/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
wpa_i.h | 28 struct wpa_ptk ptk, tptk; member in struct:wpa_sm 234 struct wpa_ptk *ptk); 239 struct wpa_ptk *ptk); 243 struct wpa_ptk *ptk, size_t ptk_len);
|
wpa_ft.c | 28 struct wpa_ptk *ptk, size_t ptk_len) 53 (u8 *) ptk, ptk_len, ptk_name); 54 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len); 399 wpa_printf(MSG_DEBUG, "FT: Installing PTK to the driver."); 417 sizeof(null_rsc), (u8 *) sm->ptk.tk1, keylen) < 0) { 418 wpa_printf(MSG_WARNING, "FT: Failed to set PTK to the driver"); 551 (u8 *) &sm->ptk, ptk_len, ptk_name); 552 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", 553 (u8 *) &sm->ptk, ptk_len) [all...] |
wpa.c | 95 * @kck: Key Confirmation Key (KCK, part of PTK) 186 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL, 307 * @ptk: PTK to use for keyed hash and encryption 314 struct wpa_ptk *ptk) 351 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL, 360 struct wpa_ptk *ptk) 365 return wpa_derive_ptk_ft(sm, src_addr, key, ptk, ptk_len); 370 (u8 *) ptk, ptk_len, 382 struct wpa_ptk *ptk; local [all...] |
peerkey.c | 120 wpa_eapol_key_send(sm, sm->ptk.kck, ver, dst, ETH_P_EAPOL, 172 wpa_eapol_key_send(sm, sm->ptk.kck, ver, src_addr, ETH_P_EAPOL, [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/common/ |
wpa_common.c | 72 * wpa_pmk_to_ptk - Calculate PTK from PMK, addresses, and nonces 80 * @ptk: Buffer for pairwise transient key 81 * @ptk_len: Length of PTK 85 * PTK = PRF-X(PMK, "Pairwise key expansion", 96 u8 *ptk, size_t ptk_len, int use_sha256) 121 ptk, ptk_len); 124 sha1_prf(pmk, pmk_len, label, data, sizeof(data), ptk, 127 wpa_printf(MSG_DEBUG, "WPA: PTK derivation - A1=" MACSTR " A2=" MACSTR, 130 wpa_hexdump_key(MSG_DEBUG, "WPA: PTK", ptk, ptk_len) [all...] |
wpa_common.h | 297 u8 *ptk, size_t ptk_len, int use_sha256); 317 u8 *ptk, size_t ptk_len, u8 *ptk_name);
|
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_i.h | 30 struct wpa_ptk ptk, tptk; member in struct:wpa_sm 276 struct wpa_ptk *ptk); 281 struct wpa_ptk *ptk); 285 struct wpa_ptk *ptk, size_t ptk_len);
|
wpa.c | 35 * @kck: Key Confirmation Key (KCK, part of PTK) 137 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL, 265 * @ptk: PTK to use for keyed hash and encryption 272 struct wpa_ptk *ptk) 346 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL, 355 struct wpa_ptk *ptk) 360 return wpa_derive_ptk_ft(sm, src_addr, key, ptk, ptk_len); 365 (u8 *) ptk, ptk_len, 377 struct wpa_ptk *ptk; local [all...] |
wpa_ft.c | 55 struct wpa_ptk *ptk, size_t ptk_len) 80 (u8 *) ptk, ptk_len, ptk_name); 81 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len); 505 wpa_printf(MSG_DEBUG, "FT: Installing PTK to the driver."); 523 sizeof(null_rsc), (u8 *) sm->ptk.tk1, keylen) < 0) { 524 wpa_printf(MSG_WARNING, "FT: Failed to set PTK to the driver"); 670 (u8 *) &sm->ptk, ptk_len, ptk_name); 671 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", 672 (u8 *) &sm->ptk, ptk_len) [all...] |
peerkey.c | 121 wpa_eapol_key_send(sm, sm->ptk.kck, ver, dst, ETH_P_EAPOL, 173 wpa_eapol_key_send(sm, sm->ptk.kck, ver, src_addr, ETH_P_EAPOL, [all...] |
/external/wpa_supplicant_8/src/common/ |
wpa_common.c | 72 * wpa_pmk_to_ptk - Calculate PTK from PMK, addresses, and nonces 80 * @ptk: Buffer for pairwise transient key 81 * @ptk_len: Length of PTK 85 * PTK = PRF-X(PMK, "Pairwise key expansion", 96 u8 *ptk, size_t ptk_len, int use_sha256) 121 ptk, ptk_len); 124 sha1_prf(pmk, pmk_len, label, data, sizeof(data), ptk, 127 wpa_printf(MSG_DEBUG, "WPA: PTK derivation - A1=" MACSTR " A2=" MACSTR, 132 wpa_hexdump_key(MSG_DEBUG, "WPA: PTK", ptk, ptk_len) [all...] |
wpa_common.h | 311 u8 *ptk, size_t ptk_len, int use_sha256); 331 u8 *ptk, size_t ptk_len, u8 *ptk_name);
|
/external/wpa_supplicant/ |
wpa.c | 859 * wpa_pmk_to_ptk - Calculate PTK from PMK, addresses, and nonces 867 * @ptk: Buffer for pairwise transient key 868 * @ptk_len: Length of PTK 871 * PTK = PRF-X(PMK, "Pairwise key expansion", 883 u8 *ptk, size_t ptk_len) 903 sha1_prf(pmk, pmk_len, label, data, sizeof(data), ptk, ptk_len); 906 wpa_hexdump_key(MSG_DEBUG, "WPA: PTK", ptk, ptk_len); 1024 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL, 1491 struct wpa_ptk *ptk; local [all...] |
wpa_i.h | 81 struct wpa_ptk ptk, tptk; member in struct:wpa_sm
|
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_i.h | 67 struct wpa_ptk PTK; 79 Boolean PtkGroupInit; /* init request for PTK Group state machine */ 228 struct wpa_ptk *ptk, size_t ptk_len);
|
wpa_auth_ft.c | 360 struct wpa_ptk *ptk, size_t ptk_len) 396 (u8 *) ptk, ptk_len, ptk_name); 397 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len); 459 if (aes_wrap(sm->PTK.kek, key_len / 8, key, subelem + 13)) { 491 if (aes_wrap(sm->PTK.kek, WPA_IGTK_LEN / 8, 720 wpa_ft_mic(sm->PTK.kck, sm->addr, sm->wpa_auth->addr, 6, 885 /* MLME-SETKEYS.request(PTK) */ 894 "PTK configuration", sm->pairwise); 901 * again after association to get the PTK configured, but that could b [all...] |
wpa_auth.c | 41 static int wpa_verify_key_mic(struct wpa_ptk *PTK, u8 *data, size_t data_len); 263 wpa_auth_logger(wpa_auth, sm->addr, LOGGER_DEBUG, "rekeying PTK"); 970 if (wpa_verify_key_mic(&sm->PTK, data, data_len)) { 1031 /* FIX: why was this triggering PTK rekeying for the [all...] |