Searched refs:TK (Results 1 – 3 of 3) sorted by relevance
/hostap-latest/wlantest/ |
D | tkip.c | 108 static void tkip_mixing_phase1(u16 *TTAK, const u8 *TK, const u8 *TA, u32 IV32) in tkip_mixing_phase1() argument 121 TTAK[0] += _S_(TTAK[4] ^ Mk16(TK[1 + j], TK[0 + j])); in tkip_mixing_phase1() 122 TTAK[1] += _S_(TTAK[0] ^ Mk16(TK[5 + j], TK[4 + j])); in tkip_mixing_phase1() 123 TTAK[2] += _S_(TTAK[1] ^ Mk16(TK[9 + j], TK[8 + j])); in tkip_mixing_phase1() 124 TTAK[3] += _S_(TTAK[2] ^ Mk16(TK[13 + j], TK[12 + j])); in tkip_mixing_phase1() 125 TTAK[4] += _S_(TTAK[3] ^ Mk16(TK[1 + j], TK[0 + j])) + i; in tkip_mixing_phase1() 130 static void tkip_mixing_phase2(u8 *WEPSeed, const u8 *TK, const u16 *TTAK, in tkip_mixing_phase2() argument 144 PPK[0] += _S_(PPK[5] ^ Mk16_le((u16 *) &TK[0])); in tkip_mixing_phase2() 145 PPK[1] += _S_(PPK[0] ^ Mk16_le((u16 *) &TK[2])); in tkip_mixing_phase2() 146 PPK[2] += _S_(PPK[1] ^ Mk16_le((u16 *) &TK[4])); in tkip_mixing_phase2() [all …]
|
/hostap-latest/tests/ |
D | cipher-and-key-mgmt-testing.txt | 287 Testing TK reinstallation protection on a station device (4-way handshake) 375 of a likely security vulnerability. The AP's TK configuration should be 376 verified (i.e., whether it is configuring the same TK again and then
|
/hostap-latest/wpa_supplicant/ |
D | ChangeLog | 286 * fixed TK configuration to the driver in EAPOL-Key 3/4 retry case
|