Home | History | Annotate | Download | only in ap

Lines Matching refs:GTK

242 	wpa_auth_logger(wpa_auth, NULL, LOGGER_DEBUG, "rekeying GTK");
499 * Reinitialize GTK to make sure it is suitable for the new
601 "strict rekeying - force GTK rekey since STA "
1114 "received EAPOL-Key Request for GTK "
1170 const u8 *gnonce, u8 *gtk, size_t gtk_len)
1176 /* GTK = PRF-X(GMK, "Group key expansion",
1192 sha256_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data), gtk, gtk_len);
1194 if (sha1_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data), gtk, gtk_len)
1908 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos, dummy_gtk[32];
1925 GTK[GN], IGTK, [FTIE], [TIE * 2])
1942 /* WPA2 send GTK in the 4-way handshake */
1944 gtk = gsm->GTK[gsm->GN - 1];
1948 * Provide unique random GTK to each STA to prevent use
1949 * of GTK in the BSS.
1953 gtk = dummy_gtk;
1959 /* WPA does not include GTK in msg 3/4 */
1961 gtk = NULL;
1982 if (gtk)
2009 if (gtk) {
2014 gtk, gtk_len);
2245 u8 *gtk, dummy_gtk[32];
2259 /* Send EAPOL(1, 1, 1, !Pair, G, RSC, GNonce, MIC(PTK), GTK[GN]) */
2266 gtk = gsm->GTK[gsm->GN - 1];
2269 * Provide unique random GTK to each STA to prevent use
2270 * of GTK in the BSS.
2274 gtk = dummy_gtk;
2287 gtk, gsm->GTK_len);
2290 kde = gtk;
2370 group->GTK[group->GN - 1], group->GTK_len) < 0)
2372 wpa_hexdump_key(MSG_DEBUG, "GTK",
2373 group->GTK[group->GN - 1], group->GTK_len);
2401 /* GTK[0..N] = 0 */
2402 os_memset(group->GTK, 0, sizeof(group->GTK));
2409 /* GTK[GN] = CalcGTK() */
2433 "marking station for GTK rekeying");
2436 /* Do not rekey GTK/IGTK when STA is in WNM-Sleep Mode */
2449 /* update GTK when exiting WNM-Sleep Mode */
2471 * GTK subelement:
2484 os_memcpy(pos, gsm->GTK[gsm->GN - 1], gsm->GTK_len);
2487 wpa_printf(MSG_DEBUG, "WNM: GTK Key ID %u in WNM-Sleep Mode exit",
2489 wpa_hexdump_key(MSG_DEBUG, "WNM: GTK in WNM-Sleep Mode exit",
2490 gsm->GTK[gsm->GN - 1], gsm->GTK_len);
2553 "GKeyDoneStations=%d when starting new GTK rekey",
2571 group->GTK[group->GN - 1], group->GTK_len) < 0)