Searched refs:PTK (Results 1 - 3 of 3) sorted by relevance
/freebsd-9.3-release/contrib/wpa/src/ap/ |
H A D | wpa_auth.c | 40 static int wpa_verify_key_mic(struct wpa_ptk *PTK, u8 *data, size_t data_len); 258 wpa_auth_logger(wpa_auth, sm->addr, LOGGER_DEBUG, "rekeying PTK"); 901 if (wpa_verify_key_mic(&sm->PTK, data, data_len)) { 961 /* FIX: why was this triggering PTK rekeying for the 1154 if (aes_wrap(sm->PTK.kek, (key_data_len - 8) / 8, buf, 1167 os_memcpy(ek + 16, sm->PTK.kek, 16); 1178 "PTK not valid when sending EAPOL-Key " 1183 wpa_eapol_key_mic(sm->PTK.kck, version, (u8 *) hdr, len, 1221 static int wpa_verify_key_mic(struct wpa_ptk *PTK, u8 *data, size_t data_len) argument 1237 if (wpa_eapol_key_mic(PTK 1551 struct wpa_ptk PTK; local [all...] |
H A D | wpa_auth_i.h | 67 struct wpa_ptk PTK; member in struct:wpa_state_machine 79 Boolean PtkGroupInit; /* init request for PTK Group state machine */
|
H A D | wpa_auth_ft.c | 394 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len); 456 if (aes_wrap(sm->PTK.kek, key_len / 8, key, subelem + 13)) { 488 if (aes_wrap(sm->PTK.kek, WPA_IGTK_LEN / 8, 717 wpa_ft_mic(sm->PTK.kck, sm->addr, sm->wpa_auth->addr, 6, 882 /* MLME-SETKEYS.request(PTK) */ 891 "PTK configuration", sm->pairwise); 898 * again after association to get the PTK configured, but that could be 902 sm->PTK.tk1, klen)) 1014 (u8 *) &sm->PTK, ptk_len, ptk_name); 1015 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", [all...] |
Completed in 52 milliseconds