Home | History | Annotate | Download | only in rsn_supp

Lines Matching defs:stk

50 	/* TODO: time out SMK and any STK that was generated using this SMK */
293 * 8.5.1.4 Station to station (STK) key hierarchy
364 "RSN: Failed to get random data for INonce (STK)");
368 wpa_hexdump(MSG_DEBUG, "RSN: INonce for STK 4-Way Handshake",
372 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 1/4 to " MACSTR,
427 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 3/4 to " MACSTR,
429 wpa_eapol_key_send(sm, peerkey->stk.kck, ver, peerkey->addr,
646 /* TODO: abort SMK/STK handshake and remove all related keys */
661 struct wpa_ptk *stk;
665 wpa_printf(MSG_DEBUG, "RSN: RX message 1 of STK 4-Way Handshake from "
674 wpa_printf(MSG_DEBUG, "RSN: No SMKID in STK 1/4");
678 wpa_hexdump(MSG_DEBUG, "RSN: Unknown SMKID in STK 1/4",
691 /* Calculate STK which will be stored as a temporary STK until it has
693 stk = &peerkey->tstk;
697 (u8 *) stk, sizeof(*stk),
700 os_memcpy(buf, stk->u.auth.tx_mic_key, 8);
701 os_memcpy(stk->u.auth.tx_mic_key, stk->u.auth.rx_mic_key, 8);
702 os_memcpy(stk->u.auth.rx_mic_key, buf, 8);
720 stk)) {
767 wpa_printf(MSG_DEBUG, "RSN: RX message 2 of STK 4-Way Handshake from "
777 wpa_printf(MSG_DEBUG, "RSN: No SMKID or RSN IE in STK 2/4");
782 wpa_hexdump(MSG_DEBUG, "RSN: Unknown SMKID in STK 2/4",
789 wpa_printf(MSG_INFO, "RSN: Peer RSN IE in SMK and STK "
793 wpa_hexdump(MSG_DEBUG, "RSN: Peer RSN IE in STK handshake",
816 wpa_printf(MSG_DEBUG, "RSN: RX message 3 of STK 4-Way Handshake from "
826 "STK 3/4");
832 wpa_printf(MSG_INFO, "RSN: Initiator RSN IE in SMK and STK "
837 wpa_hexdump(MSG_DEBUG, "RSN: Initiator RSN IE in STK "
844 wpa_printf(MSG_WARNING, "RSN: INonce from message 1 of STK "
845 "4-Way Handshake differs from 3 of STK 4-Way "
855 &peerkey->stk))
858 _key = (u8 *) peerkey->stk.tk1;
862 os_memcpy(key_buf + 16, peerkey->stk.u.auth.rx_mic_key, 8);
863 os_memcpy(key_buf + 24, peerkey->stk.u.auth.tx_mic_key, 8);
872 wpa_printf(MSG_WARNING, "RSN: Failed to set STK to the "
886 wpa_printf(MSG_DEBUG, "RSN: RX message 4 of STK 4-Way Handshake from "
891 rsc, sizeof(rsc), (u8 *) peerkey->stk.tk1,
893 wpa_printf(MSG_WARNING, "RSN: Failed to set STK to the "
922 (u8 *) &peerkey->stk, sizeof(peerkey->stk),
939 os_memcpy(&peerkey->stk, &peerkey->tstk,
940 sizeof(peerkey->stk));
946 wpa_eapol_key_mic(peerkey->stk.kck, ver, buf, len,
970 * wpa_sm_stkstart - Send EAPOL-Key Request for STK handshake (STK M1)
975 * Send an EAPOL-Key Request to the current authenticator to start STK
995 wpa_printf(MSG_DEBUG, "RSN: Current AP does not support STK");
1119 /* 3/4 STK 4-Way Handshake */
1123 /* 1/4 STK 4-Way Handshake */
1127 /* 4/4 STK 4-Way Handshake */
1130 /* 2/4 STK 4-Way Handshake */