Home
last modified time | relevance | path

Searched refs:ptk (Results 1 – 10 of 10) sorted by relevance

/external/wpa_supplicant_8/src/common/
Dwpa_common.c352 struct wpa_ptk *ptk, int akmp, int cipher, in wpa_pmk_to_ptk() argument
392 ptk->kck_len = wpa_kck_len(akmp, pmk_len); in wpa_pmk_to_ptk()
393 ptk->kek_len = wpa_kek_len(akmp, pmk_len); in wpa_pmk_to_ptk()
394 ptk->tk_len = wpa_cipher_key_len(cipher); in wpa_pmk_to_ptk()
395 if (ptk->tk_len == 0) { in wpa_pmk_to_ptk()
401 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len; in wpa_pmk_to_ptk()
458 os_memcpy(ptk->kck, tmp, ptk->kck_len); in wpa_pmk_to_ptk()
459 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len); in wpa_pmk_to_ptk()
461 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); in wpa_pmk_to_ptk()
462 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); in wpa_pmk_to_ptk()
[all …]
Dwpa_common.h350 struct wpa_ptk *ptk, int akmp, int cipher,
359 size_t dhss_len, struct wpa_ptk *ptk,
390 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher);
/external/wpa_supplicant_8/src/rsn_supp/
Dwpa.c50 int wpa_eapol_key_send(struct wpa_sm *sm, struct wpa_ptk *ptk, in wpa_eapol_key_send() argument
79 if (key_mic && (!ptk || !ptk->kck_len)) in wpa_eapol_key_send()
83 wpa_eapol_key_mic(ptk->kck, ptk->kck_len, sm->key_mgmt, ver, in wpa_eapol_key_send()
90 if (ptk) in wpa_eapol_key_send()
92 ptk->kck, ptk->kck_len); in wpa_eapol_key_send()
107 if (!ptk || !ptk->kek_len) in wpa_eapol_key_send()
137 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); in wpa_eapol_key_send()
142 if (aes_siv_encrypt(ptk->kek, ptk->kek_len, in wpa_eapol_key_send()
238 wpa_eapol_key_send(sm, &sm->ptk, ver, bssid, ETH_P_EAPOL, rbuf, rlen, in wpa_sm_key_request()
447 struct wpa_ptk *ptk) in wpa_supplicant_send_2_of_4() argument
[all …]
Dwpa_ft.c25 const struct wpa_eapol_key *key, struct wpa_ptk *ptk) in wpa_derive_ptk_ft() argument
55 sm->own_addr, sm->bssid, sm->pmk_r1_name, ptk, in wpa_derive_ptk_ft()
407 sizeof(null_rsc), (u8 *) sm->ptk.tk, keylen) < 0) { in wpa_ft_install_ptk()
609 sm->pmk_r1_name, &sm->ptk, ptk_name, sm->key_mgmt, in wpa_ft_process_response()
614 kck = sm->ptk.kck2; in wpa_ft_process_response()
615 kck_len = sm->ptk.kck2_len; in wpa_ft_process_response()
617 kck = sm->ptk.kck; in wpa_ft_process_response()
618 kck_len = sm->ptk.kck_len; in wpa_ft_process_response()
689 kek = sm->ptk.kek2; in wpa_ft_process_gtk_subelem()
690 kek_len = sm->ptk.kek2_len; in wpa_ft_process_gtk_subelem()
[all …]
Dwpa_i.h23 struct wpa_ptk ptk, tptk; member
303 sm->ctx->set_rekey_offload(sm->ctx->ctx, sm->ptk.kek, sm->ptk.kek_len, in wpa_sm_set_rekey_offload()
304 sm->ptk.kck, sm->ptk.kck_len, in wpa_sm_set_rekey_offload()
412 int wpa_eapol_key_send(struct wpa_sm *sm, struct wpa_ptk *ptk,
419 struct wpa_ptk *ptk);
423 struct wpa_ptk *ptk);
426 const struct wpa_eapol_key *key, struct wpa_ptk *ptk);
/external/scapy/scapy/modules/krack/
Dautomaton.py174 self.ptk = customPRF512(pmk, amac, smac, anonce, snonce)
177 self.kck = self.ptk[:16]
178 self.kek = self.ptk[16:32]
179 self.tk = self.ptk[32:48]
180 self.mic_ap_to_sta = self.ptk[48:56]
181 self.mic_sta_to_ap = self.ptk[56:64]
/external/google-breakpad/src/tools/solaris/dump_syms/testdata/
Ddump_syms_regtest.stabs10 …5: .stabs "V=9.0;DBG_GEN=5.0.8;dm;cd;backend;ptf;ptx;ptk;s;g;R=5.8<<Sun C++ 5.8 Patch 121018-07 2…
118 …5: .stabs "V=9.0;DBG_GEN=5.0.8;dm;cd;backend;ptf;ptx;ptk;s;g;R=5.8<<Sun C++ 5.8 Patch 121018-07 2…
/external/wpa_supplicant_8/src/ap/
Dwpa_auth_i.h294 struct wpa_ptk *ptk);
Dwpa_auth.c44 static int wpa_aead_decrypt(struct wpa_state_machine *sm, struct wpa_ptk *ptk,
59 struct wpa_ptk *ptk);
2169 struct wpa_ptk *ptk) in wpa_derive_ptk() argument
2176 return wpa_auth_derive_ptk_ft(sm, pmk, ptk); in wpa_derive_ptk()
2188 ptk, sm->wpa_key_mgmt, sm->pairwise, z, z_len); in wpa_derive_ptk()
2270 static int wpa_aead_decrypt(struct wpa_state_machine *sm, struct wpa_ptk *ptk, in wpa_aead_decrypt() argument
2301 if (aes_siv_decrypt(ptk->kek, ptk->kek_len, pos, key_data_len, in wpa_aead_decrypt()
Dwpa_auth_ft.c2078 struct wpa_ptk *ptk) in wpa_auth_derive_ptk_ft() argument
2144 ptk, ptk_name, sm->wpa_key_mgmt, sm->pairwise); in wpa_auth_derive_ptk_ft()