/external/wpa_supplicant_8/src/common/ |
wpa_common.c | 119 * wpa_pmk_to_ptk - Calculate PTK from PMK, addresses, and nonces 127 * @ptk: Buffer for pairwise transient key 133 * PTK = PRF-X(PMK, "Pairwise key expansion", 144 struct wpa_ptk *ptk, int akmp, int cipher) 168 ptk->kck_len = wpa_kck_len(akmp); 169 ptk->kek_len = wpa_kek_len(akmp); 170 ptk->tk_len = wpa_cipher_key_len(cipher); 171 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len [all...] |
wpa_common.h | 342 struct wpa_ptk *ptk, int akmp, int cipher); 363 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher);
|
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa.c | 33 * @kck: Key Confirmation Key (KCK, part of PTK) 158 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, bssid, 333 * @ptk: PTK to use for keyed hash and encryption 340 struct wpa_ptk *ptk) 424 return wpa_eapol_key_send(sm, ptk->kck, ptk->kck_len, ver, dst, 430 const struct wpa_eapol_key *key, struct wpa_ptk *ptk) 434 return wpa_derive_ptk_ft(sm, src_addr, key, ptk); 451 struct wpa_ptk *ptk; local [all...] |
wpa_i.h | 24 struct wpa_ptk ptk, tptk; member in struct:wpa_sm 264 sm->ctx->set_rekey_offload(sm->ctx->ctx, sm->ptk.kek, sm->ptk.kek_len, 265 sm->ptk.kck, sm->ptk.kck_len, 363 struct wpa_ptk *ptk); 367 struct wpa_ptk *ptk); 370 const struct wpa_eapol_key *key, struct wpa_ptk *ptk);
|
wpa_ft.c | 22 const struct wpa_eapol_key *key, struct wpa_ptk *ptk) 46 sm->bssid, sm->pmk_r1_name, ptk, ptk_name, 319 wpa_printf(MSG_DEBUG, "FT: Installing PTK to the driver."); 331 sizeof(null_rsc), (u8 *) sm->ptk.tk, keylen) < 0) { 332 wpa_printf(MSG_WARNING, "FT: Failed to set PTK to the driver"); 477 sm->own_addr, bssid, sm->pmk_r1_name, &sm->ptk, 483 sm->ptk.kck, sm->ptk.kck_len, bssid, 501 wpa_printf(MSG_DEBUG, "FT: Failed to set PTK prior to " 562 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, gtk_len / 8, gtk_elem + 11 [all...] |
peerkey.c | 117 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, dst, 171 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, src_addr, 1087 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, bssid, [all...] |
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_i.h | 65 struct wpa_ptk PTK; 78 Boolean PtkGroupInit; /* init request for PTK Group state machine */ 255 struct wpa_ptk *ptk);
|
wpa_auth_ft.c | 365 struct wpa_ptk *ptk) 400 ptk, ptk_name, sm->wpa_key_mgmt, sm->pairwise); 459 if (aes_wrap(sm->PTK.kek, sm->PTK.kek_len, key_len / 8, key, 492 if (aes_wrap(sm->PTK.kek, sm->PTK.kek_len, WPA_IGTK_LEN / 8, 740 wpa_ft_mic(sm->PTK.kck, sm->PTK.kck_len, sm->addr, 774 /* MLME-SETKEYS.request(PTK) */ 779 "PTK configuration", sm->pairwise) [all...] |
wpa_auth.c | 36 static int wpa_verify_key_mic(int akmp, struct wpa_ptk *PTK, u8 *data, 48 struct wpa_ptk *ptk); 302 wpa_auth_logger(wpa_auth, sm->addr, LOGGER_DEBUG, "rekeying PTK"); 828 struct wpa_ptk PTK; 845 wpa_derive_ptk(sm, sm->alt_SNonce, pmk, pmk_len, &PTK); 847 if (wpa_verify_key_mic(sm->wpa_key_mgmt, &PTK, data, data_len) 867 os_memcpy(&sm->PTK, &PTK, sizeof(PTK)); [all...] |