/hostap-latest/src/common/ |
D | wpa_common.c | 397 const u8 *z, size_t z_len, size_t kdk_len) in wpa_pmk_to_ptk() argument 445 if (kdk_len > WPA_KDK_MAX_LEN) { in wpa_pmk_to_ptk() 448 kdk_len); in wpa_pmk_to_ptk() 455 ptk->kdk_len = kdk_len; in wpa_pmk_to_ptk() 462 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len + ptk->kdk_len; in wpa_pmk_to_ptk() 576 if (kdk_len) { in wpa_pmk_to_ptk() 578 ptk->tk_len, ptk->kdk_len); in wpa_pmk_to_ptk() 579 wpa_hexdump_key(MSG_DEBUG, "WPA: KDK", ptk->kdk, ptk->kdk_len); in wpa_pmk_to_ptk() 670 u8 *fils_ft, size_t *fils_ft_len, size_t kdk_len) in fils_pmk_to_ptk() argument 721 if (kdk_len) { in fils_pmk_to_ptk() [all …]
|
D | wpa_common.h | 270 size_t kdk_len; member 468 const u8 *z, size_t z_len, size_t kdk_len); 478 u8 *fils_ft, size_t *fils_ft_len, size_t kdk_len); 512 size_t kdk_len); 773 size_t kdk_len);
|
D | common_module_tests.c | 671 if (ptk.kdk_len != sizeof(kdk) || in pasn_test_pasn_auth() 756 if (ptk.kdk_len != sizeof(kdk) || in pasn_test_no_pasn_auth()
|
D | ptksa_cache.c | 209 e->ptk.kdk_len); in ptksa_cache_list()
|
/hostap-latest/src/pasn/ |
D | pasn_common.c | 58 pasn->kdk_len = WPA_KDK_MAX_LEN; in pasn_enable_kdk_derivation() 67 pasn->kdk_len = 0; in pasn_disable_kdk_derivation()
|
D | pasn_responder.c | 352 pasn->cipher, pasn->kdk_len); in pasn_derive_keys() 666 pasn->kdk_len = WPA_KDK_MAX_LEN; in handle_auth_pasn_1() 668 pasn->kdk_len = 0; in handle_auth_pasn_1() 670 wpa_printf(MSG_DEBUG, "PASN: kdk_len=%zu", pasn->kdk_len); in handle_auth_pasn_1()
|
D | pasn_common.h | 45 size_t kdk_len; member
|
D | pasn_initiator.c | 1236 pasn->kdk_len); in wpa_pasn_auth_rx()
|
/hostap-latest/src/rsn_supp/ |
D | wpa_ft.c | 44 size_t mpmk_len, kdk_len; in wpa_derive_ptk_ft() local 79 kdk_len = WPA_KDK_MAX_LEN; in wpa_derive_ptk_ft() 81 kdk_len = 0; in wpa_derive_ptk_ft() 86 sm->pairwise_cipher, kdk_len); in wpa_derive_ptk_ft() 596 size_t kck_len, kdk_len; in wpa_ft_process_response() local 706 kdk_len = WPA_KDK_MAX_LEN; in wpa_ft_process_response() 708 kdk_len = 0; in wpa_ft_process_response() 715 kdk_len) < 0) in wpa_ft_process_response()
|
D | wpa.c | 721 size_t z_len = 0, kdk_len; in wpa_derive_ptk() local 749 kdk_len = WPA_KDK_MAX_LEN; in wpa_derive_ptk() 751 kdk_len = 0; in wpa_derive_ptk() 757 kdk_len); in wpa_derive_ptk() 5938 size_t g_ap_len = 0, kdk_len; in fils_process_auth() local 6172 kdk_len = WPA_KDK_MAX_LEN; in fils_process_auth() 6174 kdk_len = 0; in fils_process_auth() 6184 kdk_len) < 0) { in fils_process_auth()
|
/hostap-latest/wlantest/ |
D | rx_eapol.c | 185 size_t kdk_len; in try_pmk() local 207 kdk_len = WPA_KDK_MAX_LEN; in try_pmk() 209 kdk_len = 0; in try_pmk() 236 sta->pairwise_cipher, kdk_len) < 0 || in try_pmk() 243 sta->pairwise_cipher, NULL, 0, kdk_len) < 0 || in try_pmk()
|
/hostap-latest/src/ap/ |
D | wpa_auth_i.h | 341 size_t *key_len, size_t kdk_len);
|
D | wpa_auth.c | 2868 size_t z_len = 0, kdk_len; local 2875 kdk_len = WPA_KDK_MAX_LEN; 2877 kdk_len = 0; 2890 sm->pairwise, kdk_len); 2894 kdk_len); 2930 sm->pairwise, z, z_len, kdk_len); 2962 size_t fils_ft_len = 0, kdk_len; local 2967 kdk_len = WPA_KDK_MAX_LEN; 2969 kdk_len = 0; 2976 fils_ft, &fils_ft_len, kdk_len);
|
D | wpa_auth_ft.c | 2117 size_t *key_len, size_t kdk_len) in wpa_auth_derive_ptk_ft() argument 2164 kdk_len); in wpa_auth_derive_ptk_ft() 3184 size_t pmk_r1_len, kdk_len, len; in wpa_ft_process_auth_req() local 3368 kdk_len = WPA_KDK_MAX_LEN; in wpa_ft_process_auth_req() 3370 kdk_len = 0; in wpa_ft_process_auth_req() 3375 pairwise, kdk_len) < 0) in wpa_ft_process_auth_req()
|
D | ieee802_11.c | 2465 pasn_get_cipher(sta->pasn), sta->pasn->kdk_len); in pasn_fils_auth_resp()
|
/hostap-latest/wpa_supplicant/ |
D | pasn_supplicant.c | 567 wpa_printf(MSG_DEBUG, "PASN: kdk_len=%zu", pasn->kdk_len); in wpas_pasn_auth_start_cb()
|