/freebsd/contrib/wpa/src/common/ |
H A D | wpa_common.c | 396 struct wpa_ptk *ptk, int akmp, int cipher, in wpa_pmk_to_ptk() argument 452 ptk->kck_len = wpa_kck_len(akmp, pmk_len); in wpa_pmk_to_ptk() 453 ptk->kek_len = wpa_kek_len(akmp, pmk_len); in wpa_pmk_to_ptk() 454 ptk->tk_len = wpa_cipher_key_len(cipher); in wpa_pmk_to_ptk() 455 ptk->kdk_len = kdk_len; in wpa_pmk_to_ptk() 456 if (ptk->tk_len == 0) { in wpa_pmk_to_ptk() 462 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len + ptk->kdk_len; in wpa_pmk_to_ptk() 567 os_memcpy(ptk->kck, tmp, ptk->kck_len); in wpa_pmk_to_ptk() 568 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len); in wpa_pmk_to_ptk() 570 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); in wpa_pmk_to_ptk() [all …]
|
H A D | common_module_tests.c | 647 struct wpa_ptk ptk; in pasn_test_pasn_auth() local 653 &ptk, WPA_KEY_MGMT_PASN, WPA_CIPHER_CCMP, in pasn_test_pasn_auth() 659 if (ptk.kck_len != sizeof(kck) || in pasn_test_pasn_auth() 660 os_memcmp(kck, ptk.kck, sizeof(kck)) != 0) { in pasn_test_pasn_auth() 665 if (ptk.tk_len != sizeof(tk) || in pasn_test_pasn_auth() 666 os_memcmp(tk, ptk.tk, sizeof(tk)) != 0) { in pasn_test_pasn_auth() 671 if (ptk.kdk_len != sizeof(kdk) || in pasn_test_pasn_auth() 672 os_memcmp(kdk, ptk.kdk, sizeof(kdk)) != 0) { in pasn_test_pasn_auth() 726 struct wpa_ptk ptk; in pasn_test_no_pasn_auth() local 732 &ptk, WPA_KEY_MGMT_SAE, WPA_CIPHER_CCMP, in pasn_test_no_pasn_auth() [all …]
|
H A D | ptksa_cache.c | 197 ret = wpa_snprintf_hex(pos, buf + len - pos, e->ptk.tk, in ptksa_cache_list() 198 e->ptk.tk_len); in ptksa_cache_list() 208 ret = wpa_snprintf_hex(pos, buf + len - pos, e->ptk.kdk, in ptksa_cache_list() 209 e->ptk.kdk_len); in ptksa_cache_list() 280 const struct wpa_ptk *ptk, in ptksa_cache_add() argument 289 if (!ptksa || !ptk || !addr || !life_time || cipher == WPA_CIPHER_NONE) in ptksa_cache_add() 313 os_memcpy(&entry->ptk, ptk, sizeof(entry->ptk)); in ptksa_cache_add() 376 u32 cipher, u32 life_time, const struct wpa_ptk *ptk, in ptksa_cache_add() argument
|
H A D | ptksa_cache.h | 22 struct wpa_ptk ptk; member 44 const struct wpa_ptk *ptk,
|
H A D | wpa_common.h | 466 struct wpa_ptk *ptk, int akmp, int cipher, 475 size_t dhss_len, struct wpa_ptk *ptk, 510 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher, 753 struct wpa_ptk *ptk, int akmp, int cipher, 763 int wpa_ltf_keyseed(struct wpa_ptk *ptk, int akmp, int cipher);
|
/freebsd/contrib/wpa/src/rsn_supp/ |
H A D | wpa_ft.c | 38 const struct wpa_eapol_key *key, struct wpa_ptk *ptk) in wpa_derive_ptk_ft() argument 85 sm->pmk_r1_name, ptk, ptk_name, sm->key_mgmt, in wpa_derive_ptk_ft() 98 ret = wpa_ltf_keyseed(ptk, sm->key_mgmt, sm->pairwise_cipher); in wpa_derive_ptk_ft() 511 (u8 *) sm->ptk.tk, keylen, in wpa_ft_install_ptk() 519 sm->dot11RSNAConfigPMKLifetime, &sm->ptk); in wpa_ft_install_ptk() 713 sm->pmk_r1_name, &sm->ptk, ptk_name, sm->key_mgmt, in wpa_ft_process_response() 724 wpa_ltf_keyseed(&sm->ptk, sm->key_mgmt, sm->pairwise_cipher)) { in wpa_ft_process_response() 731 kck = sm->ptk.kck2; in wpa_ft_process_response() 732 kck_len = sm->ptk.kck2_len; in wpa_ft_process_response() 734 kck = sm->ptk.kck; in wpa_ft_process_response() [all …]
