Home
last modified time | relevance | path

Searched refs:kck (Results 1 – 25 of 36) sorted by relevance

12

/hostap-latest/src/common/
Dcommon_module_tests.c307 const u8 kck[] = { in sae_tests() local
435 if (os_memcmp(kck, sae.tmp->kck, SAE_KCK_LEN) != 0) { in sae_tests()
631 const u8 kck[] = { in pasn_test_pasn_auth() local
659 if (ptk.kck_len != sizeof(kck) || in pasn_test_pasn_auth()
660 os_memcmp(kck, ptk.kck, sizeof(kck)) != 0) { in pasn_test_pasn_auth()
708 const u8 kck[] = { in pasn_test_no_pasn_auth() local
738 if (ptk.kck_len != sizeof(kck) || in pasn_test_no_pasn_auth()
739 os_memcmp(kck, ptk.kck, sizeof(kck)) != 0) { in pasn_test_no_pasn_auth()
Dwpa_common.h258 u8 kck[WPA_KCK_MAX_LEN]; /* EAPOL-Key Key Confirmation Key (KCK) */ member
487 int wpa_ft_mic(int key_mgmt, const u8 *kck, size_t kck_len, const u8 *sta_addr,
538 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa,
541 static inline int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa, in rsn_pmkid_suite_b() argument
548 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa,
551 static inline int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, in rsn_pmkid_suite_b_192() argument
777 int pasn_mic(const u8 *kck, int akmp, int cipher,
Dwpa_common.c567 os_memcpy(ptk->kck, tmp, ptk->kck_len); in wpa_pmk_to_ptk()
568 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len); in wpa_pmk_to_ptk()
894 int wpa_ft_mic(int key_mgmt, const u8 *kck, size_t kck_len, const u8 *sta_addr, in wpa_ft_mic() argument
996 if (hmac_sha512_vector(kck, kck_len, num_elem, addr, len, hash)) in wpa_ft_mic()
1006 if (hmac_sha384_vector(kck, kck_len, num_elem, addr, len, hash)) in wpa_ft_mic()
1015 if (hmac_sha256_vector(kck, kck_len, num_elem, addr, len, hash)) in wpa_ft_mic()
1021 omac1_aes_128_vector(kck, num_elem, addr, len, mic) == 0) in wpa_ft_mic()
1539 os_memcpy(ptk->kck, tmp, WPA_PASN_KCK_LEN); in pasn_pmk_to_ptk()
1540 wpa_hexdump_key(MSG_DEBUG, "PASN: KCK:", ptk->kck, WPA_PASN_KCK_LEN); in pasn_pmk_to_ptk()
1648 int pasn_mic(const u8 *kck, int akmp, int cipher, in pasn_mic() argument
[all …]
Dsae.h42 u8 kck[SAE_MAX_HASH_LEN]; member
/hostap-latest/tests/hwsim/
Dtest_ap_psk.py1472 kck = ptk[0:16]
1474 return (ptk, kck, kek)
1476 def eapol_key_mic(kck, msg): argument
1479 m = hmac.new(kck, data, hashlib.sha1)
1510 def reply_eapol(info, hapd, addr, msg, key_info, nonce, data, kck): argument
1513 eapol_key_mic(kck, msg)
1556 (ptk, kck, kek) = pmk_to_ptk(pmk, addr, bssid, snonce, anonce)
1563 reply_eapol("2/4", hapd, addr, msg, 0x010a, snonce, rsne, kck)
1571 reply_eapol("4/4", hapd, addr, msg, 0x030a, None, None, kck)
1587 (ptk, kck, kek) = pmk_to_ptk(pmk, addr, bssid, snonce, anonce)
[all …]
Dtest_ocv.py44 def build_eapol_key_1_2(kck, key_data, replay_counter=3, key_info=0x1382, argument
61 eapol_key_mic(kck, msg)
64 def build_eapol_key_2_2(kck, key_data, replay_counter=3, key_info=0x0302, argument
66 return build_eapol_key_1_2(kck, key_data, replay_counter, key_info,
356 self.kck = None
405 (ptk, self.kck, self.kek) = pmk_to_ptk(pmk, self.addr, self.bssid,
417 self.rsne + ocikde, self.kck)
428 self.rsne + ocikde, self.kck)
434 self.kck)
674 msg = build_eapol_key_2_2(conn.kck, ocikde, replay_counter=3)
[all …]
Dtest_erp.py414 kck = ptk[0:16]
432 if kck not in buf:
