Home
last modified time | relevance | path

Searched refs:kek (Results 1 – 25 of 40) sorted by relevance

12

/hostap-latest/tests/hwsim/
Dtest_ap_psk.py1473 kek = ptk[16:32]
1474 return (ptk, kck, kek)
1556 (ptk, kck, kek) = pmk_to_ptk(pmk, addr, bssid, snonce, anonce)
1587 (ptk, kck, kek) = pmk_to_ptk(pmk, addr, bssid, snonce, anonce)
1614 (ptk, kck, kek) = pmk_to_ptk(pmk, addr, bssid, snonce, anonce)
1637 (ptk, kck, kek) = pmk_to_ptk(pmk, addr, bssid, snonce, anonce)
1641 (ptk, kck, kek) = pmk_to_ptk(pmk, addr, bssid, snonce2, anonce)
1662 (ptk, kck, kek) = pmk_to_ptk(pmk, addr, bssid, snonce, anonce)
1684 (ptk, kck, kek) = pmk_to_ptk(pmk, addr, bssid, snonce, anonce)
1722 (ptk, kck, kek) = pmk_to_ptk(pmk, addr, bssid, snonce, anonce)
[all …]
Dtest_erp.py415 kek = ptk[16:32]
434 if kek not in buf:
452 verify_not_present(buf, kek, fname, "KEK")
488 kek = ptk[16:32]
503 verify_not_present(buf, kek, fname, "KEK")
523 verify_not_present(buf, kek, fname, "KEK")
Dtest_ocv.py357 self.kek = None
405 (ptk, self.kck, self.kek) = pmk_to_ptk(pmk, self.addr, self.bssid,
711 self.kek = None
766 (ptk, self.kck, self.kek) = pmk_to_ptk(pmk, self.addr, self.bssid,
780 wrapped = aes_wrap(self.kek, pad_key_data(plain))
797 wrapped = aes_wrap(self.kek, pad_key_data(plain))
879 wrapped = aes_wrap(conn.kek, pad_key_data(plain))
896 wrapped = aes_wrap(conn.kek, pad_key_data(plain))
Dtest_wpas_ap.py1128 kek = ptk[16:32]
1137 if kek not in buf:
1150 verify_not_present(buf2, kek, fname, "KEK")
1159 verify_not_present(buf3, kek, fname, "KEK")
/hostap-latest/src/rsn_supp/
Dwpa_ft.c809 const u8 *kek; in wpa_ft_process_gtk_subelem() local
813 kek = sm->ptk.kek2; in wpa_ft_process_gtk_subelem()
816 kek = sm->ptk.kek; in wpa_ft_process_gtk_subelem()
835 if (aes_unwrap(kek, kek_len, gtk_len / 8, gtk_elem + 11, gtk)) { in wpa_ft_process_gtk_subelem()
892 const u8 *kek; in wpa_ft_process_igtk_subelem() local
896 kek = sm->ptk.kek2; in wpa_ft_process_igtk_subelem()
899 kek = sm->ptk.kek; in wpa_ft_process_igtk_subelem()
929 if (aes_unwrap(kek, kek_len, igtk_len / 8, igtk_elem + 9, igtk)) { in wpa_ft_process_igtk_subelem()
962 const u8 *kek; in wpa_ft_process_bigtk_subelem() local
973 kek = sm->ptk.kek2; in wpa_ft_process_bigtk_subelem()
[all …]
Dwpa.c178 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); in wpa_eapol_key_send()
183 if (aes_siv_encrypt(ptk->kek, ptk->kek_len, in wpa_eapol_key_send()
694 ptk->kek, ptk->kek_len); in wpa_supplicant_send_2_of_4()
695 if (aes_wrap(ptk->kek, ptk->kek_len, plain_len / 8, plain, in wpa_supplicant_send_2_of_4()
2417 ptk->kek, ptk->kek_len); in wpa_supplicant_send_4_of_4()
2418 if (aes_wrap(ptk->kek, ptk->kek_len, plain_len / 8, plain, in wpa_supplicant_send_4_of_4()
3236 os_memcpy(ek + 16, sm->ptk.kek, sm->ptk.kek_len); in wpa_supplicant_process_1_of_2_wpa()
3261 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, maxkeylen / 8, in wpa_supplicant_process_1_of_2_wpa()
3535 os_memcpy(ek + 16, sm->ptk.kek, sm->ptk.kek_len); in wpa_supplicant_decrypt_key_data()
3568 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, *key_data_len / 8, in wpa_supplicant_decrypt_key_data()
[all …]
