Home
last modified time | relevance | path

Searched refs:ptk (Results 1 – 25 of 27) sorted by relevance

12

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/
Dwpa_common.c351 struct wpa_ptk *ptk, int akmp, int cipher, in wpa_pmk_to_ptk() argument
407 ptk->kck_len = wpa_kck_len(akmp, pmk_len); in wpa_pmk_to_ptk()
408 ptk->kek_len = wpa_kek_len(akmp, pmk_len); in wpa_pmk_to_ptk()
409 ptk->tk_len = wpa_cipher_key_len(cipher); in wpa_pmk_to_ptk()
410 ptk->kdk_len = kdk_len; in wpa_pmk_to_ptk()
411 if (ptk->tk_len == 0) { in wpa_pmk_to_ptk()
417 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len + ptk->kdk_len; in wpa_pmk_to_ptk()
492 os_memcpy(ptk->kck, tmp, ptk->kck_len); in wpa_pmk_to_ptk()
493 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len); in wpa_pmk_to_ptk()
495 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); in wpa_pmk_to_ptk()
[all …]
Dcommon_module_tests.c647 struct wpa_ptk ptk; in pasn_test_pasn_auth() local
653 &ptk, WPA_KEY_MGMT_PASN, WPA_CIPHER_CCMP, in pasn_test_pasn_auth()
659 if (ptk.kck_len != sizeof(kck) || in pasn_test_pasn_auth()
660 os_memcmp(kck, ptk.kck, sizeof(kck)) != 0) { in pasn_test_pasn_auth()
665 if (ptk.tk_len != sizeof(tk) || in pasn_test_pasn_auth()
666 os_memcmp(tk, ptk.tk, sizeof(tk)) != 0) { in pasn_test_pasn_auth()
671 if (ptk.kdk_len != sizeof(kdk) || in pasn_test_pasn_auth()
672 os_memcmp(kdk, ptk.kdk, sizeof(kdk)) != 0) { in pasn_test_pasn_auth()
726 struct wpa_ptk ptk; in pasn_test_no_pasn_auth() local
732 &ptk, WPA_KEY_MGMT_SAE, WPA_CIPHER_CCMP, in pasn_test_no_pasn_auth()
[all …]
Dptksa_cache.c192 ret = wpa_snprintf_hex(pos, buf + len - pos, e->ptk.tk, in ptksa_cache_list()
193 e->ptk.tk_len); in ptksa_cache_list()
203 ret = wpa_snprintf_hex(pos, buf + len - pos, e->ptk.kdk, in ptksa_cache_list()
204 e->ptk.kdk_len); in ptksa_cache_list()
270 const struct wpa_ptk *ptk) in ptksa_cache_add() argument
275 if (!ptksa || !ptk || !addr || !life_time || cipher == WPA_CIPHER_NONE) in ptksa_cache_add()
293 os_memcpy(&entry->ptk, ptk, sizeof(entry->ptk)); in ptksa_cache_add()
Dptksa_cache.h22 struct wpa_ptk ptk; member
40 const struct wpa_ptk *ptk);
68 u32 life_time, const struct wpa_ptk *ptk) in ptksa_cache_add() argument
Dwpa_common.h391 struct wpa_ptk *ptk, int akmp, int cipher,
400 size_t dhss_len, struct wpa_ptk *ptk,
433 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher,
644 struct wpa_ptk *ptk, int akmp, int cipher,
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/
Dwpa_common.c352 struct wpa_ptk *ptk, int akmp, int cipher, in wpa_pmk_to_ptk() argument
392 ptk->kck_len = wpa_kck_len(akmp, pmk_len); in wpa_pmk_to_ptk()
393 ptk->kek_len = wpa_kek_len(akmp, pmk_len); in wpa_pmk_to_ptk()
394 ptk->tk_len = wpa_cipher_key_len(cipher); in wpa_pmk_to_ptk()
395 if (ptk->tk_len == 0) { in wpa_pmk_to_ptk()
401 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len; in wpa_pmk_to_ptk()
458 os_memcpy(ptk->kck, tmp, ptk->kck_len); in wpa_pmk_to_ptk()
459 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len); in wpa_pmk_to_ptk()
461 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); in wpa_pmk_to_ptk()
462 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); in wpa_pmk_to_ptk()
[all …]
Dwpa_common.h350 struct wpa_ptk *ptk, int akmp, int cipher,
359 size_t dhss_len, struct wpa_ptk *ptk,
390 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher);
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/
