/hostap-latest/src/common/ |
D | common_module_tests.c | 307 const u8 kck[] = { in sae_tests() local 435 if (os_memcmp(kck, sae.tmp->kck, SAE_KCK_LEN) != 0) { in sae_tests() 631 const u8 kck[] = { in pasn_test_pasn_auth() local 659 if (ptk.kck_len != sizeof(kck) || in pasn_test_pasn_auth() 660 os_memcmp(kck, ptk.kck, sizeof(kck)) != 0) { in pasn_test_pasn_auth() 708 const u8 kck[] = { in pasn_test_no_pasn_auth() local 738 if (ptk.kck_len != sizeof(kck) || in pasn_test_no_pasn_auth() 739 os_memcmp(kck, ptk.kck, sizeof(kck)) != 0) { in pasn_test_no_pasn_auth()
|
D | wpa_common.h | 258 u8 kck[WPA_KCK_MAX_LEN]; /* EAPOL-Key Key Confirmation Key (KCK) */ member 487 int wpa_ft_mic(int key_mgmt, const u8 *kck, size_t kck_len, const u8 *sta_addr, 538 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, 541 static inline int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, in rsn_pmkid_suite_b() argument 548 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa, 551 static inline int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, in rsn_pmkid_suite_b_192() argument 777 int pasn_mic(const u8 *kck, int akmp, int cipher,
|
D | wpa_common.c | 567 os_memcpy(ptk->kck, tmp, ptk->kck_len); in wpa_pmk_to_ptk() 568 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len); in wpa_pmk_to_ptk() 894 int wpa_ft_mic(int key_mgmt, const u8 *kck, size_t kck_len, const u8 *sta_addr, in wpa_ft_mic() argument 996 if (hmac_sha512_vector(kck, kck_len, num_elem, addr, len, hash)) in wpa_ft_mic() 1006 if (hmac_sha384_vector(kck, kck_len, num_elem, addr, len, hash)) in wpa_ft_mic() 1015 if (hmac_sha256_vector(kck, kck_len, num_elem, addr, len, hash)) in wpa_ft_mic() 1021 omac1_aes_128_vector(kck, num_elem, addr, len, mic) == 0) in wpa_ft_mic() 1539 os_memcpy(ptk->kck, tmp, WPA_PASN_KCK_LEN); in pasn_pmk_to_ptk() 1540 wpa_hexdump_key(MSG_DEBUG, "PASN: KCK:", ptk->kck, WPA_PASN_KCK_LEN); in pasn_pmk_to_ptk() 1648 int pasn_mic(const u8 *kck, int akmp, int cipher, in pasn_mic() argument [all …]
|
D | sae.h | 42 u8 kck[SAE_MAX_HASH_LEN]; member
|
/hostap-latest/tests/hwsim/ |
D | test_ap_psk.py | 1472 kck = ptk[0:16] 1474 return (ptk, kck, kek) 1476 def eapol_key_mic(kck, msg): argument 1479 m = hmac.new(kck, data, hashlib.sha1) 1510 def reply_eapol(info, hapd, addr, msg, key_info, nonce, data, kck): argument 1513 eapol_key_mic(kck, msg) 1556 (ptk, kck, kek) = pmk_to_ptk(pmk, addr, bssid, snonce, anonce) 1563 reply_eapol("2/4", hapd, addr, msg, 0x010a, snonce, rsne, kck) 1571 reply_eapol("4/4", hapd, addr, msg, 0x030a, None, None, kck) 1587 (ptk, kck, kek) = pmk_to_ptk(pmk, addr, bssid, snonce, anonce) [all …]
|
D | test_ocv.py | 44 def build_eapol_key_1_2(kck, key_data, replay_counter=3, key_info=0x1382, argument 61 eapol_key_mic(kck, msg) 64 def build_eapol_key_2_2(kck, key_data, replay_counter=3, key_info=0x0302, argument 66 return build_eapol_key_1_2(kck, key_data, replay_counter, key_info, 356 self.kck = None 405 (ptk, self.kck, self.kek) = pmk_to_ptk(pmk, self.addr, self.bssid, 417 self.rsne + ocikde, self.kck) 428 self.rsne + ocikde, self.kck) 434 self.kck) 674 msg = build_eapol_key_2_2(conn.kck, ocikde, replay_counter=3) [all …]
|
D | test_erp.py | 414 kck = ptk[0:16] 432 if kck not in buf: 451 verify_not_present(buf, kck, fname, "KCK") 487 kck = ptk[0:16] 502 verify_not_present(buf, kck, fname, "KCK") 522 verify_not_present(buf, kck, fname, "KCK")
