp, in wpa_verify_key_mic()
|
/hal_espressif-latest/components/wpa_supplicant/src/common/ |
D | wpa_common.h | 201 u8 kck[WPA_KCK_MAX_LEN]; /* EAPOL-Key Key Confirmation Key (KCK) */ member 333 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, 372 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, 375 static inline int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, in rsn_pmkid_suite_b() argument 383 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, 386 static inline int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, in rsn_pmkid_suite_b_192() argument
|
D | wpa_common.c | 26 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, in wpa_ft_mic() argument 78 if (omac1_aes_128(kck, buf, pos - buf, mic)) { in wpa_ft_mic() 825 os_memcpy(ptk->kck, tmp, ptk->kck_len); in wpa_pmk_r1_to_ptk() 829 wpa_hexdump_key(MSG_DEBUG, "FT: KCK", ptk->kck, ptk->kck_len); in wpa_pmk_r1_to_ptk() 1040 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, in rsn_pmkid_suite_b() argument 1052 if (hmac_sha256_vector(kck, kck_len, 3, addr, len, hash) < 0) in rsn_pmkid_suite_b() 1072 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, in rsn_pmkid_suite_b_192() argument 1084 if (hmac_sha384_vector(kck, kck_len, 3, addr, len, hash) < 0) in rsn_pmkid_suite_b_192() 1200 os_memcpy(ptk->kck, tmp, ptk->kck_len); in wpa_pmk_to_ptk() 1201 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len); in wpa_pmk_to_ptk()
|
D | sae.h | 45 u8 kck[SAE_MAX_HASH_LEN]; member
|
D | sae.c | 1570 os_memcpy(sae->tmp->kck, keys, hash_len); in sae_derive_keys() 1586 sae->tmp->kck, sae->tmp->kck_len); in sae_derive_keys() 2161 return hkdf_extract(SAE_KCK_LEN, sae->tmp->kck, sae->tmp->kck_len, in sae_cn_confirm()
|
/hal_espressif-latest/components/wpa_supplicant/src/rsn_supp/ |
D | pmksa_cache.h | 60 const u8 *pmkid, const u8 *kck, size_t kck_len, 108 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add() argument
|
D | pmksa_cache.c | 108 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add() argument 117 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_add() 128 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_add() 130 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_add()
|
D | wpa_ft.c | 155 const u8 *kck, size_t kck_len, in wpa_ft_gen_req_ies() argument 275 if (kck) { in wpa_ft_gen_req_ies() 295 if (kck) { in wpa_ft_gen_req_ies() 310 if (wpa_ft_mic(kck, kck_len, sm->own_addr, target_ap, 5, in wpa_ft_gen_req_ies() 529 sm->ptk.kck, sm->ptk.kck_len, bssid, in wpa_ft_process_response() 819 if (wpa_ft_mic(sm->ptk.kck, sm->ptk.kck_len, sm->own_addr, src_addr, 6,
|
D | wpa.c | 235 void wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, size_t kck_len, in wpa_eapol_key_send() argument 255 wpa_eapol_key_mic(kck, kck_len, sm->key_mgmt, ver, msg, msg_len, in wpa_eapol_key_send() 262 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", kck, kck_len); in wpa_eapol_key_send() 346 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, bssid, in wpa_sm_key_request() 639 wpa_eapol_key_send(sm, ptk->kck, ptk->kck_len, ver, dst, ETH_P_EAPOL, in wpa_supplicant_send_2_of_4() 1256 wpa_eapol_key_send(sm, ptk->kck, ptk->kck_len, ver, dst, ETH_P_EAPOL, in wpa_supplicant_send_4_of_4() 1454 sm->ptk.kck, sm->ptk.kck_len, in wpa_supplicant_send_4_of_4_txcallback() 1625 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, sm->bssid, ETH_P_EAPOL, in wpa_supplicant_send_2_of_2() 1707 wpa_eapol_key_mic(sm->tptk.kck, sm->tptk.kck_len, sm->key_mgmt, in wpa_supplicant_verify_eapol_key_mic() 1722 wpa_eapol_key_mic(sm->ptk.kck, sm->ptk.kck_len, sm->key_mgmt, in wpa_supplicant_verify_eapol_key_mic()
|