|
H A D | wpa.c | 91 int wpa_eapol_key_send(struct wpa_sm *sm, struct wpa_ptk *ptk, in wpa_eapol_key_send() argument 120 if (key_mic && (!ptk || !ptk->kck_len)) in wpa_eapol_key_send() 124 wpa_eapol_key_mic(ptk->kck, ptk->kck_len, sm->key_mgmt, ver, in wpa_eapol_key_send() 131 if (ptk) in wpa_eapol_key_send() 133 ptk->kck, ptk->kck_len); in wpa_eapol_key_send() 148 if (!ptk || !ptk->kek_len) in wpa_eapol_key_send() 178 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); in wpa_eapol_key_send() 183 if (aes_siv_encrypt(ptk->kek, ptk->kek_len, in wpa_eapol_key_send() 288 wpa_eapol_key_send(sm, &sm->ptk, ver, wpa_sm_get_auth_addr(sm), in wpa_sm_key_request() 529 struct wpa_ptk *ptk) in wpa_supplicant_send_2_of_4() argument [all …]
|
H A D | wpa_i.h | 28 struct wpa_ptk ptk, tptk; member 369 sm->ctx->set_rekey_offload(sm->ctx->ctx, sm->ptk.kek, sm->ptk.kek_len, in wpa_sm_set_rekey_offload() 370 sm->ptk.kck, sm->ptk.kck_len, in wpa_sm_set_rekey_offload() 494 u32 life_time, struct wpa_ptk *ptk) in wpa_sm_store_ptk() argument 498 ptk); in wpa_sm_store_ptk() 527 int wpa_eapol_key_send(struct wpa_sm *sm, struct wpa_ptk *ptk, 534 struct wpa_ptk *ptk); 538 struct wpa_ptk *ptk); 541 const struct wpa_eapol_key *key, struct wpa_ptk *ptk);
|
H A D | wpa.h | 99 u32 life_time, const struct wpa_ptk *ptk);
|
/freebsd/contrib/wpa/src/pasn/ |
H A D | pasn_initiator.c | 668 ret = pasn_mic(pasn->ptk.kck, pasn->akmp, pasn->cipher, in wpas_pasn_build_auth_3() 713 forced_memzero(&pasn->ptk, sizeof(pasn->ptk)); in wpa_pasn_reset() 1235 &pasn->ptk, pasn->akmp, pasn->cipher, in wpa_pasn_auth_rx() 1243 ret = wpa_ltf_keyseed(&pasn->ptk, pasn->akmp, pasn->cipher); in wpa_pasn_auth_rx() 1270 ret = pasn_mic(pasn->ptk.kck, pasn->akmp, pasn->cipher, in wpa_pasn_auth_rx() 1305 ret = pasn_mic(pasn->ptk.kck, pasn->akmp, pasn->cipher, in wpa_pasn_auth_rx()
|
H A D | pasn_responder.c | 351 &pasn->ptk, pasn->akmp, in pasn_derive_keys() 359 ret = wpa_ltf_keyseed(&pasn->ptk, pasn->akmp, in pasn_derive_keys() 558 ret = pasn_mic(pasn->ptk.kck, pasn->akmp, pasn->cipher, in handle_auth_pasn_resp() 976 ret = pasn_mic(pasn->ptk.kck, pasn->akmp, pasn->cipher, in handle_auth_pasn_3()
|
H A D | pasn_common.c | 231 return &pasn->ptk; in pasn_get_ptk()
|
H A D | pasn_common.h | 83 struct wpa_ptk ptk; member
|
/freebsd/contrib/wpa/wpa_supplicant/ |
