Searched refs:PTK (Results 1 - 3 of 3) sorted by relevance

/freebsd-9.3-release/contrib/wpa/src/ap/
H A Dwpa_auth.c40 static int wpa_verify_key_mic(struct wpa_ptk *PTK, u8 *data, size_t data_len);
258 wpa_auth_logger(wpa_auth, sm->addr, LOGGER_DEBUG, "rekeying PTK");
901 if (wpa_verify_key_mic(&sm->PTK, data, data_len)) {
961 /* FIX: why was this triggering PTK rekeying for the
1154 if (aes_wrap(sm->PTK.kek, (key_data_len - 8) / 8, buf,
1167 os_memcpy(ek + 16, sm->PTK.kek, 16);
1178 "PTK not valid when sending EAPOL-Key "
1183 wpa_eapol_key_mic(sm->PTK.kck, version, (u8 *) hdr, len,
1221 static int wpa_verify_key_mic(struct wpa_ptk *PTK, u8 *data, size_t data_len) argument
1237 if (wpa_eapol_key_mic(PTK
1551 struct wpa_ptk PTK; local
[all...]
H A Dwpa_auth_i.h67 struct wpa_ptk PTK; member in struct:wpa_state_machine
79 Boolean PtkGroupInit; /* init request for PTK Group state machine */
H A Dwpa_auth_ft.c394 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len);
456 if (aes_wrap(sm->PTK.kek, key_len / 8, key, subelem + 13)) {
488 if (aes_wrap(sm->PTK.kek, WPA_IGTK_LEN / 8,
717 wpa_ft_mic(sm->PTK.kck, sm->addr, sm->wpa_auth->addr, 6,
882 /* MLME-SETKEYS.request(PTK) */
891 "PTK configuration", sm->pairwise);
898 * again after association to get the PTK configured, but that could be
902 sm->PTK.tk1, klen))
1014 (u8 *) &sm->PTK, ptk_len, ptk_name);
1015 wpa_hexdump_key(MSG_DEBUG, "FT: PTK",
[all...]

Completed in 52 milliseconds