/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa_ft.c | 23 struct wpa_ptk *ptk, size_t ptk_len) 48 (u8 *) ptk, ptk_len, ptk_name); 49 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len); 377 size_t ft_ies_len, ptk_len; local 478 ptk_len = sm->pairwise_cipher != WPA_CIPHER_TKIP ? 48 : 64; 481 (u8 *) &sm->ptk, ptk_len, ptk_name); 483 (u8 *) &sm->ptk, ptk_len); 21 wpa_derive_ptk_ft(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, struct wpa_ptk *ptk, size_t ptk_len) argument
|
H A D | wpa.c | 359 size_t ptk_len = sm->pairwise_cipher != WPA_CIPHER_TKIP ? 48 : 64; local 362 return wpa_derive_ptk_ft(sm, src_addr, key, ptk, ptk_len); 367 (u8 *) ptk, ptk_len,
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | wpa_ft.c | 23 struct wpa_ptk *ptk, size_t ptk_len) 48 (u8 *) ptk, ptk_len, ptk_name); 49 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len); 377 size_t ft_ies_len, ptk_len; local 478 ptk_len = sm->pairwise_cipher != WPA_CIPHER_TKIP ? 48 : 64; 481 (u8 *) &sm->ptk, ptk_len, ptk_name); 483 (u8 *) &sm->ptk, ptk_len); 21 wpa_derive_ptk_ft(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, struct wpa_ptk *ptk, size_t ptk_len) argument
|
H A D | wpa.c | 359 size_t ptk_len = sm->pairwise_cipher != WPA_CIPHER_TKIP ? 48 : 64; local 362 return wpa_derive_ptk_ft(sm, src_addr, key, ptk, ptk_len); 367 (u8 *) ptk, ptk_len,
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | wpa_ft.c | 23 struct wpa_ptk *ptk, size_t ptk_len) 48 (u8 *) ptk, ptk_len, ptk_name); 49 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len); 377 size_t ft_ies_len, ptk_len; local 478 ptk_len = sm->pairwise_cipher != WPA_CIPHER_TKIP ? 48 : 64; 481 (u8 *) &sm->ptk, ptk_len, ptk_name); 483 (u8 *) &sm->ptk, ptk_len); 21 wpa_derive_ptk_ft(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, struct wpa_ptk *ptk, size_t ptk_len) argument
|
H A D | wpa.c | 359 size_t ptk_len = sm->pairwise_cipher != WPA_CIPHER_TKIP ? 48 : 64; local 362 return wpa_derive_ptk_ft(sm, src_addr, key, ptk, ptk_len); 367 (u8 *) ptk, ptk_len,
|
/external/wpa_supplicant_6/wpa_supplicant/src/common/ |
H A D | wpa_common.c | 81 * @ptk_len: Length of PTK 96 u8 *ptk, size_t ptk_len, int use_sha256) 121 ptk, ptk_len); 125 ptk_len); 130 wpa_hexdump_key(MSG_DEBUG, "WPA: PTK", ptk, ptk_len); 526 u8 *ptk, size_t ptk_len, u8 *ptk_name) 547 sha256_prf(pmk_r1, PMK_LEN, "FT-PTK", buf, pos - buf, ptk, ptk_len); 93 wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, const u8 *addr1, const u8 *addr2, const u8 *nonce1, const u8 *nonce2, u8 *ptk, size_t ptk_len, int use_sha256) argument 523 wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *pmk_r1_name, u8 *ptk, size_t ptk_len, u8 *ptk_name) argument
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
H A D | wpa_ft.c | 28 struct wpa_ptk *ptk, size_t ptk_len) 53 (u8 *) ptk, ptk_len, ptk_name); 54 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len); 458 size_t ft_ies_len, ptk_len; local 548 ptk_len = sm->pairwise_cipher == WPA_CIPHER_CCMP ? 48 : 64; 551 (u8 *) &sm->ptk, ptk_len, ptk_name); 553 (u8 *) &sm->ptk, ptk_len); 26 wpa_derive_ptk_ft(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, struct wpa_ptk *ptk, size_t ptk_len) argument
|
H A D | wpa.c | 362 size_t ptk_len = sm->pairwise_cipher == WPA_CIPHER_CCMP ? 48 : 64; local 365 return wpa_derive_ptk_ft(sm, src_addr, key, ptk, ptk_len); 370 (u8 *) ptk, ptk_len,
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth_ft.c | 344 struct wpa_ptk *ptk, size_t ptk_len) 380 (u8 *) ptk, ptk_len, ptk_name); 381 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len); 790 size_t buflen, ptk_len; local 881 ptk_len = pairwise == WPA_CIPHER_TKIP ? 64 : 48; 884 (u8 *) &sm->PTK, ptk_len, ptk_name); 886 (u8 *) &sm->PTK, ptk_len); 343 wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, const u8 *pmk, struct wpa_ptk *ptk, size_t ptk_len) argument
