Home | History | Annotate | Download | only in rsn_supp

Lines Matching refs:smk

56 	/* TODO: time out SMK and any STK that was generated using this SMK */
113 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error (peer "
117 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error "
172 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK M3");
191 wpa_printf(MSG_DEBUG, "RSN: Received SMK M2");
194 wpa_printf(MSG_INFO, "RSN: SMK handshake not allowed for "
201 wpa_printf(MSG_INFO, "RSN: Failed to parse KDEs in SMK M2");
208 "SMK M2");
212 wpa_printf(MSG_DEBUG, "RSN: SMK M2 - SMK initiator " MACSTR,
216 wpa_printf(MSG_INFO, "RSN: Too long Initiator RSN IE in SMK "
222 wpa_printf(MSG_INFO, "RSN: Failed to parse RSN IE in SMK M2");
234 wpa_printf(MSG_INFO, "RSN: No acceptable cipher in SMK M2");
269 /* Group Suite can be anything for SMK RSN IE; receiver will just
284 wpa_hexdump(MSG_DEBUG, "WPA: RSN IE for SMK handshake",
297 * rsn_smkid - Derive SMK identifier
298 * @smk: Station master key (32 bytes)
306 * SMKID = HMAC-SHA1-128(SMK, "SMK Name" || PNonce || MAC_P || INonce || MAC_I)
308 static void rsn_smkid(const u8 *smk, const u8 *pnonce, const u8 *mac_p,
312 char *title = "SMK Name";
326 hmac_sha256_vector(smk, PMK_LEN, 5, addr, len, hash);
329 hmac_sha1_vector(smk, PMK_LEN, 5, addr, len, hash);
449 wpa_printf(MSG_DEBUG, "RSN: Received SMK M4 (Initiator " MACSTR ")",
452 if (os_memcmp(kde->smk + PMK_LEN, peerkey->pnonce, WPA_NONCE_LEN) != 0)
454 wpa_printf(MSG_INFO, "RSN: PNonce in SMK KDE does not "
455 "match with the one used in SMK M3");
460 wpa_printf(MSG_INFO, "RSN: INonce in SMK M4 did not "
461 "match with the one received in SMK M2");
479 wpa_printf(MSG_DEBUG, "RSN: Received SMK M5 (Peer " MACSTR ")",
483 wpa_printf(MSG_INFO, "RSN: No RSN IE in SMK M5");
489 wpa_printf(MSG_INFO, "RSN: Key Nonce in SMK M5 does "
490 "not match with INonce used in SMK M1");
494 if (os_memcmp(kde->smk + PMK_LEN, peerkey->inonce, WPA_NONCE_LEN) != 0)
496 wpa_printf(MSG_INFO, "RSN: INonce in SMK KDE does not "
497 "match with the one used in SMK M1");
513 wpa_printf(MSG_INFO, "RSN: SMK Peer STA " MACSTR " selected "
536 wpa_printf(MSG_DEBUG, "RSN: SMK handshake not allowed for "
543 wpa_printf(MSG_INFO, "RSN: Failed to parse KDEs in SMK M4/M5");
549 kde.smk == NULL || kde.smk_len < PMK_LEN + WPA_NONCE_LEN ||
551 wpa_printf(MSG_INFO, "RSN: No MAC Address, Nonce, SMK, or "
552 "Lifetime KDE in SMK M4/M5");
564 wpa_printf(MSG_INFO, "RSN: No matching SMK handshake found "
565 "for SMK M4/M5: peer " MACSTR,
579 smk, kde.smk, PMK_LEN);
581 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", peerkey->smk, PMK_LEN);
583 wpa_printf(MSG_DEBUG, "RSN: SMK lifetime %u seconds", lifetime);
593 rsn_smkid(peerkey->smk, peerkey->pnonce, peerkey->addr,
598 rsn_smkid(peerkey->smk, peerkey->pnonce, sm->own_addr,
617 wpa_printf(MSG_DEBUG, "RSN: Received SMK Error");
620 wpa_printf(MSG_DEBUG, "RSN: SMK handshake not allowed for "
627 wpa_printf(MSG_INFO, "RSN: Failed to parse KDEs in SMK Error");
632 wpa_printf(MSG_INFO, "RSN: No Error KDE in SMK Error");
643 "RSN: SMK Error KDE received: MUI %d error_type %d peer "
659 wpa_printf(MSG_DEBUG, "RSN: No matching SMK handshake "
660 "found for SMK Error");
663 /* TODO: abort SMK/STK handshake and remove all related keys */
687 /* RSN: msg 1/4 should contain SMKID for the selected SMK */
712 wpa_pmk_to_ptk(peerkey->smk, PMK_LEN, "Peer key expansion",
761 wpa_printf(MSG_DEBUG, "RSN: Peer used SMK lifetime %u seconds "
767 wpa_printf(MSG_DEBUG, "RSN: Peer used shorter SMK lifetime %u seconds "
794 /* RSN: msg 2/4 should contain SMKID for the selected SMK and RSN IE
813 wpa_printf(MSG_INFO, "RSN: Peer RSN IE in SMK and STK "
815 wpa_hexdump(MSG_DEBUG, "RSN: Peer RSN IE in SMK handshake",
858 wpa_printf(MSG_INFO, "RSN: Initiator RSN IE in SMK and STK "
860 wpa_hexdump(MSG_DEBUG, "RSN: Initiator RSN IE in SMK "
945 wpa_pmk_to_ptk(peerkey->smk, PMK_LEN, "Peer key expansion",
1032 "SMK M1");
1048 /* SMK M1:
1057 /* Group Suite can be anything for SMK RSN IE; receiver will just
1079 wpa_hexdump(MSG_DEBUG, "WPA: RSN IE for SMK handshake",
1109 wpa_hexdump(MSG_DEBUG, "WPA: INonce for SMK handshake",
1120 SMK M1 Request (peer "
1173 /* SMK Error */
1176 /* SMK M2 */
1180 /* SMK M4 or M5 */