Home
last modified time | relevance | path

Searched refs:PTK (Results 1 – 8 of 8) sorted by relevance

/freebsd/contrib/wpa/src/ap/
H A Dwpa_auth.c45 static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK,
1295 struct wpa_ptk PTK; local
1305 os_memset(&PTK, 0, sizeof(PTK));
1325 if (wpa_derive_ptk(sm, sm->alt_SNonce, pmk, pmk_len, &PTK, 0,
1330 if (wpa_verify_key_mic(sm->wpa_key_mgmt, pmk_len, &PTK,
1368 os_memcpy(&sm->PTK, &PTK, sizeof(PTK));
1369 forced_memzero(&PTK, sizeof(PTK));
1635 if (aes_unwrap(sm->PTK.kek, sm->PTK.kek_len,
1772 wpa_verify_key_mic(sm->wpa_key_mgmt, sm->pmk_len, &sm->PTK,
1788 wpa_aead_decrypt(sm, &sm->PTK, data, data_len,
[all …]
H A Dwpa_auth_ft.c2228 kek = sm->PTK.kek2; in wpa_ft_gtk_subelem()
2229 kek_len = sm->PTK.kek2_len; in wpa_ft_gtk_subelem()
2231 kek = sm->PTK.kek; in wpa_ft_gtk_subelem()
2232 kek_len = sm->PTK.kek_len; in wpa_ft_gtk_subelem()
2317 kek = sm->PTK.kek2; in wpa_ft_igtk_subelem()
2318 kek_len = sm->PTK.kek2_len; in wpa_ft_igtk_subelem()
2320 kek = sm->PTK.kek; in wpa_ft_igtk_subelem()
2321 kek_len = sm->PTK.kek_len; in wpa_ft_igtk_subelem()
2378 kek = sm->PTK.kek2; in wpa_ft_bigtk_subelem()
2379 kek_len = sm->PTK.kek2_len; in wpa_ft_bigtk_subelem()
[all …]
H A Dwpa_auth_i.h63 struct wpa_ptk PTK; member
/freebsd/contrib/wpa/wpa_supplicant/
H A Dtodo.txt53 - try to work around race in configuring PTK and sending msg 4/4 (some NDIS
H A DREADME-HS20485 <3>WPA: Key negotiation completed with 02:00:00:00:01:00 [PTK=CCMP GTK=CCMP]
526 <3>WPA: Key negotiation completed with 02:00:00:00:01:00 [PTK=CCMP GTK=CCMP]
H A DChangeLog22 - use Secure=1 in message 2 during PTK rekeying
202 * fixed PTK rekeying with FILS and FT
252 - fixed PTK and EAPOL-Key integrity and key-wrap algorithm selection
404 * fixed EAPOL-Key Request Secure bit to be 1 if PTK is set
701 * fixed PTK derivation for CCMP-256 and GCMP-256
1413 used to enforce frequent PTK rekeying, e.g., to mitigate some attacks
2533 - improved PTK Key Handshake
/freebsd/contrib/wpa/hostapd/
H A DChangeLog18 - use Secure=1 in message 3 during PTK rekeying
160 * fixed PTK rekeying with FILS and FT
191 - fixed PTK and EAPOL-Key integrity and key-wrap algorithm selection
449 * fixed PTK derivation for CCMP-256 and GCMP-256
826 enforce frequent PTK rekeying, e.g., to mitigate some attacks against
/freebsd/share/misc/
H A Dusb_vendors7263 0029 PTK-450 [Intuos5 (S)]
7264 002a PTK-650 [Intuos5 (M)]
7311 00b8 PTK-440 [Intuos4 (4x6)]
7312 00b9 PTK-640 [Intuos4 (6x9)]
7313 00ba PTK-840 [Intuos4 (8x13)]
7314 00bb PTK-1240 [Intuos4 (12x19)]