Searched refs:PTK (Results 1 – 4 of 4) sorted by relevance
/hal_espressif-3.6.0/components/wpa_supplicant/src/ap/ |
D | wpa_auth.c | 39 static int wpa_verify_key_mic(int akmp, struct wpa_ptk *PTK, u8 *data, 814 if (wpa_verify_key_mic(sm->wpa_key_mgmt, &sm->PTK, data, in wpa_receive() 1070 if (aes_wrap(sm->PTK.kek, 16, (key_data_len - 8) / 8, buf, in __wpa_send_eapol() 1083 memcpy(ek + 16, sm->PTK.kek, 16); in __wpa_send_eapol() 1096 wpa_eapol_key_mic(sm->PTK.kck, sm->PTK.kck_len, in __wpa_send_eapol() 1168 static int wpa_verify_key_mic(int akmp, struct wpa_ptk *PTK, u8 *data, in wpa_verify_key_mic() argument 1188 if (wpa_eapol_key_mic(PTK->kck, PTK->kck_len, akmp, in wpa_verify_key_mic() 1201 memset(&sm->PTK, 0, sizeof(sm->PTK)); in wpa_remove_ptk() 1279 memset(&sm->PTK, 0, sizeof(sm->PTK)); in wpa_auth_sm_event() 1337 memset(&sm->PTK, 0, sizeof(sm->PTK)); in SM_STATE() [all …]
|
D | wpa_auth_i.h | 61 struct wpa_ptk PTK; member
|
/hal_espressif-3.6.0/docs/en/api-guides/ |
D | wifi-security.rst | 22 - Forcing a client to perform 4-way handshake again in case PSK is compromised in order to get PTK.
|
/hal_espressif-3.6.0/docs/zh_CN/api-guides/ |
D | wifi.rst | 1278 - 如果 PSK 遭到破坏,强制 client 再次执行 4 次握手,以获得 PTK。
|