Lines Matching refs:ptk
712 uint8_t *nonce1, uint8_t *nonce2, uint8_t *ptk, size_t ptk_len) in wpa_pmk_to_ptk() argument
745 sizeof (data), ptk, ptk_len); in wpa_pmk_to_ptk()
748 wpa_hexdump(MSG_DEBUG, "WPA: PTK", ptk, ptk_len); in wpa_pmk_to_ptk()
858 wpa_eapol_key_mic(wpa_s->ptk.mic_key, ver, (uint8_t *)hdr, in wpa_supplicant_key_request()
880 struct wpa_ptk *ptk; in wpa_supplicant_process_1_of_4() local
974 ptk = &wpa_s->tptk; in wpa_supplicant_process_1_of_4()
978 wpa_s->snonce, key->key_nonce, (uint8_t *)ptk, sizeof (*ptk)); in wpa_supplicant_process_1_of_4()
983 (void) memcpy(buf, ptk->u.auth.tx_mic_key, 8); in wpa_supplicant_process_1_of_4()
984 (void) memcpy(ptk->u.auth.tx_mic_key, ptk->u.auth.rx_mic_key, 8); in wpa_supplicant_process_1_of_4()
985 (void) memcpy(ptk->u.auth.rx_mic_key, buf, 8); in wpa_supplicant_process_1_of_4()
1232 wpa_eapol_key_mic(wpa_s->ptk.mic_key, ver, (uint8_t *)hdr, in wpa_supplicant_process_3_of_4()
1280 (uint8_t *)&wpa_s->ptk.tk1, keylen) < 0) { in wpa_supplicant_process_3_of_4()
1425 (void) memcpy(ek + 16, wpa_s->ptk.encr_key, 16); in wpa_supplicant_process_1_of_2()
1434 if (aes_unwrap(wpa_s->ptk.encr_key, maxkeylen / 8, in wpa_supplicant_process_1_of_2()
1512 wpa_eapol_key_mic(wpa_s->ptk.mic_key, ver, (uint8_t *)hdr, in wpa_supplicant_process_1_of_2()
1547 (void) memcpy(&wpa_s->ptk, &wpa_s->tptk, in wpa_supplicant_verify_eapol_key_mic()
1548 sizeof (wpa_s->ptk)); in wpa_supplicant_verify_eapol_key_mic()
1554 wpa_eapol_key_mic(wpa_s->ptk.mic_key, ver, buf, len, in wpa_supplicant_verify_eapol_key_mic()
1599 (void) memcpy(ek + 16, wpa_s->ptk.encr_key, 16); in wpa_supplicant_decrypt_key_data()
1615 if (aes_unwrap(wpa_s->ptk.encr_key, keydatalen / 8, in wpa_supplicant_decrypt_key_data()