Home | History | Annotate | Download | only in ap

Lines Matching refs:ptk

36 static int wpa_verify_key_mic(int akmp, struct wpa_ptk *PTK, u8 *data,
48 struct wpa_ptk *ptk);
302 wpa_auth_logger(wpa_auth, sm->addr, LOGGER_DEBUG, "rekeying PTK");
828 struct wpa_ptk PTK;
845 wpa_derive_ptk(sm, sm->alt_SNonce, pmk, pmk_len, &PTK);
847 if (wpa_verify_key_mic(sm->wpa_key_mgmt, &PTK, data, data_len)
867 os_memcpy(&sm->PTK, &PTK, sizeof(PTK));
1250 if (wpa_verify_key_mic(sm->wpa_key_mgmt, &sm->PTK, data,
1536 if (aes_wrap(sm->PTK.kek, sm->PTK.kek_len,
1549 } else if (sm->PTK.kek_len == 16) {
1555 os_memcpy(ek + 16, sm->PTK.kek, sm->PTK.kek_len);
1578 "PTK not valid when sending EAPOL-Key "
1585 wpa_eapol_key_mic(sm->PTK.kck, sm->PTK.kck_len,
1639 static int wpa_verify_key_mic(int akmp, struct wpa_ptk *PTK, u8 *data,
1659 if (wpa_eapol_key_mic(PTK->kck, PTK->kck_len, akmp,
1672 os_memset(&sm->PTK, 0, sizeof(sm->PTK));
1738 wpa_printf(MSG_DEBUG, "FT: Retry PTK configuration "
1761 os_memset(&sm->PTK, 0, sizeof(sm->PTK));
1827 os_memset(&sm->PTK, 0, sizeof(sm->PTK));
2032 struct wpa_ptk *ptk)
2036 return wpa_auth_derive_ptk_ft(sm, pmk, ptk);
2041 ptk, sm->wpa_key_mgmt, sm->pairwise);
2047 struct wpa_ptk PTK;
2072 wpa_derive_ptk(sm, sm->SNonce, pmk, pmk_len, &PTK);
2074 if (wpa_verify_key_mic(sm->wpa_key_mgmt, &PTK,
2127 os_memcpy(&sm->PTK, &PTK, sizeof(PTK));
2220 /* Send EAPOL(1, 1, 1, Pair, P, RSC, ANonce, MIC(PTK), RSNIE, [MDIE],
2394 sm->PTK.tk, klen)) {
2585 /* Send EAPOL(1, 1, 1, !Pair, G, RSC, GNonce, MIC(PTK), GTK[GN]) */
3302 sm->PTK.kck, sm->PTK.kck_len,
3621 * deriving the PTK. This results in unsuccessful 4-way