Lines Matching refs:PTK

43 static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK,
940 struct wpa_ptk PTK; in wpa_try_alt_snonce() local
946 os_memset(&PTK, 0, sizeof(PTK)); in wpa_try_alt_snonce()
966 if (wpa_derive_ptk(sm, sm->alt_SNonce, pmk, pmk_len, &PTK, 0) < in wpa_try_alt_snonce()
970 if (wpa_verify_key_mic(sm->wpa_key_mgmt, pmk_len, &PTK, in wpa_try_alt_snonce()
1000 os_memcpy(&sm->PTK, &PTK, sizeof(PTK)); in wpa_try_alt_snonce()
1001 forced_memzero(&PTK, sizeof(PTK)); in wpa_try_alt_snonce()
1307 wpa_verify_key_mic(sm->wpa_key_mgmt, sm->pmk_len, &sm->PTK, in wpa_receive()
1322 wpa_aead_decrypt(sm, &sm->PTK, data, data_len, in wpa_receive()
1595 sm->PTK.kek, sm->PTK.kek_len); in __wpa_send_eapol()
1600 if (aes_siv_encrypt(sm->PTK.kek, sm->PTK.kek_len, kde, kde_len, in __wpa_send_eapol()
1629 sm->PTK.kek_len); in __wpa_send_eapol()
1630 if (aes_wrap(sm->PTK.kek, sm->PTK.kek_len, in __wpa_send_eapol()
1638 } else if (sm->PTK.kek_len == 16) { in __wpa_send_eapol()
1647 os_memcpy(ek + 16, sm->PTK.kek, sm->PTK.kek_len); in __wpa_send_eapol()
1668 if (wpa_eapol_key_mic(sm->PTK.kck, sm->PTK.kck_len, in __wpa_send_eapol()
1735 static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK, in wpa_verify_key_mic() argument
1754 if (wpa_eapol_key_mic(PTK->kck, PTK->kck_len, akmp, in wpa_verify_key_mic()
1767 os_memset(&sm->PTK, 0, sizeof(sm->PTK)); in wpa_remove_ptk()
1908 os_memset(&sm->PTK, 0, sizeof(sm->PTK)); in wpa_auth_sm_event()
1981 os_memset(&sm->PTK, 0, sizeof(sm->PTK)); in SM_STATE()
2358 &sm->PTK, ick, &ick_len, in fils_auth_pmk_to_ptk()
2638 if (aes_siv_decrypt(sm->PTK.kek, sm->PTK.kek_len, crypt, end - crypt, in fils_decrypt_assoc()
2715 if (aes_siv_encrypt(sm->PTK.kek, sm->PTK.kek_len, in fils_encrypt_assoc()
2862 sm->PTK.tk, klen, KEY_FLAG_PAIRWISE_RX_TX)) { in fils_set_tk()
2869 dot11RSNAConfigPMKLifetime, &sm->PTK); in fils_set_tk()
2925 struct wpa_ptk PTK; in SM_STATE() local
2942 os_memset(&PTK, 0, sizeof(PTK)); in SM_STATE()
2975 if (wpa_derive_ptk(sm, sm->SNonce, pmk, pmk_len, &PTK, in SM_STATE()
2980 wpa_verify_key_mic(sm->wpa_key_mgmt, pmk_len, &PTK, in SM_STATE()
2993 wpa_aead_decrypt(sm, &PTK, sm->last_rx_eapol_key, in SM_STATE()
3207 os_memcpy(&sm->PTK, &PTK, sizeof(PTK)); in SM_STATE()
3208 forced_memzero(&PTK, sizeof(PTK)); in SM_STATE()
3438 sm->keyidx_active, sm->PTK.tk, in SM_STATE()
3650 0, sm->PTK.tk, klen, in SM_STATE()
3662 dot11RSNAConfigPMKLifetime, &sm->PTK); in SM_STATE()
4786 sm->PTK.kck, sm->PTK.kck_len, in wpa_auth_pmksa_add()
5317 os_memcpy(fils_kek, sm->PTK.kek, WPA_KEK_MAX_LEN); in wpa_auth_get_fils_aead_params()
5318 *fils_kek_len = sm->PTK.kek_len; in wpa_auth_get_fils_aead_params()