/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa_ft.c | 23 struct wpa_ptk *ptk, size_t ptk_len) 48 (u8 *) ptk, ptk_len, ptk_name); 49 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len); 377 size_t ft_ies_len, ptk_len; local 478 ptk_len = sm->pairwise_cipher != WPA_CIPHER_TKIP ? 48 : 64; 481 (u8 *) &sm->ptk, ptk_len, ptk_name); 483 (u8 *) &sm->ptk, ptk_len); 21 wpa_derive_ptk_ft(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, struct wpa_ptk *ptk, size_t ptk_len) argument
|
H A D | wpa_i.h | 317 struct wpa_ptk *ptk, size_t ptk_len);
|
H A D | wpa.c | 359 size_t ptk_len = sm->pairwise_cipher != WPA_CIPHER_TKIP ? 48 : 64; local 362 return wpa_derive_ptk_ft(sm, src_addr, key, ptk, ptk_len); 367 (u8 *) ptk, ptk_len,
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | wpa_ft.c | 23 struct wpa_ptk *ptk, size_t ptk_len) 48 (u8 *) ptk, ptk_len, ptk_name); 49 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len); 377 size_t ft_ies_len, ptk_len; local 478 ptk_len = sm->pairwise_cipher != WPA_CIPHER_TKIP ? 48 : 64; 481 (u8 *) &sm->ptk, ptk_len, ptk_name); 483 (u8 *) &sm->ptk, ptk_len); 21 wpa_derive_ptk_ft(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, struct wpa_ptk *ptk, size_t ptk_len) argument
|
H A D | wpa_i.h | 317 struct wpa_ptk *ptk, size_t ptk_len);
|
H A D | wpa.c | 359 size_t ptk_len = sm->pairwise_cipher != WPA_CIPHER_TKIP ? 48 : 64; local 362 return wpa_derive_ptk_ft(sm, src_addr, key, ptk, ptk_len); 367 (u8 *) ptk, ptk_len,
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | wpa_ft.c | 23 struct wpa_ptk *ptk, size_t ptk_len) 48 (u8 *) ptk, ptk_len, ptk_name); 49 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len); 377 size_t ft_ies_len, ptk_len; local 478 ptk_len = sm->pairwise_cipher != WPA_CIPHER_TKIP ? 48 : 64; 481 (u8 *) &sm->ptk, ptk_len, ptk_name); 483 (u8 *) &sm->ptk, ptk_len); 21 wpa_derive_ptk_ft(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, struct wpa_ptk *ptk, size_t ptk_len) argument
|
H A D | wpa_i.h | 317 struct wpa_ptk *ptk, size_t ptk_len);
|
H A D | wpa.c | 359 size_t ptk_len = sm->pairwise_cipher != WPA_CIPHER_TKIP ? 48 : 64; local 362 return wpa_derive_ptk_ft(sm, src_addr, key, ptk, ptk_len); 367 (u8 *) ptk, ptk_len,
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | wpa_common.c | 77 * @ptk_len: Length of PTK 92 u8 *ptk, size_t ptk_len, int use_sha256) 117 ptk, ptk_len); 121 ptk_len); 128 wpa_hexdump_key(MSG_DEBUG, "WPA: PTK", ptk, ptk_len); 812 u8 *ptk, size_t ptk_len, u8 *ptk_name) 833 sha256_prf(pmk_r1, PMK_LEN, "FT-PTK", buf, pos - buf, ptk, ptk_len); 89 wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, const u8 *addr1, const u8 *addr2, const u8 *nonce1, const u8 *nonce2, u8 *ptk, size_t ptk_len, int use_sha256) argument 809 wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *pmk_r1_name, u8 *ptk, size_t ptk_len, u8 *ptk_name) argument
|
H A D | wpa_common.h | 319 u8 *ptk, size_t ptk_len, int use_sha256); 339 u8 *ptk, size_t ptk_len, u8 *ptk_name);
|
/external/wpa_supplicant_8/src/common/ |
H A D | wpa_common.c | 77 * @ptk_len: Length of PTK 92 u8 *ptk, size_t ptk_len, int use_sha256) 117 ptk, ptk_len); 121 ptk_len); 128 wpa_hexdump_key(MSG_DEBUG, "WPA: PTK", ptk, ptk_len); 812 u8 *ptk, size_t ptk_len, u8 *ptk_name) 833 sha256_prf(pmk_r1, PMK_LEN, "FT-PTK", buf, pos - buf, ptk, ptk_len); 89 wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, const u8 *addr1, const u8 *addr2, const u8 *nonce1, const u8 *nonce2, u8 *ptk, size_t ptk_len, int use_sha256) argument 809 wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *pmk_r1_name, u8 *ptk, size_t ptk_len, u8 *ptk_name) argument