Dwpa_ft.c37 const struct wpa_eapol_key *key, struct wpa_ptk *ptk) in wpa_derive_ptk_ft() argument
79 sm->own_addr, sm->bssid, sm->pmk_r1_name, ptk, in wpa_derive_ptk_ft()
465 (u8 *) sm->ptk.tk, keylen, in wpa_ft_install_ptk()
472 sm->dot11RSNAConfigPMKLifetime, &sm->ptk); in wpa_ft_install_ptk()
683 sm->pmk_r1_name, &sm->ptk, ptk_name, sm->key_mgmt, in wpa_ft_process_response()
689 kck = sm->ptk.kck2; in wpa_ft_process_response()
690 kck_len = sm->ptk.kck2_len; in wpa_ft_process_response()
692 kck = sm->ptk.kck; in wpa_ft_process_response()
693 kck_len = sm->ptk.kck_len; in wpa_ft_process_response()
765 kek = sm->ptk.kek2; in wpa_ft_process_gtk_subelem()
[all …]
Dwpa.c52 int wpa_eapol_key_send(struct wpa_sm *sm, struct wpa_ptk *ptk, in wpa_eapol_key_send() argument
81 if (key_mic && (!ptk || !ptk->kck_len)) in wpa_eapol_key_send()
85 wpa_eapol_key_mic(ptk->kck, ptk->kck_len, sm->key_mgmt, ver, in wpa_eapol_key_send()
92 if (ptk) in wpa_eapol_key_send()
94 ptk->kck, ptk->kck_len); in wpa_eapol_key_send()
109 if (!ptk || !ptk->kek_len) in wpa_eapol_key_send()
139 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); in wpa_eapol_key_send()
144 if (aes_siv_encrypt(ptk->kek, ptk->kek_len, in wpa_eapol_key_send()
248 wpa_eapol_key_send(sm, &sm->ptk, ver, bssid, ETH_P_EAPOL, rbuf, rlen, in wpa_sm_key_request()
487 struct wpa_ptk *ptk) in wpa_supplicant_send_2_of_4() argument
[all …]
Dwpa_i.h28 struct wpa_ptk ptk, tptk; member
356 sm->ctx->set_rekey_offload(sm->ctx->ctx, sm->ptk.kek, sm->ptk.kek_len, in wpa_sm_set_rekey_offload()
357 sm->ptk.kck, sm->ptk.kck_len, in wpa_sm_set_rekey_offload()
477 u32 life_time, struct wpa_ptk *ptk) in wpa_sm_store_ptk() argument
481 ptk); in wpa_sm_store_ptk()
484 int wpa_eapol_key_send(struct wpa_sm *sm, struct wpa_ptk *ptk,
491 struct wpa_ptk *ptk);
495 struct wpa_ptk *ptk);
498 const struct wpa_eapol_key *key, struct wpa_ptk *ptk);
Dwpa.h94 u32 life_time, const struct wpa_ptk *ptk);
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/
Dwpa_ft.c26 const struct wpa_eapol_key *key, struct wpa_ptk *ptk) in wpa_derive_ptk_ft() argument
64 sm->own_addr, sm->bssid, sm->pmk_r1_name, ptk, in wpa_derive_ptk_ft()
416 sizeof(null_rsc), (u8 *) sm->ptk.tk, keylen) < 0) { in wpa_ft_install_ptk()
618 sm->pmk_r1_name, &sm->ptk, ptk_name, sm->key_mgmt, in wpa_ft_process_response()
623 kck = sm->ptk.kck2; in wpa_ft_process_response()
624 kck_len = sm->ptk.kck2_len; in wpa_ft_process_response()
626 kck = sm->ptk.kck; in wpa_ft_process_response()
627 kck_len = sm->ptk.kck_len; in wpa_ft_process_response()
698 kek = sm->ptk.kek2; in wpa_ft_process_gtk_subelem()
699 kek_len = sm->ptk.kek2_len; in wpa_ft_process_gtk_subelem()
[all …]
Dwpa.c50 int wpa_eapol_key_send(struct wpa_sm *sm, struct wpa_ptk *ptk, in wpa_eapol_key_send() argument
79 if (key_mic && (!ptk || !ptk->kck_len)) in wpa_eapol_key_send()
83 wpa_eapol_key_mic(ptk->kck, ptk->kck_len, sm->key_mgmt, ver, in wpa_eapol_key_send()
90 if (ptk) in wpa_eapol_key_send()
92 ptk->kck, ptk->kck_len); in wpa_eapol_key_send()
107 if (!ptk || !ptk->kek_len) in wpa_eapol_key_send()
137 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); in wpa_eapol_key_send()
142 if (aes_siv_encrypt(ptk->kek, ptk->kek_len, in wpa_eapol_key_send()
238 wpa_eapol_key_send(sm, &sm->ptk, ver, bssid, ETH_P_EAPOL, rbuf, rlen, in wpa_sm_key_request()
473 struct wpa_ptk *ptk) in wpa_supplicant_send_2_of_4() argument
