Found 9 other functions taking a
wpa_ptk
argument:
wpa_pmk_to_ptk - Calculate PTK from PMK, addresses, and nonces @pmk: Pairwise master key @pmk_len: Length of PMK @label: Label to use in derivation @addr1: AA or SA @addr2: SA or AA @nonce1: ANonce or SNonce @nonce2: SNonce or ANonce @ptk: Buffer for pairwise transient key @akmp: Negotiated AKM @cipher: Negotiated pairwise cipher Returns: 0 on success, -1 on failure IEEE Std 802.11i-2004 - 8.5.1.2 Pairwise key hierarchy PTK = PRF-X(PMK, "Pairwise key expansion", Min(AA, SA) || Max(AA, SA) || Min(ANonce, SNonce) || Max(ANonce, SNonce))
wpa_pmk_r1_to_ptk - Derive PTK and PTKName from PMK-R1 IEEE Std 802.11r-2008 - 8.5.1.5.5
wpa_supplicant_send_2_of_4 - Send message 2 of WPA/RSN 4-Way Handshake @sm: Pointer to WPA state machine data from wpa_sm_init() @dst: Destination address for the frame @key: Pointer to the EAPOL-Key frame header @ver: Version bits from EAPOL-Key Key Info @nonce: Nonce value for the EAPOL-Key frame @wpa_ie: WPA/RSN IE @wpa_ie_len: Length of the WPA/RSN IE @ptk: PTK to use for keyed hash and encryption Returns: 0 on success, -1 on failure
wpa_supplicant_send_4_of_4 - Send message 4 of WPA/RSN 4-Way Handshake @sm: Pointer to WPA state machine data from wpa_sm_init() @dst: Destination address for the frame @key: Pointer to the EAPOL-Key frame header @ver: Version bits from EAPOL-Key Key Info @key_info: Key Info @ptk: PTK to use for keyed hash and encryption Returns: 0 on success, -1 on failure