/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | pmksa_cache_auth.h | 20 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry 49 const u8 *pmk, size_t pmk_len,
|
H A D | pmksa_cache_auth.c | 223 * @pmk: The new pairwise master key 239 const u8 *pmk, size_t pmk_len, 252 os_memcpy(entry->pmk, pmk, pmk_len); 254 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, 297 os_memcpy(entry->pmk, old_entry->pmk, old_entry->pmk_len); 401 rsn_pmkid(entry->pmk, entry->pmk_len, aa, spa, new_pmkid, 238 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument
|
H A D | wpa_auth_ft.c | 362 int wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, const u8 *pmk, argument
|
/external/wpa_supplicant_8/src/ap/ |
H A D | pmksa_cache_auth.h | 20 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry 49 const u8 *pmk, size_t pmk_len,
|
H A D | pmksa_cache_auth.c | 223 * @pmk: The new pairwise master key 239 const u8 *pmk, size_t pmk_len, 252 os_memcpy(entry->pmk, pmk, pmk_len); 254 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, 297 os_memcpy(entry->pmk, old_entry->pmk, old_entry->pmk_len); 401 rsn_pmkid(entry->pmk, entry->pmk_len, aa, spa, new_pmkid, 238 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument
|
H A D | wpa_auth_ft.c | 362 int wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, const u8 *pmk, argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | pmksa_cache_auth.h | 20 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry 49 const u8 *pmk, size_t pmk_len,
|
H A D | pmksa_cache_auth.c | 223 * @pmk: The new pairwise master key 239 const u8 *pmk, size_t pmk_len, 252 os_memcpy(entry->pmk, pmk, pmk_len); 254 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, 297 os_memcpy(entry->pmk, old_entry->pmk, old_entry->pmk_len); 401 rsn_pmkid(entry->pmk, entry->pmk_len, aa, spa, new_pmkid, 238 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | sae.h | 43 u8 pmk[SAE_PMK_LEN]; member in struct:sae_data
|
H A D | wpa_common.c | 75 * @pmk: Pairwise master key 95 void wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, argument 122 sha256_prf(pmk, pmk_len, label, data, sizeof(data), 126 sha1_prf(pmk, pmk_len, label, data, sizeof(data), ptk, 133 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len); 899 * @pmk: Pairwise master key 900 * @pmk_len: Length of pmk in bytes 909 void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa, argument 923 hmac_sha256_vector(pmk, pmk_len, 3, addr, len, hash); 926 hmac_sha1_vector(pmk, pmk_le [all...] |
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | pmksa_cache.h | 18 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry 59 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 70 const u8 *pmk, size_t pmk_len); 106 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument 126 const u8 *pmk, size_t pmk_len) 124 pmksa_cache_flush(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *pmk, size_t pmk_len) argument
|
H A D | pmksa_cache.c | 110 * @pmk: The new pairwise master key 124 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument 136 os_memcpy(entry->pmk, pmk, pmk_len); 138 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, 155 os_memcmp_const(pos->pmk, pmk, pmk_len) == 0 && 181 pmksa_cache_flush(pmksa, network_ctx, pos->pmk, 244 * @pmk: PMK to match for or %NYLL to match all PMKs 248 const u8 *pmk, size_ 247 pmksa_cache_flush(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *pmk, size_t pmk_len) argument [all...] |
H A D | preauth.c | 78 u8 pmk[PMK_LEN]; local 83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 89 res = eapol_sm_get_key(eapol, pmk, 16); 94 pmk, pmk_len); 96 pmksa_cache_add(sm->pmksa, pmk, pmk_len,
|
H A D | wpa.h | 108 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len); 169 static inline void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, argument
|
H A D | wpa_i.h | 22 u8 pmk[PMK_LEN]; member in struct:wpa_sm
|
/external/wpa_supplicant_8/src/common/ |
H A D | sae.h | 43 u8 pmk[SAE_PMK_LEN]; member in struct:sae_data
|
H A D | wpa_common.c | 75 * @pmk: Pairwise master key 95 void wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, argument 122 sha256_prf(pmk, pmk_len, label, data, sizeof(data), 126 sha1_prf(pmk, pmk_len, label, data, sizeof(data), ptk, 133 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len); 899 * @pmk: Pairwise master key 900 * @pmk_len: Length of pmk in bytes 909 void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa, argument 923 hmac_sha256_vector(pmk, pmk_len, 3, addr, len, hash); 926 hmac_sha1_vector(pmk, pmk_le [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | pmksa_cache.h | 18 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry 59 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 70 const u8 *pmk, size_t pmk_len); 106 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument 126 const u8 *pmk, size_t pmk_len) 124 pmksa_cache_flush(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *pmk, size_t pmk_len) argument
|
H A D | pmksa_cache.c | 110 * @pmk: The new pairwise master key 124 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument 136 os_memcpy(entry->pmk, pmk, pmk_len); 138 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, 155 os_memcmp_const(pos->pmk, pmk, pmk_len) == 0 && 181 pmksa_cache_flush(pmksa, network_ctx, pos->pmk, 244 * @pmk: PMK to match for or %NYLL to match all PMKs 248 const u8 *pmk, size_ 247 pmksa_cache_flush(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *pmk, size_t pmk_len) argument [all...] |
H A D | preauth.c | 78 u8 pmk[PMK_LEN]; local 83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 89 res = eapol_sm_get_key(eapol, pmk, 16); 94 pmk, pmk_len); 96 pmksa_cache_add(sm->pmksa, pmk, pmk_len,
|
H A D | wpa.h | 108 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len); 169 static inline void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | sae.h | 43 u8 pmk[SAE_PMK_LEN]; member in struct:sae_data
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | pmksa_cache.h | 18 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry 59 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 70 const u8 *pmk, size_t pmk_len); 106 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument 126 const u8 *pmk, size_t pmk_len) 124 pmksa_cache_flush(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *pmk, size_t pmk_len) argument
|
H A D | pmksa_cache.c | 110 * @pmk: The new pairwise master key 124 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument 136 os_memcpy(entry->pmk, pmk, pmk_len); 138 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, 155 os_memcmp_const(pos->pmk, pmk, pmk_len) == 0 && 181 pmksa_cache_flush(pmksa, network_ctx, pos->pmk, 244 * @pmk: PMK to match for or %NYLL to match all PMKs 248 const u8 *pmk, size_ 247 pmksa_cache_flush(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *pmk, size_t pmk_len) argument [all...] |
H A D | preauth.c | 78 u8 pmk[PMK_LEN]; local 83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 89 res = eapol_sm_get_key(eapol, pmk, 16); 94 pmk, pmk_len); 96 pmksa_cache_add(sm->pmksa, pmk, pmk_len,
|