Searched refs:PTK (Results 1 – 8 of 8) sorted by relevance
/freebsd/contrib/wpa/src/ap/ |
H A D | wpa_auth.c | 45 static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK, 1295 struct wpa_ptk PTK; local 1305 os_memset(&PTK, 0, sizeof(PTK)); 1325 if (wpa_derive_ptk(sm, sm->alt_SNonce, pmk, pmk_len, &PTK, 0, 1330 if (wpa_verify_key_mic(sm->wpa_key_mgmt, pmk_len, &PTK, 1368 os_memcpy(&sm->PTK, &PTK, sizeof(PTK)); 1369 forced_memzero(&PTK, sizeof(PTK)); 1635 if (aes_unwrap(sm->PTK.kek, sm->PTK.kek_len, 1772 wpa_verify_key_mic(sm->wpa_key_mgmt, sm->pmk_len, &sm->PTK, 1788 wpa_aead_decrypt(sm, &sm->PTK, data, data_len, [all …]
|
H A D | wpa_auth_ft.c | 2228 kek = sm->PTK.kek2; in wpa_ft_gtk_subelem() 2229 kek_len = sm->PTK.kek2_len; in wpa_ft_gtk_subelem() 2231 kek = sm->PTK.kek; in wpa_ft_gtk_subelem() 2232 kek_len = sm->PTK.kek_len; in wpa_ft_gtk_subelem() 2317 kek = sm->PTK.kek2; in wpa_ft_igtk_subelem() 2318 kek_len = sm->PTK.kek2_len; in wpa_ft_igtk_subelem() 2320 kek = sm->PTK.kek; in wpa_ft_igtk_subelem() 2321 kek_len = sm->PTK.kek_len; in wpa_ft_igtk_subelem() 2378 kek = sm->PTK.kek2; in wpa_ft_bigtk_subelem() 2379 kek_len = sm->PTK.kek2_len; in wpa_ft_bigtk_subelem() [all …]
|
H A D | wpa_auth_i.h | 63 struct wpa_ptk PTK; member
|
/freebsd/contrib/wpa/wpa_supplicant/ |
H A D | todo.txt | 53 - try to work around race in configuring PTK and sending msg 4/4 (some NDIS
|
H A D | README-HS20 | 485 <3>WPA: Key negotiation completed with 02:00:00:00:01:00 [PTK=CCMP GTK=CCMP] 526 <3>WPA: Key negotiation completed with 02:00:00:00:01:00 [PTK=CCMP GTK=CCMP]
|
H A D | ChangeLog | 22 - use Secure=1 in message 2 during PTK rekeying 202 * fixed PTK rekeying with FILS and FT 252 - fixed PTK and EAPOL-Key integrity and key-wrap algorithm selection 404 * fixed EAPOL-Key Request Secure bit to be 1 if PTK is set 701 * fixed PTK derivation for CCMP-256 and GCMP-256 1413 used to enforce frequent PTK rekeying, e.g., to mitigate some attacks 2533 - improved PTK Key Handshake
|
/freebsd/contrib/wpa/hostapd/ |
H A D | ChangeLog | 18 - use Secure=1 in message 3 during PTK rekeying 160 * fixed PTK rekeying with FILS and FT 191 - fixed PTK and EAPOL-Key integrity and key-wrap algorithm selection 449 * fixed PTK derivation for CCMP-256 and GCMP-256 826 enforce frequent PTK rekeying, e.g., to mitigate some attacks against
|
/freebsd/share/misc/ |
H A D | usb_vendors | 7263 0029 PTK-450 [Intuos5 (S)] 7264 002a PTK-650 [Intuos5 (M)] 7311 00b8 PTK-440 [Intuos4 (4x6)] 7312 00b9 PTK-640 [Intuos4 (6x9)] 7313 00ba PTK-840 [Intuos4 (8x13)] 7314 00bb PTK-1240 [Intuos4 (12x19)]
|