Searched refs:ptk (Results 1 - 25 of 35) sorted by relevance

12

/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
H A Dwpa_i.h28 struct wpa_ptk ptk, tptk; member in struct:wpa_sm
234 struct wpa_ptk *ptk);
239 struct wpa_ptk *ptk);
243 struct wpa_ptk *ptk, size_t ptk_len);
H A Dwpa_ft.c28 struct wpa_ptk *ptk, size_t ptk_len)
53 (u8 *) ptk, ptk_len, ptk_name);
54 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len);
417 sizeof(null_rsc), (u8 *) sm->ptk.tk1, keylen) < 0) {
551 (u8 *) &sm->ptk, ptk_len, ptk_name);
553 (u8 *) &sm->ptk, ptk_len);
557 sm->pmk_r1_name, sm->ptk.kck, bssid);
616 if (aes_unwrap(sm->ptk.kek, gtk_len / 8, gtk_elem + 10, gtk)) {
707 if (aes_unwrap(sm->ptk.kek, WPA_IGTK_LEN / 8, igtk_elem + 9, igtk)) {
813 if (wpa_ft_mic(sm->ptk
26 wpa_derive_ptk_ft(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, struct wpa_ptk *ptk, size_t ptk_len) argument
[all...]
H A Dwpa.c186 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL,
307 * @ptk: PTK to use for keyed hash and encryption
314 struct wpa_ptk *ptk)
351 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL,
360 struct wpa_ptk *ptk)
365 return wpa_derive_ptk_ft(sm, src_addr, key, ptk, ptk_len);
370 (u8 *) ptk, ptk_len,
382 struct wpa_ptk *ptk; local
434 ptk = &sm->tptk;
435 wpa_derive_ptk(sm, src_addr, key, ptk);
310 wpa_supplicant_send_2_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, int ver, const u8 *nonce, const u8 *wpa_ie, size_t wpa_ie_len, struct wpa_ptk *ptk) argument
358 wpa_derive_ptk(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, struct wpa_ptk *ptk) argument
899 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, const u8 *kde, size_t kde_len, struct wpa_ptk *ptk) argument
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/common/
H A Dwpa_common.c80 * @ptk: Buffer for pairwise transient key
96 u8 *ptk, size_t ptk_len, int use_sha256)
121 ptk, ptk_len);
124 sha1_prf(pmk, pmk_len, label, data, sizeof(data), ptk,
130 wpa_hexdump_key(MSG_DEBUG, "WPA: PTK", ptk, ptk_len);
526 u8 *ptk, size_t ptk_len, u8 *ptk_name)
547 sha256_prf(pmk_r1, PMK_LEN, "FT-PTK", buf, pos - buf, ptk, ptk_len);
93 wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, const u8 *addr1, const u8 *addr2, const u8 *nonce1, const u8 *nonce2, u8 *ptk, size_t ptk_len, int use_sha256) argument
523 wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *pmk_r1_name, u8 *ptk, size_t ptk_len, u8 *ptk_name) argument
H A Dwpa_common.h297 u8 *ptk, size_t ptk_len, int use_sha256);
317 u8 *ptk, size_t ptk_len, u8 *ptk_name);
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dwpa_i.h30 struct wpa_ptk ptk, tptk; member in struct:wpa_sm
276 struct wpa_ptk *ptk);
281 struct wpa_ptk *ptk);
285 struct wpa_ptk *ptk, size_t ptk_len);
H A Dwpa.c137 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL,
265 * @ptk: PTK to use for keyed hash and encryption
272 struct wpa_ptk *ptk)
346 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL,
355 struct wpa_ptk *ptk)
360 return wpa_derive_ptk_ft(sm, src_addr, key, ptk, ptk_len);
365 (u8 *) ptk, ptk_len,
377 struct wpa_ptk *ptk; local
429 ptk = &sm->tptk;
430 wpa_derive_ptk(sm, src_addr, key, ptk);
268 wpa_supplicant_send_2_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, int ver, const u8 *nonce, const u8 *wpa_ie, size_t wpa_ie_len, struct wpa_ptk *ptk) argument
353 wpa_derive_ptk(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, struct wpa_ptk *ptk) argument
1028 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, const u8 *kde, size_t kde_len, struct wpa_ptk *ptk) argument
[all...]
