/hal_espressif-latest/components/wpa_supplicant/src/common/ |
D | wpa_common.c | 775 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher) in wpa_pmk_r1_to_ptk() argument 798 ptk->kck_len = wpa_kck_len(akmp, PMK_LEN); in wpa_pmk_r1_to_ptk() 799 ptk->kek_len = wpa_kek_len(akmp, PMK_LEN); in wpa_pmk_r1_to_ptk() 800 ptk->tk_len = wpa_cipher_key_len(cipher); in wpa_pmk_r1_to_ptk() 801 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len; in wpa_pmk_r1_to_ptk() 825 os_memcpy(ptk->kck, tmp, ptk->kck_len); in wpa_pmk_r1_to_ptk() 826 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); in wpa_pmk_r1_to_ptk() 827 os_memcpy(ptk->tk, tmp + ptk->kck_len + ptk->kek_len, ptk->tk_len); in wpa_pmk_r1_to_ptk() 829 wpa_hexdump_key(MSG_DEBUG, "FT: KCK", ptk->kck, ptk->kck_len); in wpa_pmk_r1_to_ptk() 830 wpa_hexdump_key(MSG_DEBUG, "FT: KEK", ptk->kek, ptk->kek_len); in wpa_pmk_r1_to_ptk() [all …]
|
D | wpa_common.h | 351 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher); 436 struct wpa_ptk *ptk, int akmp, int cipher);
|
/hal_espressif-latest/components/wpa_supplicant/src/rsn_supp/ |
D | wpa.c | 346 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, bssid, in wpa_sm_key_request() 549 struct wpa_ptk *ptk) in wpa_supplicant_send_2_of_4() argument 639 wpa_eapol_key_send(sm, ptk->kck, ptk->kck_len, ver, dst, ETH_P_EAPOL, in wpa_supplicant_send_2_of_4() 647 const struct wpa_eapol_key *key, struct wpa_ptk *ptk) in wpa_derive_ptk() argument 651 return wpa_derive_ptk_ft(sm, src_addr, key, ptk); in wpa_derive_ptk() 655 key->key_nonce, ptk, sm->key_mgmt, in wpa_derive_ptk() 666 struct wpa_ptk *ptk; in wpa_supplicant_process_1_of_4() local 728 ptk = &sm->tptk; in wpa_supplicant_process_1_of_4() 729 wpa_derive_ptk(sm, src_addr, key, ptk); in wpa_supplicant_process_1_of_4() 749 kde, kde_len, ptk)) in wpa_supplicant_process_1_of_4() [all …]
|
D | wpa_ft.c | 24 const struct wpa_eapol_key *key, struct wpa_ptk *ptk) in wpa_derive_ptk_ft() argument 51 sm->bssid, sm->pmk_r1_name, ptk, ptk_name, in wpa_derive_ptk_ft() 345 sizeof(null_rsc), (u8 *) sm->ptk.tk, keylen, KEY_FLAG_PAIRWISE) < 0) { in wpa_ft_install_ptk() 523 sm->own_addr, bssid, sm->pmk_r1_name, &sm->ptk, in wpa_ft_process_response() 529 sm->ptk.kck, sm->ptk.kck_len, bssid, in wpa_ft_process_response() 608 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, gtk_len / 8, gtk_elem + 11, gtk)) { in wpa_ft_process_gtk_subelem() 686 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, WPA_IGTK_LEN / 8, 819 if (wpa_ft_mic(sm->ptk.kck, sm->ptk.kck_len, sm->own_addr, src_addr, 6,
|
D | wpa_i.h | 31 struct wpa_ptk ptk, tptk; member 211 const struct wpa_eapol_key *key, struct wpa_ptk *ptk);
|
/hal_espressif-latest/components/wpa_supplicant/src/ap/ |
D | wpa_auth_i.h | 220 struct wpa_ptk *ptk);
|
D | wpa_auth.c | 1602 const u8 *pmk, struct wpa_ptk *ptk) in wpa_derive_ptk() argument 1609 return wpa_auth_derive_ptk_ft(sm, pmk, ptk); in wpa_derive_ptk() 1614 ptk, sm->wpa_key_mgmt, sm->pairwise); in wpa_derive_ptk()
|