/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/ |
H A D | wpa.h | 179 const u8 *ptk_kck, size_t ptk_kck_len, 348 static inline void wpa_sm_set_ptk_kck_kek(struct wpa_sm *sm, const u8 *ptk_kck, in wpa_sm_set_ptk_kck_kek() argument
|
H A D | wpa.c | 3499 const u8 *ptk_kck, size_t ptk_kck_len, in wpa_sm_set_ptk_kck_kek() 3502 if (ptk_kck && ptk_kck_len <= WPA_KCK_MAX_LEN) { in wpa_sm_set_ptk_kck_kek() 3503 os_memcpy(sm->ptk.kck, ptk_kck, ptk_kck_len); in wpa_sm_set_ptk_kck_kek() 3498 wpa_sm_set_ptk_kck_kek(struct wpa_sm *sm, const u8 *ptk_kck, size_t ptk_kck_len, const u8 *ptk_kek, size_t ptk_kek_len) wpa_sm_set_ptk_kck_kek() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/ |
H A D | wpa.h | 244 const u8 *ptk_kck, size_t ptk_kck_len, 455 static inline void wpa_sm_set_ptk_kck_kek(struct wpa_sm *sm, const u8 *ptk_kck, in wpa_sm_set_ptk_kck_kek() argument
|
H A D | wpa.c | 5197 const u8 *ptk_kck, size_t ptk_kck_len, 5200 if (ptk_kck && ptk_kck_len <= WPA_KCK_MAX_LEN) { 5201 os_memcpy(sm->ptk.kck, ptk_kck, ptk_kck_len);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/drivers/ |
H A D | driver_nl80211_event.c | 298 struct nlattr *ptk_kck, in mlme_event_connect() 433 if (ptk_kck) { in mlme_event_connect() 434 event.assoc_info.ptk_kck = nla_data(ptk_kck); in mlme_event_connect() 435 event.assoc_info.ptk_kck_len = nla_len(ptk_kck); in mlme_event_connect() 290 mlme_event_connect(struct wpa_driver_nl80211_data *drv, enum nl80211_commands cmd, struct nlattr *status, struct nlattr *addr, struct nlattr *req_ie, struct nlattr *resp_ie, struct nlattr *timed_out, struct nlattr *timeout_reason, struct nlattr *authorized, struct nlattr *key_replay_ctr, struct nlattr *ptk_kck, struct nlattr *ptk_kek, struct nlattr *subnet_status, struct nlattr *fils_erp_next_seq_num, struct nlattr *fils_pmk, struct nlattr *fils_pmkid) mlme_event_connect() argument
|
H A D | driver.h | 4969 * @ptk_kck 4993 * ptk_kck - The derived PTK KCK 4995 const u8 *ptk_kck; member 4998 * ptk_kek_len - The length of ptk_kck
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/drivers/ |
H A D | driver_nl80211_event.c | 686 struct nlattr *ptk_kck, 844 if (ptk_kck) { 845 event.assoc_info.ptk_kck = nla_data(ptk_kck); 846 event.assoc_info.ptk_kck_len = nla_len(ptk_kck); 678 mlme_event_connect(struct wpa_driver_nl80211_data *drv, enum nl80211_commands cmd, struct nlattr *status, struct nlattr *addr, struct nlattr *req_ie, struct nlattr *resp_ie, struct nlattr *timed_out, struct nlattr *timeout_reason, struct nlattr *authorized, struct nlattr *key_replay_ctr, struct nlattr *ptk_kck, struct nlattr *ptk_kek, struct nlattr *subnet_status, struct nlattr *fils_erp_next_seq_num, struct nlattr *fils_pmk, struct nlattr *fils_pmkid, struct nlattr *mlo_links) global() argument
|
H A D | driver.h | 5491 * @ptk_kck 5515 * ptk_kck - The derived PTK KCK 5517 const u8 *ptk_kck; member 5520 * ptk_kek_len - The length of ptk_kck
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | ctrl_iface.c | 9834 struct wpabuf *ptk_kck = NULL; local 9899 } else if (os_strcmp(str, "ptk_kck") == 0) { 9900 wpabuf_free(ptk_kck); 9901 ptk_kck = wpabuf_parse_bin(pos); 9902 if (!ptk_kck) 9904 ai->ptk_kck = wpabuf_head(ptk_kck); 9905 ai->ptk_kck_len = wpabuf_len(ptk_kck); 9941 wpabuf_free(ptk_kck);
|
H A D | events.c | 5547 wpa_sm_set_ptk_kck_kek(wpa_s->wpa, data->assoc_info.ptk_kck,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | events.c | 4033 wpa_sm_set_ptk_kck_kek(wpa_s->wpa, data->assoc_info.ptk_kck, in wpa_supplicant_event_assoc_auth()
|