/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
D | wpa_common.c | 351 struct wpa_ptk *ptk, int akmp, int cipher, in wpa_pmk_to_ptk() argument 407 ptk->kck_len = wpa_kck_len(akmp, pmk_len); in wpa_pmk_to_ptk() 408 ptk->kek_len = wpa_kek_len(akmp, pmk_len); in wpa_pmk_to_ptk() 409 ptk->tk_len = wpa_cipher_key_len(cipher); in wpa_pmk_to_ptk() 410 ptk->kdk_len = kdk_len; in wpa_pmk_to_ptk() 411 if (ptk->tk_len == 0) { in wpa_pmk_to_ptk() 417 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len + ptk->kdk_len; in wpa_pmk_to_ptk() 492 os_memcpy(ptk->kck, tmp, ptk->kck_len); in wpa_pmk_to_ptk() 493 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len); in wpa_pmk_to_ptk() 495 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); in wpa_pmk_to_ptk() [all …]
|
D | common_module_tests.c | 647 struct wpa_ptk ptk; in pasn_test_pasn_auth() local 653 &ptk, WPA_KEY_MGMT_PASN, WPA_CIPHER_CCMP, in pasn_test_pasn_auth() 659 if (ptk.kck_len != sizeof(kck) || in pasn_test_pasn_auth() 660 os_memcmp(kck, ptk.kck, sizeof(kck)) != 0) { in pasn_test_pasn_auth() 665 if (ptk.tk_len != sizeof(tk) || in pasn_test_pasn_auth() 666 os_memcmp(tk, ptk.tk, sizeof(tk)) != 0) { in pasn_test_pasn_auth() 671 if (ptk.kdk_len != sizeof(kdk) || in pasn_test_pasn_auth() 672 os_memcmp(kdk, ptk.kdk, sizeof(kdk)) != 0) { in pasn_test_pasn_auth() 726 struct wpa_ptk ptk; in pasn_test_no_pasn_auth() local 732 &ptk, WPA_KEY_MGMT_SAE, WPA_CIPHER_CCMP, in pasn_test_no_pasn_auth() [all …]
|
D | ptksa_cache.c | 192 ret = wpa_snprintf_hex(pos, buf + len - pos, e->ptk.tk, in ptksa_cache_list() 193 e->ptk.tk_len); in ptksa_cache_list() 203 ret = wpa_snprintf_hex(pos, buf + len - pos, e->ptk.kdk, in ptksa_cache_list() 204 e->ptk.kdk_len); in ptksa_cache_list() 270 const struct wpa_ptk *ptk) in ptksa_cache_add() argument 275 if (!ptksa || !ptk || !addr || !life_time || cipher == WPA_CIPHER_NONE) in ptksa_cache_add() 293 os_memcpy(&entry->ptk, ptk, sizeof(entry->ptk)); in ptksa_cache_add()
|
D | ptksa_cache.h | 22 struct wpa_ptk ptk; member 40 const struct wpa_ptk *ptk); 68 u32 life_time, const struct wpa_ptk *ptk) in ptksa_cache_add() argument
|
D | wpa_common.h | 391 struct wpa_ptk *ptk, int akmp, int cipher, 400 size_t dhss_len, struct wpa_ptk *ptk, 433 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher, 644 struct wpa_ptk *ptk, int akmp, int cipher,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/ |
D | wpa_common.c | 352 struct wpa_ptk *ptk, int akmp, int cipher, in wpa_pmk_to_ptk() argument 392 ptk->kck_len = wpa_kck_len(akmp, pmk_len); in wpa_pmk_to_ptk() 393 ptk->kek_len = wpa_kek_len(akmp, pmk_len); in wpa_pmk_to_ptk() 394 ptk->tk_len = wpa_cipher_key_len(cipher); in wpa_pmk_to_ptk() 395 if (ptk->tk_len == 0) { in wpa_pmk_to_ptk() 401 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len; in wpa_pmk_to_ptk() 458 os_memcpy(ptk->kck, tmp, ptk->kck_len); in wpa_pmk_to_ptk() 459 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len); in wpa_pmk_to_ptk() 461 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); in wpa_pmk_to_ptk() 462 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); in wpa_pmk_to_ptk() [all …]
|
D | wpa_common.h | 350 struct wpa_ptk *ptk, int akmp, int cipher, 359 size_t dhss_len, struct wpa_ptk *ptk, 390 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/ |
