Searched refs:PTK (Results 1 – 8 of 8) sorted by relevance
/hostap-3.6.0/src/ap/ |
D | wpa_auth.c | 43 static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK, 936 struct wpa_ptk PTK; in wpa_try_alt_snonce() local 942 os_memset(&PTK, 0, sizeof(PTK)); in wpa_try_alt_snonce() 962 if (wpa_derive_ptk(sm, sm->alt_SNonce, pmk, pmk_len, &PTK, 0) < in wpa_try_alt_snonce() 966 if (wpa_verify_key_mic(sm->wpa_key_mgmt, pmk_len, &PTK, in wpa_try_alt_snonce() 996 os_memcpy(&sm->PTK, &PTK, sizeof(PTK)); in wpa_try_alt_snonce() 997 forced_memzero(&PTK, sizeof(PTK)); in wpa_try_alt_snonce() 1315 wpa_verify_key_mic(sm->wpa_key_mgmt, sm->pmk_len, &sm->PTK, in wpa_receive() 1330 wpa_aead_decrypt(sm, &sm->PTK, data, data_len, in wpa_receive() 1607 sm->PTK.kek, sm->PTK.kek_len); in __wpa_send_eapol() [all …]
|
D | wpa_auth_ft.c | 2177 kek = sm->PTK.kek2; in wpa_ft_gtk_subelem() 2178 kek_len = sm->PTK.kek2_len; in wpa_ft_gtk_subelem() 2180 kek = sm->PTK.kek; in wpa_ft_gtk_subelem() 2181 kek_len = sm->PTK.kek_len; in wpa_ft_gtk_subelem() 2266 kek = sm->PTK.kek2; in wpa_ft_igtk_subelem() 2267 kek_len = sm->PTK.kek2_len; in wpa_ft_igtk_subelem() 2269 kek = sm->PTK.kek; in wpa_ft_igtk_subelem() 2270 kek_len = sm->PTK.kek_len; in wpa_ft_igtk_subelem() 2326 kek = sm->PTK.kek2; in wpa_ft_bigtk_subelem() 2327 kek_len = sm->PTK.kek2_len; in wpa_ft_bigtk_subelem() [all …]
|
D | wpa_auth_i.h | 63 struct wpa_ptk PTK; member
|
/hostap-3.6.0/tests/ |
D | cipher-and-key-mgmt-testing.txt | 211 <3>WPA: Key negotiation completed with <DUT MAC address> [PTK=CCMP GTK=CCMP] 335 <3>WPA: Key negotiation completed with <DUT MAC address> [PTK=CCMP GTK=CCMP] 338 Show the ANonce from the first 4-way handshake, request PTK rekeying,
|
/hostap-3.6.0/wpa_supplicant/ |
D | todo.txt | 53 - try to work around race in configuring PTK and sending msg 4/4 (some NDIS
|
D | README-HS20 | 454 <3>WPA: Key negotiation completed with 02:00:00:00:01:00 [PTK=CCMP GTK=CCMP] 495 <3>WPA: Key negotiation completed with 02:00:00:00:01:00 [PTK=CCMP GTK=CCMP]
|
D | ChangeLog | 152 * fixed PTK rekeying with FILS and FT 202 - fixed PTK and EAPOL-Key integrity and key-wrap algorithm selection 354 * fixed EAPOL-Key Request Secure bit to be 1 if PTK is set 651 * fixed PTK derivation for CCMP-256 and GCMP-256 1363 used to enforce frequent PTK rekeying, e.g., to mitigate some attacks 2483 - improved PTK Key Handshake
|
/hostap-3.6.0/hostapd/ |
D | ChangeLog | 123 * fixed PTK rekeying with FILS and FT 154 - fixed PTK and EAPOL-Key integrity and key-wrap algorithm selection 412 * fixed PTK derivation for CCMP-256 and GCMP-256 789 enforce frequent PTK rekeying, e.g., to mitigate some attacks against
|