Lines Matching refs:GTK
242 wpa_auth_logger(wpa_auth, NULL, LOGGER_DEBUG, "rekeying GTK");
502 * Reinitialize GTK to make sure it is suitable for the new
601 "strict rekeying - force GTK rekey since STA "
1029 "received EAPOL-Key Request for GTK "
1069 const u8 *gnonce, u8 *gtk, size_t gtk_len)
1075 /* GTK = PRF-X(GMK, "Group key expansion",
1091 sha256_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data), gtk, gtk_len);
1093 if (sha1_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data), gtk, gtk_len)
1799 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos;
1816 GTK[GN], IGTK, [FTIE], [TIE * 2])
1833 /* WPA2 send GTK in the 4-way handshake */
1835 gtk = gsm->GTK[gsm->GN - 1];
1841 /* WPA does not include GTK in msg 3/4 */
1843 gtk = NULL;
1850 if (gtk)
1877 if (gtk) {
1882 gtk, gtk_len);
2130 /* Send EAPOL(1, 1, 1, !Pair, G, RSC, GNonce, MIC(PTK), GTK[GN]) */
2148 gsm->GTK[gsm->GN - 1], gsm->GTK_len);
2151 kde = gsm->GTK[gsm->GN - 1];
2231 group->GTK[group->GN - 1], group->GTK_len) < 0)
2233 wpa_hexdump_key(MSG_DEBUG, "GTK",
2234 group->GTK[group->GN - 1], group->GTK_len);
2262 /* GTK[0..N] = 0 */
2263 os_memset(group->GTK, 0, sizeof(group->GTK));
2270 /* GTK[GN] = CalcGTK() */
2291 "marking station for GTK rekeying");
2327 "GKeyDoneStations=%d when starting new GTK rekey",
2345 group->GTK[group->GN - 1], group->GTK_len) < 0)