Lines Matching refs:smk
302 static void rsn_smkid(const u8 *smk, const u8 *pnonce, const u8 *mac_p, in rsn_smkid() argument
320 hmac_sha256_vector(smk, PMK_LEN, 5, addr, len, hash); in rsn_smkid()
323 hmac_sha1_vector(smk, PMK_LEN, 5, addr, len, hash); in rsn_smkid()
446 if (os_memcmp(kde->smk + PMK_LEN, peerkey->pnonce, WPA_NONCE_LEN) != 0) in wpa_supplicant_process_smk_m4()
488 if (os_memcmp(kde->smk + PMK_LEN, peerkey->inonce, WPA_NONCE_LEN) != 0) in wpa_supplicant_process_smk_m5()
543 kde.smk == NULL || kde.smk_len < PMK_LEN + WPA_NONCE_LEN || in wpa_supplicant_process_smk_m45()
573 os_memcpy(peerkey->smk, kde.smk, PMK_LEN); in wpa_supplicant_process_smk_m45()
575 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", peerkey->smk, PMK_LEN); in wpa_supplicant_process_smk_m45()
587 rsn_smkid(peerkey->smk, peerkey->pnonce, peerkey->addr, in wpa_supplicant_process_smk_m45()
592 rsn_smkid(peerkey->smk, peerkey->pnonce, sm->own_addr, in wpa_supplicant_process_smk_m45()
706 wpa_pmk_to_ptk(peerkey->smk, PMK_LEN, "Peer key expansion", in wpa_supplicant_process_stk_1_of_4()
939 wpa_pmk_to_ptk(peerkey->smk, PMK_LEN, "Peer key expansion", in peerkey_verify_eapol_key_mic()