D | wpa_ft.c | 37 const struct wpa_eapol_key *key, struct wpa_ptk *ptk) in wpa_derive_ptk_ft() argument 79 sm->own_addr, sm->bssid, sm->pmk_r1_name, ptk, in wpa_derive_ptk_ft() 465 (u8 *) sm->ptk.tk, keylen, in wpa_ft_install_ptk() 472 sm->dot11RSNAConfigPMKLifetime, &sm->ptk); in wpa_ft_install_ptk() 683 sm->pmk_r1_name, &sm->ptk, ptk_name, sm->key_mgmt, in wpa_ft_process_response() 689 kck = sm->ptk.kck2; in wpa_ft_process_response() 690 kck_len = sm->ptk.kck2_len; in wpa_ft_process_response() 692 kck = sm->ptk.kck; in wpa_ft_process_response() 693 kck_len = sm->ptk.kck_len; in wpa_ft_process_response() 765 kek = sm->ptk.kek2; in wpa_ft_process_gtk_subelem() [all …]
|
D | wpa.c | 52 int wpa_eapol_key_send(struct wpa_sm *sm, struct wpa_ptk *ptk, in wpa_eapol_key_send() argument 81 if (key_mic && (!ptk || !ptk->kck_len)) in wpa_eapol_key_send() 85 wpa_eapol_key_mic(ptk->kck, ptk->kck_len, sm->key_mgmt, ver, in wpa_eapol_key_send() 92 if (ptk) in wpa_eapol_key_send() 94 ptk->kck, ptk->kck_len); in wpa_eapol_key_send() 109 if (!ptk || !ptk->kek_len) in wpa_eapol_key_send() 139 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); in wpa_eapol_key_send() 144 if (aes_siv_encrypt(ptk->kek, ptk->kek_len, in wpa_eapol_key_send() 248 wpa_eapol_key_send(sm, &sm->ptk, ver, bssid, ETH_P_EAPOL, rbuf, rlen, in wpa_sm_key_request() 487 struct wpa_ptk *ptk) in wpa_supplicant_send_2_of_4() argument [all …]
|
D | wpa_i.h | 28 struct wpa_ptk ptk, tptk; member 356 sm->ctx->set_rekey_offload(sm->ctx->ctx, sm->ptk.kek, sm->ptk.kek_len, in wpa_sm_set_rekey_offload() 357 sm->ptk.kck, sm->ptk.kck_len, in wpa_sm_set_rekey_offload() 477 u32 life_time, struct wpa_ptk *ptk) in wpa_sm_store_ptk() argument 481 ptk); in wpa_sm_store_ptk() 484 int wpa_eapol_key_send(struct wpa_sm *sm, struct wpa_ptk *ptk, 491 struct wpa_ptk *ptk); 495 struct wpa_ptk *ptk); 498 const struct wpa_eapol_key *key, struct wpa_ptk *ptk);
|
D | wpa.h | 94 u32 life_time, const struct wpa_ptk *ptk);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/ |
D | wpa_ft.c | 26 const struct wpa_eapol_key *key, struct wpa_ptk *ptk) in wpa_derive_ptk_ft() argument 64 sm->own_addr, sm->bssid, sm->pmk_r1_name, ptk, in wpa_derive_ptk_ft() 416 sizeof(null_rsc), (u8 *) sm->ptk.tk, keylen) < 0) { in wpa_ft_install_ptk() 618 sm->pmk_r1_name, &sm->ptk, ptk_name, sm->key_mgmt, in wpa_ft_process_response() 623 kck = sm->ptk.kck2; in wpa_ft_process_response() 624 kck_len = sm->ptk.kck2_len; in wpa_ft_process_response() 626 kck = sm->ptk.kck; in wpa_ft_process_response() 627 kck_len = sm->ptk.kck_len; in wpa_ft_process_response() 698 kek = sm->ptk.kek2; in wpa_ft_process_gtk_subelem() 699 kek_len = sm->ptk.kek2_len; in wpa_ft_process_gtk_subelem() [all …]
|
D | wpa.c | 50 int wpa_eapol_key_send(struct wpa_sm *sm, struct wpa_ptk *ptk, in wpa_eapol_key_send() argument 79 if (key_mic && (!ptk || !ptk->kck_len)) in wpa_eapol_key_send() 83 wpa_eapol_key_mic(ptk->kck, ptk->kck_len, sm->key_mgmt, ver, in wpa_eapol_key_send() 90 if (ptk) in wpa_eapol_key_send() 92 ptk->kck, ptk->kck_len); in wpa_eapol_key_send() 107 if (!ptk || !ptk->kek_len) in wpa_eapol_key_send() 137 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); in wpa_eapol_key_send() 142 if (aes_siv_encrypt(ptk->kek, ptk->kek_len, in wpa_eapol_key_send() 238 wpa_eapol_key_send(sm, &sm->ptk, ver, bssid, ETH_P_EAPOL, rbuf, rlen, in wpa_sm_key_request() 473 struct wpa_ptk *ptk) in wpa_supplicant_send_2_of_4() argument [all …]
|
