Home
last modified time | relevance | path

Searched refs:PTK (Results 1 – 9 of 9) sorted by relevance

/external/wpa_supplicant_8/src/ap/
Dwpa_auth.c35 static int wpa_verify_key_mic(struct wpa_ptk *PTK, u8 *data, size_t data_len);
1070 if (wpa_verify_key_mic(&sm->PTK, data, data_len)) { in wpa_receive()
1345 if (aes_wrap(sm->PTK.kek, (key_data_len - 8) / 8, buf, in __wpa_send_eapol()
1358 os_memcpy(ek + 16, sm->PTK.kek, 16); in __wpa_send_eapol()
1374 wpa_eapol_key_mic(sm->PTK.kck, version, (u8 *) hdr, len, in __wpa_send_eapol()
1417 static int wpa_verify_key_mic(struct wpa_ptk *PTK, u8 *data, size_t data_len) in wpa_verify_key_mic() argument
1433 if (wpa_eapol_key_mic(PTK->kck, key_info & WPA_KEY_INFO_TYPE_MASK, in wpa_verify_key_mic()
1445 os_memset(&sm->PTK, 0, sizeof(sm->PTK)); in wpa_remove_ptk()
1526 os_memset(&sm->PTK, 0, sizeof(sm->PTK)); in wpa_auth_sm_event()
1600 os_memset(&sm->PTK, 0, sizeof(sm->PTK)); in SM_STATE()
[all …]
Dwpa_auth_ft.c430 if (aes_wrap(sm->PTK.kek, key_len / 8, key, subelem + 13)) { in wpa_ft_gtk_subelem()
462 if (aes_wrap(sm->PTK.kek, WPA_IGTK_LEN / 8, in wpa_ft_igtk_subelem()
691 wpa_ft_mic(sm->PTK.kck, sm->addr, sm->wpa_auth->addr, 6, in wpa_sm_write_assoc_resp_ies()
739 sm->PTK.tk1, klen)) in wpa_ft_install_ptk()
851 (u8 *) &sm->PTK, ptk_len, ptk_name); in wpa_ft_process_auth_req()
853 (u8 *) &sm->PTK, ptk_len); in wpa_ft_process_auth_req()
1052 if (wpa_ft_mic(sm->PTK.kck, sm->addr, sm->wpa_auth->addr, 5, in wpa_ft_validate_reassoc()
Dwpa_auth_i.h61 struct wpa_ptk PTK; member
/external/wpa_supplicant_8/wpa_supplicant/
Dtodo.txt57 - try to work around race in configuring PTK and sending msg 4/4 (some NDIS
DChangeLog159 used to enforce frequent PTK rekeying, e.g., to mitigate some attacks
1278 - improved PTK Key Handshake
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/
Ddriver_iphone.m329 * PTK for TKIP/CCMP.
/external/wpa_supplicant_6/wpa_supplicant/
Dwpa_supplicant.conf.orig334 # wpa_ptk_rekey: Maximum lifetime for PTK in seconds. This can be used to
335 # enforce rekeying of PTK to mitigate some attacks against TKIP deficiencies.
538 # WPA-Personal(PSK) with TKIP and enforcement for frequent PTK rekeying
DChangeLog60 used to enforce frequent PTK rekeying, e.g., to mitigate some attacks
1179 - improved PTK Key Handshake
/external/wpa_supplicant_8/hostapd/
DChangeLog115 enforce frequent PTK rekeying, e.g., to mitigate some attacks against