Dwpa.h90 void (*set_rekey_offload)(void *ctx, const u8 *kek, size_t kek_len,
650 struct wpabuf * fils_build_assoc_req(struct wpa_sm *sm, const u8 **kek,
/hostap-latest/src/common/
Ddpp_backup.c269 u8 kek[DPP_MAX_HASH_LEN]; in dpp_build_pw_recipient_info() local
288 kek, hash_len)) { in dpp_build_pw_recipient_info()
293 kek, hash_len); in dpp_build_pw_recipient_info()
297 aes_siv_encrypt(kek, hash_len, wpabuf_head(cont_enc_key), in dpp_build_pw_recipient_info()
342 forced_memzero(kek, sizeof(kek)); in dpp_build_pw_recipient_info()
1137 u8 kek[DPP_MAX_HASH_LEN]; in dpp_conf_resp_env_data() local
1160 kek, data.pbkdf2_key_len)) { in dpp_conf_resp_env_data()
1165 kek, data.pbkdf2_key_len); in dpp_conf_resp_env_data()
1172 res = aes_siv_decrypt(kek, data.pbkdf2_key_len, in dpp_conf_resp_env_data()
1175 forced_memzero(kek, data.pbkdf2_key_len); in dpp_conf_resp_env_data()
Dcommon_module_tests.c712 const u8 kek[] = { in pasn_test_no_pasn_auth() local
744 if (ptk.kek_len != sizeof(kek) || in pasn_test_no_pasn_auth()
745 os_memcmp(kek, ptk.kek, sizeof(kek)) != 0) { in pasn_test_no_pasn_auth()
Dsae.h69 u8 kek[SAE_MAX_HASH_LEN]; member
Dsae_pk.c688 if (aes_siv_encrypt(tmp->kek, tmp->kek_len, in sae_write_confirm_pk()
825 if (aes_siv_decrypt(tmp->kek, tmp->kek_len, in sae_check_confirm_pk()
Dwpa_common.c570 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); in wpa_pmk_to_ptk()
571 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); in wpa_pmk_to_ptk()
771 os_memcpy(ptk->kek, tmp + offset, ptk->kek_len); in fils_pmk_to_ptk()
772 wpa_hexdump_key(MSG_DEBUG, "FILS: KEK", ptk->kek, ptk->kek_len); in fils_pmk_to_ptk()
2551 os_memcpy(ptk->kek, tmp + offset, ptk->kek_len); in wpa_pmk_r1_to_ptk()
2562 wpa_hexdump_key(MSG_DEBUG, "FT: KEK", ptk->kek, ptk->kek_len); in wpa_pmk_r1_to_ptk()
/hostap-latest/src/crypto/
Daes-wrap.c26 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument
40 ctx = aes_encrypt_init(kek, kek_len); in aes_wrap()
Daes-unwrap.c26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument
39 ctx = aes_decrypt_init(kek, kek_len); in aes_unwrap()
Daes_wrap.h21 int __must_check aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain,
23 int __must_check aes_unwrap(const u8 *kek, size_t kek_len, int n,
Dcrypto_linux.c784 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument
797 skcipher = linux_af_alg_skcipher("kw(aes)", kek, kek_len); in aes_unwrap()
/hostap-latest/wlantest/
Drx_eapol.c269 sta->tptk.kek, sta->tptk.kek_len); in try_pmk()
320 sta->ptk.kek, sta->ptk.kek_len); in derive_ptk()
520 static u8 * decrypt_eapol_key_data_rc4(struct wlantest *wt, const u8 *kek, in decrypt_eapol_key_data_rc4() argument
532 os_memcpy(ek + 16, kek, 16); in decrypt_eapol_key_data_rc4()
544 static u8 * decrypt_eapol_key_data_aes(struct wlantest *wt, const u8 *kek, in decrypt_eapol_key_data_aes() argument
561 if (aes_unwrap(kek, kek_len, keydatalen / 8, keydata, buf)) { in decrypt_eapol_key_data_aes()
575 struct wlantest_sta *sta, const u8 *kek, in decrypt_eapol_key_data() argument
597 return decrypt_eapol_key_data_rc4(wt, kek, hdr, keydata, in decrypt_eapol_key_data()
601 return decrypt_eapol_key_data_aes(wt, kek, kek_len, hdr, in decrypt_eapol_key_data()
