/external/wpa_supplicant_8/src/common/ |
D | wpa_common.c | 168 struct wpa_ptk *ptk, int akmp, int cipher) in wpa_pmk_to_ptk() argument 192 ptk->kck_len = wpa_kck_len(akmp); in wpa_pmk_to_ptk() 193 ptk->kek_len = wpa_kek_len(akmp); in wpa_pmk_to_ptk() 194 ptk->tk_len = wpa_cipher_key_len(cipher); in wpa_pmk_to_ptk() 195 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len; in wpa_pmk_to_ptk() 218 os_memcpy(ptk->kck, tmp, ptk->kck_len); in wpa_pmk_to_ptk() 219 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len); in wpa_pmk_to_ptk() 221 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); in wpa_pmk_to_ptk() 222 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); in wpa_pmk_to_ptk() 224 os_memcpy(ptk->tk, tmp + ptk->kck_len + ptk->kek_len, ptk->tk_len); in wpa_pmk_to_ptk() [all …]
|
D | wpa_common.h | 350 struct wpa_ptk *ptk, int akmp, int cipher); 357 const u8 *snonce, const u8 *anonce, struct wpa_ptk *ptk, 385 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher);
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | wpa.c | 46 int wpa_eapol_key_send(struct wpa_sm *sm, struct wpa_ptk *ptk, in wpa_eapol_key_send() argument 72 if (key_mic && (!ptk || !ptk->kck_len)) in wpa_eapol_key_send() 76 wpa_eapol_key_mic(ptk->kck, ptk->kck_len, sm->key_mgmt, ver, in wpa_eapol_key_send() 83 if (ptk) in wpa_eapol_key_send() 85 ptk->kck, ptk->kck_len); in wpa_eapol_key_send() 100 if (!ptk || !ptk->kek_len) in wpa_eapol_key_send() 130 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); in wpa_eapol_key_send() 135 if (aes_siv_encrypt(ptk->kek, ptk->kek_len, in wpa_eapol_key_send() 232 wpa_eapol_key_send(sm, &sm->ptk, ver, bssid, ETH_P_EAPOL, rbuf, rlen, in wpa_sm_key_request() 414 struct wpa_ptk *ptk) in wpa_supplicant_send_2_of_4() argument [all …]
|
D | wpa_i.h | 24 struct wpa_ptk ptk, tptk; member 282 sm->ctx->set_rekey_offload(sm->ctx->ctx, sm->ptk.kek, sm->ptk.kek_len, in wpa_sm_set_rekey_offload() 283 sm->ptk.kck, sm->ptk.kck_len, in wpa_sm_set_rekey_offload() 383 int wpa_eapol_key_send(struct wpa_sm *sm, struct wpa_ptk *ptk, 390 struct wpa_ptk *ptk); 394 struct wpa_ptk *ptk); 397 const struct wpa_eapol_key *key, struct wpa_ptk *ptk);
|
D | wpa_ft.c | 22 const struct wpa_eapol_key *key, struct wpa_ptk *ptk) in wpa_derive_ptk_ft() argument 46 sm->bssid, sm->pmk_r1_name, ptk, ptk_name, in wpa_derive_ptk_ft() 332 sizeof(null_rsc), (u8 *) sm->ptk.tk, keylen) < 0) { in wpa_ft_install_ptk() 478 sm->own_addr, bssid, sm->pmk_r1_name, &sm->ptk, in wpa_ft_process_response() 484 sm->ptk.kck, sm->ptk.kck_len, bssid, in wpa_ft_process_response() 563 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, gtk_len / 8, gtk_elem + 11, in wpa_ft_process_gtk_subelem() 643 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, WPA_IGTK_LEN / 8, in wpa_ft_process_igtk_subelem() 773 if (wpa_ft_mic(sm->ptk.kck, sm->ptk.kck_len, sm->own_addr, src_addr, 6, in wpa_ft_validate_reassoc_resp()
|
D | peerkey.c | 116 wpa_eapol_key_send(sm, &sm->ptk, ver, dst, ETH_P_EAPOL, rbuf, rlen, in wpa_supplicant_send_smk_error() 169 wpa_eapol_key_send(sm, &sm->ptk, ver, src_addr, ETH_P_EAPOL, rbuf, rlen, in wpa_supplicant_send_smk_m3() 1096 wpa_eapol_key_send(sm, &sm->ptk, ver, bssid, ETH_P_EAPOL, rbuf, rlen, in wpa_sm_stkstart()
|
/external/syslinux/gpxe/src/net/80211/ |
D | wpa.c | 351 &ctx->ptk, sizeof ( ctx->ptk ) ); in wpa_derive_ptk() 354 DBGC2_HD ( ctx, &ctx->ptk, sizeof ( ctx->ptk ) ); in wpa_derive_ptk() 369 DBGC2_HD ( ctx, &ctx->ptk.tk, len ); in wpa_install_ptk() 372 &ctx->ptk.tk, len, NULL ); in wpa_install_ptk() 491 kie->mic ( &ctx->ptk.kck, eapol, EAPOL_HDR_LEN + in wpa_send_eapol() 796 rc = kie->decrypt ( &ctx->ptk.kek, pkt->iv, pkt->data, in wpa_handle_1_of_2() 900 kie->mic ( &ctx->ptk.kck, ( void * ) pkt - EAPOL_HDR_LEN, in eapol_key_rx() 931 rc = kie->decrypt ( &ctx->ptk.kek, pkt->iv, pkt->data, in eapol_key_rx()
|
/external/syslinux/gpxe/src/include/gpxe/ |
D | wpa.h | 337 struct wpa_ptk ptk; member
|
/external/google-breakpad/src/tools/solaris/dump_syms/testdata/ |
D | dump_syms_regtest.stabs | 10 …5: .stabs "V=9.0;DBG_GEN=5.0.8;dm;cd;backend;ptf;ptx;ptk;s;g;R=5.8<<Sun C++ 5.8 Patch 121018-07 2… 118 …5: .stabs "V=9.0;DBG_GEN=5.0.8;dm;cd;backend;ptf;ptx;ptk;s;g;R=5.8<<Sun C++ 5.8 Patch 121018-07 2…
|
/external/wpa_supplicant_8/src/ap/ |
D | wpa_auth_i.h | 253 struct wpa_ptk *ptk);
|
D | wpa_auth.c | 41 static int wpa_aead_decrypt(struct wpa_state_machine *sm, struct wpa_ptk *ptk, 54 struct wpa_ptk *ptk); 2061 struct wpa_ptk *ptk) in wpa_derive_ptk() argument 2065 return wpa_auth_derive_ptk_ft(sm, pmk, ptk); in wpa_derive_ptk() 2070 ptk, sm->wpa_key_mgmt, sm->pairwise); in wpa_derive_ptk() 2106 static int wpa_aead_decrypt(struct wpa_state_machine *sm, struct wpa_ptk *ptk, in wpa_aead_decrypt() argument 2137 if (aes_siv_decrypt(ptk->kek, ptk->kek_len, pos, key_data_len, in wpa_aead_decrypt()
|
D | wpa_auth_ft.c | 376 struct wpa_ptk *ptk) in wpa_auth_derive_ptk_ft() argument 417 ptk, ptk_name, sm->wpa_key_mgmt, sm->pairwise); in wpa_auth_derive_ptk_ft()
|