Searched defs:pmk (Results 1 - 25 of 44) sorted by relevance

12

/external/wpa_supplicant_8/hostapd/src/ap/
H A Dpmksa_cache_auth.h20 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry
49 const u8 *pmk, size_t pmk_len,
H A Dpmksa_cache_auth.c223 * @pmk: The new pairwise master key
239 const u8 *pmk, size_t pmk_len,
252 os_memcpy(entry->pmk, pmk, pmk_len);
254 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid,
297 os_memcpy(entry->pmk, old_entry->pmk, old_entry->pmk_len);
401 rsn_pmkid(entry->pmk, entry->pmk_len, aa, spa, new_pmkid,
238 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument
H A Dwpa_auth_ft.c343 int wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, const u8 *pmk, argument
/external/wpa_supplicant_8/src/ap/
H A Dpmksa_cache_auth.h20 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry
49 const u8 *pmk, size_t pmk_len,
H A Dpmksa_cache_auth.c223 * @pmk: The new pairwise master key
239 const u8 *pmk, size_t pmk_len,
252 os_memcpy(entry->pmk, pmk, pmk_len);
254 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid,
297 os_memcpy(entry->pmk, old_entry->pmk, old_entry->pmk_len);
401 rsn_pmkid(entry->pmk, entry->pmk_len, aa, spa, new_pmkid,
238 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dpmksa_cache_auth.h20 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry
49 const u8 *pmk, size_t pmk_len,
H A Dpmksa_cache_auth.c223 * @pmk: The new pairwise master key
239 const u8 *pmk, size_t pmk_len,
252 os_memcpy(entry->pmk, pmk, pmk_len);
254 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid,
297 os_memcpy(entry->pmk, old_entry->pmk, old_entry->pmk_len);
401 rsn_pmkid(entry->pmk, entry->pmk_len, aa, spa, new_pmkid,
238 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
H A Dpmksa_cache.h24 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry
58 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
102 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument
H A Dpmksa_cache.c43 * @pmk: Pairwise master key
44 * @pmk_len: Length of pmk in bytes
52 static void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, argument
66 hmac_sha256_vector(pmk, pmk_len, 3, addr, len, hash);
69 hmac_sha1_vector(pmk, pmk_len, 3, addr, len, hash);
150 * @pmk: The new pairwise master key
164 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument
176 os_memcpy(entry->pmk, pmk, pmk_len);
178 rsn_pmkid(pmk, pmk_le
[all...]
H A Dpreauth.c87 u8 pmk[PMK_LEN]; local
92 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
98 res = eapol_sm_get_key(eapol, pmk, 16);
103 pmk, pmk_len);
105 pmksa_cache_add(sm->pmksa, pmk, pmk_len,
H A Dwpa.h97 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len);
150 static inline void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, argument
H A Dwpa_i.h26 u8 pmk[PMK_LEN]; member in struct:wpa_sm
H A Dwpa.c218 sm->pmk, sm->pmk_len);
226 res = eapol_sm_get_key(sm->eapol, sm->pmk, PMK_LEN);
232 res = eapol_sm_get_key(sm->eapol, sm->pmk, 16);
247 "machines", sm->pmk, pmk_len);
249 pmksa_cache_add(sm->pmksa, sm->pmk, pmk_len, src_addr,
368 wpa_pmk_to_ptk(sm->pmk, sm->pmk_len, "Pairwise key expansion",
1833 os_memcmp(sm->pmk, entry->pmk, sm->pmk_len) == 0)) {
1845 os_memset(sm->pmk, 0, sizeof(sm->pmk));
1974 wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dpmksa_cache.h18 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry
53 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
99 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument
H A Dpmksa_cache.c110 * @pmk: The new pairwise master key
124 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument
136 os_memcpy(entry->pmk, pmk, pmk_len);
138 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid,
155 os_memcmp(pos->pmk, pmk, pmk_len) == 0 &&
335 new_entry = pmksa_cache_add(pmksa, old_entry->pmk, old_entry->pmk_len,
H A Dpreauth.c77 u8 pmk[PMK_LEN]; local
82 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
88 res = eapol_sm_get_key(eapol, pmk, 16);
93 pmk, pmk_len);
95 pmksa_cache_add(sm->pmksa, pmk, pmk_len,
/external/wpa_supplicant_8/src/rsn_supp/
H A Dpmksa_cache.h18 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry
53 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
99 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument
H A Dpmksa_cache.c110 * @pmk: The new pairwise master key
124 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument
136 os_memcpy(entry->pmk, pmk, pmk_len);
138 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid,
155 os_memcmp(pos->pmk, pmk, pmk_len) == 0 &&
335 new_entry = pmksa_cache_add(pmksa, old_entry->pmk, old_entry->pmk_len,
H A Dpreauth.c77 u8 pmk[PMK_LEN]; local
82 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
88 res = eapol_sm_get_key(eapol, pmk, 16);
93 pmk, pmk_len);
95 pmksa_cache_add(sm->pmksa, pmk, pmk_len,
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dpmksa_cache.h18 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry
53 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
99 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument
H A Dpmksa_cache.c110 * @pmk: The new pairwise master key
124 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument
136 os_memcpy(entry->pmk, pmk, pmk_len);
138 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid,
155 os_memcmp(pos->pmk, pmk, pmk_len) == 0 &&
335 new_entry = pmksa_cache_add(pmksa, old_entry->pmk, old_entry->pmk_len,
H A Dpreauth.c77 u8 pmk[PMK_LEN]; local
82 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
88 res = eapol_sm_get_key(eapol, pmk, 16);
93 pmk, pmk_len);
95 pmksa_cache_add(sm->pmksa, pmk, pmk_len,
/external/wpa_supplicant_6/wpa_supplicant/src/common/
H A Dwpa_common.c73 * @pmk: Pairwise master key
93 void wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, argument
120 sha256_prf(pmk, pmk_len, label, data, sizeof(data),
124 sha1_prf(pmk, pmk_len, label, data, sizeof(data), ptk,
129 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len);
/external/wpa_supplicant_6/wpa_supplicant/
H A Dwpas_glue.c227 u8 pmk[PMK_LEN]; local
254 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
260 res = eapol_sm_get_key(eapol, pmk, 16);
270 if (wpa_drv_set_key(wpa_s, WPA_ALG_PMK, NULL, 0, 0, NULL, 0, pmk,
H A Deapol_test.c337 u8 pmk[PMK_LEN]; local
340 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) {
341 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN);
342 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) {
349 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) {
350 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16);
351 if (os_memcmp(pmk, e->authenticator_pmk, 16) != 0) {

Completed in 282 milliseconds

12