Home
last modified time | relevance | path

Searched refs:kek_len (Results 1 – 25 of 28) sorted by relevance

12

/hostap-latest/src/rsn_supp/
Dwpa_ft.c810 size_t kek_len; in wpa_ft_process_gtk_subelem() local
814 kek_len = sm->ptk.kek2_len; in wpa_ft_process_gtk_subelem()
817 kek_len = sm->ptk.kek_len; in wpa_ft_process_gtk_subelem()
835 if (aes_unwrap(kek, kek_len, gtk_len / 8, gtk_elem + 11, gtk)) { in wpa_ft_process_gtk_subelem()
893 size_t kek_len; in wpa_ft_process_igtk_subelem() local
897 kek_len = sm->ptk.kek2_len; in wpa_ft_process_igtk_subelem()
900 kek_len = sm->ptk.kek_len; in wpa_ft_process_igtk_subelem()
929 if (aes_unwrap(kek, kek_len, igtk_len / 8, igtk_elem + 9, igtk)) { in wpa_ft_process_igtk_subelem()
963 size_t kek_len; in wpa_ft_process_bigtk_subelem() local
974 kek_len = sm->ptk.kek2_len; in wpa_ft_process_bigtk_subelem()
[all …]
Dwpa.c148 if (!ptk || !ptk->kek_len) in wpa_eapol_key_send()
178 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); in wpa_eapol_key_send()
183 if (aes_siv_encrypt(ptk->kek, ptk->kek_len, in wpa_eapol_key_send()
694 ptk->kek, ptk->kek_len); in wpa_supplicant_send_2_of_4()
695 if (aes_wrap(ptk->kek, ptk->kek_len, plain_len / 8, plain, in wpa_supplicant_send_2_of_4()
2417 ptk->kek, ptk->kek_len); in wpa_supplicant_send_4_of_4()
2418 if (aes_wrap(ptk->kek, ptk->kek_len, plain_len / 8, plain, in wpa_supplicant_send_4_of_4()
3222 if (ver == WPA_KEY_INFO_TYPE_HMAC_MD5_RC4 && sm->ptk.kek_len == 16) { in wpa_supplicant_process_1_of_2_wpa()
3236 os_memcpy(ek + 16, sm->ptk.kek, sm->ptk.kek_len); in wpa_supplicant_process_1_of_2_wpa()
3261 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, maxkeylen / 8, in wpa_supplicant_process_1_of_2_wpa()
[all …]
Dwpa.h90 void (*set_rekey_offload)(void *ctx, const u8 *kek, size_t kek_len,
651 size_t *kek_len, const u8 **snonce,
Dwpa_i.h375 sm->ctx->set_rekey_offload(sm->ctx->ctx, sm->ptk.kek, sm->ptk.kek_len, in wpa_sm_set_rekey_offload()
/hostap-latest/src/common/
Dsae_pk.c629 if (tmp->kek_len != 32 && tmp->kek_len != 48 && tmp->kek_len != 64) { in sae_write_confirm_pk()
688 if (aes_siv_encrypt(tmp->kek, tmp->kek_len, in sae_write_confirm_pk()
789 if (tmp->kek_len != 32 && tmp->kek_len != 48 && tmp->kek_len != 64) { in sae_check_confirm_pk()
825 if (aes_siv_decrypt(tmp->kek, tmp->kek_len, in sae_check_confirm_pk()
Dwpa_common.c453 ptk->kek_len = wpa_kek_len(akmp, pmk_len); in wpa_pmk_to_ptk()
462 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len + ptk->kdk_len; in wpa_pmk_to_ptk()
570 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); in wpa_pmk_to_ptk()
571 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); in wpa_pmk_to_ptk()
573 os_memcpy(ptk->tk, tmp + ptk->kck_len + ptk->kek_len, ptk->tk_len); in wpa_pmk_to_ptk()
577 os_memcpy(ptk->kdk, tmp + ptk->kck_len + ptk->kek_len + in wpa_pmk_to_ptk()
