Lines Matching refs:PTK
46 static int wpa_verify_key_mic(int akmp, struct wpa_ptk *PTK, u8 *data,
865 if (wpa_verify_key_mic(sm->wpa_key_mgmt, &sm->PTK, data, in wpa_receive()
1122 if (aes_wrap(sm->PTK.kek, sm->PTK.kek_len, (key_data_len - 8) / 8, buf, in __wpa_send_eapol()
1129 } else if (sm->PTK.kek_len == 16) { in __wpa_send_eapol()
1135 memcpy(ek + 16, sm->PTK.kek, sm->PTK.kek_len); in __wpa_send_eapol()
1152 wpa_eapol_key_mic(sm->PTK.kck, sm->PTK.kck_len, in __wpa_send_eapol()
1214 static int wpa_verify_key_mic(int akmp, struct wpa_ptk *PTK, u8 *data, in wpa_verify_key_mic() argument
1234 if (wpa_eapol_key_mic(PTK->kck, PTK->kck_len, akmp, in wpa_verify_key_mic()
1247 memset(&sm->PTK, 0, sizeof(sm->PTK)); in wpa_remove_ptk()
1325 memset(&sm->PTK, 0, sizeof(sm->PTK)); in wpa_auth_sm_event()
1388 memset(&sm->PTK, 0, sizeof(sm->PTK)); in SM_STATE()
1620 struct wpa_ptk PTK; in SM_STATE() local
1653 wpa_derive_ptk(sm, sm->SNonce, pmk, &PTK); in SM_STATE()
1655 if (wpa_verify_key_mic(sm->wpa_key_mgmt, &PTK, in SM_STATE()
1733 memcpy(&sm->PTK, &PTK, sizeof(PTK)); in SM_STATE()
1961 sm->PTK.tk, klen)) { in SM_STATE()