Home
last modified time | relevance | path

Searched refs:kck_len (Results 1 – 11 of 11) sorted by relevance

/hal_espressif-latest/components/wpa_supplicant/src/common/
Dwpa_common.c26 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, in wpa_ft_mic() argument
36 if (kck_len != 16) { in wpa_ft_mic()
38 (unsigned int) kck_len); in wpa_ft_mic()
798 ptk->kck_len = wpa_kck_len(akmp, PMK_LEN); in wpa_pmk_r1_to_ptk()
801 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len; in wpa_pmk_r1_to_ptk()
825 os_memcpy(ptk->kck, tmp, ptk->kck_len); in wpa_pmk_r1_to_ptk()
826 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); in wpa_pmk_r1_to_ptk()
827 os_memcpy(ptk->tk, tmp + ptk->kck_len + ptk->kek_len, ptk->tk_len); in wpa_pmk_r1_to_ptk()
829 wpa_hexdump_key(MSG_DEBUG, "FT: KCK", ptk->kck, ptk->kck_len); in wpa_pmk_r1_to_ptk()
1040 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, in rsn_pmkid_suite_b() argument
[all …]
Dwpa_common.h204 size_t kck_len; member
333 int wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr,
372 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa,
375 static inline int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, in rsn_pmkid_suite_b() argument
383 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa,
386 static inline int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, in rsn_pmkid_suite_b_192() argument
Dsae.h46 size_t kck_len; member
Dsae.c1571 sae->tmp->kck_len = hash_len; in sae_derive_keys()
1586 sae->tmp->kck, sae->tmp->kck_len); in sae_derive_keys()
2161 return hkdf_extract(SAE_KCK_LEN, sae->tmp->kck, sae->tmp->kck_len, in sae_cn_confirm()
2229 hash_len = sae->tmp->kck_len; in sae_write_confirm()
2267 hash_len = sae->tmp->kck_len; in sae_check_confirm()
/hal_espressif-latest/components/wpa_supplicant/src/ap/
Dpmksa_cache_auth.h51 const u8 *kck, size_t kck_len,
56 const u8 *kck, size_t kck_len, const u8 *aa,
Dpmksa_cache_auth.c205 const u8 *kck, size_t kck_len, in pmksa_cache_auth_add() argument
211 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len, in pmksa_cache_auth_add()
240 const u8 *kck, size_t kck_len, const u8 *aa, in pmksa_cache_auth_create_entry() argument
261 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_auth_create_entry()
263 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_auth_create_entry()
Dwpa_auth.c1152 wpa_eapol_key_mic(sm->PTK.kck, sm->PTK.kck_len, in __wpa_send_eapol()
1234 if (wpa_eapol_key_mic(PTK->kck, PTK->kck_len, akmp, in wpa_verify_key_mic()
/hal_espressif-latest/components/wpa_supplicant/src/rsn_supp/
Dpmksa_cache.h60 const u8 *pmkid, const u8 *kck, size_t kck_len,
108 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add() argument
Dpmksa_cache.c108 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add() argument
128 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_add()
130 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_add()
Dwpa_ft.c155 const u8 *kck, size_t kck_len, in wpa_ft_gen_req_ies() argument
310 if (wpa_ft_mic(kck, kck_len, sm->own_addr, target_ap, 5, in wpa_ft_gen_req_ies()
529 sm->ptk.kck, sm->ptk.kck_len, bssid, in wpa_ft_process_response()
819 if (wpa_ft_mic(sm->ptk.kck, sm->ptk.kck_len, sm->own_addr, src_addr, 6,
Dwpa.c235 void wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, size_t kck_len, in wpa_eapol_key_send() argument
255 wpa_eapol_key_mic(kck, kck_len, sm->key_mgmt, ver, msg, msg_len, in wpa_eapol_key_send()
262 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", kck, kck_len); in wpa_eapol_key_send()
346 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, bssid, in wpa_sm_key_request()
639 wpa_eapol_key_send(sm, ptk->kck, ptk->kck_len, ver, dst, ETH_P_EAPOL, in wpa_supplicant_send_2_of_4()
1256 wpa_eapol_key_send(sm, ptk->kck, ptk->kck_len, ver, dst, ETH_P_EAPOL, in wpa_supplicant_send_4_of_4()
1454 sm->ptk.kck, sm->ptk.kck_len, in wpa_supplicant_send_4_of_4_txcallback()
1625 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, sm->bssid, ETH_P_EAPOL, in wpa_supplicant_send_2_of_2()
1707 wpa_eapol_key_mic(sm->tptk.kck, sm->tptk.kck_len, sm->key_mgmt, in wpa_supplicant_verify_eapol_key_mic()
1722 wpa_eapol_key_mic(sm->ptk.kck, sm->ptk.kck_len, sm->key_mgmt, in wpa_supplicant_verify_eapol_key_mic()