711 ptk->kek_len = wpa_kek_len(akmp, pmk_len); in fils_pmk_to_ptk()
719 key_data_len = *ick_len + ptk->kek_len + ptk->tk_len; in fils_pmk_to_ptk()
771 os_memcpy(ptk->kek, tmp + offset, ptk->kek_len); in fils_pmk_to_ptk()
772 wpa_hexdump_key(MSG_DEBUG, "FILS: KEK", ptk->kek, ptk->kek_len); in fils_pmk_to_ptk()
[all …]
Dsae.h70 size_t kek_len; member
Dcommon_module_tests.c744 if (ptk.kek_len != sizeof(kek) || in pasn_test_no_pasn_auth()
Dwpa_common.h266 size_t kek_len; member
/hostap-latest/src/crypto/
Daes-wrap.c26 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument
40 ctx = aes_encrypt_init(kek, kek_len); in aes_wrap()
Daes-unwrap.c26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument
39 ctx = aes_decrypt_init(kek, kek_len); in aes_unwrap()
Daes_wrap.h21 int __must_check aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain,
23 int __must_check aes_unwrap(const u8 *kek, size_t kek_len, int n,
Dcrypto_linux.c784 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument
797 skcipher = linux_af_alg_skcipher("kw(aes)", kek, kek_len); in aes_unwrap()
Dcrypto_mbedtls_alt.c840 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument
848 int ret = mbedtls_nist_kw_setkey(&ctx, MBEDTLS_CIPHER_ID_AES, kek, kek_len * 8, 1) || in aes_wrap()
857 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, u8 *plain) in aes_unwrap() argument
865 int ret = mbedtls_nist_kw_setkey(&ctx, MBEDTLS_CIPHER_ID_AES, kek, kek_len * 8, 0) || in aes_unwrap()
Dcrypto_wolfssl.c692 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument
700 ret = wc_AesKeyWrap(kek, kek_len, plain, n * 8, cipher, (n + 1) * 8, in aes_wrap()
709 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument
718 ret = wc_AesKeyUnWrap(kek, kek_len, cipher, (n + 1) * 8, plain, n * 8, in aes_unwrap()
Dcrypto_openssl.c595 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument
606 type = aes_get_evp_wrap_cipher(kek_len); in aes_wrap()
629 if (AES_set_encrypt_key(kek, kek_len << 3, &actx)) in aes_wrap()
638 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument
650 type = aes_get_evp_wrap_cipher(kek_len); in aes_unwrap()
673 if (AES_set_decrypt_key(kek, kek_len << 3, &actx)) in aes_unwrap()
/hostap-latest/wlantest/
Drx_eapol.c269 sta->tptk.kek, sta->tptk.kek_len); in try_pmk()
320 sta->ptk.kek, sta->ptk.kek_len); in derive_ptk()
545 size_t kek_len, in decrypt_eapol_key_data_aes() argument
561 if (aes_unwrap(kek, kek_len, keydatalen / 8, keydata, buf)) { in decrypt_eapol_key_data_aes()
576 size_t kek_len, u16 ver, in decrypt_eapol_key_data() argument
595 if (kek_len != 16) in decrypt_eapol_key_data()
601 return decrypt_eapol_key_data_aes(wt, kek, kek_len, hdr, in decrypt_eapol_key_data()
605 return decrypt_eapol_key_data_aes(wt, kek, kek_len, hdr, in decrypt_eapol_key_data()
938 size_t kck_len, kek_len, mic_len; in rx_data_eapol_key_3_of_4() local