[all …]
Dwpa_i.h23 struct wpa_ptk ptk, tptk; member
304 sm->ctx->set_rekey_offload(sm->ctx->ctx, sm->ptk.kek, sm->ptk.kek_len, in wpa_sm_set_rekey_offload()
305 sm->ptk.kck, sm->ptk.kck_len, in wpa_sm_set_rekey_offload()
413 int wpa_eapol_key_send(struct wpa_sm *sm, struct wpa_ptk *ptk,
420 struct wpa_ptk *ptk);
424 struct wpa_ptk *ptk);
427 const struct wpa_eapol_key *key, struct wpa_ptk *ptk);
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
Dpasn_supplicant.c818 ret = pasn_mic(pasn->ptk.kck, pasn->akmp, pasn->cipher, in wpas_pasn_build_auth_3()
869 forced_memzero(&pasn->ptk, sizeof(pasn->ptk)); in wpas_pasn_reset()
1517 &pasn->ptk, pasn->akmp, pasn->cipher, in wpas_pasn_auth_rx()
1530 ret = pasn_mic(pasn->ptk.kck, pasn->akmp, pasn->cipher, in wpas_pasn_auth_rx()
1565 dot11RSNAConfigPMKLifetime, &pasn->ptk); in wpas_pasn_auth_rx()
1567 forced_memzero(&pasn->ptk, sizeof(pasn->ptk)); in wpas_pasn_auth_rx()
Dwpas_glue.c1357 u32 life_time, const struct wpa_ptk *ptk) in wpa_supplicant_store_ptk() argument
1361 ptksa_cache_add(wpa_s->ptksa, addr, cipher, life_time, ptk); in wpa_supplicant_store_ptk()
Dwpa_supplicant_i.h569 struct wpa_ptk ptk; member
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
Dwpa_auth_i.h302 int wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, struct wpa_ptk *ptk);
Dsta_info.h94 struct wpa_ptk ptk; member
Dwpa_auth.c46 static int wpa_aead_decrypt(struct wpa_state_machine *sm, struct wpa_ptk *ptk,
61 struct wpa_ptk *ptk, int force_sha256);
235 u32 life_time, const struct wpa_ptk *ptk) in wpa_auth_store_ptksa() argument
239 life_time, ptk); in wpa_auth_store_ptksa()
2303 struct wpa_ptk *ptk, int force_sha256) in wpa_derive_ptk() argument
2325 ptk, ptk_name, in wpa_derive_ptk()
2330 return wpa_auth_derive_ptk_ft(sm, ptk); in wpa_derive_ptk()
2346 ptk, akmp, sm->pairwise, z, z_len, kdk_len); in wpa_derive_ptk()
2430 static int wpa_aead_decrypt(struct wpa_state_machine *sm, struct wpa_ptk *ptk, in wpa_aead_decrypt() argument
2461 if (aes_siv_decrypt(ptk->kek, ptk->kek_len, pos, key_data_len, in wpa_aead_decrypt()
Dwpa_auth.h321 u32 life_time, const struct wpa_ptk *ptk);
Dwpa_auth_glue.c924 u32 life_time, const struct wpa_ptk *ptk) in hostapd_store_ptksa() argument
928 ptksa_cache_add(hapd->ptksa, addr, cipher, life_time, ptk); in hostapd_store_ptksa()
Dieee802_11.c2648 &sta->pasn->ptk, sta->pasn->akmp, in pasn_fils_auth_resp()
2885 &sta->pasn->ptk, sta->pasn->akmp, in pasn_derive_keys()
3057 ret = pasn_mic(sta->pasn->ptk.kck, sta->pasn->akmp, sta->pasn->cipher, in handle_auth_pasn_resp()
3435 ret = pasn_mic(sta->pasn->ptk.kck, sta->pasn->akmp, sta->pasn->cipher, in handle_auth_pasn_3()
3486 &sta->pasn->ptk); in handle_auth_pasn_3()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
Dwpa_auth_i.h295 int wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, struct wpa_ptk *ptk);
Dwpa_auth.c44 static int wpa_aead_decrypt(struct wpa_state_machine *sm, struct wpa_ptk *ptk,
59 struct wpa_ptk *ptk);
2220 struct wpa_ptk *ptk) in wpa_derive_ptk() argument
2234 ptk, ptk_name, in wpa_derive_ptk()
2238 return wpa_auth_derive_ptk_ft(sm, ptk); in wpa_derive_ptk()
2251 ptk, sm->wpa_key_mgmt, sm->pairwise, z, z_len); in wpa_derive_ptk()
2333 static int wpa_aead_decrypt(struct wpa_state_machine *sm, struct wpa_ptk *ptk, in wpa_aead_decrypt() argument
2364 if (aes_siv_decrypt(ptk->kek, ptk->kek_len, pos, key_data_len, in wpa_aead_decrypt()

12