HomeSort by relevance Sort by last modified time
    Searched refs:ptk (Results 1 - 9 of 9) sorted by null

  /external/wpa_supplicant_8/src/rsn_supp/
wpa_i.h 24 struct wpa_ptk ptk, tptk; member in struct:wpa_sm
248 sm->ctx->set_rekey_offload(sm->ctx->ctx, sm->ptk.kek,
249 sm->ptk.kck, sm->rx_replay_counter);
308 struct wpa_ptk *ptk);
313 struct wpa_ptk *ptk);
317 struct wpa_ptk *ptk, size_t ptk_len);
wpa.c 29 * @kck: Key Confirmation Key (KCK, part of PTK)
131 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL,
267 * @ptk: PTK to use for keyed hash and encryption
274 struct wpa_ptk *ptk)
348 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL,
357 struct wpa_ptk *ptk)
362 return wpa_derive_ptk_ft(sm, src_addr, key, ptk, ptk_len);
367 (u8 *) ptk, ptk_len,
379 struct wpa_ptk *ptk; local
    [all...]
wpa_ft.c 23 struct wpa_ptk *ptk, size_t ptk_len)
48 (u8 *) ptk, ptk_len, ptk_name);
49 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len);
322 wpa_printf(MSG_DEBUG, "FT: Installing PTK to the driver.");
334 sizeof(null_rsc), (u8 *) sm->ptk.tk1, keylen) < 0) {
335 wpa_printf(MSG_WARNING, "FT: Failed to set PTK to the driver");
481 (u8 *) &sm->ptk, ptk_len, ptk_name);
482 wpa_hexdump_key(MSG_DEBUG, "FT: PTK",
483 (u8 *) &sm->ptk, ptk_len)
    [all...]
peerkey.c 115 wpa_eapol_key_send(sm, sm->ptk.kck, ver, dst, ETH_P_EAPOL,
167 wpa_eapol_key_send(sm, sm->ptk.kck, ver, src_addr, ETH_P_EAPOL,
1099 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL,
    [all...]
  /external/wpa_supplicant_8/src/common/
wpa_common.c 68 * wpa_pmk_to_ptk - Calculate PTK from PMK, addresses, and nonces
76 * @ptk: Buffer for pairwise transient key
77 * @ptk_len: Length of PTK
81 * PTK = PRF-X(PMK, "Pairwise key expansion",
92 u8 *ptk, size_t ptk_len, int use_sha256)
117 ptk, ptk_len);
120 sha1_prf(pmk, pmk_len, label, data, sizeof(data), ptk,
123 wpa_printf(MSG_DEBUG, "WPA: PTK derivation - A1=" MACSTR " A2=" MACSTR,
128 wpa_hexdump_key(MSG_DEBUG, "WPA: PTK", ptk, ptk_len)
    [all...]
wpa_common.h 319 u8 *ptk, size_t ptk_len, int use_sha256);
339 u8 *ptk, size_t ptk_len, u8 *ptk_name);
  /external/wpa_supplicant_8/src/ap/
wpa_auth_i.h 62 struct wpa_ptk PTK;
75 Boolean PtkGroupInit; /* init request for PTK Group state machine */
227 struct wpa_ptk *ptk, size_t ptk_len);
wpa_auth_ft.c 345 struct wpa_ptk *ptk, size_t ptk_len)
381 (u8 *) ptk, ptk_len, ptk_name);
382 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len);
444 if (aes_wrap(sm->PTK.kek, key_len / 8, key, subelem + 13)) {
476 if (aes_wrap(sm->PTK.kek, WPA_IGTK_LEN / 8,
729 wpa_ft_mic(sm->PTK.kck, sm->addr, sm->wpa_auth->addr, 6,
757 /* MLME-SETKEYS.request(PTK) */
762 "PTK configuration", sm->pairwise);
769 * again after association to get the PTK configured, but that could b
    [all...]
wpa_auth.c 35 static int wpa_verify_key_mic(struct wpa_ptk *PTK, u8 *data, size_t data_len);
263 wpa_auth_logger(wpa_auth, sm->addr, LOGGER_DEBUG, "rekeying PTK");
1062 if (wpa_verify_key_mic(&sm->PTK, data, data_len)) {
    [all...]

Completed in 396 milliseconds