Lines Matching defs:PTK
36 static int wpa_verify_key_mic(int akmp, struct wpa_ptk *PTK, u8 *data,
47 const u8 *pmk, struct wpa_ptk *ptk);
301 wpa_auth_logger(wpa_auth, sm->addr, LOGGER_DEBUG, "rekeying PTK");
827 struct wpa_ptk PTK;
840 wpa_derive_ptk(sm, sm->alt_SNonce, pmk, &PTK);
842 if (wpa_verify_key_mic(sm->wpa_key_mgmt, &PTK, data, data_len)
862 os_memcpy(&sm->PTK, &PTK, sizeof(PTK));
1245 if (wpa_verify_key_mic(sm->wpa_key_mgmt, &sm->PTK, data,
1531 if (aes_wrap(sm->PTK.kek, sm->PTK.kek_len,
1543 } else if (sm->PTK.kek_len == 16) {
1549 os_memcpy(ek + 16, sm->PTK.kek, sm->PTK.kek_len);
1571 "PTK not valid when sending EAPOL-Key "
1578 wpa_eapol_key_mic(sm->PTK.kck, sm->PTK.kck_len,
1632 static int wpa_verify_key_mic(int akmp, struct wpa_ptk *PTK, u8 *data,
1652 if (wpa_eapol_key_mic(PTK->kck, PTK->kck_len, akmp,
1665 os_memset(&sm->PTK, 0, sizeof(sm->PTK));
1731 wpa_printf(MSG_DEBUG, "FT: Retry PTK configuration "
1754 os_memset(&sm->PTK, 0, sizeof(sm->PTK));
1812 os_memset(&sm->PTK, 0, sizeof(sm->PTK));
1995 const u8 *pmk, struct wpa_ptk *ptk)
1999 return wpa_auth_derive_ptk_ft(sm, pmk, ptk);
2004 ptk, sm->wpa_key_mgmt, sm->pairwise);
2010 struct wpa_ptk PTK;
2031 wpa_derive_ptk(sm, sm->SNonce, pmk, &PTK);
2033 if (wpa_verify_key_mic(sm->wpa_key_mgmt, &PTK,
2085 os_memcpy(&sm->PTK, &PTK, sizeof(PTK));
2178 /* Send EAPOL(1, 1, 1, Pair, P, RSC, ANonce, MIC(PTK), RSNIE, [MDIE],
2339 sm->PTK.tk, klen)) {
2530 /* Send EAPOL(1, 1, 1, !Pair, G, RSC, GNonce, MIC(PTK), GTK[GN]) */
3239 sm->PTK.kck, sm->PTK.kck_len,
3426 * deriving the PTK. This results in unsuccessful 4-way