Home | History | Annotate | Download | only in ap

Lines Matching defs:smk

60 			"Sending SMK Error");
91 wpa_printf(MSG_INFO, "RSN: Failed to parse KDEs in SMK M1");
98 "SMK M1");
108 wpa_printf(MSG_DEBUG, "RSN: SMK handshake with " MACSTR
128 /* SMK M2:
134 "Sending SMK M2");
149 const u8 *smk)
155 /* SMK M4:
157 * MIC=MIC, DataKDs=(MAC_I KDE, INonce KDE, SMK KDE,
177 /* SMK with PNonce */
178 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN,
187 "Sending SMK M4");
202 const u8 *smk, const u8 *peer)
208 /* SMK M5:
210 * MIC=MIC, DataKDs=(RSNIE_P, MAC_P KDE, PNonce, SMK KDE,
234 /* SMK and INonce */
235 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN,
244 "Sending SMK M5");
260 u8 smk[32], buf[ETH_ALEN + 8 + 2 * WPA_NONCE_LEN], *pos;
264 wpa_printf(MSG_INFO, "RSN: Failed to parse KDEs in SMK M3");
272 "Nonce KDE in SMK M3");
283 wpa_printf(MSG_DEBUG, "RSN: SMK handshake with " MACSTR
292 if (random_get_bytes(smk, PMK_LEN)) {
293 wpa_printf(MSG_DEBUG, "RSN: Failed to generate SMK");
297 /* SMK = PRF-256(Random number, "SMK Derivation",
308 sha256_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf),
309 smk, PMK_LEN);
311 sha1_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf),
312 smk, PMK_LEN);
315 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", smk, PMK_LEN);
317 wpa_send_smk_m4(wpa_auth, sm, key, &kde, smk);
318 wpa_send_smk_m5(wpa_auth, search.sm, key, &kde, smk, sm->addr);
320 /* Authenticator does not need SMK anymore and it is required to forget
322 os_memset(smk, 0, sizeof(*smk));
336 wpa_printf(MSG_INFO, "RSN: Failed to parse KDEs in SMK Error");
343 "SMK Error");
352 "associated for SMK Error message from " MACSTR,
361 "STA reported SMK Error: Peer " MACSTR