Home
last modified time | relevance | path

Searched refs:TK (Results 1 – 3 of 3) sorted by relevance

/hostap-latest/wlantest/
Dtkip.c108 static void tkip_mixing_phase1(u16 *TTAK, const u8 *TK, const u8 *TA, u32 IV32) in tkip_mixing_phase1() argument
121 TTAK[0] += _S_(TTAK[4] ^ Mk16(TK[1 + j], TK[0 + j])); in tkip_mixing_phase1()
122 TTAK[1] += _S_(TTAK[0] ^ Mk16(TK[5 + j], TK[4 + j])); in tkip_mixing_phase1()
123 TTAK[2] += _S_(TTAK[1] ^ Mk16(TK[9 + j], TK[8 + j])); in tkip_mixing_phase1()
124 TTAK[3] += _S_(TTAK[2] ^ Mk16(TK[13 + j], TK[12 + j])); in tkip_mixing_phase1()
125 TTAK[4] += _S_(TTAK[3] ^ Mk16(TK[1 + j], TK[0 + j])) + i; in tkip_mixing_phase1()
130 static void tkip_mixing_phase2(u8 *WEPSeed, const u8 *TK, const u16 *TTAK, in tkip_mixing_phase2() argument
144 PPK[0] += _S_(PPK[5] ^ Mk16_le((u16 *) &TK[0])); in tkip_mixing_phase2()
145 PPK[1] += _S_(PPK[0] ^ Mk16_le((u16 *) &TK[2])); in tkip_mixing_phase2()
146 PPK[2] += _S_(PPK[1] ^ Mk16_le((u16 *) &TK[4])); in tkip_mixing_phase2()
[all …]
/hostap-latest/tests/
Dcipher-and-key-mgmt-testing.txt287 Testing TK reinstallation protection on a station device (4-way handshake)
375 of a likely security vulnerability. The AP's TK configuration should be
376 verified (i.e., whether it is configuring the same TK again and then
/hostap-latest/wpa_supplicant/
DChangeLog286 * fixed TK configuration to the driver in EAPOL-Key 3/4 retry case