Searched refs:pmk (Results 1 - 25 of 54) sorted by relevance

123

/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dpmksa_cache.h18 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry
59 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
70 const u8 *pmk, size_t pmk_len);
106 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument
126 const u8 *pmk, size_t pmk_len)
124 pmksa_cache_flush(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *pmk, size_t pmk_len) argument
H A Dpmksa_cache.c110 * @pmk: The new pairwise master key
124 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument
136 os_memcpy(entry->pmk, pmk, pmk_len);
138 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid,
155 os_memcmp_const(pos->pmk, pmk, pmk_len) == 0 &&
181 pmksa_cache_flush(pmksa, network_ctx, pos->pmk,
244 * @pmk: PMK to match for or %NYLL to match all PMKs
248 const u8 *pmk, size_
247 pmksa_cache_flush(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *pmk, size_t pmk_len) argument
[all...]
H A Dpreauth.c78 u8 pmk[PMK_LEN]; local
83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
89 res = eapol_sm_get_key(eapol, pmk, 16);
94 pmk, pmk_len);
96 pmksa_cache_add(sm->pmksa, pmk, pmk_len,
H A Dwpa.c169 sm->pmk, sm->pmk_len);
177 res = eapol_sm_get_key(sm->eapol, sm->pmk, PMK_LEN);
183 res = eapol_sm_get_key(sm->eapol, sm->pmk, 16);
199 "machines", sm->pmk, pmk_len);
204 sm->pmk, pmk_len,
371 wpa_pmk_to_ptk(sm->pmk, sm->pmk_len, "Pairwise key expansion",
2024 os_memcmp(sm->pmk, entry->pmk, sm->pmk_len) == 0)) {
2032 os_memset(sm->pmk, 0, sizeof(sm->pmk));
2186 wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len) argument
[all...]
/external/wpa_supplicant_8/src/rsn_supp/
H A Dpmksa_cache.h18 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry
59 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
70 const u8 *pmk, size_t pmk_len);
106 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument
126 const u8 *pmk, size_t pmk_len)
124 pmksa_cache_flush(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *pmk, size_t pmk_len) argument
H A Dpmksa_cache.c110 * @pmk: The new pairwise master key
124 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument
136 os_memcpy(entry->pmk, pmk, pmk_len);
138 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid,
155 os_memcmp_const(pos->pmk, pmk, pmk_len) == 0 &&
181 pmksa_cache_flush(pmksa, network_ctx, pos->pmk,
244 * @pmk: PMK to match for or %NYLL to match all PMKs
248 const u8 *pmk, size_
247 pmksa_cache_flush(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *pmk, size_t pmk_len) argument
[all...]
H A Dpreauth.c78 u8 pmk[PMK_LEN]; local
83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
89 res = eapol_sm_get_key(eapol, pmk, 16);
94 pmk, pmk_len);
96 pmksa_cache_add(sm->pmksa, pmk, pmk_len,
H A Dwpa.c169 sm->pmk, sm->pmk_len);
177 res = eapol_sm_get_key(sm->eapol, sm->pmk, PMK_LEN);
183 res = eapol_sm_get_key(sm->eapol, sm->pmk, 16);
199 "machines", sm->pmk, pmk_len);
204 sm->pmk, pmk_len,
371 wpa_pmk_to_ptk(sm->pmk, sm->pmk_len, "Pairwise key expansion",
2024 os_memcmp(sm->pmk, entry->pmk, sm->pmk_len) == 0)) {
2032 os_memset(sm->pmk, 0, sizeof(sm->pmk));
2186 wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dpmksa_cache.h18 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry
59 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
70 const u8 *pmk, size_t pmk_len);
106 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument
126 const u8 *pmk, size_t pmk_len)
124 pmksa_cache_flush(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *pmk, size_t pmk_len) argument
H A Dpmksa_cache.c110 * @pmk: The new pairwise master key
124 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument
