On the use of automatic tools for the formal analysis of IEEE 802.11 key-exchange protocols