Lines Matching defs:ptk

151 	wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, bssid,
320 * @ptk: PTK to use for keyed hash and encryption
327 struct wpa_ptk *ptk)
412 wpa_eapol_key_send(sm, ptk->kck, ptk->kck_len, ver, dst, ETH_P_EAPOL,
420 const struct wpa_eapol_key *key, struct wpa_ptk *ptk)
424 return wpa_derive_ptk_ft(sm, src_addr, key, ptk);
429 key->key_nonce, ptk, sm->key_mgmt,
441 struct wpa_ptk *ptk;
492 ptk = &sm->tptk;
493 wpa_derive_ptk(sm, src_addr, key, ptk);
497 os_memcpy(buf, &ptk->tk[16], 8);
498 os_memcpy(&ptk->tk[16], &ptk->tk[24], 8);
499 os_memcpy(&ptk->tk[24], buf, 8);
528 kde, kde_len, ptk))
608 if (sm->ptk.installed) {
642 sm->ptk.tk, keylen) < 0) {
651 os_memset(sm->ptk.tk, 0, WPA_TK_MAX_LEN);
652 sm->ptk.installed = 1;
1152 * @ptk: PTK to use for keyed hash and encryption
1158 struct wpa_ptk *ptk)
1193 wpa_eapol_key_send(sm, ptk->kck, ptk->kck_len, ver, dst, ETH_P_EAPOL,
1269 &sm->ptk)) {
1315 sm->ptk.kck, sm->ptk.kck_len,
1410 if (ver == WPA_KEY_INFO_TYPE_HMAC_MD5_RC4 && sm->ptk.kek_len == 16) {
1424 os_memcpy(ek + 16, sm->ptk.kek, sm->ptk.kek_len);
1449 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, maxkeylen / 8,
1504 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, sm->bssid,
1599 os_memcpy(&sm->ptk, &sm->tptk, sizeof(sm->ptk));
1606 wpa_eapol_key_mic(sm->ptk.kck, sm->ptk.kck_len, sm->key_mgmt,
1647 if (ver == WPA_KEY_INFO_TYPE_HMAC_MD5_RC4 && sm->ptk.kek_len == 16) {
1655 os_memcpy(ek + 16, sm->ptk.kek, sm->ptk.kek_len);
1682 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, *key_data_len / 8,
2355 os_memset(&sm->ptk, 0, sizeof(sm->ptk));
2881 os_memset(&sm->ptk, 0, sizeof(sm->ptk));
3028 os_memcpy(sm->ptk.kck, ptk_kck, ptk_kck_len);
3029 sm->ptk.kck_len = ptk_kck_len;
3033 os_memcpy(sm->ptk.kek, ptk_kek, ptk_kek_len);
3034 sm->ptk.kek_len = ptk_kek_len;