H A Dwpa_ft.c55 struct wpa_ptk *ptk, size_t ptk_len)
80 (u8 *) ptk, ptk_len, ptk_name);
81 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len);
523 sizeof(null_rsc), (u8 *) sm->ptk.tk1, keylen) < 0) {
670 (u8 *) &sm->ptk, ptk_len, ptk_name);
672 (u8 *) &sm->ptk, ptk_len);
676 sm->pmk_r1_name, sm->ptk.kck, bssid,
749 if (aes_unwrap(sm->ptk.kek, gtk_len / 8, gtk_elem + 11, gtk)) {
839 if (aes_unwrap(sm->ptk.kek, WPA_IGTK_LEN / 8, igtk_elem + 9, igtk)) {
962 if (wpa_ft_mic(sm->ptk
53 wpa_derive_ptk_ft(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, struct wpa_ptk *ptk, size_t ptk_len) argument
[all...]
/external/wpa_supplicant_8/src/rsn_supp/
H A Dwpa_i.h30 struct wpa_ptk ptk, tptk; member in struct:wpa_sm
276 struct wpa_ptk *ptk);
281 struct wpa_ptk *ptk);
285 struct wpa_ptk *ptk, size_t ptk_len);
H A Dwpa.c137 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL,
265 * @ptk: PTK to use for keyed hash and encryption
272 struct wpa_ptk *ptk)
346 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL,
355 struct wpa_ptk *ptk)
360 return wpa_derive_ptk_ft(sm, src_addr, key, ptk, ptk_len);
365 (u8 *) ptk, ptk_len,
377 struct wpa_ptk *ptk; local
429 ptk = &sm->tptk;
430 wpa_derive_ptk(sm, src_addr, key, ptk);
268 wpa_supplicant_send_2_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, int ver, const u8 *nonce, const u8 *wpa_ie, size_t wpa_ie_len, struct wpa_ptk *ptk) argument
353 wpa_derive_ptk(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, struct wpa_ptk *ptk) argument
1028 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, const u8 *kde, size_t kde_len, struct wpa_ptk *ptk) argument
[all...]
H A Dwpa_ft.c55 struct wpa_ptk *ptk, size_t ptk_len)
80 (u8 *) ptk, ptk_len, ptk_name);
81 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len);
523 sizeof(null_rsc), (u8 *) sm->ptk.tk1, keylen) < 0) {
670 (u8 *) &sm->ptk, ptk_len, ptk_name);
672 (u8 *) &sm->ptk, ptk_len);
676 sm->pmk_r1_name, sm->ptk.kck, bssid,
749 if (aes_unwrap(sm->ptk.kek, gtk_len / 8, gtk_elem + 11, gtk)) {
839 if (aes_unwrap(sm->ptk.kek, WPA_IGTK_LEN / 8, igtk_elem + 9, igtk)) {
962 if (wpa_ft_mic(sm->ptk
53 wpa_derive_ptk_ft(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, struct wpa_ptk *ptk, size_t ptk_len) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dwpa_i.h30 struct wpa_ptk ptk, tptk; member in struct:wpa_sm
276 struct wpa_ptk *ptk);
281 struct wpa_ptk *ptk);
285 struct wpa_ptk *ptk, size_t ptk_len);
H A Dwpa.c137 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL,
265 * @ptk: PTK to use for keyed hash and encryption
272 struct wpa_ptk *ptk)
346 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL,
355 struct wpa_ptk *ptk)
360 return wpa_derive_ptk_ft(sm, src_addr, key, ptk, ptk_len);
365 (u8 *) ptk, ptk_len,
377 struct wpa_ptk *ptk; local
429 ptk = &sm->tptk;
430 wpa_derive_ptk(sm, src_addr, key, ptk);
268 wpa_supplicant_send_2_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, int ver, const u8 *nonce, const u8 *wpa_ie, size_t wpa_ie_len, struct wpa_ptk *ptk) argument
353 wpa_derive_ptk(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, struct wpa_ptk *ptk) argument
1028 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, const u8 *kde, size_t kde_len, struct wpa_ptk *ptk) argument
[all...]
