/external/wpa_supplicant_8/src/common/ |
wpa_common.c | 223 * wpa_pmk_to_ptk - Calculate PTK from PMK, addresses, and nonces 231 * @ptk: Buffer for pairwise transient key 237 * PTK = PRF-X(PMK, "Pairwise key expansion", 244 struct wpa_ptk *ptk, int akmp, int cipher) 273 ptk->kck_len = wpa_kck_len(akmp, pmk_len); 274 ptk->kek_len = wpa_kek_len(akmp, pmk_len); 275 ptk->tk_len = wpa_cipher_key_len(cipher); 276 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len [all...] |
wpa_common.h | 336 struct wpa_ptk *ptk, int akmp, int cipher); 344 size_t dhss_len, struct wpa_ptk *ptk, 373 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher);
|
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa.c | 39 * @ptk: PTK for Key Confirmation/Encryption Key 48 int wpa_eapol_key_send(struct wpa_sm *sm, struct wpa_ptk *ptk, 77 if (key_mic && (!ptk || !ptk->kck_len)) 81 wpa_eapol_key_mic(ptk->kck, ptk->kck_len, sm->key_mgmt, ver, 88 if (ptk) 90 ptk->kck, ptk->kck_len) 536 struct wpa_ptk *ptk; local 1916 struct wpa_ptk *ptk; local [all...] |
wpa_i.h | 23 struct wpa_ptk ptk, tptk; member in struct:wpa_sm 295 sm->ctx->set_rekey_offload(sm->ctx->ctx, sm->ptk.kek, sm->ptk.kek_len, 296 sm->ptk.kck, sm->ptk.kck_len, 396 int wpa_eapol_key_send(struct wpa_sm *sm, struct wpa_ptk *ptk, 403 struct wpa_ptk *ptk); 407 struct wpa_ptk *ptk); 410 const struct wpa_eapol_key *key, struct wpa_ptk *ptk);
|
wpa_ft.c | 22 const struct wpa_eapol_key *key, struct wpa_ptk *ptk) 46 sm->bssid, sm->pmk_r1_name, ptk, ptk_name, 326 wpa_printf(MSG_DEBUG, "FT: Installing PTK to the driver."); 338 sizeof(null_rsc), (u8 *) sm->ptk.tk, keylen) < 0) { 339 wpa_printf(MSG_WARNING, "FT: Failed to set PTK to the driver"); 484 sm->own_addr, bssid, sm->pmk_r1_name, &sm->ptk, 490 sm->ptk.kck, sm->ptk.kck_len, bssid, 508 wpa_printf(MSG_DEBUG, "FT: Failed to set PTK prior to " 569 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, gtk_len / 8, gtk_elem + 11 [all...] |
/external/syslinux/gpxe/src/net/80211/ |
wpa.c | 351 &ctx->ptk, sizeof ( ctx->ptk ) ); 353 DBGC2 ( ctx, "WPA %p PTK:\n", ctx ); 354 DBGC2_HD ( ctx, &ctx->ptk, sizeof ( ctx->ptk ) ); 369 DBGC2_HD ( ctx, &ctx->ptk.tk, len ); 372 &ctx->ptk.tk, len, NULL ); 491 kie->mic ( &ctx->ptk.kck, eapol, EAPOL_HDR_LEN + 734 /* Install PTK */ 737 DBGC ( ctx, "WPA %p failed to install PTK: %s\n", ctx [all...] |
/external/syslinux/gpxe/src/include/gpxe/ |
wpa.h | 82 /** Key type field value for a PTK (pairwise) key handshake */ 283 * failure. On success, the keys will be available in @a ptk and @a 324 * If the PTK is not valid, the GTK should be used for both 337 struct wpa_ptk ptk; member in struct:wpa_common_ctx
|
/external/scapy/scapy/modules/krack/ |
automaton.py | 165 PTK, KCK, KEK, TK, MIC (AP -> STA), MIC (STA -> AP) 173 # Compute PTK 174 self.ptk = customPRF512(pmk, amac, smac, anonce, snonce) 177 self.kck = self.ptk[:16] 178 self.kek = self.ptk[16:32] 179 self.tk = self.ptk[32:48] 180 self.mic_ap_to_sta = self.ptk[48:56] 181 self.mic_sta_to_ap = self.ptk[56:64]
|
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_i.h | 61 struct wpa_ptk PTK; 75 Boolean PtkGroupInit; /* init request for PTK Group state machine */ 283 struct wpa_ptk *ptk);
|
wpa_auth.c | 38 static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK, 41 static int wpa_aead_decrypt(struct wpa_state_machine *sm, struct wpa_ptk *ptk, 56 struct wpa_ptk *ptk); 310 wpa_auth_logger(wpa_auth, sm->addr, LOGGER_DEBUG, "rekeying PTK"); 849 struct wpa_ptk PTK; 854 os_memset(&PTK, 0, sizeof(PTK)); 867 if (wpa_derive_ptk(sm, sm->alt_SNonce, pmk, pmk_len, &PTK) < 0) 870 if (wpa_verify_key_mic(sm->wpa_key_mgmt, pmk_len, &PTK, 890 os_memcpy(&sm->PTK, &PTK, sizeof(PTK)) [all...] |
wpa_auth_ft.c | [all...] |
/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/ |
cor.h | 444 STDMETHOD (GetMemberRefProps) (THIS_ mdMemberRef mr, mdToken *ptk, LPWSTR szMember, ULONG cchMember, ULONG *pchMember, PCCOR_SIGNATURE *ppvSigBlob, ULONG *pbSig) PURE; [all...] |