/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | wpa_common.c | 127 * @ptk: Buffer for pairwise transient key 144 struct wpa_ptk *ptk, int akmp, int cipher) 168 ptk->kck_len = wpa_kck_len(akmp); 169 ptk->kek_len = wpa_kek_len(akmp); 170 ptk->tk_len = wpa_cipher_key_len(cipher); 171 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len; 188 os_memcpy(ptk->kck, tmp, ptk 141 wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, const u8 *addr1, const u8 *addr2, const u8 *nonce1, const u8 *nonce2, struct wpa_ptk *ptk, int akmp, int cipher) argument 935 wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *pmk_r1_name, struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher) argument [all...] |
H A D | wpa_common.h | 340 struct wpa_ptk *ptk, int akmp, int cipher); 361 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher);
|
/external/wpa_supplicant_8/src/common/ |
H A D | wpa_common.c | 127 * @ptk: Buffer for pairwise transient key 144 struct wpa_ptk *ptk, int akmp, int cipher) 168 ptk->kck_len = wpa_kck_len(akmp); 169 ptk->kek_len = wpa_kek_len(akmp); 170 ptk->tk_len = wpa_cipher_key_len(cipher); 171 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len; 188 os_memcpy(ptk->kck, tmp, ptk 141 wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, const u8 *addr1, const u8 *addr2, const u8 *nonce1, const u8 *nonce2, struct wpa_ptk *ptk, int akmp, int cipher) argument 935 wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *pmk_r1_name, struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher) argument [all...] |
H A D | wpa_common.h | 340 struct wpa_ptk *ptk, int akmp, int cipher); 361 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher);
|
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | wpa_common.c | 127 * @ptk: Buffer for pairwise transient key 144 struct wpa_ptk *ptk, int akmp, int cipher) 168 ptk->kck_len = wpa_kck_len(akmp); 169 ptk->kek_len = wpa_kek_len(akmp); 170 ptk->tk_len = wpa_cipher_key_len(cipher); 171 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len; 188 os_memcpy(ptk->kck, tmp, ptk 141 wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, const u8 *addr1, const u8 *addr2, const u8 *nonce1, const u8 *nonce2, struct wpa_ptk *ptk, int akmp, int cipher) argument 935 wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *pmk_r1_name, struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher) argument [all...] |
H A D | wpa_common.h | 340 struct wpa_ptk *ptk, int akmp, int cipher); 361 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher);
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa.c | 151 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, bssid, 309 * @ptk: PTK to use for keyed hash and encryption 316 struct wpa_ptk *ptk) 401 wpa_eapol_key_send(sm, ptk->kck, ptk->kck_len, ver, dst, ETH_P_EAPOL, 409 const struct wpa_eapol_key *key, struct wpa_ptk *ptk) 413 return wpa_derive_ptk_ft(sm, src_addr, key, ptk); 418 key->key_nonce, ptk, sm->key_mgmt, 430 struct wpa_ptk *ptk; local 312 wpa_supplicant_send_2_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, int ver, const u8 *nonce, const u8 *wpa_ie, size_t wpa_ie_len, struct wpa_ptk *ptk) argument 408 wpa_derive_ptk(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, struct wpa_ptk *ptk) argument 1080 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, struct wpa_ptk *ptk) argument [all...] |
H A D | wpa_i.h | 24 struct wpa_ptk ptk, tptk; member in struct:wpa_sm 258 sm->ctx->set_rekey_offload(sm->ctx->ctx, sm->ptk.kek, sm->ptk.kek_len, 259 sm->ptk.kck, sm->ptk.kck_len, 359 struct wpa_ptk *ptk); 363 struct wpa_ptk *ptk); 366 const struct wpa_eapol_key *key, struct wpa_ptk *ptk);
|
H A D | wpa_ft.c | 22 const struct wpa_eapol_key *key, struct wpa_ptk *ptk) 46 sm->bssid, sm->pmk_r1_name, ptk, ptk_name, 333 sizeof(null_rsc), (u8 *) sm->ptk.tk, keylen) < 0) { 479 sm->own_addr, bssid, sm->pmk_r1_name, &sm->ptk, 485 sm->ptk.kck, sm->ptk.kck_len, bssid, 564 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, gtk_len / 8, gtk_elem + 11, 644 if (aes_unwrap(sm->ptk.kek, sm->ptk 21 wpa_derive_ptk_ft(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, struct wpa_ptk *ptk) argument [all...] |
H A D | peerkey.c | 117 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, dst, 171 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, src_addr, 1087 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, bssid,