H A Dwpa_ft.c55 struct wpa_ptk *ptk, size_t ptk_len)
80 (u8 *) ptk, ptk_len, ptk_name);
81 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len);
523 sizeof(null_rsc), (u8 *) sm->ptk.tk1, keylen) < 0) {
670 (u8 *) &sm->ptk, ptk_len, ptk_name);
672 (u8 *) &sm->ptk, ptk_len);
676 sm->pmk_r1_name, sm->ptk.kck, bssid,
749 if (aes_unwrap(sm->ptk.kek, gtk_len / 8, gtk_elem + 11, gtk)) {
839 if (aes_unwrap(sm->ptk.kek, WPA_IGTK_LEN / 8, igtk_elem + 9, igtk)) {
962 if (wpa_ft_mic(sm->ptk
53 wpa_derive_ptk_ft(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, struct wpa_ptk *ptk, size_t ptk_len) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/common/
H A Dwpa_common.c80 * @ptk: Buffer for pairwise transient key
96 u8 *ptk, size_t ptk_len, int use_sha256)
121 ptk, ptk_len);
124 sha1_prf(pmk, pmk_len, label, data, sizeof(data), ptk,
132 wpa_hexdump_key(MSG_DEBUG, "WPA: PTK", ptk, ptk_len);
666 u8 *ptk, size_t ptk_len, u8 *ptk_name)
687 sha256_prf(pmk_r1, PMK_LEN, "FT-PTK", buf, pos - buf, ptk, ptk_len);
93 wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, const u8 *addr1, const u8 *addr2, const u8 *nonce1, const u8 *nonce2, u8 *ptk, size_t ptk_len, int use_sha256) argument
663 wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *pmk_r1_name, u8 *ptk, size_t ptk_len, u8 *ptk_name) argument
H A Dwpa_common.h311 u8 *ptk, size_t ptk_len, int use_sha256);
331 u8 *ptk, size_t ptk_len, u8 *ptk_name);
/external/wpa_supplicant_8/src/common/
H A Dwpa_common.c80 * @ptk: Buffer for pairwise transient key
96 u8 *ptk, size_t ptk_len, int use_sha256)
121 ptk, ptk_len);
124 sha1_prf(pmk, pmk_len, label, data, sizeof(data), ptk,
132 wpa_hexdump_key(MSG_DEBUG, "WPA: PTK", ptk, ptk_len);
666 u8 *ptk, size_t ptk_len, u8 *ptk_name)
687 sha256_prf(pmk_r1, PMK_LEN, "FT-PTK", buf, pos - buf, ptk, ptk_len);
93 wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, const u8 *addr1, const u8 *addr2, const u8 *nonce1, const u8 *nonce2, u8 *ptk, size_t ptk_len, int use_sha256) argument
663 wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *pmk_r1_name, u8 *ptk, size_t ptk_len, u8 *ptk_name) argument
H A Dwpa_common.h311 u8 *ptk, size_t ptk_len, int use_sha256);
331 u8 *ptk, size_t ptk_len, u8 *ptk_name);
/external/wpa_supplicant_8/wpa_supplicant/src/common/
H A Dwpa_common.c80 * @ptk: Buffer for pairwise transient key
96 u8 *ptk, size_t ptk_len, int use_sha256)
121 ptk, ptk_len);
124 sha1_prf(pmk, pmk_len, label, data, sizeof(data), ptk,
132 wpa_hexdump_key(MSG_DEBUG, "WPA: PTK", ptk, ptk_len);
666 u8 *ptk, size_t ptk_len, u8 *ptk_name)
687 sha256_prf(pmk_r1, PMK_LEN, "FT-PTK", buf, pos - buf, ptk, ptk_len);
93 wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, const u8 *addr1, const u8 *addr2, const u8 *nonce1, const u8 *nonce2, u8 *ptk, size_t ptk_len, int use_sha256) argument
663 wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *pmk_r1_name, u8 *ptk, size_t ptk_len, u8 *ptk_name) argument
H A Dwpa_common.h311 u8 *ptk, size_t ptk_len, int use_sha256);
331 u8 *ptk, size_t ptk_len, u8 *ptk_name);
/external/wpa_supplicant/
H A Dwpa.c867 * @ptk: Buffer for pairwise transient key
883 u8 *ptk, size_t ptk_len)
903 sha1_prf(pmk, pmk_len, label, data, sizeof(data), ptk, ptk_len);
906 wpa_hexdump_key(MSG_DEBUG, "WPA: PTK", ptk, ptk_len);
1024 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL,
1157 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL,
1441 struct wpa_ptk *ptk)
1478 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL,
1491 struct wpa_ptk *ptk; local
1536 ptk
879 wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, const u8 *addr1, const u8 *addr2, const u8 *nonce1, const u8 *nonce2, u8 *ptk, size_t ptk_len) argument
1436 wpa_supplicant_send_2_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, int ver, const u8 *nonce, const u8 *wpa_ie, size_t wpa_ie_len, struct wpa_ptk *ptk) argument
1964 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, const u8 *kde, size_t kde_len, struct wpa_ptk *ptk) argument
[all...]
H A Dwpa_i.h81 struct wpa_ptk ptk, tptk; member in struct:wpa_sm
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dwpa_auth_i.h228 struct wpa_ptk *ptk, size_t ptk_len);
/external/wpa_supplicant_8/src/ap/
H A Dwpa_auth_i.h228 struct wpa_ptk *ptk, size_t ptk_len);
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dwpa_auth_i.h228 struct wpa_ptk *ptk, size_t ptk_len);

Completed in 184 milliseconds

12