|
H A D | wpa_auth.c | 1728 size_t ptk_len = sm->pairwise != WPA_CIPHER_TKIP ? 48 : 64; local 1731 return wpa_auth_derive_ptk_ft(sm, pmk, ptk, ptk_len); 1736 (u8 *) ptk, ptk_len,
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | wpa_common.c | 77 * @ptk_len: Length of PTK 92 u8 *ptk, size_t ptk_len, int use_sha256) 117 ptk, ptk_len); 121 ptk_len); 128 wpa_hexdump_key(MSG_DEBUG, "WPA: PTK", ptk, ptk_len); 812 u8 *ptk, size_t ptk_len, u8 *ptk_name) 833 sha256_prf(pmk_r1, PMK_LEN, "FT-PTK", buf, pos - buf, ptk, ptk_len); 89 wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, const u8 *addr1, const u8 *addr2, const u8 *nonce1, const u8 *nonce2, u8 *ptk, size_t ptk_len, int use_sha256) argument 809 wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *pmk_r1_name, u8 *ptk, size_t ptk_len, u8 *ptk_name) argument
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth_ft.c | 344 struct wpa_ptk *ptk, size_t ptk_len) 380 (u8 *) ptk, ptk_len, ptk_name); 381 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len); 790 size_t buflen, ptk_len; local 881 ptk_len = pairwise == WPA_CIPHER_TKIP ? 64 : 48; 884 (u8 *) &sm->PTK, ptk_len, ptk_name); 886 (u8 *) &sm->PTK, ptk_len); 343 wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, const u8 *pmk, struct wpa_ptk *ptk, size_t ptk_len) argument
|
H A D | wpa_auth.c | 1728 size_t ptk_len = sm->pairwise != WPA_CIPHER_TKIP ? 48 : 64; local 1731 return wpa_auth_derive_ptk_ft(sm, pmk, ptk, ptk_len); 1736 (u8 *) ptk, ptk_len,
|
/external/wpa_supplicant_8/src/common/ |
H A D | wpa_common.c | 77 * @ptk_len: Length of PTK 92 u8 *ptk, size_t ptk_len, int use_sha256) 117 ptk, ptk_len); 121 ptk_len); 128 wpa_hexdump_key(MSG_DEBUG, "WPA: PTK", ptk, ptk_len); 812 u8 *ptk, size_t ptk_len, u8 *ptk_name) 833 sha256_prf(pmk_r1, PMK_LEN, "FT-PTK", buf, pos - buf, ptk, ptk_len); 89 wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, const u8 *addr1, const u8 *addr2, const u8 *nonce1, const u8 *nonce2, u8 *ptk, size_t ptk_len, int use_sha256) argument 809 wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *pmk_r1_name, u8 *ptk, size_t ptk_len, u8 *ptk_name) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth_ft.c | 344 struct wpa_ptk *ptk, size_t ptk_len) 380 (u8 *) ptk, ptk_len, ptk_name); 381 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len); 790 size_t buflen, ptk_len; local 881 ptk_len = pairwise == WPA_CIPHER_TKIP ? 64 : 48; 884 (u8 *) &sm->PTK, ptk_len, ptk_name); 886 (u8 *) &sm->PTK, ptk_len); 343 wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, const u8 *pmk, struct wpa_ptk *ptk, size_t ptk_len) argument
|
H A D | wpa_auth.c | 1728 size_t ptk_len = sm->pairwise != WPA_CIPHER_TKIP ? 48 : 64; local 1731 return wpa_auth_derive_ptk_ft(sm, pmk, ptk, ptk_len); 1736 (u8 *) ptk, ptk_len,
|
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | wpa_common.c | 77 * @ptk_len: Length of PTK 92 u8 *ptk, size_t ptk_len, int use_sha256) 117 ptk, ptk_len); 121 ptk_len); 128 wpa_hexdump_key(MSG_DEBUG, "WPA: PTK", ptk, ptk_len); 812 u8 *ptk, size_t ptk_len, u8 *ptk_name) 833 sha256_prf(pmk_r1, PMK_LEN, "FT-PTK", buf, pos - buf, ptk, ptk_len); 89 wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, const u8 *addr1, const u8 *addr2, const u8 *nonce1, const u8 *nonce2, u8 *ptk, size_t ptk_len, int use_sha256) argument 809 wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *pmk_r1_name, u8 *ptk, size_t ptk_len, u8 *ptk_name) argument
|