Home | History | Annotate | Download | only in ap

Lines Matching refs:PTK

35 static int wpa_verify_key_mic(struct wpa_ptk *PTK, u8 *data, size_t data_len);
263 wpa_auth_logger(wpa_auth, sm->addr, LOGGER_DEBUG, "rekeying PTK");
1062 if (wpa_verify_key_mic(&sm->PTK, data, data_len)) {
1325 if (aes_wrap(sm->PTK.kek, (key_data_len - 8) / 8, buf,
1338 os_memcpy(ek + 16, sm->PTK.kek, 16);
1349 "PTK not valid when sending EAPOL-Key "
1354 wpa_eapol_key_mic(sm->PTK.kck, version, (u8 *) hdr, len,
1407 static int wpa_verify_key_mic(struct wpa_ptk *PTK, u8 *data, size_t data_len)
1423 if (wpa_eapol_key_mic(PTK->kck, key_info & WPA_KEY_INFO_TYPE_MASK,
1435 os_memset(&sm->PTK, 0, sizeof(sm->PTK));
1493 wpa_printf(MSG_DEBUG, "FT: Retry PTK configuration "
1516 os_memset(&sm->PTK, 0, sizeof(sm->PTK));
1574 os_memset(&sm->PTK, 0, sizeof(sm->PTK));
1748 struct wpa_ptk *ptk)
1753 return wpa_auth_derive_ptk_ft(sm, pmk, ptk, ptk_len);
1758 (u8 *) ptk, ptk_len,
1767 struct wpa_ptk PTK;
1787 wpa_derive_ptk(sm, pmk, &PTK);
1789 if (wpa_verify_key_mic(&PTK, sm->last_rx_eapol_key,
1838 os_memcpy(&sm->PTK, &PTK, sizeof(PTK));
1924 /* Send EAPOL(1, 1, 1, Pair, P, RSC, ANonce, MIC(PTK), RSNIE, [MDIE],
2069 sm->PTK.tk1, klen)) {
2259 /* Send EAPOL(1, 1, 1, !Pair, G, RSC, GNonce, MIC(PTK), GTK[GN]) */
3035 * deriving the PTK. This results in unsuccessful 4-way