Home
last modified time | relevance | path

Searched refs:PTK (Results 1 – 4 of 4) sorted by relevance

/hal_espressif-3.6.0/components/wpa_supplicant/src/ap/
Dwpa_auth.c39 static int wpa_verify_key_mic(int akmp, struct wpa_ptk *PTK, u8 *data,
814 if (wpa_verify_key_mic(sm->wpa_key_mgmt, &sm->PTK, data, in wpa_receive()
1070 if (aes_wrap(sm->PTK.kek, 16, (key_data_len - 8) / 8, buf, in __wpa_send_eapol()
1083 memcpy(ek + 16, sm->PTK.kek, 16); in __wpa_send_eapol()
1096 wpa_eapol_key_mic(sm->PTK.kck, sm->PTK.kck_len, in __wpa_send_eapol()
1168 static int wpa_verify_key_mic(int akmp, struct wpa_ptk *PTK, u8 *data, in wpa_verify_key_mic() argument
1188 if (wpa_eapol_key_mic(PTK->kck, PTK->kck_len, akmp, in wpa_verify_key_mic()
1201 memset(&sm->PTK, 0, sizeof(sm->PTK)); in wpa_remove_ptk()
1279 memset(&sm->PTK, 0, sizeof(sm->PTK)); in wpa_auth_sm_event()
1337 memset(&sm->PTK, 0, sizeof(sm->PTK)); in SM_STATE()
[all …]
Dwpa_auth_i.h61 struct wpa_ptk PTK; member
/hal_espressif-3.6.0/docs/en/api-guides/
Dwifi-security.rst22 - Forcing a client to perform 4-way handshake again in case PSK is compromised in order to get PTK.
/hal_espressif-3.6.0/docs/zh_CN/api-guides/
Dwifi.rst1278 - 如果 PSK 遭到破坏,强制 client 再次执行 4 次握手,以获得 PTK