/external/wpa_supplicant_8/src/common/ |
D | wpa_common.c | 352 struct wpa_ptk *ptk, int akmp, int cipher, in wpa_pmk_to_ptk() argument 392 ptk->kck_len = wpa_kck_len(akmp, pmk_len); in wpa_pmk_to_ptk() 393 ptk->kek_len = wpa_kek_len(akmp, pmk_len); in wpa_pmk_to_ptk() 394 ptk->tk_len = wpa_cipher_key_len(cipher); in wpa_pmk_to_ptk() 395 if (ptk->tk_len == 0) { in wpa_pmk_to_ptk() 401 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len; in wpa_pmk_to_ptk() 458 os_memcpy(ptk->kck, tmp, ptk->kck_len); in wpa_pmk_to_ptk() 459 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len); in wpa_pmk_to_ptk() 461 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); in wpa_pmk_to_ptk() 462 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); in wpa_pmk_to_ptk() [all …]
|
D | wpa_common.h | 350 struct wpa_ptk *ptk, int akmp, int cipher, 359 size_t dhss_len, struct wpa_ptk *ptk, 390 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher);
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | wpa.c | 50 int wpa_eapol_key_send(struct wpa_sm *sm, struct wpa_ptk *ptk, in wpa_eapol_key_send() argument 79 if (key_mic && (!ptk || !ptk->kck_len)) in wpa_eapol_key_send() 83 wpa_eapol_key_mic(ptk->kck, ptk->kck_len, sm->key_mgmt, ver, in wpa_eapol_key_send() 90 if (ptk) in wpa_eapol_key_send() 92 ptk->kck, ptk->kck_len); in wpa_eapol_key_send() 107 if (!ptk || !ptk->kek_len) in wpa_eapol_key_send() 137 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); in wpa_eapol_key_send() 142 if (aes_siv_encrypt(ptk->kek, ptk->kek_len, in wpa_eapol_key_send() 238 wpa_eapol_key_send(sm, &sm->ptk, ver, bssid, ETH_P_EAPOL, rbuf, rlen, in wpa_sm_key_request() 447 struct wpa_ptk *ptk) in wpa_supplicant_send_2_of_4() argument [all …]
|
D | wpa_ft.c | 25 const struct wpa_eapol_key *key, struct wpa_ptk *ptk) in wpa_derive_ptk_ft() argument 55 sm->own_addr, sm->bssid, sm->pmk_r1_name, ptk, in wpa_derive_ptk_ft() 407 sizeof(null_rsc), (u8 *) sm->ptk.tk, keylen) < 0) { in wpa_ft_install_ptk() 609 sm->pmk_r1_name, &sm->ptk, ptk_name, sm->key_mgmt, in wpa_ft_process_response() 614 kck = sm->ptk.kck2; in wpa_ft_process_response() 615 kck_len = sm->ptk.kck2_len; in wpa_ft_process_response() 617 kck = sm->ptk.kck; in wpa_ft_process_response() 618 kck_len = sm->ptk.kck_len; in wpa_ft_process_response() 689 kek = sm->ptk.kek2; in wpa_ft_process_gtk_subelem() 690 kek_len = sm->ptk.kek2_len; in wpa_ft_process_gtk_subelem() [all …]
|
D | wpa_i.h | 23 struct wpa_ptk ptk, tptk; member 303 sm->ctx->set_rekey_offload(sm->ctx->ctx, sm->ptk.kek, sm->ptk.kek_len, in wpa_sm_set_rekey_offload() 304 sm->ptk.kck, sm->ptk.kck_len, in wpa_sm_set_rekey_offload() 412 int wpa_eapol_key_send(struct wpa_sm *sm, struct wpa_ptk *ptk, 419 struct wpa_ptk *ptk); 423 struct wpa_ptk *ptk); 426 const struct wpa_eapol_key *key, struct wpa_ptk *ptk);
|
/external/scapy/scapy/modules/krack/ |
D | automaton.py | 174 self.ptk = customPRF512(pmk, amac, smac, anonce, snonce) 177 self.kck = self.ptk[:16] 178 self.kek = self.ptk[16:32] 179 self.tk = self.ptk[32:48] 180 self.mic_ap_to_sta = self.ptk[48:56] 181 self.mic_sta_to_ap = self.ptk[56:64]
|
/external/google-breakpad/src/tools/solaris/dump_syms/testdata/ |
D | dump_syms_regtest.stabs | 10 …5: .stabs "V=9.0;DBG_GEN=5.0.8;dm;cd;backend;ptf;ptx;ptk;s;g;R=5.8<<Sun C++ 5.8 Patch 121018-07 2… 118 …5: .stabs "V=9.0;DBG_GEN=5.0.8;dm;cd;backend;ptf;ptx;ptk;s;g;R=5.8<<Sun C++ 5.8 Patch 121018-07 2…
|
/external/wpa_supplicant_8/src/ap/ |
D | wpa_auth_i.h | 294 struct wpa_ptk *ptk);
|
D | wpa_auth.c | 44 static int wpa_aead_decrypt(struct wpa_state_machine *sm, struct wpa_ptk *ptk, 59 struct wpa_ptk *ptk); 2169 struct wpa_ptk *ptk) in wpa_derive_ptk() argument 2176 return wpa_auth_derive_ptk_ft(sm, pmk, ptk); in wpa_derive_ptk() 2188 ptk, sm->wpa_key_mgmt, sm->pairwise, z, z_len); in wpa_derive_ptk() 2270 static int wpa_aead_decrypt(struct wpa_state_machine *sm, struct wpa_ptk *ptk, in wpa_aead_decrypt() argument 2301 if (aes_siv_decrypt(ptk->kek, ptk->kek_len, pos, key_data_len, in wpa_aead_decrypt()
|
D | wpa_auth_ft.c | 2078 struct wpa_ptk *ptk) in wpa_auth_derive_ptk_ft() argument 2144 ptk, ptk_name, sm->wpa_key_mgmt, sm->pairwise); in wpa_auth_derive_ptk_ft()
|