Lines Matching refs:PTK
36 static int wpa_verify_key_mic(int akmp, struct wpa_ptk *PTK, u8 *data,
827 struct wpa_ptk PTK; in wpa_try_alt_snonce() local
840 wpa_derive_ptk(sm, sm->alt_SNonce, pmk, &PTK); in wpa_try_alt_snonce()
842 if (wpa_verify_key_mic(sm->wpa_key_mgmt, &PTK, data, data_len) in wpa_try_alt_snonce()
862 os_memcpy(&sm->PTK, &PTK, sizeof(PTK)); in wpa_try_alt_snonce()
1245 if (wpa_verify_key_mic(sm->wpa_key_mgmt, &sm->PTK, data, in wpa_receive()
1531 if (aes_wrap(sm->PTK.kek, sm->PTK.kek_len, in __wpa_send_eapol()
1543 } else if (sm->PTK.kek_len == 16) { in __wpa_send_eapol()
1549 os_memcpy(ek + 16, sm->PTK.kek, sm->PTK.kek_len); in __wpa_send_eapol()
1578 wpa_eapol_key_mic(sm->PTK.kck, sm->PTK.kck_len, in __wpa_send_eapol()
1632 static int wpa_verify_key_mic(int akmp, struct wpa_ptk *PTK, u8 *data, in wpa_verify_key_mic() argument
1652 if (wpa_eapol_key_mic(PTK->kck, PTK->kck_len, akmp, in wpa_verify_key_mic()
1665 os_memset(&sm->PTK, 0, sizeof(sm->PTK)); in wpa_remove_ptk()
1754 os_memset(&sm->PTK, 0, sizeof(sm->PTK)); in wpa_auth_sm_event()
1812 os_memset(&sm->PTK, 0, sizeof(sm->PTK)); in SM_STATE()
2010 struct wpa_ptk PTK; in SM_STATE() local
2031 wpa_derive_ptk(sm, sm->SNonce, pmk, &PTK); in SM_STATE()
2033 if (wpa_verify_key_mic(sm->wpa_key_mgmt, &PTK, in SM_STATE()
2085 os_memcpy(&sm->PTK, &PTK, sizeof(PTK)); in SM_STATE()
2339 sm->PTK.tk, klen)) { in SM_STATE()
3239 sm->PTK.kck, sm->PTK.kck_len, in wpa_auth_pmksa_add()