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | wpa.c | 151 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, bssid, 309 * @ptk: PTK to use for keyed hash and encryption 316 struct wpa_ptk *ptk) 401 wpa_eapol_key_send(sm, ptk->kck, ptk->kck_len, ver, dst, ETH_P_EAPOL, 409 const struct wpa_eapol_key *key, struct wpa_ptk *ptk) 413 return wpa_derive_ptk_ft(sm, src_addr, key, ptk); 418 key->key_nonce, ptk, sm->key_mgmt, 430 struct wpa_ptk *ptk; local 312 wpa_supplicant_send_2_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, int ver, const u8 *nonce, const u8 *wpa_ie, size_t wpa_ie_len, struct wpa_ptk *ptk) argument 408 wpa_derive_ptk(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, struct wpa_ptk *ptk) argument 1080 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, struct wpa_ptk *ptk) argument [all...] |
H A D | wpa_i.h | 24 struct wpa_ptk ptk, tptk; member in struct:wpa_sm 258 sm->ctx->set_rekey_offload(sm->ctx->ctx, sm->ptk.kek, sm->ptk.kek_len, 259 sm->ptk.kck, sm->ptk.kck_len, 359 struct wpa_ptk *ptk); 363 struct wpa_ptk *ptk); 366 const struct wpa_eapol_key *key, struct wpa_ptk *ptk);
|
H A D | wpa_ft.c | 22 const struct wpa_eapol_key *key, struct wpa_ptk *ptk) 46 sm->bssid, sm->pmk_r1_name, ptk, ptk_name, 333 sizeof(null_rsc), (u8 *) sm->ptk.tk, keylen) < 0) { 479 sm->own_addr, bssid, sm->pmk_r1_name, &sm->ptk, 485 sm->ptk.kck, sm->ptk.kck_len, bssid, 564 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, gtk_len / 8, gtk_elem + 11, 644 if (aes_unwrap(sm->ptk.kek, sm->ptk 21 wpa_derive_ptk_ft(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, struct wpa_ptk *ptk) argument [all...] |
H A D | peerkey.c | 117 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, dst, 171 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, src_addr, 1087 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, bssid,
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | wpa.c | 151 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, bssid, 309 * @ptk: PTK to use for keyed hash and encryption 316 struct wpa_ptk *ptk) 401 wpa_eapol_key_send(sm, ptk->kck, ptk->kck_len, ver, dst, ETH_P_EAPOL, 409 const struct wpa_eapol_key *key, struct wpa_ptk *ptk) 413 return wpa_derive_ptk_ft(sm, src_addr, key, ptk); 418 key->key_nonce, ptk, sm->key_mgmt, 430 struct wpa_ptk *ptk; local 312 wpa_supplicant_send_2_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, int ver, const u8 *nonce, const u8 *wpa_ie, size_t wpa_ie_len, struct wpa_ptk *ptk) argument 408 wpa_derive_ptk(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, struct wpa_ptk *ptk) argument 1080 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, struct wpa_ptk *ptk) argument [all...] |
H A D | wpa_i.h | 24 struct wpa_ptk ptk, tptk; member in struct:wpa_sm 258 sm->ctx->set_rekey_offload(sm->ctx->ctx, sm->ptk.kek, sm->ptk.kek_len, 259 sm->ptk.kck, sm->ptk.kck_len, 359 struct wpa_ptk *ptk); 363 struct wpa_ptk *ptk); 366 const struct wpa_eapol_key *key, struct wpa_ptk *ptk);
|
H A D | wpa_ft.c | 22 const struct wpa_eapol_key *key, struct wpa_ptk *ptk) 46 sm->bssid, sm->pmk_r1_name, ptk, ptk_name, 333 sizeof(null_rsc), (u8 *) sm->ptk.tk, keylen) < 0) { 479 sm->own_addr, bssid, sm->pmk_r1_name, &sm->ptk, 485 sm->ptk.kck, sm->ptk.kck_len, bssid, 564 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, gtk_len / 8, gtk_elem + 11, 644 if (aes_unwrap(sm->ptk.kek, sm->ptk 21 wpa_derive_ptk_ft(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, struct wpa_ptk *ptk) argument [all...] |
H A D | peerkey.c | 117 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, dst, 171 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, src_addr, 1087 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, bssid,
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth_i.h | 253 struct wpa_ptk *ptk);
|
H A D | wpa_auth_ft.c | 365 struct wpa_ptk *ptk) 400 ptk, ptk_name, sm->wpa_key_mgmt, sm->pairwise); 364 wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, const u8 *pmk, struct wpa_ptk *ptk) argument
|
H A D | wpa_auth.c | 47 const u8 *pmk, struct wpa_ptk *ptk); 1995 const u8 *pmk, struct wpa_ptk *ptk) 1999 return wpa_auth_derive_ptk_ft(sm, pmk, ptk); 2004 ptk, sm->wpa_key_mgmt, sm->pairwise); 1994 wpa_derive_ptk(struct wpa_state_machine *sm, const u8 *snonce, const u8 *pmk, struct wpa_ptk *ptk) argument
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth_i.h | 253 struct wpa_ptk *ptk);
|
H A D | wpa_auth_ft.c | 365 struct wpa_ptk *ptk) 400 ptk, ptk_name, sm->wpa_key_mgmt, sm->pairwise); 364 wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, const u8 *pmk, struct wpa_ptk *ptk) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth_i.h | 253 struct wpa_ptk *ptk);
|
H A D | wpa_auth_ft.c | 365 struct wpa_ptk *ptk) 400 ptk, ptk_name, sm->wpa_key_mgmt, sm->pairwise); 364 wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, const u8 *pmk, struct wpa_ptk *ptk) argument
|