Lines Matching refs:ptk
29 * @kck: Key Confirmation Key (KCK, part of PTK)
131 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL,
267 * @ptk: PTK to use for keyed hash and encryption
274 struct wpa_ptk *ptk)
348 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL,
357 struct wpa_ptk *ptk)
362 return wpa_derive_ptk_ft(sm, src_addr, key, ptk, ptk_len);
367 (u8 *) ptk, ptk_len,
379 struct wpa_ptk *ptk;
428 /* Calculate PTK which will be stored as a temporary PTK until it has
430 ptk = &sm->tptk;
431 wpa_derive_ptk(sm, src_addr, key, ptk);
433 os_memcpy(buf, ptk->u.auth.tx_mic_key, 8);
434 os_memcpy(ptk->u.auth.tx_mic_key, ptk->u.auth.rx_mic_key, 8);
435 os_memcpy(ptk->u.auth.rx_mic_key, buf, 8);
440 ptk))
463 MACSTR " [PTK=%s GTK=%s]", MAC2STR(addr),
505 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, "WPA: Request PTK rekeying");
519 "WPA: Installing PTK to the driver");
546 (u8 *) sm->ptk.tk1, keylen) < 0) {
548 "WPA: Failed to set PTK to the "
987 * @ptk: PTK to use for keyed hash and encryption
994 struct wpa_ptk *ptk)
1026 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL,
1093 NULL, 0, &sm->ptk)) {
1099 * SNonce will still be used to avoid changing PTK. */
1225 os_memcpy(ek + 16, sm->ptk.kek, 16);
1253 if (aes_unwrap(sm->ptk.kek, maxkeylen / 8,
1299 wpa_eapol_key_send(sm, sm->ptk.kck, ver, sm->bssid, ETH_P_EAPOL,
1385 os_memcpy(&sm->ptk, &sm->tptk, sizeof(sm->ptk));
1391 wpa_eapol_key_mic(sm->ptk.kck, ver, buf, len,
1426 "WPA: PTK not available, cannot decrypt EAPOL-Key Key "
1436 os_memcpy(ek + 16, sm->ptk.kek, 16);
1458 if (aes_unwrap(sm->ptk.kek, keydatalen / 8,
1543 * to. In addition, key material (PTK, GTK) is configured at the end of a
2072 * IEEE 802.11, 8.4.10: Delete PTK SA on (re)association if
2075 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, "WPA: Clear old PTK");
2604 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, "WPA: Clear old PMK and PTK");
2608 os_memset(&sm->ptk, 0, sizeof(sm->ptk));