Lines Matching refs:ptk

346     wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, bssid,  in wpa_sm_key_request()
549 struct wpa_ptk *ptk) in wpa_supplicant_send_2_of_4() argument
639 wpa_eapol_key_send(sm, ptk->kck, ptk->kck_len, ver, dst, ETH_P_EAPOL, in wpa_supplicant_send_2_of_4()
647 const struct wpa_eapol_key *key, struct wpa_ptk *ptk) in wpa_derive_ptk() argument
651 return wpa_derive_ptk_ft(sm, src_addr, key, ptk); in wpa_derive_ptk()
655 key->key_nonce, ptk, sm->key_mgmt, in wpa_derive_ptk()
666 struct wpa_ptk *ptk; in wpa_supplicant_process_1_of_4() local
728 ptk = &sm->tptk; in wpa_supplicant_process_1_of_4()
729 wpa_derive_ptk(sm, src_addr, key, ptk); in wpa_supplicant_process_1_of_4()
749 kde, kde_len, ptk)) in wpa_supplicant_process_1_of_4()
775 if (sm->ptk.installed) { in wpa_supplicant_install_ptk()
800 sm->ptk.tk, keylen, KEY_FLAG_PAIRWISE | key_flag) < 0) { in wpa_supplicant_install_ptk()
807 sm->ptk.installed = 1; in wpa_supplicant_install_ptk()
1217 struct wpa_ptk *ptk) in wpa_supplicant_send_4_of_4() argument
1256 wpa_eapol_key_send(sm, ptk->kck, ptk->kck_len, ver, dst, ETH_P_EAPOL, in wpa_supplicant_send_4_of_4()
1365 &sm->ptk)) { in wpa_supplicant_process_3_of_4()
1394 WPA_KEY_RSC_LEN, sm->ptk.tk, keylen, in wpa_supplicant_activate_ptk()
1454 sm->ptk.kck, sm->ptk.kck_len, in wpa_supplicant_send_4_of_4_txcallback()
1540 if (ver == WPA_KEY_INFO_TYPE_HMAC_MD5_RC4 && sm->ptk.kek_len == 16) { in wpa_supplicant_process_1_of_2_wpa()
1542 os_memcpy(ek + 16, sm->ptk.kek, sm->ptk.kek_len); in wpa_supplicant_process_1_of_2_wpa()
1568 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, maxkeylen / 8, key_data, gd->gtk)) { in wpa_supplicant_process_1_of_2_wpa()
1625 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, sm->bssid, ETH_P_EAPOL, in wpa_supplicant_send_2_of_2()
1716 memcpy(&sm->ptk, &sm->tptk, sizeof(sm->ptk)); in wpa_supplicant_verify_eapol_key_mic()
1722 wpa_eapol_key_mic(sm->ptk.kck, sm->ptk.kck_len, sm->key_mgmt, in wpa_supplicant_verify_eapol_key_mic()
1763 if (ver == WPA_KEY_INFO_TYPE_HMAC_MD5_RC4 && sm->ptk.kek_len == 16) { in wpa_supplicant_decrypt_key_data()
1766 os_memcpy(ek + 16, sm->ptk.kek, sm->ptk.kek_len); in wpa_supplicant_decrypt_key_data()
1792 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, *key_data_len / 8, in wpa_supplicant_decrypt_key_data()
2252 os_memset(&sm->ptk, 0, sizeof(sm->ptk)); in wpa_sm_notify_assoc()
2797 os_memset(&sm->ptk, 0, sizeof(sm->ptk)); in wpa_sm_drop_sa()