Constructing PTK key from sniffed traffic and decrypting WPA2 network traffic using it

Suppose there is a WPA2/PSK access point (AP) and 2 clients are connected to it, say X and Y. So X and Y both know the password or PSK required for authentication.
From here:

In case of WPA2/PSK when device authenticates with access point… Continue reading Constructing PTK key from sniffed traffic and decrypting WPA2 network traffic using it