451 verify_not_present(buf, kck, fname, "KCK")
487 kck = ptk[0:16]
502 verify_not_present(buf, kck, fname, "KCK")
522 verify_not_present(buf, kck, fname, "KCK")
Dtest_wpas_ap.py1127 kck = ptk[0:16]
1135 if kck not in buf:
1149 verify_not_present(buf2, kck, fname, "KCK")
1158 verify_not_present(buf3, kck, fname, "KCK")
/hostap-latest/src/ap/
Dpmksa_cache_auth.c284 const u8 *kck, size_t kck_len, in pmksa_cache_auth_add() argument
290 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len, in pmksa_cache_auth_add()
319 const u8 *kck, size_t kck_len, const u8 *aa, in pmksa_cache_auth_create_entry() argument
329 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_auth_create_entry()
337 if (kck && kck_len && kck_len < WPA_KCK_MAX_LEN) { in pmksa_cache_auth_create_entry()
338 os_memcpy(entry->kck, kck, kck_len); in pmksa_cache_auth_create_entry()
344 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_auth_create_entry()
346 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_auth_create_entry()
534 rsn_pmkid_suite_b_192(entry->kck, entry->kck_len, in pmksa_cache_get_okc()
538 rsn_pmkid_suite_b(entry->kck, entry->kck_len, aa, spa, in pmksa_cache_get_okc()
Dpmksa_cache_auth.h22 u8 kck[WPA_KCK_MAX_LEN]; member
57 const u8 *kck, size_t kck_len,
62 const u8 *kck, size_t kck_len, const u8 *aa,
Dwpa_auth_ft.c2574 const u8 *kck; in wpa_sm_write_assoc_resp_ies() local
2844 kck = sm->PTK.kck2; in wpa_sm_write_assoc_resp_ies()
2847 kck = sm->PTK.kck; in wpa_sm_write_assoc_resp_ies()
2851 wpa_ft_mic(sm->wpa_key_mgmt, kck, kck_len, in wpa_sm_write_assoc_resp_ies()
3497 const u8 *kck; in wpa_ft_validate_reassoc() local
3641 kck = sm->PTK.kck2; in wpa_ft_validate_reassoc()
3644 kck = sm->PTK.kck; in wpa_ft_validate_reassoc()
3647 if (wpa_ft_mic(sm->wpa_key_mgmt, kck, kck_len, in wpa_ft_validate_reassoc()
/hostap-latest/wlantest/
Drx_eapol.c57 static int check_mic(struct wlantest_sta *sta, const u8 *kck, size_t kck_len, in check_mic() argument
76 if (wpa_eapol_key_mic(kck, kck_len, sta->key_mgmt, ver, buf, len, in check_mic()
237 check_mic(sta, ptk.kck, ptk.kck_len, ver, data, len) < 0) in try_pmk()
244 check_mic(sta, ptk.kck, ptk.kck_len, ver, data, len) < 0) { in try_pmk()
267 sta->tptk.kck, sta->tptk.kck_len); in try_pmk()
307 if (check_mic(sta, ptk->ptk.kck, ptk->ptk.kck_len, in derive_ptk()
318 sta->ptk.kck, sta->ptk.kck_len); in derive_ptk()
361 const u8 *key_data, *kck, *mic; in rx_data_eapol_key_2_of_4() local
456 kck = sta->ptk.kck; in rx_data_eapol_key_2_of_4()
461 kck = sta->tptk.kck; in rx_data_eapol_key_2_of_4()
[all …]
Drx_tdls.c126 tdls->tpk.kck, sizeof(tdls->tpk.kck)); in tdls_derive_tpk()
182 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", tdls->tpk.kck, 16); in tdls_verify_mic()
183 ret = omac1_aes_128(tdls->tpk.kck, buf, pos - buf, mic); in tdls_verify_mic()
521 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", tdls->tpk.kck, 16); in tdls_verify_mic_teardown()
522 ret = omac1_aes_128(tdls->tpk.kck, buf, pos - buf, mic); in tdls_verify_mic_teardown()
Drx_mgmt.c1572 const u8 *kck; in rx_mgmt_reassoc_req() local
1705 kck = sta->ptk.kck2; in rx_mgmt_reassoc_req()
1708 kck = sta->ptk.kck; in rx_mgmt_reassoc_req()
1726 if (wpa_ft_mic(sta->key_mgmt, kck, kck_len, in rx_mgmt_reassoc_req()