H A D | pasn_supplicant.c | 334 entry->ptk.tk_len, in wpas_pasn_set_keys_from_cache() 335 entry->ptk.tk, in wpas_pasn_set_keys_from_cache() 336 entry->ptk.ltf_keyseed_len, in wpas_pasn_set_keys_from_cache() 337 entry->ptk.ltf_keyseed, 0); in wpas_pasn_set_keys_from_cache() 824 forced_memzero(pasn_get_ptk(pasn), sizeof(pasn->ptk)); in wpas_pasn_auth_rx()
|
H A D | wpas_glue.c | 1384 u32 life_time, const struct wpa_ptk *ptk) in wpa_supplicant_store_ptk() argument 1389 ptk, NULL, NULL, 0); in wpa_supplicant_store_ptk()
|
/freebsd/contrib/wpa/src/ap/ |
H A D | wpa_auth_i.h | 325 u32 life_time, const struct wpa_ptk *ptk); 334 int wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, struct wpa_ptk *ptk,
|
H A D | wpa_auth.c | 48 static int wpa_aead_decrypt(struct wpa_state_machine *sm, struct wpa_ptk *ptk, 63 struct wpa_ptk *ptk, int force_sha256, 392 u32 life_time, const struct wpa_ptk *ptk) in wpa_auth_store_ptksa() argument 396 life_time, ptk); in wpa_auth_store_ptksa() 2861 struct wpa_ptk *ptk, int force_sha256, argument 2886 sm->pmk_r1_name, ptk, 2890 ret = wpa_auth_derive_ptk_ft(sm, ptk, pmk_r0, pmk_r1, 2903 ret = wpa_ltf_keyseed(ptk, sm->wpa_key_mgmt, 2927 sm->ANonce, snonce, ptk, akmp, 2938 ret = wpa_ltf_keyseed(ptk, sm->wpa_key_mgmt, sm->pairwise); [all …]
|
H A D | wpa_auth.h | 368 u32 life_time, const struct wpa_ptk *ptk);
|
H A D | wpa_auth_glue.c | 970 u32 life_time, const struct wpa_ptk *ptk) in hostapd_store_ptksa() argument 975 ptk, NULL, NULL, 0); in hostapd_store_ptksa()
|
H A D | ieee802_11.c | 2699 entry->ptk.tk_len, entry->ptk.tk, in pasn_set_keys_from_cache() 2700 entry->ptk.ltf_keyseed_len, in pasn_set_keys_from_cache() 2701 entry->ptk.ltf_keyseed, 0); in pasn_set_keys_from_cache()
|
H A D | wpa_auth_ft.c | 2115 int wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, struct wpa_ptk *ptk, in wpa_auth_derive_ptk_ft() argument 2163 ptk, ptk_name, sm->wpa_key_mgmt, sm->pairwise, in wpa_auth_derive_ptk_ft()
|
/freebsd/sys/contrib/dev/iwlwifi/mvm/ |
H A D | d3.c | 1465 } ptk; member 1663 iwl_mvm_set_key_rx_seq_tids(key, status->ptk.aes.seq); in iwl_mvm_set_aes_ptk_rx_seq() 1681 status->ptk.aes.seq[tid].ccmp.pn, in iwl_mvm_set_aes_ptk_rx_seq() 1706 status->ptk.tkip.tx_pn = (u64)le16_to_cpu(sc->tkip.tsc.iv16) | in iwl_mvm_convert_key_counters() 1708 status->ptk.aes.tx_pn = le64_to_cpu(sc->aes.tsc.pn); in iwl_mvm_convert_key_counters() 1713 &status->ptk.tkip.seq[i]); in iwl_mvm_convert_key_counters() 1715 &status->ptk.aes.seq[i]); in iwl_mvm_convert_key_counters() 1761 &status->ptk.tkip.seq[tid]); in iwl_mvm_convert_key_counters_v5() 1763 &status->ptk.aes.seq[tid]); in iwl_mvm_convert_key_counters_v5() 1940 atomic64_set(&key->tx_pn, status->ptk.aes.tx_pn); in iwl_mvm_d3_update_keys() [all …]
|
/freebsd/contrib/file/magic/Magdir/ |
H A D | os2 | 83 # http://www.os2museum.com/files/docs/os210ptk/os2-1.0-ptk-tools-1988.pdf
|
/freebsd/contrib/ldns/ldns/ |
H A D | net.h.in | 106 * Sends ptk to the nameserver at the resolver object. Returns the data
|