Lines Matching refs:smk
294 static void rsn_smkid(const u8 *smk, const u8 *pnonce, const u8 *mac_p, in rsn_smkid() argument
312 hmac_sha256_vector(smk, PMK_LEN, 5, addr, len, hash); in rsn_smkid()
315 hmac_sha1_vector(smk, PMK_LEN, 5, addr, len, hash); in rsn_smkid()
440 if (os_memcmp(kde->smk + PMK_LEN, peerkey->pnonce, WPA_NONCE_LEN) != 0) in wpa_supplicant_process_smk_m4()
482 if (os_memcmp(kde->smk + PMK_LEN, peerkey->inonce, WPA_NONCE_LEN) != 0) in wpa_supplicant_process_smk_m5()
534 kde.smk == NULL || kde.smk_len < PMK_LEN + WPA_NONCE_LEN || in wpa_supplicant_process_smk_m45()
564 os_memcpy(peerkey->smk, kde.smk, PMK_LEN); in wpa_supplicant_process_smk_m45()
566 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", peerkey->smk, PMK_LEN); in wpa_supplicant_process_smk_m45()
576 rsn_smkid(peerkey->smk, peerkey->pnonce, peerkey->addr, in wpa_supplicant_process_smk_m45()
581 rsn_smkid(peerkey->smk, peerkey->pnonce, sm->own_addr, in wpa_supplicant_process_smk_m45()
693 wpa_pmk_to_ptk(peerkey->smk, PMK_LEN, "Peer key expansion", in wpa_supplicant_process_stk_1_of_4()
927 wpa_pmk_to_ptk(peerkey->smk, PMK_LEN, "Peer key expansion", in peerkey_verify_eapol_key_mic()