Home
last modified time | relevance | path

Searched refs:PTK (Results 1 – 8 of 8) sorted by relevance

/hostap-3.6.0/src/ap/
Dwpa_auth.c43 static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK,
936 struct wpa_ptk PTK; in wpa_try_alt_snonce() local
942 os_memset(&PTK, 0, sizeof(PTK)); in wpa_try_alt_snonce()
962 if (wpa_derive_ptk(sm, sm->alt_SNonce, pmk, pmk_len, &PTK, 0) < in wpa_try_alt_snonce()
966 if (wpa_verify_key_mic(sm->wpa_key_mgmt, pmk_len, &PTK, in wpa_try_alt_snonce()
996 os_memcpy(&sm->PTK, &PTK, sizeof(PTK)); in wpa_try_alt_snonce()
997 forced_memzero(&PTK, sizeof(PTK)); in wpa_try_alt_snonce()
1315 wpa_verify_key_mic(sm->wpa_key_mgmt, sm->pmk_len, &sm->PTK, in wpa_receive()
1330 wpa_aead_decrypt(sm, &sm->PTK, data, data_len, in wpa_receive()
1607 sm->PTK.kek, sm->PTK.kek_len); in __wpa_send_eapol()
[all …]
Dwpa_auth_ft.c2177 kek = sm->PTK.kek2; in wpa_ft_gtk_subelem()
2178 kek_len = sm->PTK.kek2_len; in wpa_ft_gtk_subelem()
2180 kek = sm->PTK.kek; in wpa_ft_gtk_subelem()
2181 kek_len = sm->PTK.kek_len; in wpa_ft_gtk_subelem()
2266 kek = sm->PTK.kek2; in wpa_ft_igtk_subelem()
2267 kek_len = sm->PTK.kek2_len; in wpa_ft_igtk_subelem()
2269 kek = sm->PTK.kek; in wpa_ft_igtk_subelem()
2270 kek_len = sm->PTK.kek_len; in wpa_ft_igtk_subelem()
2326 kek = sm->PTK.kek2; in wpa_ft_bigtk_subelem()
2327 kek_len = sm->PTK.kek2_len; in wpa_ft_bigtk_subelem()
[all …]
Dwpa_auth_i.h63 struct wpa_ptk PTK; member
/hostap-3.6.0/tests/
Dcipher-and-key-mgmt-testing.txt211 <3>WPA: Key negotiation completed with <DUT MAC address> [PTK=CCMP GTK=CCMP]
335 <3>WPA: Key negotiation completed with <DUT MAC address> [PTK=CCMP GTK=CCMP]
338 Show the ANonce from the first 4-way handshake, request PTK rekeying,
/hostap-3.6.0/wpa_supplicant/
Dtodo.txt53 - try to work around race in configuring PTK and sending msg 4/4 (some NDIS
DREADME-HS20454 <3>WPA: Key negotiation completed with 02:00:00:00:01:00 [PTK=CCMP GTK=CCMP]
495 <3>WPA: Key negotiation completed with 02:00:00:00:01:00 [PTK=CCMP GTK=CCMP]
DChangeLog152 * fixed PTK rekeying with FILS and FT
202 - fixed PTK and EAPOL-Key integrity and key-wrap algorithm selection
354 * fixed EAPOL-Key Request Secure bit to be 1 if PTK is set
651 * fixed PTK derivation for CCMP-256 and GCMP-256
1363 used to enforce frequent PTK rekeying, e.g., to mitigate some attacks
2483 - improved PTK Key Handshake
/hostap-3.6.0/hostapd/
DChangeLog123 * fixed PTK rekeying with FILS and FT
154 - fixed PTK and EAPOL-Key integrity and key-wrap algorithm selection
412 * fixed PTK derivation for CCMP-256 and GCMP-256
789 enforce frequent PTK rekeying, e.g., to mitigate some attacks against