Searched refs:PMK (Results 1 - 6 of 6) sorted by relevance
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth_i.h | 61 u8 PMK[PMK_LEN]; member in struct:wpa_state_machine
|
H A D | wpa_auth.c | 409 wpa_printf(MSG_ERROR, "FT PMK cache initialization failed."); 1654 wpa_printf(MSG_DEBUG, "WPA: PMK from PMKSA cache"); 1655 os_memcpy(sm->PMK, sm->pmksa->pmk, PMK_LEN); 1657 wpa_printf(MSG_DEBUG, "WPA: PMK from EAPOL state machine " 1659 os_memcpy(sm->PMK, msk, PMK_LEN); 1667 wpa_printf(MSG_DEBUG, "WPA: Could not get PMK"); 1675 * state and takes PMK from the previously used AAA Key. This will 1676 * eventually fail in 4-Way Handshake because Supplicant uses PMK 1689 os_memcpy(sm->PMK, psk, PMK_LEN); 1736 rsn_pmkid(sm->PMK, PMK_LE [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth_i.h | 61 u8 PMK[PMK_LEN]; member in struct:wpa_state_machine
|
H A D | wpa_auth.c | 409 wpa_printf(MSG_ERROR, "FT PMK cache initialization failed."); 1654 wpa_printf(MSG_DEBUG, "WPA: PMK from PMKSA cache"); 1655 os_memcpy(sm->PMK, sm->pmksa->pmk, PMK_LEN); 1657 wpa_printf(MSG_DEBUG, "WPA: PMK from EAPOL state machine " 1659 os_memcpy(sm->PMK, msk, PMK_LEN); 1667 wpa_printf(MSG_DEBUG, "WPA: Could not get PMK"); 1675 * state and takes PMK from the previously used AAA Key. This will 1676 * eventually fail in 4-Way Handshake because Supplicant uses PMK 1689 os_memcpy(sm->PMK, psk, PMK_LEN); 1736 rsn_pmkid(sm->PMK, PMK_LE [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth_i.h | 61 u8 PMK[PMK_LEN]; member in struct:wpa_state_machine
|
H A D | wpa_auth.c | 409 wpa_printf(MSG_ERROR, "FT PMK cache initialization failed."); 1654 wpa_printf(MSG_DEBUG, "WPA: PMK from PMKSA cache"); 1655 os_memcpy(sm->PMK, sm->pmksa->pmk, PMK_LEN); 1657 wpa_printf(MSG_DEBUG, "WPA: PMK from EAPOL state machine " 1659 os_memcpy(sm->PMK, msk, PMK_LEN); 1667 wpa_printf(MSG_DEBUG, "WPA: Could not get PMK"); 1675 * state and takes PMK from the previously used AAA Key. This will 1676 * eventually fail in 4-Way Handshake because Supplicant uses PMK 1689 os_memcpy(sm->PMK, psk, PMK_LEN); 1736 rsn_pmkid(sm->PMK, PMK_LE [all...] |
Completed in 69 milliseconds