Home | History | Annotate | Download | only in rsn_supp

Lines Matching refs:ptk

35  * @kck: Key Confirmation Key (KCK, part of PTK)
137 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL,
265 * @ptk: PTK to use for keyed hash and encryption
272 struct wpa_ptk *ptk)
346 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL,
355 struct wpa_ptk *ptk)
360 return wpa_derive_ptk_ft(sm, src_addr, key, ptk, ptk_len);
365 (u8 *) ptk, ptk_len,
377 struct wpa_ptk *ptk;
427 /* Calculate PTK which will be stored as a temporary PTK until it has
429 ptk = &sm->tptk;
430 wpa_derive_ptk(sm, src_addr, key, ptk);
432 os_memcpy(buf, ptk->u.auth.tx_mic_key, 8);
433 os_memcpy(ptk->u.auth.tx_mic_key, ptk->u.auth.rx_mic_key, 8);
434 os_memcpy(ptk->u.auth.rx_mic_key, buf, 8);
439 ptk))
462 MACSTR " [PTK=%s GTK=%s]", MAC2STR(addr),
504 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, "WPA: Request PTK rekeying");
518 "WPA: Installing PTK to the driver");
550 (u8 *) sm->ptk.tk1, keylen) < 0) {
552 "WPA: Failed to set PTK to the "
1025 * @ptk: PTK to use for keyed hash and encryption
1032 struct wpa_ptk *ptk)
1064 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL,
1141 NULL, 0, &sm->ptk)) {
1147 * SNonce will still be used to avoid changing PTK. */
1270 os_memcpy(ek + 16, sm->ptk.kek, 16);
1298 if (aes_unwrap(sm->ptk.kek, maxkeylen / 8,
1344 wpa_eapol_key_send(sm, sm->ptk.kck, ver, sm->bssid, ETH_P_EAPOL,
1428 os_memcpy(&sm->ptk, &sm->tptk, sizeof(sm->ptk));
1434 wpa_eapol_key_mic(sm->ptk.kck, ver, buf, len,
1469 "WPA: PTK not available, cannot decrypt EAPOL-Key Key "
1479 os_memcpy(ek + 16, sm->ptk.kek, 16);
1501 if (aes_unwrap(sm->ptk.kek, keydatalen / 8,
1586 * to. In addition, key material (PTK, GTK) is configured at the end of a
2126 * IEEE 802.11, 8.4.10: Delete PTK SA on (re)association if
2129 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, "WPA: Clear old PTK");
2632 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, "WPA: Clear old PMK and PTK");
2636 os_memset(&sm->ptk, 0, sizeof(sm->ptk));