Lines Matching refs:smk
875 * STK = PRF-X(SMK, "Peer key expansion",
1070 "SMK M1");
1083 /* SMK M1:
1092 /* Group Suite can be anything for SMK RSN IE; receiver will just
1114 wpa_hexdump(MSG_DEBUG, "WPA: RSN IE for SMK handshake",
1144 wpa_hexdump(MSG_DEBUG, "WPA: INonce for SMK handshake",
1155 wpa_printf(MSG_INFO, "RSN: Sending EAPOL-Key SMK M1 Request (peer "
1184 const u8 *smk;
1248 ie->smk = pos + 2 + RSN_SELECTOR_LEN;
2119 /* TODO: time out SMK and any STK that was generated using this SMK */
2178 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error (peer "
2182 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error "
2241 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK M3");
2261 wpa_printf(MSG_DEBUG, "RSN: Received SMK M2");
2264 wpa_printf(MSG_INFO, "RSN: SMK handshake not allowed for "
2271 wpa_printf(MSG_INFO, "RSN: Failed to parse KDEs in SMK M2");
2278 "SMK M2");
2282 wpa_printf(MSG_DEBUG, "RSN: SMK M2 - SMK initiator " MACSTR,
2286 wpa_printf(MSG_INFO, "RSN: Too long Initiator RSN IE in SMK "
2292 wpa_printf(MSG_INFO, "RSN: Failed to parse RSN IE in SMK M2");
2304 wpa_printf(MSG_INFO, "RSN: No acceptable cipher in SMK M2");
2335 SMK RSN IE; receiver will just
2350 wpa_hexdump(MSG_DEBUG, "WPA: RSN IE for SMK handshake",
2363 * rsn_smkid - Derive SMK identifier
2364 * @smk: Station master key (32 bytes)
2371 * SMKID = HMAC-SHA1-128(SMK, "SMK Name" || PNonce || MAC_P || INonce || MAC_I)
2373 static void rsn_smkid(const u8 *smk, const u8 *pnonce, const u8 *mac_p,
2376 char *title = "SMK Name";
2388 hmac_sha1_vector(smk, PMK_LEN, 5, addr, len, hash);
2517 wpa_printf(MSG_DEBUG, "RSN: SMK handshake not allowed for "
2524 wpa_printf(MSG_INFO, "RSN: Failed to parse KDEs in SMK M4/M5");
2530 kde.smk == NULL || kde.smk_len < PMK_LEN + WPA_NONCE_LEN ||
2532 wpa_printf(MSG_INFO, "RSN: No MAC Address, Nonce, SMK, or "
2533 "Lifetime KDE in SMK M4/M5");
2545 wpa_printf(MSG_INFO, "RSN: No matching SMK handshake found "
2546 "for SMK M4/M5: peer " MACSTR,
2553 wpa_printf(MSG_DEBUG, "RSN: Received SMK M5 (Peer " MACSTR ")",
2558 wpa_printf(MSG_INFO, "RSN: No RSN IE in SMK M5");
2565 wpa_printf(MSG_INFO, "RSN: Key Nonce in SMK M5 does "
2566 "not match with INonce used in SMK M1");
2570 if (os_memcmp(kde.smk + PMK_LEN, peerkey->inonce,
2572 wpa_printf(MSG_INFO, "RSN: INonce in SMK KDE does not "
2573 "match with the one used in SMK M1");
2589 wpa_printf(MSG_INFO, "RSN: SMK Peer STA " MACSTR
2599 wpa_printf(MSG_DEBUG, "RSN: Received SMK M4 (Initiator "
2602 if (os_memcmp(kde.smk + PMK_LEN, peerkey->pnonce,
2604 wpa_printf(MSG_INFO, "RSN: PNonce in SMK KDE does not "
2605 "match with the one used in SMK M3");
2611 wpa_printf(MSG_INFO, "RSN: INonce in SMK M5 did not "
2612 "match with the one received in SMK M2");
2617 os_memcpy(peerkey->smk, kde.smk, PMK_LEN);
2619 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", peerkey->smk, PMK_LEN);
2621 wpa_printf(MSG_DEBUG, "RSN: SMK lifetime %u seconds", lifetime);
2631 rsn_smkid(peerkey->smk, peerkey->pnonce, peerkey->addr,
2635 rsn_smkid(peerkey->smk, peerkey->pnonce, sm->own_addr,
2654 wpa_printf(MSG_DEBUG, "RSN: Received SMK Error");
2657 wpa_printf(MSG_DEBUG, "RSN: SMK handshake not allowed for "
2664 wpa_printf(MSG_INFO, "RSN: Failed to parse KDEs in SMK Error");
2669 wpa_printf(MSG_INFO, "RSN: No Error KDE in SMK Error");
2678 "RSN: SMK Error KDE received: MUI %d error_type %d peer "
2694 wpa_printf(MSG_DEBUG, "RSN: No matching SMK handshake "
2695 "found for SMK Error");
2698 /* TODO: abort SMK/STK handshake and remove all related keys */
2722 /* RSN: msg 1/4 should contain SMKID for the selected SMK */
2747 wpa_pmk_to_ptk(peerkey->smk, PMK_LEN, "Peer key expansion",
2795 wpa_printf(MSG_DEBUG, "RSN: Peer used SMK lifetime %u seconds "
2801 wpa_printf(MSG_DEBUG, "RSN: Peer used shorter SMK lifetime %u seconds "
2828 /* RSN: msg 2/4 should contain SMKID for the selected SMK and RSN IE
2847 wpa_printf(MSG_INFO, "RSN: Peer RSN IE in SMK and STK "
2849 wpa_hexdump(MSG_DEBUG, "RSN: Peer RSN IE in SMK handshake",
2892 wpa_printf(MSG_INFO, "RSN: Initiator RSN IE in SMK and STK "
2894 wpa_hexdump(MSG_DEBUG, "RSN: Initiator RSN IE in SMK "
3221 wpa_pmk_to_ptk(peerkey->smk, PMK_LEN, "Peer key expansion",
3601 /* SMK Error */
3605 /* SMK M2 */
3609 /* SMK M4 or M5 */