Searched refs:kdk_len (Results 1 – 12 of 12) sorted by relevance
/hostap-3.6.0/src/common/ |
D | wpa_common.c | 352 const u8 *z, size_t z_len, size_t kdk_len) in wpa_pmk_to_ptk() argument 400 if (kdk_len > WPA_KDK_MAX_LEN) { in wpa_pmk_to_ptk() 403 kdk_len); in wpa_pmk_to_ptk() 410 ptk->kdk_len = kdk_len; in wpa_pmk_to_ptk() 417 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len + ptk->kdk_len; in wpa_pmk_to_ptk() 501 if (kdk_len) { in wpa_pmk_to_ptk() 503 ptk->tk_len, ptk->kdk_len); in wpa_pmk_to_ptk() 504 wpa_hexdump_key(MSG_DEBUG, "WPA: KDK", ptk->kdk, ptk->kdk_len); in wpa_pmk_to_ptk() 595 u8 *fils_ft, size_t *fils_ft_len, size_t kdk_len) in fils_pmk_to_ptk() argument 646 if (kdk_len) { in fils_pmk_to_ptk() [all …]
|
D | wpa_common.h | 242 size_t kdk_len; member 392 const u8 *z, size_t z_len, size_t kdk_len); 402 u8 *fils_ft, size_t *fils_ft_len, size_t kdk_len); 434 size_t kdk_len); 645 size_t kdk_len);
|
D | common_module_tests.c | 671 if (ptk.kdk_len != sizeof(kdk) || in pasn_test_pasn_auth() 756 if (ptk.kdk_len != sizeof(kdk) || in pasn_test_no_pasn_auth()
|
D | ptksa_cache.c | 204 e->ptk.kdk_len); in ptksa_cache_list()
|
/hostap-3.6.0/src/rsn_supp/ |
D | wpa_ft.c | 43 size_t mpmk_len, kdk_len; in wpa_derive_ptk_ft() local 74 kdk_len = WPA_KDK_MAX_LEN; in wpa_derive_ptk_ft() 76 kdk_len = 0; in wpa_derive_ptk_ft() 81 kdk_len); in wpa_derive_ptk_ft() 549 size_t kck_len, kdk_len; in wpa_ft_process_response() local 677 kdk_len = WPA_KDK_MAX_LEN; in wpa_ft_process_response() 679 kdk_len = 0; in wpa_ft_process_response() 685 kdk_len) < 0) in wpa_ft_process_response()
|
D | wpa.c | 586 size_t z_len = 0, kdk_len; in wpa_derive_ptk() local 614 kdk_len = WPA_KDK_MAX_LEN; in wpa_derive_ptk() 616 kdk_len = 0; in wpa_derive_ptk() 622 kdk_len); in wpa_derive_ptk() 4178 size_t g_ap_len = 0, kdk_len; in fils_process_auth() local 4409 kdk_len = WPA_KDK_MAX_LEN; in fils_process_auth() 4411 kdk_len = 0; in fils_process_auth() 4420 kdk_len) < 0) { in fils_process_auth()
|
/hostap-3.6.0/wpa_supplicant/ |
D | pasn_supplicant.c | 1085 pasn->kdk_len = WPA_KDK_MAX_LEN; in wpas_pasn_start() 1087 pasn->kdk_len = 0; in wpas_pasn_start() 1088 wpa_printf(MSG_DEBUG, "PASN: kdk_len=%zu", pasn->kdk_len); in wpas_pasn_start() 1518 pasn->kdk_len); in wpas_pasn_auth_rx()
|
D | wpa_supplicant_i.h | 557 size_t kdk_len; member
|
/hostap-3.6.0/src/ap/ |
D | sta_info.h | 91 size_t kdk_len; member
|
D | wpa_auth.c | 2297 size_t z_len = 0, kdk_len; in wpa_derive_ptk() local 2303 kdk_len = WPA_KDK_MAX_LEN; in wpa_derive_ptk() 2305 kdk_len = 0; in wpa_derive_ptk() 2319 kdk_len); in wpa_derive_ptk() 2337 ptk, akmp, sm->pairwise, z, z_len, kdk_len); in wpa_derive_ptk() 2352 size_t fils_ft_len = 0, kdk_len; in fils_auth_pmk_to_ptk() local 2357 kdk_len = WPA_KDK_MAX_LEN; in fils_auth_pmk_to_ptk() 2359 kdk_len = 0; in fils_auth_pmk_to_ptk() 2365 fils_ft, &fils_ft_len, kdk_len); in fils_auth_pmk_to_ptk()
|
D | wpa_auth_ft.c | 3070 size_t pmk_r1_len, kdk_len; in wpa_ft_process_auth_req() local 3203 kdk_len = WPA_KDK_MAX_LEN; in wpa_ft_process_auth_req() 3205 kdk_len = 0; in wpa_ft_process_auth_req() 3210 pairwise, kdk_len) < 0) in wpa_ft_process_auth_req()
|
D | ieee802_11.c | 2659 sta->pasn->cipher, sta->pasn->kdk_len); in pasn_fils_auth_resp() 2896 sta->pasn->cipher, sta->pasn->kdk_len); in pasn_derive_keys() 3168 sta->pasn->kdk_len = WPA_KDK_MAX_LEN; in handle_auth_pasn_1() 3170 sta->pasn->kdk_len = 0; in handle_auth_pasn_1() 3171 wpa_printf(MSG_DEBUG, "PASN: kdk_len=%zu", sta->pasn->kdk_len); in handle_auth_pasn_1()
|