Lines Matching defs:kck
567 os_memcpy(ptk->kck, tmp, ptk->kck_len);
568 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len);
894 int wpa_ft_mic(int key_mgmt, const u8 *kck, size_t kck_len, const u8 *sta_addr,
996 if (hmac_sha512_vector(kck, kck_len, num_elem, addr, len, hash))
1006 if (hmac_sha384_vector(kck, kck_len, num_elem, addr, len, hash))
1015 if (hmac_sha256_vector(kck, kck_len, num_elem, addr, len, hash))
1021 omac1_aes_128_vector(kck, num_elem, addr, len, mic) == 0)
1539 os_memcpy(ptk->kck, tmp, WPA_PASN_KCK_LEN);
1540 wpa_hexdump_key(MSG_DEBUG, "PASN: KCK:", ptk->kck, WPA_PASN_KCK_LEN);
1630 * @kck: The key confirmation key for the PASN PTKSA
1648 int pasn_mic(const u8 *kck, int akmp, int cipher,
1658 if (!kck) {
1686 wpa_hexdump_key(MSG_DEBUG, "PASN: MIC: KCK", kck, WPA_PASN_KCK_LEN);
1692 if (hmac_sha384(kck, WPA_PASN_KCK_LEN, buf, buf_len, hash))
1700 if (hmac_sha256(kck, WPA_PASN_KCK_LEN, buf, buf_len, hash))
2541 os_memcpy(ptk->kck, tmp, ptk->kck_len);
2553 wpa_hexdump_key(MSG_DEBUG, "FT: KCK", ptk->kck, ptk->kck_len);
2629 * @kck: Key confirmation key
2630 * @kck_len: Length of kck in bytes
2639 int rsn_pmkid_suite_b(const u8 *kck, size_t kck_len, const u8 *aa,
2651 if (hmac_sha256_vector(kck, kck_len, 3, addr, len, hash) < 0)
2662 * @kck: Key confirmation key
2663 * @kck_len: Length of kck in bytes
2672 int rsn_pmkid_suite_b_192(const u8 *kck, size_t kck_len, const u8 *aa,
2684 if (hmac_sha384_vector(kck, kck_len, 3, addr, len, hash) < 0)