2189 const u8 *kck, *kek; in rx_mgmt_reassoc_resp() local
2408 kck = sta->ptk.kck2; in rx_mgmt_reassoc_resp()
2413 kck = sta->ptk.kck; in rx_mgmt_reassoc_resp()
2421 if (wpa_ft_mic(sta->key_mgmt, kck, kck_len, in rx_mgmt_reassoc_resp()
Dsta.c326 wpa_hexdump(MSG_DEBUG, "PTK:KCK", sta->ptk.kck, sta->ptk.kck_len); in sta_new_ptk()
Dwlantest.c243 os_memcpy(p->ptk.kck, ptk, 16); in add_ptk_file()
Dwlantest.h133 u8 kck[16]; member
/hostap-latest/src/rsn_supp/
Dwpa_ft.c208 const u8 *kck, size_t kck_len, in wpa_ft_gen_req_ies() argument
396 if (kck) { in wpa_ft_gen_req_ies()
409 if (kck && wpa_sm_ocv_enabled(sm)) { in wpa_ft_gen_req_ies()
455 if (kck) { in wpa_ft_gen_req_ies()
472 if (wpa_ft_mic(sm->key_mgmt, kck, kck_len, in wpa_ft_gen_req_ies()
595 const u8 *kck; in wpa_ft_process_response() local
734 kck = sm->ptk.kck2; in wpa_ft_process_response()
737 kck = sm->ptk.kck; in wpa_ft_process_response()
742 kck, kck_len, bssid, in wpa_ft_process_response()
1031 const u8 *kck; in wpa_ft_validate_reassoc_resp() local
[all …]
Dpmksa_cache.c233 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add() argument
248 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_add()
257 os_memcpy(entry->kck, kck, kck_len); in pmksa_cache_add()
262 rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_add()
264 rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid); in pmksa_cache_add()
517 pmkid, old_entry->kck, old_entry->kck_len, in pmksa_cache_clone_entry()
913 const u8 *pmkid, const u8 *kck, size_t kck_len, in pmksa_cache_add() argument
Dpmksa_cache.h20 u8 kck[WPA_KCK_MAX_LEN]; member
85 const u8 *pmkid, const u8 *kck, size_t kck_len,
Dtdls.c112 u8 kck[16]; /* TPK-KCK */ member
473 peer->tpk.kck, sizeof(peer->tpk.kck)); in wpa_tdls_generate_tpk()
493 static int wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid, in wpa_tdls_ftie_mic() argument
536 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16); in wpa_tdls_ftie_mic()
537 ret = omac1_aes_128(kck, buf, pos - buf, mic); in wpa_tdls_ftie_mic()
557 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, in wpa_tdls_key_mic_teardown() argument
596 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16); in wpa_tdls_key_mic_teardown()
597 ret = omac1_aes_128(kck, buf, pos - buf, mic); in wpa_tdls_key_mic_teardown()
613 wpa_tdls_ftie_mic(peer->tpk.kck, trans_seq, lnkid, in wpa_supplicant_verify_tdls_mic()
641 wpa_tdls_key_mic_teardown(peer->tpk.kck, trans_seq, rcode, in wpa_supplicant_verify_tdls_mic_teardown()
[all …]
/hostap-latest/tests/fuzzing/pasn-resp/
Dpasn-resp.c28 const u8 *kck, size_t kck_len, in pmksa_cache_auth_add() argument
/hostap-latest/src/pasn/
Dpasn_initiator.c668 ret = pasn_mic(pasn->ptk.kck, pasn->akmp, pasn->cipher, in wpas_pasn_build_auth_3()
1270 ret = pasn_mic(pasn->ptk.kck, pasn->akmp, pasn->cipher, in wpa_pasn_auth_rx()
1305 ret = pasn_mic(pasn->ptk.kck, pasn->akmp, pasn->cipher, in wpa_pasn_auth_rx()
Dpasn_responder.c558 ret = pasn_mic(pasn->ptk.kck, pasn->akmp, pasn->cipher, in handle_auth_pasn_resp()
976 ret = pasn_mic(pasn->ptk.kck, pasn->akmp, pasn->cipher, in handle_auth_pasn_3()
/hostap-latest/wpa_supplicant/
Ddriver_i.h616 const u8 *kck, size_t kck_len, in wpa_drv_set_rekey_info() argument
622 kck, kck_len, replay_ctr); in wpa_drv_set_rekey_info()

12