993 kek_len = sta->ptk.kek_len; in rx_data_eapol_key_3_of_4()
[all …]
Drx_mgmt.c1079 if (aes_siv_decrypt(ptk.kek, ptk.kek_len, in try_rmsk()
1300 if (aes_siv_decrypt(sta->ptk.kek, sta->ptk.kek_len, in decrypt_fils_assoc_resp()
1783 const u8 *kek, size_t kek_len, in process_gtk_subelem() argument
1812 if (aes_unwrap(kek, kek_len, gtk_len / 8, gtk_elem + hlen, gtk)) { in process_gtk_subelem()
1876 const u8 *kek, size_t kek_len, in process_igtk_subelem() argument
1916 if (aes_unwrap(kek, kek_len, igtk_len / 8, igtk_elem + hlen, igtk)) { in process_igtk_subelem()
1951 const u8 *kek, size_t kek_len, in process_bigtk_subelem() argument
1988 if (aes_unwrap(kek, kek_len, bigtk_len / 8, bigtk_elem + hlen, bigtk)) { in process_bigtk_subelem()
2024 const u8 *kek, size_t kek_len, in process_fte_group_keys() argument
2027 process_gtk_subelem(wt, bss, sta, kek, kek_len, in process_fte_group_keys()
[all …]
Dsta.c327 wpa_hexdump(MSG_DEBUG, "PTK:KEK", sta->ptk.kek, sta->ptk.kek_len); in sta_new_ptk()
Dwlantest.c246 p->ptk.kek_len = 16; in add_ptk_file()
/hostap-latest/src/ap/
Dwpa_auth_ft.c2225 size_t kek_len; in wpa_ft_gtk_subelem() local
2229 kek_len = sm->PTK.kek2_len; in wpa_ft_gtk_subelem()
2232 kek_len = sm->PTK.kek_len; in wpa_ft_gtk_subelem()
2290 if (aes_wrap(kek, kek_len, key_len / 8, key, subelem + 13)) { in wpa_ft_gtk_subelem()
2293 (int) kek_len); in wpa_ft_gtk_subelem()
2312 size_t kek_len; in wpa_ft_igtk_subelem() local
2318 kek_len = sm->PTK.kek2_len; in wpa_ft_igtk_subelem()
2321 kek_len = sm->PTK.kek_len; in wpa_ft_igtk_subelem()
2353 if (aes_wrap(kek, kek_len, igtk_len / 8, igtk, pos)) { in wpa_ft_igtk_subelem()
2356 (int) kek_len); in wpa_ft_igtk_subelem()
[all …]
Dwpa_auth.c1636 if (aes_unwrap(sm->PTK.kek, sm->PTK.kek_len,
2082 sm->PTK.kek, sm->PTK.kek_len);
2087 if (aes_siv_encrypt(sm->PTK.kek, sm->PTK.kek_len, kde, kde_len,
2116 sm->PTK.kek, sm->PTK.kek_len);
2117 if (aes_wrap(sm->PTK.kek, sm->PTK.kek_len,
2128 } else if (sm->PTK.kek_len == 16) {
2137 os_memcpy(ek + 16, sm->PTK.kek, sm->PTK.kek_len);
3077 if (aes_siv_decrypt(ptk->kek, ptk->kek_len, pos, key_data_len,
3268 if (aes_siv_decrypt(sm->PTK.kek, sm->PTK.kek_len, crypt, end - crypt,
3345 if (aes_siv_encrypt(sm->PTK.kek, sm->PTK.kek_len,
[all …]
/hostap-latest/wpa_supplicant/
Ddriver_i.h615 const u8 *kek, size_t kek_len, in wpa_drv_set_rekey_info() argument
621 wpa_s->driver->set_rekey_info(wpa_s->drv_priv, kek, kek_len, in wpa_drv_set_rekey_info()
Dwpas_glue.c1255 const u8 *kek, size_t kek_len, in wpa_supplicant_set_rekey_offload() argument
1261 wpa_drv_set_rekey_info(wpa_s, kek, kek_len, kck, kck_len, replay_ctr); in wpa_supplicant_set_rekey_offload()
/hostap-latest/src/drivers/
Ddriver_atheros.c1088 mlme.fils_aad.kek_len = params->fils_kek_len; in atheros_sta_auth()
1095 mlme.fils_aad.kek, mlme.fils_aad.kek_len); in atheros_sta_auth()

12