/hostap-latest/wlantest/ |
D | rx_data.c | 159 unsigned int tk_len = ptk->tk_len; in try_ptk() local 163 pairwise_cipher == 0) && tk_len == 16) { in try_ptk() 167 pairwise_cipher == 0) && tk_len == 32) { in try_ptk() 173 (tk_len == 16 || tk_len == 32)) { in try_ptk() 174 decrypted = gcmp_decrypt(ptk->tk, tk_len, hdr, a1, a2, a3, in try_ptk() 177 pairwise_cipher == 0) && tk_len == 32) { in try_ptk() 211 ptk->ptk.tk_len, keyid); in try_all_ptk() 384 const u8 *tk, size_t tk_len, size_t *dlen) in try_ptk_decrypt() argument 393 decrypted = gcmp_decrypt(tk, tk_len, hdr, a1, a2, a3, in try_ptk_decrypt() 397 write_decrypted_note(wt, decrypted, tk, tk_len, keyid); in try_ptk_decrypt() [all …]
|
D | gcmp.c | 85 u8 * gcmp_decrypt(const u8 *tk, size_t tk_len, const struct ieee80211_hdr *hdr, in gcmp_decrypt() argument 108 if (aes_gcm_ad(tk, tk_len, nonce, sizeof(nonce), m, mlen, aad, aad_len, in gcmp_decrypt() 126 u8 * gcmp_encrypt(const u8 *tk, size_t tk_len, const u8 *frame, size_t len, in gcmp_encrypt() argument 159 if (aes_gcm_ae(tk, tk_len, nonce, sizeof(nonce), frame + hdrlen, plen, in gcmp_encrypt()
|
D | wlantest.c | 240 p->ptk.tk_len = ptk_len; in add_ptk_file() 248 p->ptk.tk_len = ptk_len - 32; in add_ptk_file() 336 const u8 *tk, size_t tk_len, int keyid) in write_decrypted_note() argument 343 wpa_snprintf_hex(tk_hex, sizeof(tk_hex), tk, tk_len); in write_decrypted_note()
|
D | wlantest.h | 263 const u8 *tk, size_t tk_len, int keyid); 369 u8 * gcmp_decrypt(const u8 *tk, size_t tk_len, const struct ieee80211_hdr *hdr, 372 u8 * gcmp_encrypt(const u8 *tk, size_t tk_len, const u8 *frame, size_t len,
|
D | sta.c | 328 wpa_hexdump(MSG_DEBUG, "PTK:TK", sta->ptk.tk, sta->ptk.tk_len); in sta_new_ptk()
|
D | rx_mgmt.c | 3238 if (ptk->tk_len == 16) { in try_tk() 3245 } else if (ptk->tk_len == 32) { in try_tk() 3287 ptk->ptk.tk_len, keyid); in mgmt_decrypt_tk() 3388 decrypted = gcmp_decrypt(sta->ptk.tk, sta->ptk.tk_len, hdr, in mgmt_decrypt() 3392 sta->ptk.tk_len, keyid); in mgmt_decrypt()
|
D | rx_eapol.c | 271 sta->tptk.tk, sta->tptk.tk_len); in try_pmk() 322 sta->ptk.tk, sta->ptk.tk_len); in derive_ptk()
|
/hostap-latest/src/common/ |
D | wpa_common.c | 454 ptk->tk_len = wpa_cipher_key_len(cipher); in wpa_pmk_to_ptk() 456 if (ptk->tk_len == 0) { in wpa_pmk_to_ptk() 462 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len + ptk->kdk_len; in wpa_pmk_to_ptk() 573 os_memcpy(ptk->tk, tmp + ptk->kck_len + ptk->kek_len, ptk->tk_len); in wpa_pmk_to_ptk() 574 wpa_hexdump_key(MSG_DEBUG, "WPA: TK", ptk->tk, ptk->tk_len); in wpa_pmk_to_ptk() 578 ptk->tk_len, ptk->kdk_len); in wpa_pmk_to_ptk() 712 ptk->tk_len = wpa_cipher_key_len(cipher); in fils_pmk_to_ptk() 719 key_data_len = *ick_len + ptk->kek_len + ptk->tk_len; in fils_pmk_to_ptk() 775 os_memcpy(ptk->tk, tmp + offset, ptk->tk_len); in fils_pmk_to_ptk() 776 wpa_hexdump_key(MSG_DEBUG, "FILS: TK", ptk->tk, ptk->tk_len); in fils_pmk_to_ptk() [all …]
|
D | common_module_tests.c | 665 if (ptk.tk_len != sizeof(tk) || in pasn_test_pasn_auth() 750 if (ptk.tk_len != sizeof(tk) || in pasn_test_no_pasn_auth()
|
D | ptksa_cache.c | 198 e->ptk.tk_len); in ptksa_cache_list()
|
D | wpa_common.h | 267 size_t tk_len; member
|
/hostap-latest/wpa_supplicant/ |
D | driver_i.h | 1145 u32 cipher, u8 tk_len, in wpa_drv_set_secure_ranging_ctx() argument 1163 params.tk_len = tk_len; in wpa_drv_set_secure_ranging_ctx()
|
D | pasn_supplicant.c | 334 entry->ptk.tk_len, in wpas_pasn_set_keys_from_cache()
|
/hostap-latest/src/ap/ |
D | ap_drv_ops.c | 1231 u32 cipher, u8 tk_len, const u8 *tk, in hostapd_drv_set_secure_ranging_ctx() argument 1244 params.tk_len = tk_len; in hostapd_drv_set_secure_ranging_ctx()
|
D | ieee802_11.c | 2701 entry->ptk.tk_len, entry->ptk.tk, in pasn_set_keys_from_cache()
|
/hostap-latest/src/rsn_supp/ |
D | wpa.c | 1252 if (keylen <= 0 || (unsigned int) keylen != sm->ptk.tk_len) { in wpa_supplicant_install_ptk() 1254 keylen, (long unsigned int) sm->ptk.tk_len); in wpa_supplicant_install_ptk() 1296 sm->ptk.tk_len = 0; in wpa_supplicant_install_ptk() 6742 if (keylen <= 0 || (unsigned int) keylen != sm->ptk.tk_len) { in fils_process_assoc_resp() 6744 keylen, (long unsigned int) sm->ptk.tk_len); in fils_process_assoc_resp() 6768 sm->ptk.tk_len = 0; in fils_process_assoc_resp()
|
/hostap-latest/src/drivers/ |
D | driver.h | 3022 u8 tk_len; member
|
D | driver_nl80211.c | 13453 if (params->tk_len && params->tk) { in nl80211_set_secure_ranging_ctx() 13455 params->tk_len, params->tk)) in nl80211_set_secure_ranging_ctx() 13458 params->tk, params->tk_len); in nl80211_set_secure_ranging_ctx()
|