Searched refs:ptk (Results 1 - 25 of 27) sorted by relevance

12

/external/wpa_supplicant_8/hostapd/src/common/
H A Dwpa_common.c127 * @ptk: Buffer for pairwise transient key
144 struct wpa_ptk *ptk, int akmp, int cipher)
168 ptk->kck_len = wpa_kck_len(akmp);
169 ptk->kek_len = wpa_kek_len(akmp);
170 ptk->tk_len = wpa_cipher_key_len(cipher);
171 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len;
188 os_memcpy(ptk->kck, tmp, ptk
141 wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, const u8 *addr1, const u8 *addr2, const u8 *nonce1, const u8 *nonce2, struct wpa_ptk *ptk, int akmp, int cipher) argument
935 wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *pmk_r1_name, struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher) argument
[all...]
H A Dwpa_common.h340 struct wpa_ptk *ptk, int akmp, int cipher);
361 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher);
/external/wpa_supplicant_8/src/common/
H A Dwpa_common.c127 * @ptk: Buffer for pairwise transient key
144 struct wpa_ptk *ptk, int akmp, int cipher)
168 ptk->kck_len = wpa_kck_len(akmp);
169 ptk->kek_len = wpa_kek_len(akmp);
170 ptk->tk_len = wpa_cipher_key_len(cipher);
171 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len;
188 os_memcpy(ptk->kck, tmp, ptk
141 wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, const u8 *addr1, const u8 *addr2, const u8 *nonce1, const u8 *nonce2, struct wpa_ptk *ptk, int akmp, int cipher) argument
935 wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *pmk_r1_name, struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher) argument
[all...]
H A Dwpa_common.h340 struct wpa_ptk *ptk, int akmp, int cipher);
361 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher);
/external/wpa_supplicant_8/wpa_supplicant/src/common/
H A Dwpa_common.c127 * @ptk: Buffer for pairwise transient key
144 struct wpa_ptk *ptk, int akmp, int cipher)
168 ptk->kck_len = wpa_kck_len(akmp);
169 ptk->kek_len = wpa_kek_len(akmp);
170 ptk->tk_len = wpa_cipher_key_len(cipher);
171 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len;
188 os_memcpy(ptk->kck, tmp, ptk
141 wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, const u8 *addr1, const u8 *addr2, const u8 *nonce1, const u8 *nonce2, struct wpa_ptk *ptk, int akmp, int cipher) argument
935 wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *pmk_r1_name, struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher) argument
[all...]
H A Dwpa_common.h340 struct wpa_ptk *ptk, int akmp, int cipher);
361 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher);
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dwpa.c151 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, bssid,
309 * @ptk: PTK to use for keyed hash and encryption
316 struct wpa_ptk *ptk)
401 wpa_eapol_key_send(sm, ptk->kck, ptk->kck_len, ver, dst, ETH_P_EAPOL,
409 const struct wpa_eapol_key *key, struct wpa_ptk *ptk)
413 return wpa_derive_ptk_ft(sm, src_addr, key, ptk);
418 key->key_nonce, ptk, sm->key_mgmt,
430 struct wpa_ptk *ptk; local
312 wpa_supplicant_send_2_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, int ver, const u8 *nonce, const u8 *wpa_ie, size_t wpa_ie_len, struct wpa_ptk *ptk) argument
408 wpa_derive_ptk(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, struct wpa_ptk *ptk) argument
1080 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, struct wpa_ptk *ptk) argument
[all...]
H A Dwpa_i.h24 struct wpa_ptk ptk, tptk; member in struct:wpa_sm
258 sm->ctx->set_rekey_offload(sm->ctx->ctx, sm->ptk.kek, sm->ptk.kek_len,
259 sm->ptk.kck, sm->ptk.kck_len,
359 struct wpa_ptk *ptk);
363 struct wpa_ptk *ptk);
366 const struct wpa_eapol_key *key, struct wpa_ptk *ptk);
H A Dwpa_ft.c22 const struct wpa_eapol_key *key, struct wpa_ptk *ptk)
46 sm->bssid, sm->pmk_r1_name, ptk, ptk_name,
333 sizeof(null_rsc), (u8 *) sm->ptk.tk, keylen) < 0) {
479 sm->own_addr, bssid, sm->pmk_r1_name, &sm->ptk,
485 sm->ptk.kck, sm->ptk.kck_len, bssid,
564 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, gtk_len / 8, gtk_elem + 11,
644 if (aes_unwrap(sm->ptk.kek, sm->ptk
21 wpa_derive_ptk_ft(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, struct wpa_ptk *ptk) argument
[all...]
H A Dpeerkey.c117 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, dst,
171 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, src_addr,
1087 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, bssid,
/external/wpa_supplicant_8/src/rsn_supp/
H A Dwpa.c151 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, bssid,
309 * @ptk: PTK to use for keyed hash and encryption
316 struct wpa_ptk *ptk)
