Home | History | Annotate | Download | only in rsn_supp

Lines Matching defs:stk

50 	/* TODO: time out SMK and any STK that was generated using this SMK */
293 * 8.5.1.4 Station to station (STK) key hierarchy
364 "RSN: Failed to get random data for INonce (STK)");
368 wpa_hexdump(MSG_DEBUG, "RSN: INonce for STK 4-Way Handshake",
372 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 1/4 to " MACSTR,
427 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 3/4 to " MACSTR,
429 wpa_eapol_key_send(sm, peerkey->stk.kck, ver, peerkey->addr,
649 /* TODO: abort SMK/STK handshake and remove all related keys */
664 struct wpa_ptk *stk;
668 wpa_printf(MSG_DEBUG, "RSN: RX message 1 of STK 4-Way Handshake from "
678 wpa_printf(MSG_DEBUG, "RSN: No SMKID in STK 1/4");
682 wpa_hexdump(MSG_DEBUG, "RSN: Unknown SMKID in STK 1/4",
695 /* Calculate STK which will be stored as a temporary STK until it has
697 stk = &peerkey->tstk;
701 (u8 *) stk, sizeof(*stk),
704 os_memcpy(buf, stk->u.auth.tx_mic_key, 8);
705 os_memcpy(stk->u.auth.tx_mic_key, stk->u.auth.rx_mic_key, 8);
706 os_memcpy(stk->u.auth.rx_mic_key, buf, 8);
724 stk)) {
775 wpa_printf(MSG_DEBUG, "RSN: RX message 2 of STK 4-Way Handshake from "
787 wpa_printf(MSG_DEBUG, "RSN: No SMKID or RSN IE in STK 2/4");
792 wpa_hexdump(MSG_DEBUG, "RSN: Unknown SMKID in STK 2/4",
799 wpa_printf(MSG_INFO, "RSN: Peer RSN IE in SMK and STK "
803 wpa_hexdump(MSG_DEBUG, "RSN: Peer RSN IE in STK handshake",
826 wpa_printf(MSG_DEBUG, "RSN: RX message 3 of STK 4-Way Handshake from "
838 "STK 3/4");
844 wpa_printf(MSG_INFO, "RSN: Initiator RSN IE in SMK and STK "
849 wpa_hexdump(MSG_DEBUG, "RSN: Initiator RSN IE in STK "
856 wpa_printf(MSG_WARNING, "RSN: INonce from message 1 of STK "
857 "4-Way Handshake differs from 3 of STK 4-Way "
867 NULL, 0, &peerkey->stk))
870 _key = (u8 *) peerkey->stk.tk1;
874 os_memcpy(key_buf + 16, peerkey->stk.u.auth.rx_mic_key, 8);
875 os_memcpy(key_buf + 24, peerkey->stk.u.auth.tx_mic_key, 8);
884 wpa_printf(MSG_WARNING, "RSN: Failed to set STK to the "
898 wpa_printf(MSG_DEBUG, "RSN: RX message 4 of STK 4-Way Handshake from "
903 rsc, sizeof(rsc), (u8 *) peerkey->stk.tk1,
905 wpa_printf(MSG_WARNING, "RSN: Failed to set STK to the "
934 (u8 *) &peerkey->stk, sizeof(peerkey->stk),
951 os_memcpy(&peerkey->stk, &peerkey->tstk,
952 sizeof(peerkey->stk));
958 wpa_eapol_key_mic(peerkey->stk.kck, ver, buf, len,
982 * wpa_sm_stkstart - Send EAPOL-Key Request for STK handshake (STK M1)
987 * Send an EAPOL-Key Request to the current authenticator to start STK
1007 wpa_printf(MSG_DEBUG, "RSN: Current AP does not support STK");
1130 /* 3/4 STK 4-Way Handshake */
1133 /* 1/4 STK 4-Way Handshake */
1136 /* 4/4 STK 4-Way Handshake */
1139 /* 2/4 STK 4-Way Handshake */