Searched refs:PTK (Results 1 - 6 of 6) sorted by relevance
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | wpa_auth.c | 50 static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK, 381 wpa_auth_logger(wpa_auth, sm->addr, LOGGER_DEBUG, "rekeying PTK"); in wpa_rekey_ptk() 390 wpa_printf(MSG_DEBUG, "WPA: Start PTK rekeying timer for " in wpa_auth_set_ptk_rekey_timer() 959 struct wpa_ptk PTK; in wpa_try_alt_snonce() local 965 os_memset(&PTK, 0, sizeof(PTK)); in wpa_try_alt_snonce() 985 if (wpa_derive_ptk(sm, sm->alt_SNonce, pmk, pmk_len, &PTK, 0) < in wpa_try_alt_snonce() 989 if (wpa_verify_key_mic(sm->wpa_key_mgmt, pmk_len, &PTK, in wpa_try_alt_snonce() 1019 os_memcpy(&sm->PTK, &PTK, sizeo in wpa_try_alt_snonce() 1770 wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK, u8 *data, size_t data_len) wpa_verify_key_mic() argument 2961 struct wpa_ptk PTK; SM_STATE() local [all...] |
H A D | wpa_auth_ft.c | 2177 kek = sm->PTK.kek2; in wpa_ft_gtk_subelem() 2178 kek_len = sm->PTK.kek2_len; in wpa_ft_gtk_subelem() 2180 kek = sm->PTK.kek; in wpa_ft_gtk_subelem() 2181 kek_len = sm->PTK.kek_len; in wpa_ft_gtk_subelem() 2265 kek = sm->PTK.kek2; in wpa_ft_igtk_subelem() 2266 kek_len = sm->PTK.kek2_len; in wpa_ft_igtk_subelem() 2268 kek = sm->PTK.kek; in wpa_ft_igtk_subelem() 2269 kek_len = sm->PTK.kek_len; in wpa_ft_igtk_subelem() 2325 kek = sm->PTK.kek2; in wpa_ft_bigtk_subelem() 2326 kek_len = sm->PTK in wpa_ft_bigtk_subelem() [all...] |
H A D | wpa_auth_i.h | 63 struct wpa_ptk PTK; member 79 bool PtkGroupInit; /* init request for PTK Group state machine */
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | wpa_auth.c | 41 static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK, 323 wpa_auth_logger(wpa_auth, sm->addr, LOGGER_DEBUG, "rekeying PTK"); in wpa_rekey_ptk() 332 wpa_printf(MSG_DEBUG, "WPA: Start PTK rekeying timer for " in wpa_auth_set_ptk_rekey_timer() 883 struct wpa_ptk PTK; in wpa_try_alt_snonce() local 889 os_memset(&PTK, 0, sizeof(PTK)); in wpa_try_alt_snonce() 909 if (wpa_derive_ptk(sm, sm->alt_SNonce, pmk, pmk_len, &PTK) < 0) in wpa_try_alt_snonce() 912 if (wpa_verify_key_mic(sm->wpa_key_mgmt, pmk_len, &PTK, in wpa_try_alt_snonce() 942 os_memcpy(&sm->PTK, &PTK, sizeo in wpa_try_alt_snonce() 1688 wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK, u8 *data, size_t data_len) wpa_verify_key_mic() argument 2819 struct wpa_ptk PTK; SM_STATE() local [all...] |
H A D | wpa_auth_ft.c | 2177 kek = sm->PTK.kek2; in wpa_ft_gtk_subelem() 2178 kek_len = sm->PTK.kek2_len; in wpa_ft_gtk_subelem() 2180 kek = sm->PTK.kek; in wpa_ft_gtk_subelem() 2181 kek_len = sm->PTK.kek_len; in wpa_ft_gtk_subelem() 2246 kek = sm->PTK.kek2; in wpa_ft_igtk_subelem() 2247 kek_len = sm->PTK.kek2_len; in wpa_ft_igtk_subelem() 2249 kek = sm->PTK.kek; in wpa_ft_igtk_subelem() 2250 kek_len = sm->PTK.kek_len; in wpa_ft_igtk_subelem() 2588 kck = sm->PTK.kck2; in wpa_sm_write_assoc_resp_ies() 2589 kck_len = sm->PTK in wpa_sm_write_assoc_resp_ies() [all...] |
H A D | wpa_auth_i.h | 63 struct wpa_ptk PTK; member 77 Boolean PtkGroupInit; /* init request for PTK Group state machine */
|
Completed in 17 milliseconds