Home | History | Annotate | Download | only in ap

Lines Matching refs:smk

66 			"Sending SMK Error");
97 wpa_printf(MSG_INFO, "RSN: Failed to parse KDEs in SMK M1");
104 "SMK M1");
114 wpa_printf(MSG_DEBUG, "RSN: SMK handshake with " MACSTR
134 /* SMK M2:
140 "Sending SMK M2");
155 const u8 *smk)
161 /* SMK M4:
163 * MIC=MIC, DataKDs=(MAC_I KDE, INonce KDE, SMK KDE,
183 /* SMK with PNonce */
184 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN,
193 "Sending SMK M4");
208 const u8 *smk, const u8 *peer)
214 /* SMK M5:
216 * MIC=MIC, DataKDs=(RSNIE_P, MAC_P KDE, PNonce, SMK KDE,
240 /* SMK and INonce */
241 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN,
250 "Sending SMK M5");
266 u8 smk[32], buf[ETH_ALEN + 8 + 2 * WPA_NONCE_LEN], *pos;
270 wpa_printf(MSG_INFO, "RSN: Failed to parse KDEs in SMK M3");
278 "Nonce KDE in SMK M3");
289 wpa_printf(MSG_DEBUG, "RSN: SMK handshake with " MACSTR
298 if (random_get_bytes(smk, PMK_LEN)) {
299 wpa_printf(MSG_DEBUG, "RSN: Failed to generate SMK");
303 /* SMK = PRF-256(Random number, "SMK Derivation",
314 sha256_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf),
315 smk, PMK_LEN);
317 sha1_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf),
318 smk, PMK_LEN);
321 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", smk, PMK_LEN);
323 wpa_send_smk_m4(wpa_auth, sm, key, &kde, smk);
324 wpa_send_smk_m5(wpa_auth, search.sm, key, &kde, smk, sm->addr);
326 /* Authenticator does not need SMK anymore and it is required to forget
328 os_memset(smk, 0, sizeof(*smk));
342 wpa_printf(MSG_INFO, "RSN: Failed to parse KDEs in SMK Error");
349 "SMK Error");
358 "associated for SMK Error message from " MACSTR,
367 "STA reported SMK Error: Peer " MACSTR