/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
H A D | wpa_i.h | 28 struct wpa_ptk ptk, tptk; member in struct:wpa_sm 234 struct wpa_ptk *ptk); 239 struct wpa_ptk *ptk); 243 struct wpa_ptk *ptk, size_t ptk_len);
|
H A D | wpa_ft.c | 28 struct wpa_ptk *ptk, size_t ptk_len) 53 (u8 *) ptk, ptk_len, ptk_name); 54 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len); 417 sizeof(null_rsc), (u8 *) sm->ptk.tk1, keylen) < 0) { 551 (u8 *) &sm->ptk, ptk_len, ptk_name); 553 (u8 *) &sm->ptk, ptk_len); 557 sm->pmk_r1_name, sm->ptk.kck, bssid); 616 if (aes_unwrap(sm->ptk.kek, gtk_len / 8, gtk_elem + 10, gtk)) { 707 if (aes_unwrap(sm->ptk.kek, WPA_IGTK_LEN / 8, igtk_elem + 9, igtk)) { 813 if (wpa_ft_mic(sm->ptk 26 wpa_derive_ptk_ft(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, struct wpa_ptk *ptk, size_t ptk_len) argument [all...] |
H A D | wpa.c | 186 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL, 307 * @ptk: PTK to use for keyed hash and encryption 314 struct wpa_ptk *ptk) 351 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL, 360 struct wpa_ptk *ptk) 365 return wpa_derive_ptk_ft(sm, src_addr, key, ptk, ptk_len); 370 (u8 *) ptk, ptk_len, 382 struct wpa_ptk *ptk; local 434 ptk = &sm->tptk; 435 wpa_derive_ptk(sm, src_addr, key, ptk); 310 wpa_supplicant_send_2_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, int ver, const u8 *nonce, const u8 *wpa_ie, size_t wpa_ie_len, struct wpa_ptk *ptk) argument 358 wpa_derive_ptk(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, struct wpa_ptk *ptk) argument 899 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, const u8 *kde, size_t kde_len, struct wpa_ptk *ptk) argument [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/common/ |
H A D | wpa_common.c | 80 * @ptk: Buffer for pairwise transient key 96 u8 *ptk, size_t ptk_len, int use_sha256) 121 ptk, ptk_len); 124 sha1_prf(pmk, pmk_len, label, data, sizeof(data), ptk, 130 wpa_hexdump_key(MSG_DEBUG, "WPA: PTK", ptk, ptk_len); 526 u8 *ptk, size_t ptk_len, u8 *ptk_name) 547 sha256_prf(pmk_r1, PMK_LEN, "FT-PTK", buf, pos - buf, ptk, ptk_len); 93 wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, const u8 *addr1, const u8 *addr2, const u8 *nonce1, const u8 *nonce2, u8 *ptk, size_t ptk_len, int use_sha256) argument 523 wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *pmk_r1_name, u8 *ptk, size_t ptk_len, u8 *ptk_name) argument
|
H A D | wpa_common.h | 297 u8 *ptk, size_t ptk_len, int use_sha256); 317 u8 *ptk, size_t ptk_len, u8 *ptk_name);
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa_i.h | 30 struct wpa_ptk ptk, tptk; member in struct:wpa_sm 276 struct wpa_ptk *ptk); 281 struct wpa_ptk *ptk); 285 struct wpa_ptk *ptk, size_t ptk_len);
|
H A D | wpa.c | 137 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL, 265 * @ptk: PTK to use for keyed hash and encryption 272 struct wpa_ptk *ptk) 346 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL, 355 struct wpa_ptk *ptk) 360 return wpa_derive_ptk_ft(sm, src_addr, key, ptk, ptk_len); 365 (u8 *) ptk, ptk_len, 377 struct wpa_ptk *ptk; local 429 ptk = &sm->tptk; 430 wpa_derive_ptk(sm, src_addr, key, ptk); 268 wpa_supplicant_send_2_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, int ver, const u8 *nonce, const u8 *wpa_ie, size_t wpa_ie_len, struct wpa_ptk *ptk) argument 353 wpa_derive_ptk(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, struct wpa_ptk *ptk) argument 1028 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, const u8 *kde, size_t kde_len, struct wpa_ptk *ptk) argument [all...] |