136 os_memcpy(entry->pmk, pmk, pmk_len);
138 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid,
155 os_memcmp_const(pos->pmk, pmk, pmk_len) == 0 &&
181 pmksa_cache_flush(pmksa, network_ctx, pos->pmk,
244 * @pmk: PMK to match for or %NYLL to match all PMKs
248 const u8 *pmk, size_
247 pmksa_cache_flush(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *pmk, size_t pmk_len) argument
[all...]
H A Dpreauth.c78 u8 pmk[PMK_LEN]; local
83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
89 res = eapol_sm_get_key(eapol, pmk, 16);
94 pmk, pmk_len);
96 pmksa_cache_add(sm->pmksa, pmk, pmk_len,
H A Dwpa.c169 sm->pmk, sm->pmk_len);
177 res = eapol_sm_get_key(sm->eapol, sm->pmk, PMK_LEN);
183 res = eapol_sm_get_key(sm->eapol, sm->pmk, 16);
199 "machines", sm->pmk, pmk_len);
204 sm->pmk, pmk_len,
371 wpa_pmk_to_ptk(sm->pmk, sm->pmk_len, "Pairwise key expansion",
2024 os_memcmp(sm->pmk, entry->pmk, sm->pmk_len) == 0)) {
2032 os_memset(sm->pmk, 0, sizeof(sm->pmk));
2186 wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dpmksa_cache_auth.h20 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry
49 const u8 *pmk, size_t pmk_len,
H A Dpmksa_cache_auth.c223 * @pmk: The new pairwise master key
239 const u8 *pmk, size_t pmk_len,
252 os_memcpy(entry->pmk, pmk, pmk_len);
254 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid,
297 os_memcpy(entry->pmk, old_entry->pmk, old_entry->pmk_len);
401 rsn_pmkid(entry->pmk, entry->pmk_len, aa, spa, new_pmkid,
238 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument
H A Dwpa_auth.h273 int wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk,
276 const u8 *pmk, size_t len, const u8 *sta_addr,
/external/wpa_supplicant_8/src/ap/
H A Dpmksa_cache_auth.h20 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry
49 const u8 *pmk, size_t pmk_len,
H A Dpmksa_cache_auth.c223 * @pmk: The new pairwise master key
239 const u8 *pmk, size_t pmk_len,
252 os_memcpy(entry->pmk, pmk, pmk_len);
254 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid,
297 os_memcpy(entry->pmk, old_entry->pmk, old_entry->pmk_len);
401 rsn_pmkid(entry->pmk, entry->pmk_len, aa, spa, new_pmkid,
238 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument
H A Dwpa_auth.h273 int wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk,
276 const u8 *pmk, size_t len, const u8 *sta_addr,
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dpmksa_cache_auth.h20 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry
49 const u8 *pmk, size_t pmk_len,
H A Dpmksa_cache_auth.c223 * @pmk: The new pairwise master key
239 const u8 *pmk, size_t pmk_len,
252 os_memcpy(entry->pmk, pmk, pmk_len);
254 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid,
297 os_memcpy(entry->pmk, old_entry->pmk, old_entry->pmk_len);
401 rsn_pmkid(entry->pmk, entry->pmk_len, aa, spa, new_pmkid,
238 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument
H A Dwpa_auth.h273 int wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk,
276 const u8 *pmk, size_t len, const u8 *sta_addr,
/external/wpa_supplicant_8/hostapd/src/common/
H A Dsae.h43 u8 pmk[SAE_PMK_LEN]; member in struct:sae_data
/external/wpa_supplicant_8/src/common/
H A Dsae.h43 u8 pmk[SAE_PMK_LEN]; member in struct:sae_data
/external/wpa_supplicant_8/wpa_supplicant/src/common/
H A Dsae.h43 u8 pmk[SAE_PMK_LEN]; member in struct:sae_data
/external/wpa_supplicant_8/wpa_supplicant/
H A Dwpas_glue.c240 u8 pmk[PMK_LEN]; local
280 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN);
287 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
293 res = eapol_sm_get_key(eapol, pmk, 16);
305 "handshake", pmk, pmk_len);
307 if (wpa_drv_set_key(wpa_s, WPA_ALG_PMK, NULL, 0, 0, NULL, 0, pmk,

Completed in 2411 milliseconds

123