D | wpa_i.h | 23 struct wpa_ptk ptk, tptk; member 304 sm->ctx->set_rekey_offload(sm->ctx->ctx, sm->ptk.kek, sm->ptk.kek_len, in wpa_sm_set_rekey_offload() 305 sm->ptk.kck, sm->ptk.kck_len, in wpa_sm_set_rekey_offload() 413 int wpa_eapol_key_send(struct wpa_sm *sm, struct wpa_ptk *ptk, 420 struct wpa_ptk *ptk); 424 struct wpa_ptk *ptk); 427 const struct wpa_eapol_key *key, struct wpa_ptk *ptk);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
D | pasn_supplicant.c | 818 ret = pasn_mic(pasn->ptk.kck, pasn->akmp, pasn->cipher, in wpas_pasn_build_auth_3() 869 forced_memzero(&pasn->ptk, sizeof(pasn->ptk)); in wpas_pasn_reset() 1517 &pasn->ptk, pasn->akmp, pasn->cipher, in wpas_pasn_auth_rx() 1530 ret = pasn_mic(pasn->ptk.kck, pasn->akmp, pasn->cipher, in wpas_pasn_auth_rx() 1565 dot11RSNAConfigPMKLifetime, &pasn->ptk); in wpas_pasn_auth_rx() 1567 forced_memzero(&pasn->ptk, sizeof(pasn->ptk)); in wpas_pasn_auth_rx()
|
D | wpas_glue.c | 1357 u32 life_time, const struct wpa_ptk *ptk) in wpa_supplicant_store_ptk() argument 1361 ptksa_cache_add(wpa_s->ptksa, addr, cipher, life_time, ptk); in wpa_supplicant_store_ptk()
|
D | wpa_supplicant_i.h | 569 struct wpa_ptk ptk; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
D | wpa_auth_i.h | 302 int wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, struct wpa_ptk *ptk);
|
D | sta_info.h | 94 struct wpa_ptk ptk; member
|
D | wpa_auth.c | 46 static int wpa_aead_decrypt(struct wpa_state_machine *sm, struct wpa_ptk *ptk, 61 struct wpa_ptk *ptk, int force_sha256); 235 u32 life_time, const struct wpa_ptk *ptk) in wpa_auth_store_ptksa() argument 239 life_time, ptk); in wpa_auth_store_ptksa() 2303 struct wpa_ptk *ptk, int force_sha256) in wpa_derive_ptk() argument 2325 ptk, ptk_name, in wpa_derive_ptk() 2330 return wpa_auth_derive_ptk_ft(sm, ptk); in wpa_derive_ptk() 2346 ptk, akmp, sm->pairwise, z, z_len, kdk_len); in wpa_derive_ptk() 2430 static int wpa_aead_decrypt(struct wpa_state_machine *sm, struct wpa_ptk *ptk, in wpa_aead_decrypt() argument 2461 if (aes_siv_decrypt(ptk->kek, ptk->kek_len, pos, key_data_len, in wpa_aead_decrypt()
|
D | wpa_auth.h | 321 u32 life_time, const struct wpa_ptk *ptk);
|
D | wpa_auth_glue.c | 924 u32 life_time, const struct wpa_ptk *ptk) in hostapd_store_ptksa() argument 928 ptksa_cache_add(hapd->ptksa, addr, cipher, life_time, ptk); in hostapd_store_ptksa()
|
D | ieee802_11.c | 2648 &sta->pasn->ptk, sta->pasn->akmp, in pasn_fils_auth_resp() 2885 &sta->pasn->ptk, sta->pasn->akmp, in pasn_derive_keys() 3057 ret = pasn_mic(sta->pasn->ptk.kck, sta->pasn->akmp, sta->pasn->cipher, in handle_auth_pasn_resp() 3435 ret = pasn_mic(sta->pasn->ptk.kck, sta->pasn->akmp, sta->pasn->cipher, in handle_auth_pasn_3() 3486 &sta->pasn->ptk); in handle_auth_pasn_3()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
D | wpa_auth_i.h | 295 int wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, struct wpa_ptk *ptk);
|
D | wpa_auth.c | 44 static int wpa_aead_decrypt(struct wpa_state_machine *sm, struct wpa_ptk *ptk, 59 struct wpa_ptk *ptk); 2220 struct wpa_ptk *ptk) in wpa_derive_ptk() argument 2234 ptk, ptk_name, in wpa_derive_ptk() 2238 return wpa_auth_derive_ptk_ft(sm, ptk); in wpa_derive_ptk() 2251 ptk, sm->wpa_key_mgmt, sm->pairwise, z, z_len); in wpa_derive_ptk() 2333 static int wpa_aead_decrypt(struct wpa_state_machine *sm, struct wpa_ptk *ptk, in wpa_aead_decrypt() argument 2364 if (aes_siv_decrypt(ptk->kek, ptk->kek_len, pos, key_data_len, in wpa_aead_decrypt()
|