|
D | test_wpas_ap.py | 1127 kck = ptk[0:16] 1135 if kck not in buf: 1149 verify_not_present(buf2, kck, fname, "KCK") 1158 verify_not_present(buf3, kck, fname, "KCK")
|
/hostap-latest/src/ap/ |
D | pmksa_cache_auth.c | 284 const u8 *kck, size_t kck_len, in pmksa_cache_auth_add() argument 290 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len, in pmksa_cache_auth_add() 319 const u8 *kck, size_t kck_len, const u8 *aa, in pmksa_cache_auth_create_entry() argument 329 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_auth_create_entry() 337 if (kck && kck_len && kck_len < WPA_KCK_MAX_LEN) { in pmksa_cache_auth_create_entry() 338 os_memcpy(entry->kck, kck, kck_len); in pmksa_cache_auth_create_entry() 344 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_auth_create_entry() 346 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_auth_create_entry() 534 rsn_pmkid_suite_b_192(entry->kck, entry->kck_len, in pmksa_cache_get_okc() 538 rsn_pmkid_suite_b(entry->kck, entry->kck_len, aa, spa, in pmksa_cache_get_okc()
|
D | pmksa_cache_auth.h | 22 u8 kck[WPA_KCK_MAX_LEN]; member 57 const u8 *kck, size_t kck_len, 62 const u8 *kck, size_t kck_len, const u8 *aa,
|
D | wpa_auth_ft.c | 2574 const u8 *kck; in wpa_sm_write_assoc_resp_ies() local 2844 kck = sm->PTK.kck2; in wpa_sm_write_assoc_resp_ies() 2847 kck = sm->PTK.kck; in wpa_sm_write_assoc_resp_ies() 2851 wpa_ft_mic(sm->wpa_key_mgmt, kck, kck_len, in wpa_sm_write_assoc_resp_ies() 3497 const u8 *kck; in wpa_ft_validate_reassoc() local 3641 kck = sm->PTK.kck2; in wpa_ft_validate_reassoc() 3644 kck = sm->PTK.kck; in wpa_ft_validate_reassoc() 3647 if (wpa_ft_mic(sm->wpa_key_mgmt, kck, kck_len, in wpa_ft_validate_reassoc()
|
/hostap-latest/wlantest/ |
D | rx_eapol.c | 57 static int check_mic(struct wlantest_sta *sta, const u8 *kck, size_t kck_len, in check_mic() argument 76 if (wpa_eapol_key_mic(kck, kck_len, sta->key_mgmt, ver, buf, len, in check_mic() 237 check_mic(sta, ptk.kck, ptk.kck_len, ver, data, len) < 0) in try_pmk() 244 check_mic(sta, ptk.kck, ptk.kck_len, ver, data, len) < 0) { in try_pmk() 267 sta->tptk.kck, sta->tptk.kck_len); in try_pmk() 307 if (check_mic(sta, ptk->ptk.kck, ptk->ptk.kck_len, in derive_ptk() 318 sta->ptk.kck, sta->ptk.kck_len); in derive_ptk() 361 const u8 *key_data, *kck, *mic; in rx_data_eapol_key_2_of_4() local 456 kck = sta->ptk.kck; in rx_data_eapol_key_2_of_4() 461 kck = sta->tptk.kck; in rx_data_eapol_key_2_of_4() [all …]
|
D | rx_tdls.c | 126 tdls->tpk.kck, sizeof(tdls->tpk.kck)); in tdls_derive_tpk() 182 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", tdls->tpk.kck, 16); in tdls_verify_mic() 183 ret = omac1_aes_128(tdls->tpk.kck, buf, pos - buf, mic); in tdls_verify_mic() 521 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", tdls->tpk.kck, 16); in tdls_verify_mic_teardown() 522 ret = omac1_aes_128(tdls->tpk.kck, buf, pos - buf, mic); in tdls_verify_mic_teardown()
|
D | rx_mgmt.c | 1572 const u8 *kck; in rx_mgmt_reassoc_req() local 1705 kck = sta->ptk.kck2; in rx_mgmt_reassoc_req() 1708 kck = sta->ptk.kck; in rx_mgmt_reassoc_req() 1726 if (wpa_ft_mic(sta->key_mgmt, kck, kck_len, in rx_mgmt_reassoc_req() 2189 const u8 *kck, *kek; in rx_mgmt_reassoc_resp() local 2408 kck = sta->ptk.kck2; in rx_mgmt_reassoc_resp() 2413 kck = sta->ptk.kck; in rx_mgmt_reassoc_resp() 2421 if (wpa_ft_mic(sta->key_mgmt, kck, kck_len, in rx_mgmt_reassoc_resp()
