Home
last modified time | relevance | path

Searched refs:ptk (Results 1 – 7 of 7) sorted by relevance

/hal_espressif-latest/components/wpa_supplicant/src/common/
Dwpa_common.c775 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher) in wpa_pmk_r1_to_ptk() argument
798 ptk->kck_len = wpa_kck_len(akmp, PMK_LEN); in wpa_pmk_r1_to_ptk()
799 ptk->kek_len = wpa_kek_len(akmp, PMK_LEN); in wpa_pmk_r1_to_ptk()
800 ptk->tk_len = wpa_cipher_key_len(cipher); in wpa_pmk_r1_to_ptk()
801 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len; in wpa_pmk_r1_to_ptk()
825 os_memcpy(ptk->kck, tmp, ptk->kck_len); in wpa_pmk_r1_to_ptk()
826 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); in wpa_pmk_r1_to_ptk()
827 os_memcpy(ptk->tk, tmp + ptk->kck_len + ptk->kek_len, ptk->tk_len); in wpa_pmk_r1_to_ptk()
829 wpa_hexdump_key(MSG_DEBUG, "FT: KCK", ptk->kck, ptk->kck_len); in wpa_pmk_r1_to_ptk()
830 wpa_hexdump_key(MSG_DEBUG, "FT: KEK", ptk->kek, ptk->kek_len); in wpa_pmk_r1_to_ptk()
[all …]
Dwpa_common.h351 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher);
436 struct wpa_ptk *ptk, int akmp, int cipher);
/hal_espressif-latest/components/wpa_supplicant/src/rsn_supp/
Dwpa.c346 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, bssid, in wpa_sm_key_request()
549 struct wpa_ptk *ptk) in wpa_supplicant_send_2_of_4() argument
639 wpa_eapol_key_send(sm, ptk->kck, ptk->kck_len, ver, dst, ETH_P_EAPOL, in wpa_supplicant_send_2_of_4()
647 const struct wpa_eapol_key *key, struct wpa_ptk *ptk) in wpa_derive_ptk() argument
651 return wpa_derive_ptk_ft(sm, src_addr, key, ptk); in wpa_derive_ptk()
655 key->key_nonce, ptk, sm->key_mgmt, in wpa_derive_ptk()
666 struct wpa_ptk *ptk; in wpa_supplicant_process_1_of_4() local
728 ptk = &sm->tptk; in wpa_supplicant_process_1_of_4()
729 wpa_derive_ptk(sm, src_addr, key, ptk); in wpa_supplicant_process_1_of_4()
749 kde, kde_len, ptk)) in wpa_supplicant_process_1_of_4()
[all …]
Dwpa_ft.c24 const struct wpa_eapol_key *key, struct wpa_ptk *ptk) in wpa_derive_ptk_ft() argument
51 sm->bssid, sm->pmk_r1_name, ptk, ptk_name, in wpa_derive_ptk_ft()
345 sizeof(null_rsc), (u8 *) sm->ptk.tk, keylen, KEY_FLAG_PAIRWISE) < 0) { in wpa_ft_install_ptk()
523 sm->own_addr, bssid, sm->pmk_r1_name, &sm->ptk, in wpa_ft_process_response()
529 sm->ptk.kck, sm->ptk.kck_len, bssid, in wpa_ft_process_response()
608 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, gtk_len / 8, gtk_elem + 11, gtk)) { in wpa_ft_process_gtk_subelem()
686 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, WPA_IGTK_LEN / 8,
819 if (wpa_ft_mic(sm->ptk.kck, sm->ptk.kck_len, sm->own_addr, src_addr, 6,
Dwpa_i.h31 struct wpa_ptk ptk, tptk; member
211 const struct wpa_eapol_key *key, struct wpa_ptk *ptk);
/hal_espressif-latest/components/wpa_supplicant/src/ap/
Dwpa_auth_i.h220 struct wpa_ptk *ptk);
Dwpa_auth.c1602 const u8 *pmk, struct wpa_ptk *ptk) in wpa_derive_ptk() argument
1609 return wpa_auth_derive_ptk_ft(sm, pmk, ptk); in wpa_derive_ptk()
1614 ptk, sm->wpa_key_mgmt, sm->pairwise); in wpa_derive_ptk()