401 wpa_eapol_key_send(sm, ptk->kck, ptk->kck_len, ver, dst, ETH_P_EAPOL,
409 const struct wpa_eapol_key *key, struct wpa_ptk *ptk)
413 return wpa_derive_ptk_ft(sm, src_addr, key, ptk);
418 key->key_nonce, ptk, sm->key_mgmt,
430 struct wpa_ptk *ptk; local
312 wpa_supplicant_send_2_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, int ver, const u8 *nonce, const u8 *wpa_ie, size_t wpa_ie_len, struct wpa_ptk *ptk) argument
408 wpa_derive_ptk(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, struct wpa_ptk *ptk) argument
1080 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, struct wpa_ptk *ptk) argument
[all...]
H A Dwpa_i.h24 struct wpa_ptk ptk, tptk; member in struct:wpa_sm
258 sm->ctx->set_rekey_offload(sm->ctx->ctx, sm->ptk.kek, sm->ptk.kek_len,
259 sm->ptk.kck, sm->ptk.kck_len,
359 struct wpa_ptk *ptk);
363 struct wpa_ptk *ptk);
366 const struct wpa_eapol_key *key, struct wpa_ptk *ptk);
H A Dwpa_ft.c22 const struct wpa_eapol_key *key, struct wpa_ptk *ptk)
46 sm->bssid, sm->pmk_r1_name, ptk, ptk_name,
333 sizeof(null_rsc), (u8 *) sm->ptk.tk, keylen) < 0) {
479 sm->own_addr, bssid, sm->pmk_r1_name, &sm->ptk,
485 sm->ptk.kck, sm->ptk.kck_len, bssid,
564 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, gtk_len / 8, gtk_elem + 11,
644 if (aes_unwrap(sm->ptk.kek, sm->ptk
21 wpa_derive_ptk_ft(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, struct wpa_ptk *ptk) argument
[all...]
H A Dpeerkey.c117 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, dst,
171 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, src_addr,
1087 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, bssid,
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dwpa.c151 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, bssid,
309 * @ptk: PTK to use for keyed hash and encryption
316 struct wpa_ptk *ptk)
401 wpa_eapol_key_send(sm, ptk->kck, ptk->kck_len, ver, dst, ETH_P_EAPOL,
409 const struct wpa_eapol_key *key, struct wpa_ptk *ptk)
413 return wpa_derive_ptk_ft(sm, src_addr, key, ptk);
418 key->key_nonce, ptk, sm->key_mgmt,
430 struct wpa_ptk *ptk; local
312 wpa_supplicant_send_2_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, int ver, const u8 *nonce, const u8 *wpa_ie, size_t wpa_ie_len, struct wpa_ptk *ptk) argument
408 wpa_derive_ptk(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, struct wpa_ptk *ptk) argument
1080 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, struct wpa_ptk *ptk) argument
[all...]
H A Dwpa_i.h24 struct wpa_ptk ptk, tptk; member in struct:wpa_sm
258 sm->ctx->set_rekey_offload(sm->ctx->ctx, sm->ptk.kek, sm->ptk.kek_len,
259 sm->ptk.kck, sm->ptk.kck_len,
359 struct wpa_ptk *ptk);
363 struct wpa_ptk *ptk);
366 const struct wpa_eapol_key *key, struct wpa_ptk *ptk);
H A Dwpa_ft.c22 const struct wpa_eapol_key *key, struct wpa_ptk *ptk)
46 sm->bssid, sm->pmk_r1_name, ptk, ptk_name,
333 sizeof(null_rsc), (u8 *) sm->ptk.tk, keylen) < 0) {
479 sm->own_addr, bssid, sm->pmk_r1_name, &sm->ptk,
485 sm->ptk.kck, sm->ptk.kck_len, bssid,
564 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, gtk_len / 8, gtk_elem + 11,
644 if (aes_unwrap(sm->ptk.kek, sm->ptk
21 wpa_derive_ptk_ft(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, struct wpa_ptk *ptk) argument
[all...]
H A Dpeerkey.c117 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, dst,
171 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, src_addr,
1087 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, bssid,
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dwpa_auth_i.h253 struct wpa_ptk *ptk);
H A Dwpa_auth_ft.c365 struct wpa_ptk *ptk)
400 ptk, ptk_name, sm->wpa_key_mgmt, sm->pairwise);
364 wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, const u8 *pmk, struct wpa_ptk *ptk) argument
H A Dwpa_auth.c47 const u8 *pmk, struct wpa_ptk *ptk);
1995 const u8 *pmk, struct wpa_ptk *ptk)
1999 return wpa_auth_derive_ptk_ft(sm, pmk, ptk);
2004 ptk, sm->wpa_key_mgmt, sm->pairwise);
1994 wpa_derive_ptk(struct wpa_state_machine *sm, const u8 *snonce, const u8 *pmk, struct wpa_ptk *ptk) argument
/external/wpa_supplicant_8/src/ap/
H A Dwpa_auth_i.h253 struct wpa_ptk *ptk);
H A Dwpa_auth_ft.c365 struct wpa_ptk *ptk)
400 ptk, ptk_name, sm->wpa_key_mgmt, sm->pairwise);
364 wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, const u8 *pmk, struct wpa_ptk *ptk) argument
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dwpa_auth_i.h253 struct wpa_ptk *ptk);
H A Dwpa_auth_ft.c365 struct wpa_ptk *ptk)
400 ptk, ptk_name, sm->wpa_key_mgmt, sm->pairwise);
364 wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, const u8 *pmk, struct wpa_ptk *ptk) argument

Completed in 272 milliseconds

12