HomeSort by relevance Sort by last modified time
    Searched refs:ptk (Results 1 - 17 of 17) sorted by null

  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
wpa_i.h 28 struct wpa_ptk ptk, tptk; member in struct:wpa_sm
234 struct wpa_ptk *ptk);
239 struct wpa_ptk *ptk);
243 struct wpa_ptk *ptk, size_t ptk_len);
wpa_ft.c 28 struct wpa_ptk *ptk, size_t ptk_len)
53 (u8 *) ptk, ptk_len, ptk_name);
54 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len);
399 wpa_printf(MSG_DEBUG, "FT: Installing PTK to the driver.");
417 sizeof(null_rsc), (u8 *) sm->ptk.tk1, keylen) < 0) {
418 wpa_printf(MSG_WARNING, "FT: Failed to set PTK to the driver");
551 (u8 *) &sm->ptk, ptk_len, ptk_name);
552 wpa_hexdump_key(MSG_DEBUG, "FT: PTK",
553 (u8 *) &sm->ptk, ptk_len)
    [all...]
wpa.c 95 * @kck: Key Confirmation Key (KCK, part of PTK)
186 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL,
307 * @ptk: PTK to use for keyed hash and encryption
314 struct wpa_ptk *ptk)
351 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL,
360 struct wpa_ptk *ptk)
365 return wpa_derive_ptk_ft(sm, src_addr, key, ptk, ptk_len);
370 (u8 *) ptk, ptk_len,
382 struct wpa_ptk *ptk; local
    [all...]
peerkey.c 120 wpa_eapol_key_send(sm, sm->ptk.kck, ver, dst, ETH_P_EAPOL,
172 wpa_eapol_key_send(sm, sm->ptk.kck, ver, src_addr, ETH_P_EAPOL,
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/common/
wpa_common.c 72 * wpa_pmk_to_ptk - Calculate PTK from PMK, addresses, and nonces
80 * @ptk: Buffer for pairwise transient key
81 * @ptk_len: Length of PTK
85 * PTK = PRF-X(PMK, "Pairwise key expansion",
96 u8 *ptk, size_t ptk_len, int use_sha256)
121 ptk, ptk_len);
124 sha1_prf(pmk, pmk_len, label, data, sizeof(data), ptk,
127 wpa_printf(MSG_DEBUG, "WPA: PTK derivation - A1=" MACSTR " A2=" MACSTR,
130 wpa_hexdump_key(MSG_DEBUG, "WPA: PTK", ptk, ptk_len)
    [all...]
wpa_common.h 297 u8 *ptk, size_t ptk_len, int use_sha256);
317 u8 *ptk, size_t ptk_len, u8 *ptk_name);
  /external/wpa_supplicant_8/src/rsn_supp/
wpa_i.h 30 struct wpa_ptk ptk, tptk; member in struct:wpa_sm
276 struct wpa_ptk *ptk);
281 struct wpa_ptk *ptk);
285 struct wpa_ptk *ptk, size_t ptk_len);
wpa.c 35 * @kck: Key Confirmation Key (KCK, part of PTK)
137 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL,
265 * @ptk: PTK to use for keyed hash and encryption
272 struct wpa_ptk *ptk)
346 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL,
355 struct wpa_ptk *ptk)
360 return wpa_derive_ptk_ft(sm, src_addr, key, ptk, ptk_len);
365 (u8 *) ptk, ptk_len,
377 struct wpa_ptk *ptk; local
    [all...]
wpa_ft.c 55 struct wpa_ptk *ptk, size_t ptk_len)
80 (u8 *) ptk, ptk_len, ptk_name);
81 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len);
505 wpa_printf(MSG_DEBUG, "FT: Installing PTK to the driver.");
523 sizeof(null_rsc), (u8 *) sm->ptk.tk1, keylen) < 0) {
524 wpa_printf(MSG_WARNING, "FT: Failed to set PTK to the driver");
670 (u8 *) &sm->ptk, ptk_len, ptk_name);
671 wpa_hexdump_key(MSG_DEBUG, "FT: PTK",
672 (u8 *) &sm->ptk, ptk_len)
    [all...]
peerkey.c 121 wpa_eapol_key_send(sm, sm->ptk.kck, ver, dst, ETH_P_EAPOL,
173 wpa_eapol_key_send(sm, sm->ptk.kck, ver, src_addr, ETH_P_EAPOL,
    [all...]
  /external/wpa_supplicant_8/src/common/
wpa_common.c 72 * wpa_pmk_to_ptk - Calculate PTK from PMK, addresses, and nonces
80 * @ptk: Buffer for pairwise transient key
81 * @ptk_len: Length of PTK
85 * PTK = PRF-X(PMK, "Pairwise key expansion",
96 u8 *ptk, size_t ptk_len, int use_sha256)
121 ptk, ptk_len);
124 sha1_prf(pmk, pmk_len, label, data, sizeof(data), ptk,
127 wpa_printf(MSG_DEBUG, "WPA: PTK derivation - A1=" MACSTR " A2=" MACSTR,
132 wpa_hexdump_key(MSG_DEBUG, "WPA: PTK", ptk, ptk_len)
    [all...]
wpa_common.h 311 u8 *ptk, size_t ptk_len, int use_sha256);
331 u8 *ptk, size_t ptk_len, u8 *ptk_name);
  /external/wpa_supplicant/
wpa.c 859 * wpa_pmk_to_ptk - Calculate PTK from PMK, addresses, and nonces
867 * @ptk: Buffer for pairwise transient key
868 * @ptk_len: Length of PTK
871 * PTK = PRF-X(PMK, "Pairwise key expansion",
883 u8 *ptk, size_t ptk_len)
903 sha1_prf(pmk, pmk_len, label, data, sizeof(data), ptk, ptk_len);
906 wpa_hexdump_key(MSG_DEBUG, "WPA: PTK", ptk, ptk_len);
1024 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL,
1491 struct wpa_ptk *ptk; local
    [all...]
wpa_i.h 81 struct wpa_ptk ptk, tptk; member in struct:wpa_sm
  /external/wpa_supplicant_8/src/ap/
wpa_auth_i.h 67 struct wpa_ptk PTK;
79 Boolean PtkGroupInit; /* init request for PTK Group state machine */
228 struct wpa_ptk *ptk, size_t ptk_len);
wpa_auth_ft.c 360 struct wpa_ptk *ptk, size_t ptk_len)
396 (u8 *) ptk, ptk_len, ptk_name);
397 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len);
459 if (aes_wrap(sm->PTK.kek, key_len / 8, key, subelem + 13)) {
491 if (aes_wrap(sm->PTK.kek, WPA_IGTK_LEN / 8,
720 wpa_ft_mic(sm->PTK.kck, sm->addr, sm->wpa_auth->addr, 6,
885 /* MLME-SETKEYS.request(PTK) */
894 "PTK configuration", sm->pairwise);
901 * again after association to get the PTK configured, but that could b
    [all...]
wpa_auth.c 41 static int wpa_verify_key_mic(struct wpa_ptk *PTK, u8 *data, size_t data_len);
263 wpa_auth_logger(wpa_auth, sm->addr, LOGGER_DEBUG, "rekeying PTK");
970 if (wpa_verify_key_mic(&sm->PTK, data, data_len)) {
1031 /* FIX: why was this triggering PTK rekeying for the
    [all...]

Completed in 39 milliseconds