Home
last modified time | relevance | path

Searched refs:kdk_len (Results 1 – 16 of 16) sorted by relevance

/hostap-latest/src/common/
Dwpa_common.c397 const u8 *z, size_t z_len, size_t kdk_len) in wpa_pmk_to_ptk() argument
445 if (kdk_len > WPA_KDK_MAX_LEN) { in wpa_pmk_to_ptk()
448 kdk_len); in wpa_pmk_to_ptk()
455 ptk->kdk_len = kdk_len; in wpa_pmk_to_ptk()
462 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len + ptk->kdk_len; in wpa_pmk_to_ptk()
576 if (kdk_len) { in wpa_pmk_to_ptk()
578 ptk->tk_len, ptk->kdk_len); in wpa_pmk_to_ptk()
579 wpa_hexdump_key(MSG_DEBUG, "WPA: KDK", ptk->kdk, ptk->kdk_len); in wpa_pmk_to_ptk()
670 u8 *fils_ft, size_t *fils_ft_len, size_t kdk_len) in fils_pmk_to_ptk() argument
721 if (kdk_len) { in fils_pmk_to_ptk()
[all …]
Dwpa_common.h270 size_t kdk_len; member
468 const u8 *z, size_t z_len, size_t kdk_len);
478 u8 *fils_ft, size_t *fils_ft_len, size_t kdk_len);
512 size_t kdk_len);
773 size_t kdk_len);
Dcommon_module_tests.c671 if (ptk.kdk_len != sizeof(kdk) || in pasn_test_pasn_auth()
756 if (ptk.kdk_len != sizeof(kdk) || in pasn_test_no_pasn_auth()
Dptksa_cache.c209 e->ptk.kdk_len); in ptksa_cache_list()
/hostap-latest/src/pasn/
Dpasn_common.c58 pasn->kdk_len = WPA_KDK_MAX_LEN; in pasn_enable_kdk_derivation()
67 pasn->kdk_len = 0; in pasn_disable_kdk_derivation()
Dpasn_responder.c352 pasn->cipher, pasn->kdk_len); in pasn_derive_keys()
666 pasn->kdk_len = WPA_KDK_MAX_LEN; in handle_auth_pasn_1()
668 pasn->kdk_len = 0; in handle_auth_pasn_1()
670 wpa_printf(MSG_DEBUG, "PASN: kdk_len=%zu", pasn->kdk_len); in handle_auth_pasn_1()
Dpasn_common.h45 size_t kdk_len; member
Dpasn_initiator.c1236 pasn->kdk_len); in wpa_pasn_auth_rx()
/hostap-latest/src/rsn_supp/
Dwpa_ft.c44 size_t mpmk_len, kdk_len; in wpa_derive_ptk_ft() local
79 kdk_len = WPA_KDK_MAX_LEN; in wpa_derive_ptk_ft()
81 kdk_len = 0; in wpa_derive_ptk_ft()
86 sm->pairwise_cipher, kdk_len); in wpa_derive_ptk_ft()
596 size_t kck_len, kdk_len; in wpa_ft_process_response() local
706 kdk_len = WPA_KDK_MAX_LEN; in wpa_ft_process_response()
708 kdk_len = 0; in wpa_ft_process_response()
715 kdk_len) < 0) in wpa_ft_process_response()
Dwpa.c721 size_t z_len = 0, kdk_len; in wpa_derive_ptk() local
749 kdk_len = WPA_KDK_MAX_LEN; in wpa_derive_ptk()
751 kdk_len = 0; in wpa_derive_ptk()
757 kdk_len); in wpa_derive_ptk()
5938 size_t g_ap_len = 0, kdk_len; in fils_process_auth() local
6172 kdk_len = WPA_KDK_MAX_LEN; in fils_process_auth()
6174 kdk_len = 0; in fils_process_auth()
6184 kdk_len) < 0) { in fils_process_auth()
/hostap-latest/wlantest/
Drx_eapol.c185 size_t kdk_len; in try_pmk() local
207 kdk_len = WPA_KDK_MAX_LEN; in try_pmk()
209 kdk_len = 0; in try_pmk()
236 sta->pairwise_cipher, kdk_len) < 0 || in try_pmk()
243 sta->pairwise_cipher, NULL, 0, kdk_len) < 0 || in try_pmk()
/hostap-latest/src/ap/
Dwpa_auth_i.h341 size_t *key_len, size_t kdk_len);
Dwpa_auth.c2868 size_t z_len = 0, kdk_len; local
2875 kdk_len = WPA_KDK_MAX_LEN;
2877 kdk_len = 0;
2890 sm->pairwise, kdk_len);
2894 kdk_len);
2930 sm->pairwise, z, z_len, kdk_len);
2962 size_t fils_ft_len = 0, kdk_len; local
2967 kdk_len = WPA_KDK_MAX_LEN;
2969 kdk_len = 0;
2976 fils_ft, &fils_ft_len, kdk_len);
Dwpa_auth_ft.c2117 size_t *key_len, size_t kdk_len) in wpa_auth_derive_ptk_ft() argument
2164 kdk_len); in wpa_auth_derive_ptk_ft()
3184 size_t pmk_r1_len, kdk_len, len; in wpa_ft_process_auth_req() local
3368 kdk_len = WPA_KDK_MAX_LEN; in wpa_ft_process_auth_req()
3370 kdk_len = 0; in wpa_ft_process_auth_req()
3375 pairwise, kdk_len) < 0) in wpa_ft_process_auth_req()
Dieee802_11.c2465 pasn_get_cipher(sta->pasn), sta->pasn->kdk_len); in pasn_fils_auth_resp()
/hostap-latest/wpa_supplicant/
Dpasn_supplicant.c567 wpa_printf(MSG_DEBUG, "PASN: kdk_len=%zu", pasn->kdk_len); in wpas_pasn_auth_start_cb()