Home | History | Annotate | Download | only in ap

Lines Matching refs:PTK

41 static int wpa_verify_key_mic(struct wpa_ptk *PTK, u8 *data, size_t data_len);
263 wpa_auth_logger(wpa_auth, sm->addr, LOGGER_DEBUG, "rekeying PTK");
970 if (wpa_verify_key_mic(&sm->PTK, data, data_len)) {
1031 /* FIX: why was this triggering PTK rekeying for the
1237 if (aes_wrap(sm->PTK.kek, (key_data_len - 8) / 8, buf,
1250 os_memcpy(ek + 16, sm->PTK.kek, 16);
1261 "PTK not valid when sending EAPOL-Key "
1266 wpa_eapol_key_mic(sm->PTK.kck, version, (u8 *) hdr, len,
1308 static int wpa_verify_key_mic(struct wpa_ptk *PTK, u8 *data, size_t data_len)
1324 if (wpa_eapol_key_mic(PTK->kck, key_info & WPA_KEY_INFO_TYPE_MASK,
1336 os_memset(&sm->PTK, 0, sizeof(sm->PTK));
1394 wpa_printf(MSG_DEBUG, "FT: Retry PTK configuration "
1417 os_memset(&sm->PTK, 0, sizeof(sm->PTK));
1491 os_memset(&sm->PTK, 0, sizeof(sm->PTK));
1649 struct wpa_ptk *ptk)
1654 return wpa_auth_derive_ptk_ft(sm, pmk, ptk, ptk_len);
1659 (u8 *) ptk, ptk_len,
1668 struct wpa_ptk PTK;
1686 wpa_derive_ptk(sm, pmk, &PTK);
1688 if (wpa_verify_key_mic(&PTK, sm->last_rx_eapol_key,
1737 os_memcpy(&sm->PTK, &PTK, sizeof(PTK));
1815 PTK), RSNIE, [MDIE],
1944 sm->PTK.tk1, klen)) {
2130 /* Send EAPOL(1, 1, 1, !Pair, G, RSC, GNonce, MIC(PTK), GTK[GN]) */
2828 * deriving the PTK. This results in unsuccessful 4-way