/freebsd/sys/contrib/dev/iwlwifi/mvm/ |
H A D | ftm-responder.c | 330 u8 *addr, u32 cipher, u8 *tk, u32 tk_len, in iwl_mvm_ftm_respoder_add_pasn_sta() 352 if ((!hltk || !hltk_len) && (!tk || !tk_len)) { in iwl_mvm_ftm_respoder_add_pasn_sta() 373 if (tk && tk_len) { in iwl_mvm_ftm_resp_remove_pasn_sta() 374 sta = kzalloc(sizeof(*sta) + tk_len, GFP_KERNEL); in iwl_mvm_ftm_resp_remove_pasn_sta() 379 cipher, tk, tk_len, &sta->keyconf); in iwl_mvm_ftm_resp_remove_pasn_sta() 313 iwl_mvm_ftm_respoder_add_pasn_sta(struct iwl_mvm * mvm,struct ieee80211_vif * vif,u8 * addr,u32 cipher,u8 * tk,u32 tk_len,u8 * hltk,u32 hltk_len) iwl_mvm_ftm_respoder_add_pasn_sta() argument
|
H A D | ftm-initiator.c | 50 u8 *addr, u32 cipher, u8 *tk, u32 tk_len, in iwl_mvm_ftm_add_pasn_sta() 104 if (tk_len != expected_tk_len || in iwl_mvm_ftm_add_pasn_sta() 106 IWL_ERR(mvm, "Invalid key length: tk_len=%u hltk_len=%u\n", in iwl_mvm_ftm_add_pasn_sta() 107 tk_len, hltk_len); in iwl_mvm_ftm_add_pasn_sta() 123 if (tk && tk_len) in iwl_mvm_ftm_add_pasn_sta() 44 iwl_mvm_ftm_add_pasn_sta(struct iwl_mvm * mvm,struct ieee80211_vif * vif,u8 * addr,u32 cipher,u8 * tk,u32 tk_len,u8 * hltk,u32 hltk_len) iwl_mvm_ftm_add_pasn_sta() argument
|
H A D | mvm.h | 2508 u8 *addr, u32 cipher, u8 *tk, u32 tk_len, in iwl_mvm_set_chan_info() 2526 u8 *addr, u32 cipher, u8 *tk, u32 tk_len, in iwl_mvm_set_chan_info_chandef()
|
/freebsd/contrib/wpa/src/common/ |
H A D | wpa_common.c | 454 ptk->tk_len = wpa_cipher_key_len(cipher); in wpa_pmk_to_ptk() 456 if (ptk->tk_len == 0) { in wpa_pmk_to_ptk() 462 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len + ptk->kdk_len; in wpa_pmk_to_ptk() 573 os_memcpy(ptk->tk, tmp + ptk->kck_len + ptk->kek_len, ptk->tk_len); in wpa_pmk_to_ptk() 574 wpa_hexdump_key(MSG_DEBUG, "WPA: TK", ptk->tk, ptk->tk_len); in wpa_pmk_to_ptk() 578 ptk->tk_len, ptk->kdk_len); in wpa_pmk_to_ptk() 712 ptk->tk_len = wpa_cipher_key_len(cipher); in fils_pmk_to_ptk() 719 key_data_len = *ick_len + ptk->kek_len + ptk->tk_len; in fils_pmk_to_ptk() 775 os_memcpy(ptk->tk, tmp + offset, ptk->tk_len); in fils_pmk_to_ptk() 776 wpa_hexdump_key(MSG_DEBUG, "FILS: TK", ptk->tk, ptk->tk_len); in fils_pmk_to_ptk() [all …]
|
H A D | common_module_tests.c | 665 if (ptk.tk_len != sizeof(tk) || in pasn_test_pasn_auth() 750 if (ptk.tk_len != sizeof(tk) || in pasn_test_no_pasn_auth()
|
H A D | ptksa_cache.c | 198 e->ptk.tk_len); in ptksa_cache_list()
|
H A D | wpa_common.h | 266 size_t tk_len; member
|
/freebsd/contrib/wpa/wpa_supplicant/ |
H A D | driver_i.h | 1142 u32 cipher, u8 tk_len, in wpa_drv_set_secure_ranging_ctx() argument 1160 params.tk_len = tk_len; in wpa_drv_set_secure_ranging_ctx()
|
H A D | pasn_supplicant.c | 334 entry->ptk.tk_len, in wpas_pasn_set_keys_from_cache()
|
/freebsd/contrib/wpa/src/ap/ |
H A D | ap_drv_ops.c | 1231 u32 cipher, u8 tk_len, const u8 *tk, in hostapd_drv_set_secure_ranging_ctx() argument 1244 params.tk_len = tk_len; in hostapd_drv_set_secure_ranging_ctx()
|
H A D | ieee802_11.c | 2699 entry->ptk.tk_len, entry->ptk.tk, in pasn_set_keys_from_cache()
|
/freebsd/contrib/wpa/src/rsn_supp/ |
H A D | wpa.c | 1217 if (keylen <= 0 || (unsigned int) keylen != sm->ptk.tk_len) { in wpa_supplicant_install_ptk() 1219 keylen, (long unsigned int) sm->ptk.tk_len); in wpa_supplicant_install_ptk() 1261 sm->ptk.tk_len = 0; in wpa_supplicant_install_ptk() 6373 if (keylen <= 0 || (unsigned int) keylen != sm->ptk.tk_len) { in fils_process_assoc_resp() 6375 keylen, (long unsigned int) sm->ptk.tk_len); in fils_process_assoc_resp() 6399 sm->ptk.tk_len = 0; in fils_process_assoc_resp()
|
/freebsd/contrib/wpa/src/drivers/ |
H A D | driver.h | 3000 u8 tk_len; member
|
H A D | driver_nl80211.c | 13395 if (params->tk_len && params->tk) { in nl80211_set_secure_ranging_ctx() 13397 params->tk_len, params->tk)) in nl80211_set_secure_ranging_ctx() 13400 params->tk, params->tk_len); in nl80211_set_secure_ranging_ctx()
|