|
D | sta.c | 326 wpa_hexdump(MSG_DEBUG, "PTK:KCK", sta->ptk.kck, sta->ptk.kck_len); in sta_new_ptk()
|
D | wlantest.c | 243 os_memcpy(p->ptk.kck, ptk, 16); in add_ptk_file()
|
D | wlantest.h | 133 u8 kck[16]; member
|
/hostap-latest/src/rsn_supp/ |
D | wpa_ft.c | 208 const u8 *kck, size_t kck_len, in wpa_ft_gen_req_ies() argument 396 if (kck) { in wpa_ft_gen_req_ies() 409 if (kck && wpa_sm_ocv_enabled(sm)) { in wpa_ft_gen_req_ies() 455 if (kck) { in wpa_ft_gen_req_ies() 472 if (wpa_ft_mic(sm->key_mgmt, kck, kck_len, in wpa_ft_gen_req_ies() 595 const u8 *kck; in wpa_ft_process_response() local 734 kck = sm->ptk.kck2; in wpa_ft_process_response() 737 kck = sm->ptk.kck; in wpa_ft_process_response() 742 kck, kck_len, bssid, in wpa_ft_process_response() 1031 const u8 *kck; in wpa_ft_validate_reassoc_resp() local [all …]
|
D | pmksa_cache.c | 233 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add() argument 248 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_add() 257 os_memcpy(entry->kck, kck, kck_len); in pmksa_cache_add() 262 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_add() 264 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_add() 517 pmkid, old_entry->kck, old_entry->kck_len, in pmksa_cache_clone_entry() 913 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add() argument
|
D | pmksa_cache.h | 20 u8 kck[WPA_KCK_MAX_LEN]; member 85 const u8 *pmkid, const u8 *kck, size_t kck_len,
|
D | tdls.c | 112 u8 kck[16]; /* TPK-KCK */ member 473 peer->tpk.kck, sizeof(peer->tpk.kck)); in wpa_tdls_generate_tpk() 493 static int wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid, in wpa_tdls_ftie_mic() argument 536 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16); in wpa_tdls_ftie_mic() 537 ret = omac1_aes_128(kck, buf, pos - buf, mic); in wpa_tdls_ftie_mic() 557 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, in wpa_tdls_key_mic_teardown() argument 596 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16); in wpa_tdls_key_mic_teardown() 597 ret = omac1_aes_128(kck, buf, pos - buf, mic); in wpa_tdls_key_mic_teardown() 613 wpa_tdls_ftie_mic(peer->tpk.kck, trans_seq, lnkid, in wpa_supplicant_verify_tdls_mic() 641 wpa_tdls_key_mic_teardown(peer->tpk.kck, trans_seq, rcode, in wpa_supplicant_verify_tdls_mic_teardown() [all …]
|
/hostap-latest/tests/fuzzing/pasn-resp/ |
D | pasn-resp.c | 28 const u8 *kck, size_t kck_len, in pmksa_cache_auth_add() argument
|
/hostap-latest/src/pasn/ |
D | pasn_initiator.c | 668 ret = pasn_mic(pasn->ptk.kck, pasn->akmp, pasn->cipher, in wpas_pasn_build_auth_3() 1270 ret = pasn_mic(pasn->ptk.kck, pasn->akmp, pasn->cipher, in wpa_pasn_auth_rx() 1305 ret = pasn_mic(pasn->ptk.kck, pasn->akmp, pasn->cipher, in wpa_pasn_auth_rx()
|
D | pasn_responder.c | 558 ret = pasn_mic(pasn->ptk.kck, pasn->akmp, pasn->cipher, in handle_auth_pasn_resp() 976 ret = pasn_mic(pasn->ptk.kck, pasn->akmp, pasn->cipher, in handle_auth_pasn_3()
|
/hostap-latest/wpa_supplicant/ |
D | driver_i.h | 616 const u8 *kck, size_t kck_len, in wpa_drv_set_rekey_info() argument 622 kck, kck_len, replay_ctr); in wpa_drv_set_rekey_info()
|