|
H A D | wpa_common.h | 319 u8 *ptk, size_t ptk_len, int use_sha256); 339 u8 *ptk, size_t ptk_len, u8 *ptk_name);
|
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | wpa_common.c | 77 * @ptk_len: Length of PTK 92 u8 *ptk, size_t ptk_len, int use_sha256) 117 ptk, ptk_len); 121 ptk_len); 128 wpa_hexdump_key(MSG_DEBUG, "WPA: PTK", ptk, ptk_len); 812 u8 *ptk, size_t ptk_len, u8 *ptk_name) 833 sha256_prf(pmk_r1, PMK_LEN, "FT-PTK", buf, pos - buf, ptk, ptk_len); 89 wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, const u8 *addr1, const u8 *addr2, const u8 *nonce1, const u8 *nonce2, u8 *ptk, size_t ptk_len, int use_sha256) argument 809 wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *pmk_r1_name, u8 *ptk, size_t ptk_len, u8 *ptk_name) argument
|
H A D | wpa_common.h | 319 u8 *ptk, size_t ptk_len, int use_sha256); 339 u8 *ptk, size_t ptk_len, u8 *ptk_name);
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth_i.h | 227 struct wpa_ptk *ptk, size_t ptk_len);
|
H A D | wpa_auth_ft.c | 345 struct wpa_ptk *ptk, size_t ptk_len) 381 (u8 *) ptk, ptk_len, ptk_name); 382 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len); 791 size_t buflen, ptk_len; local 882 ptk_len = pairwise == WPA_CIPHER_TKIP ? 64 : 48; 885 (u8 *) &sm->PTK, ptk_len, ptk_name); 887 (u8 *) &sm->PTK, ptk_len); 344 wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, const u8 *pmk, struct wpa_ptk *ptk, size_t ptk_len) argument
|
H A D | wpa_auth.c | 1750 size_t ptk_len = sm->pairwise != WPA_CIPHER_TKIP ? 48 : 64; local 1753 return wpa_auth_derive_ptk_ft(sm, pmk, ptk, ptk_len); 1758 (u8 *) ptk, ptk_len,
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth_i.h | 227 struct wpa_ptk *ptk, size_t ptk_len);
|
H A D | wpa_auth_ft.c | 345 struct wpa_ptk *ptk, size_t ptk_len) 381 (u8 *) ptk, ptk_len, ptk_name); 382 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len); 791 size_t buflen, ptk_len; local 882 ptk_len = pairwise == WPA_CIPHER_TKIP ? 64 : 48; 885 (u8 *) &sm->PTK, ptk_len, ptk_name); 887 (u8 *) &sm->PTK, ptk_len); 344 wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, const u8 *pmk, struct wpa_ptk *ptk, size_t ptk_len) argument
|
H A D | wpa_auth.c | 1750 size_t ptk_len = sm->pairwise != WPA_CIPHER_TKIP ? 48 : 64; local 1753 return wpa_auth_derive_ptk_ft(sm, pmk, ptk, ptk_len); 1758 (u8 *) ptk, ptk_len,
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth_i.h | 227 struct wpa_ptk *ptk, size_t ptk_len);
|
H A D | wpa_auth_ft.c | 345 struct wpa_ptk *ptk, size_t ptk_len) 381 (u8 *) ptk, ptk_len, ptk_name); 382 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len); 791 size_t buflen, ptk_len; local 882 ptk_len = pairwise == WPA_CIPHER_TKIP ? 64 : 48; 885 (u8 *) &sm->PTK, ptk_len, ptk_name); 887 (u8 *) &sm->PTK, ptk_len); 344 wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, const u8 *pmk, struct wpa_ptk *ptk, size_t ptk_len) argument
|
H A D | wpa_auth.c | 1750 size_t ptk_len = sm->pairwise != WPA_CIPHER_TKIP ? 48 : 64; local 1753 return wpa_auth_derive_ptk_ft(sm, pmk, ptk, ptk_len); 1758 (u8 *) ptk, ptk_len,
|