/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_i.h | 24 struct wpa_ptk ptk, tptk; member in struct:wpa_sm 248 sm->ctx->set_rekey_offload(sm->ctx->ctx, sm->ptk.kek, 249 sm->ptk.kck, sm->rx_replay_counter); 308 struct wpa_ptk *ptk); 313 struct wpa_ptk *ptk); 317 struct wpa_ptk *ptk, size_t ptk_len);
|
wpa.c | 29 * @kck: Key Confirmation Key (KCK, part of PTK) 131 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL, 267 * @ptk: PTK to use for keyed hash and encryption 274 struct wpa_ptk *ptk) 348 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL, 357 struct wpa_ptk *ptk) 362 return wpa_derive_ptk_ft(sm, src_addr, key, ptk, ptk_len); 367 (u8 *) ptk, ptk_len, 379 struct wpa_ptk *ptk; local [all...] |
wpa_ft.c | 23 struct wpa_ptk *ptk, size_t ptk_len) 48 (u8 *) ptk, ptk_len, ptk_name); 49 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len); 322 wpa_printf(MSG_DEBUG, "FT: Installing PTK to the driver."); 334 sizeof(null_rsc), (u8 *) sm->ptk.tk1, keylen) < 0) { 335 wpa_printf(MSG_WARNING, "FT: Failed to set PTK to the driver"); 481 (u8 *) &sm->ptk, ptk_len, ptk_name); 482 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", 483 (u8 *) &sm->ptk, ptk_len) [all...] |
peerkey.c | 115 wpa_eapol_key_send(sm, sm->ptk.kck, ver, dst, ETH_P_EAPOL, 167 wpa_eapol_key_send(sm, sm->ptk.kck, ver, src_addr, ETH_P_EAPOL, 1099 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL, [all...] |
/external/wpa_supplicant_8/src/common/ |
wpa_common.c | 68 * wpa_pmk_to_ptk - Calculate PTK from PMK, addresses, and nonces 76 * @ptk: Buffer for pairwise transient key 77 * @ptk_len: Length of PTK 81 * PTK = PRF-X(PMK, "Pairwise key expansion", 92 u8 *ptk, size_t ptk_len, int use_sha256) 117 ptk, ptk_len); 120 sha1_prf(pmk, pmk_len, label, data, sizeof(data), ptk, 123 wpa_printf(MSG_DEBUG, "WPA: PTK derivation - A1=" MACSTR " A2=" MACSTR, 128 wpa_hexdump_key(MSG_DEBUG, "WPA: PTK", ptk, ptk_len) [all...] |
wpa_common.h | 319 u8 *ptk, size_t ptk_len, int use_sha256); 339 u8 *ptk, size_t ptk_len, u8 *ptk_name);
|
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_i.h | 62 struct wpa_ptk PTK; 75 Boolean PtkGroupInit; /* init request for PTK Group state machine */ 227 struct wpa_ptk *ptk, size_t ptk_len);
|
wpa_auth_ft.c | 345 struct wpa_ptk *ptk, size_t ptk_len) 381 (u8 *) ptk, ptk_len, ptk_name); 382 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len); 444 if (aes_wrap(sm->PTK.kek, key_len / 8, key, subelem + 13)) { 476 if (aes_wrap(sm->PTK.kek, WPA_IGTK_LEN / 8, 729 wpa_ft_mic(sm->PTK.kck, sm->addr, sm->wpa_auth->addr, 6, 757 /* MLME-SETKEYS.request(PTK) */ 762 "PTK configuration", sm->pairwise); 769 * again after association to get the PTK configured, but that could b [all...] |
wpa_auth.c | 35 static int wpa_verify_key_mic(struct wpa_ptk *PTK, u8 *data, size_t data_len); 263 wpa_auth_logger(wpa_auth, sm->addr, LOGGER_DEBUG, "rekeying PTK"); 1062 if (wpa_verify_key_mic(&sm->PTK, data, data_len)) { [all...] |