H A D | wpa_ft.c | 55 struct wpa_ptk *ptk, size_t ptk_len) 80 (u8 *) ptk, ptk_len, ptk_name); 81 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len); 523 sizeof(null_rsc), (u8 *) sm->ptk.tk1, keylen) < 0) { 670 (u8 *) &sm->ptk, ptk_len, ptk_name); 672 (u8 *) &sm->ptk, ptk_len); 676 sm->pmk_r1_name, sm->ptk.kck, bssid, 749 if (aes_unwrap(sm->ptk.kek, gtk_len / 8, gtk_elem + 11, gtk)) { 839 if (aes_unwrap(sm->ptk.kek, WPA_IGTK_LEN / 8, igtk_elem + 9, igtk)) { 962 if (wpa_ft_mic(sm->ptk 53 wpa_derive_ptk_ft(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, struct wpa_ptk *ptk, size_t ptk_len) argument [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | wpa_i.h | 30 struct wpa_ptk ptk, tptk; member in struct:wpa_sm 276 struct wpa_ptk *ptk); 281 struct wpa_ptk *ptk); 285 struct wpa_ptk *ptk, size_t ptk_len);
|
H A D | wpa.c | 137 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL, 265 * @ptk: PTK to use for keyed hash and encryption 272 struct wpa_ptk *ptk) 346 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL, 355 struct wpa_ptk *ptk) 360 return wpa_derive_ptk_ft(sm, src_addr, key, ptk, ptk_len); 365 (u8 *) ptk, ptk_len, 377 struct wpa_ptk *ptk; local 429 ptk = &sm->tptk; 430 wpa_derive_ptk(sm, src_addr, key, ptk); 268 wpa_supplicant_send_2_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, int ver, const u8 *nonce, const u8 *wpa_ie, size_t wpa_ie_len, struct wpa_ptk *ptk) argument 353 wpa_derive_ptk(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, struct wpa_ptk *ptk) argument 1028 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, const u8 *kde, size_t kde_len, struct wpa_ptk *ptk) argument [all...] |
H A D | wpa_ft.c | 55 struct wpa_ptk *ptk, size_t ptk_len) 80 (u8 *) ptk, ptk_len, ptk_name); 81 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len); 523 sizeof(null_rsc), (u8 *) sm->ptk.tk1, keylen) < 0) { 670 (u8 *) &sm->ptk, ptk_len, ptk_name); 672 (u8 *) &sm->ptk, ptk_len); 676 sm->pmk_r1_name, sm->ptk.kck, bssid, 749 if (aes_unwrap(sm->ptk.kek, gtk_len / 8, gtk_elem + 11, gtk)) { 839 if (aes_unwrap(sm->ptk.kek, WPA_IGTK_LEN / 8, igtk_elem + 9, igtk)) { 962 if (wpa_ft_mic(sm->ptk 53 wpa_derive_ptk_ft(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, struct wpa_ptk *ptk, size_t ptk_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | wpa_i.h | 30 struct wpa_ptk ptk, tptk; member in struct:wpa_sm 276 struct wpa_ptk *ptk); 281 struct wpa_ptk *ptk); 285 struct wpa_ptk *ptk, size_t ptk_len);
|
H A D | wpa.c | 137 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL, 265 * @ptk: PTK to use for keyed hash and encryption 272 struct wpa_ptk *ptk) 346 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL, 355 struct wpa_ptk *ptk) 360 return wpa_derive_ptk_ft(sm, src_addr, key, ptk, ptk_len); 365 (u8 *) ptk, ptk_len, 377 struct wpa_ptk *ptk; local 429 ptk = &sm->tptk; 430 wpa_derive_ptk(sm, src_addr, key, ptk); 268 wpa_supplicant_send_2_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, int ver, const u8 *nonce, const u8 *wpa_ie, size_t wpa_ie_len, struct wpa_ptk *ptk) argument 353 wpa_derive_ptk(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, struct wpa_ptk *ptk) argument 1028 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, const u8 *kde, size_t kde_len, struct wpa_ptk *ptk) argument [all...] |
H A D | wpa_ft.c | 55 struct wpa_ptk *ptk, size_t ptk_len) 80 (u8 *) ptk, ptk_len, ptk_name); 81 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len); 523 sizeof(null_rsc), (u8 *) sm->ptk.tk1, keylen) < 0) { 670 (u8 *) &sm->ptk, ptk_len, ptk_name); 672 (u8 *) &sm->ptk, ptk_len); 676 sm->pmk_r1_name, sm->ptk.kck, bssid, 749 if (aes_unwrap(sm->ptk.kek, gtk_len / 8, gtk_elem + 11, gtk)) { 839 if (aes_unwrap(sm->ptk.kek, WPA_IGTK_LEN / 8, igtk_elem + 9, igtk)) { 962 if (wpa_ft_mic(sm->ptk 53 wpa_derive_ptk_ft(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, struct wpa_ptk *ptk, size_t ptk_len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | wpa_common.c | 80 * @ptk: Buffer for pairwise transient key 96 u8 *ptk, size_t ptk_len, int use_sha256) 121 ptk, ptk_len); 124 sha1_prf(pmk, pmk_len, label, data, sizeof(data), ptk, 132 wpa_hexdump_key(MSG_DEBUG, "WPA: PTK", ptk, ptk_len); 666 u8 *ptk, size_t ptk_len, u8 *ptk_name) 687 sha256_prf(pmk_r1, PMK_LEN, "FT-PTK", buf, pos - buf, ptk, ptk_len); 93 wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, const u8 *addr1, const u8 *addr2, const u8 *nonce1, const u8 *nonce2, u8 *ptk, size_t ptk_len, int use_sha256) argument 663 wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *pmk_r1_name, u8 *ptk, size_t ptk_len, u8 *ptk_name) argument
|
H A D | wpa_common.h | 311 u8 *ptk, size_t ptk_len, int use_sha256); 331 u8 *ptk, size_t ptk_len, u8 *ptk_name);
|
/external/wpa_supplicant_8/src/common/ |
H A D | wpa_common.c | 80 * @ptk: Buffer for pairwise transient key 96 u8 *ptk, size_t ptk_len, int use_sha256) 121 ptk, ptk_len); 124 sha1_prf(pmk, pmk_len, label, data, sizeof(data), ptk, 132 wpa_hexdump_key(MSG_DEBUG, "WPA: PTK", ptk, ptk_len); 666 u8 *ptk, size_t ptk_len, u8 *ptk_name) 687 sha256_prf(pmk_r1, PMK_LEN, "FT-PTK", buf, pos - buf, ptk, ptk_len); 93 wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, const u8 *addr1, const u8 *addr2, const u8 *nonce1, const u8 *nonce2, u8 *ptk, size_t ptk_len, int use_sha256) argument 663 wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *pmk_r1_name, u8 *ptk, size_t ptk_len, u8 *ptk_name) argument
|
H A D | wpa_common.h | 311 u8 *ptk, size_t ptk_len, int use_sha256); 331 u8 *ptk, size_t ptk_len, u8 *ptk_name);
|
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | wpa_common.c | 80 * @ptk: Buffer for pairwise transient key 96 u8 *ptk, size_t ptk_len, int use_sha256) 121 ptk, ptk_len); 124 sha1_prf(pmk, pmk_len, label, data, sizeof(data), ptk, 132 wpa_hexdump_key(MSG_DEBUG, "WPA: PTK", ptk, ptk_len); 666 u8 *ptk, size_t ptk_len, u8 *ptk_name) 687 sha256_prf(pmk_r1, PMK_LEN, "FT-PTK", buf, pos - buf, ptk, ptk_len); 93 wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, const u8 *addr1, const u8 *addr2, const u8 *nonce1, const u8 *nonce2, u8 *ptk, size_t ptk_len, int use_sha256) argument 663 wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *pmk_r1_name, u8 *ptk, size_t ptk_len, u8 *ptk_name) argument
|
H A D | wpa_common.h | 311 u8 *ptk, size_t ptk_len, int use_sha256); 331 u8 *ptk, size_t ptk_len, u8 *ptk_name);
|
/external/wpa_supplicant/ |
H A D | wpa.c | 867 * @ptk: Buffer for pairwise transient key 883 u8 *ptk, size_t ptk_len) 903 sha1_prf(pmk, pmk_len, label, data, sizeof(data), ptk, ptk_len); 906 wpa_hexdump_key(MSG_DEBUG, "WPA: PTK", ptk, ptk_len); 1024 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL, 1157 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL, 1441 struct wpa_ptk *ptk) 1478 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL, 1491 struct wpa_ptk *ptk; local 1536 ptk 879 wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, const u8 *addr1, const u8 *addr2, const u8 *nonce1, const u8 *nonce2, u8 *ptk, size_t ptk_len) argument 1436 wpa_supplicant_send_2_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, int ver, const u8 *nonce, const u8 *wpa_ie, size_t wpa_ie_len, struct wpa_ptk *ptk) argument 1964 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, const u8 *kde, size_t kde_len, struct wpa_ptk *ptk) argument [all...] |
H A D | wpa_i.h | 81 struct wpa_ptk ptk, tptk; member in struct:wpa_sm
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth_i.h | 228 struct wpa_ptk *ptk, size_t ptk_len);
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth_i.h | 228 struct wpa_ptk *ptk, size_t ptk_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth_i.h | 228 struct wpa_ptk *ptk, size_t ptk_len);
|