605 return decrypt_eapol_key_data_aes(wt, kek, kek_len, hdr, in decrypt_eapol_key_data()
[all …]
Drx_mgmt.c1079 if (aes_siv_decrypt(ptk.kek, ptk.kek_len, in try_rmsk()
1300 if (aes_siv_decrypt(sta->ptk.kek, sta->ptk.kek_len, in decrypt_fils_assoc_resp()
1783 const u8 *kek, size_t kek_len, in process_gtk_subelem() argument
1812 if (aes_unwrap(kek, kek_len, gtk_len / 8, gtk_elem + hlen, gtk)) { in process_gtk_subelem()
1876 const u8 *kek, size_t kek_len, in process_igtk_subelem() argument
1916 if (aes_unwrap(kek, kek_len, igtk_len / 8, igtk_elem + hlen, igtk)) { in process_igtk_subelem()
1951 const u8 *kek, size_t kek_len, in process_bigtk_subelem() argument
1988 if (aes_unwrap(kek, kek_len, bigtk_len / 8, bigtk_elem + hlen, bigtk)) { in process_bigtk_subelem()
2024 const u8 *kek, size_t kek_len, in process_fte_group_keys() argument
2027 process_gtk_subelem(wt, bss, sta, kek, kek_len, in process_fte_group_keys()
[all …]
Dsta.c327 wpa_hexdump(MSG_DEBUG, "PTK:KEK", sta->ptk.kek, sta->ptk.kek_len); in sta_new_ptk()
/hostap-latest/src/pae/
Dieee802_1x_key.c138 size_t ckn_bytes, u8 *kek, size_t kek_bytes) in ieee802_1x_kek_aes_cmac() argument
148 8 * kek_bytes, kek); in ieee802_1x_kek_aes_cmac()
Dieee802_1x_kay_i.h75 u8 *kek, size_t kek_bytes);
108 struct mka_key kek; member
Dieee802_1x_key.h18 size_t ckn_bytes, u8 *kek, size_t kek_bytes);
Dieee802_1x_kay.c1656 if (aes_wrap(participant->kek.key, participant->kek.len, in ieee802_1x_mka_encode_dist_sak_body()
1797 if (aes_unwrap(participant->kek.key, participant->kek.len, in ieee802_1x_mka_decode_dist_sak_body()
3780 participant->kek.len = participant->cak.len; in ieee802_1x_kay_create_mka()
3785 participant->kek.key, in ieee802_1x_kay_create_mka()
3786 participant->kek.len)) { in ieee802_1x_kay_create_mka()
3791 participant->kek.key, participant->kek.len); in ieee802_1x_kay_create_mka()
3891 os_memset(&participant->kek, 0, sizeof(participant->kek)); in ieee802_1x_kay_delete_mka()
/hostap-latest/src/ap/
Dwpa_auth_ft.c2224 const u8 *kek; in wpa_ft_gtk_subelem() local
2228 kek = sm->PTK.kek2; in wpa_ft_gtk_subelem()
2231 kek = sm->PTK.kek; in wpa_ft_gtk_subelem()
2290 if (aes_wrap(kek, kek_len, key_len / 8, key, subelem + 13)) { in wpa_ft_gtk_subelem()
2311 const u8 *kek, *igtk; in wpa_ft_igtk_subelem() local
2317 kek = sm->PTK.kek2; in wpa_ft_igtk_subelem()
2320 kek = sm->PTK.kek; in wpa_ft_igtk_subelem()
2353 if (aes_wrap(kek, kek_len, igtk_len / 8, igtk, pos)) { in wpa_ft_igtk_subelem()
2372 const u8 *kek, *bigtk; in wpa_ft_bigtk_subelem() local
2378 kek = sm->PTK.kek2; in wpa_ft_bigtk_subelem()
[all …]
Dwpa_auth.c1636 if (aes_unwrap(sm->PTK.kek, sm->PTK.kek_len,
2082 sm->PTK.kek, sm->PTK.kek_len);
2087 if (aes_siv_encrypt(sm->PTK.kek, sm->PTK.kek_len, kde, kde_len,
2116 sm->PTK.kek, sm->PTK.kek_len);
2117 if (aes_wrap(sm->PTK.kek, sm->PTK.kek_len,
2137 os_memcpy(ek + 16, sm->PTK.kek, sm->PTK.kek_len);
3077 if (aes_siv_decrypt(ptk->kek, ptk->kek_len, pos, key_data_len,
3268 if (aes_siv_decrypt(sm->PTK.kek, sm->PTK.kek_len, crypt, end - crypt,
3345 if (aes_siv_encrypt(sm->PTK.kek, sm->PTK.kek_len,
3810 if (aes_unwrap(PTK.kek, PTK.kek_len, key_data_length / 8,
[all …]

12