Home
last modified time | relevance | path

Searched refs:cak (Results 1 – 7 of 7) sorted by relevance

/dflybsd-src/contrib/wpa_supplicant/wpa_supplicant/
H A Dwpas_kay.c327 struct mka_key *cak; in ieee802_1x_notify_create_actor() local
341 cak = os_zalloc(sizeof(*cak)); in ieee802_1x_notify_create_actor()
342 if (!msk || !sid || !ckn || !cak) in ieee802_1x_notify_create_actor()
359 cak->len = DEFAULT_KEY_LEN; in ieee802_1x_notify_create_actor()
361 peer_addr, cak->key, cak->len)) { in ieee802_1x_notify_create_actor()
366 wpa_hexdump_key(MSG_DEBUG, "Derived CAK", cak->key, cak->len); in ieee802_1x_notify_create_actor()
378 res = ieee802_1x_kay_create_mka(wpa_s->kay, ckn, cak, 0, in ieee802_1x_notify_create_actor()
388 if (cak) { in ieee802_1x_notify_create_actor()
389 os_memset(cak, 0, sizeof(*cak)); in ieee802_1x_notify_create_actor()
390 os_free(cak); in ieee802_1x_notify_create_actor()
[all …]
/dflybsd-src/contrib/wpa_supplicant/src/ap/
H A Dwpa_auth_kay.c415 struct mka_key *cak; in ieee802_1x_notify_create_actor_hapd() local
429 cak = os_zalloc(sizeof(*cak)); in ieee802_1x_notify_create_actor_hapd()
430 if (!msk || !sid || !ckn || !cak) in ieee802_1x_notify_create_actor_hapd()
450 cak->len = DEFAULT_KEY_LEN; in ieee802_1x_notify_create_actor_hapd()
452 sta->addr, cak->key, cak->len)) { in ieee802_1x_notify_create_actor_hapd()
456 wpa_hexdump_key(MSG_DEBUG, "Derived CAK", cak->key, cak->len); in ieee802_1x_notify_create_actor_hapd()
467 res = ieee802_1x_kay_create_mka(hapd->kay, ckn, cak, 0, EAP_EXCHANGE, in ieee802_1x_notify_create_actor_hapd()
474 bin_clear_free(cak, sizeof(*cak)); in ieee802_1x_notify_create_actor_hapd()
483 struct mka_key *cak; in ieee802_1x_create_preshared_mka_hapd() local
494 cak = os_zalloc(sizeof(*cak)); in ieee802_1x_create_preshared_mka_hapd()
[all …]
/dflybsd-src/contrib/wpa_supplicant/src/pae/
H A Dieee802_1x_key.c92 const u8 *mac2, u8 *cak, size_t cak_bytes) in ieee802_1x_cak_aes_cmac() argument
98 context, sizeof(context) * 8, 8 * cak_bytes, cak); in ieee802_1x_cak_aes_cmac()
137 int ieee802_1x_kek_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn, in ieee802_1x_kek_aes_cmac() argument
146 return aes_kdf(cak, 8 * cak_bytes, "IEEE8021 KEK", in ieee802_1x_kek_aes_cmac()
158 int ieee802_1x_ick_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn, in ieee802_1x_ick_aes_cmac() argument
167 return aes_kdf(cak, 8 *cak_bytes, "IEEE8021 ICK", in ieee802_1x_ick_aes_cmac()
205 int ieee802_1x_sak_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ctx, in ieee802_1x_sak_aes_cmac() argument
208 return aes_kdf(cak, cak_bytes * 8, "IEEE8021 SAK", ctx, ctx_bytes * 8, in ieee802_1x_sak_aes_cmac()
H A Dieee802_1x_key.h13 const u8 *mac2, u8 *cak, size_t cak_bytes);
17 int ieee802_1x_kek_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn,
19 int ieee802_1x_ick_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ckn,
23 int ieee802_1x_sak_aes_cmac(const u8 *cak, size_t cak_bytes, const u8 *ctx,
H A Dieee802_1x_kay_i.h70 const u8 *mac2, u8 *cak, size_t cak_bytes);
73 int (*kek_trfm)(const u8 *cak, size_t cak_bytes,
76 int (*ick_trfm)(const u8 *cak, size_t cak_bytes,
89 struct mka_key cak; member
399 u8 cak[24]; member
H A Dieee802_1x_kay.c2148 if (ieee802_1x_sak_aes_cmac(participant->cak.key, in ieee802_1x_kay_generate_new_sak()
2149 participant->cak.len, in ieee802_1x_kay_generate_new_sak()
3588 const struct mka_key *cak, u32 life, in ieee802_1x_kay_create_mka() argument
3598 if (!kay || !ckn || !cak) { in ieee802_1x_kay_create_mka()
3603 if (cak->len != 16 && cak->len != 32) { in ieee802_1x_kay_create_mka()
3605 (unsigned int) cak->len); in ieee802_1x_kay_create_mka()
3627 participant->cak.len = cak->len; in ieee802_1x_kay_create_mka()
3628 os_memcpy(participant->cak.key, cak->key, cak->len); in ieee802_1x_kay_create_mka()
3629 wpa_hexdump_key(MSG_DEBUG, "KaY: CAK", participant->cak.key, in ieee802_1x_kay_create_mka()
3630 participant->cak.len); in ieee802_1x_kay_create_mka()
[all …]
H A Dieee802_1x_kay.h249 const struct mka_key *cak,