Searched refs:ptk_len (Results 1 - 8 of 8) sorted by relevance
/freebsd-10-stable/contrib/wpa/src/rsn_supp/ |
H A D | wpa_ft.c | 23 struct wpa_ptk *ptk, size_t ptk_len) 48 (u8 *) ptk, ptk_len, ptk_name); 49 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len); 378 size_t ft_ies_len, ptk_len; local 479 ptk_len = sm->pairwise_cipher != WPA_CIPHER_TKIP ? 48 : 64; 482 (u8 *) &sm->ptk, ptk_len, ptk_name); 484 (u8 *) &sm->ptk, ptk_len); 21 wpa_derive_ptk_ft(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, struct wpa_ptk *ptk, size_t ptk_len) argument
|
H A D | wpa_i.h | 320 struct wpa_ptk *ptk, size_t ptk_len);
|
H A D | wpa.c | 359 size_t ptk_len = sm->pairwise_cipher != WPA_CIPHER_TKIP ? 48 : 64; local 362 return wpa_derive_ptk_ft(sm, src_addr, key, ptk, ptk_len); 367 (u8 *) ptk, ptk_len,
|
/freebsd-10-stable/contrib/wpa/src/common/ |
H A D | wpa_common.c | 77 * @ptk_len: Length of PTK 92 u8 *ptk, size_t ptk_len, int use_sha256) 117 ptk, ptk_len); 121 ptk_len); 128 wpa_hexdump_key(MSG_DEBUG, "WPA: PTK", ptk, ptk_len); 818 u8 *ptk, size_t ptk_len, u8 *ptk_name) 839 sha256_prf(pmk_r1, PMK_LEN, "FT-PTK", buf, pos - buf, ptk, ptk_len); 89 wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, const u8 *addr1, const u8 *addr2, const u8 *nonce1, const u8 *nonce2, u8 *ptk, size_t ptk_len, int use_sha256) argument 815 wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *pmk_r1_name, u8 *ptk, size_t ptk_len, u8 *ptk_name) argument
|
H A D | wpa_common.h | 324 u8 *ptk, size_t ptk_len, int use_sha256); 344 u8 *ptk, size_t ptk_len, u8 *ptk_name);
|
/freebsd-10-stable/contrib/wpa/src/ap/ |
H A D | wpa_auth_i.h | 227 struct wpa_ptk *ptk, size_t ptk_len);
|
H A D | wpa_auth_ft.c | 344 struct wpa_ptk *ptk, size_t ptk_len) 380 (u8 *) ptk, ptk_len, ptk_name); 381 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len); 799 size_t buflen, ptk_len; local 890 ptk_len = pairwise == WPA_CIPHER_TKIP ? 64 : 48; 893 (u8 *) &sm->PTK, ptk_len, ptk_name); 895 (u8 *) &sm->PTK, ptk_len); 343 wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, const u8 *pmk, struct wpa_ptk *ptk, size_t ptk_len) argument
|
H A D | wpa_auth.c | 1747 size_t ptk_len = sm->pairwise != WPA_CIPHER_TKIP ? 48 : 64; local 1750 return wpa_auth_derive_ptk_ft(sm, pmk, ptk, ptk_len); 1755 (u8 *) ptk, ptk_len,
|
Completed in 218 milliseconds