/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | pmksa_cache.h | 18 u8 pmk[PMK_LEN_MAX]; member in struct:rsn_pmksa_cache_entry 59 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 71 const u8 *pmk, size_t pmk_len); 107 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument 128 const u8 *pmk, size_t pmk_len) 126 pmksa_cache_flush(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *pmk, size_t pmk_len) argument
|
H A D | pmksa_cache.c | 110 * @pmk: The new pairwise master key 127 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument 143 os_memcpy(entry->pmk, pmk, pmk_len); 152 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, 169 os_memcmp_const(pos->pmk, pmk, pmk_len) == 0 && 195 pmksa_cache_flush(pmksa, network_ctx, pos->pmk, 258 * @pmk: PMK to match for or %NYLL to match all PMKs 262 const u8 *pmk, size_ 261 pmksa_cache_flush(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *pmk, size_t pmk_len) argument [all...] |
H A D | preauth.c | 78 u8 pmk[PMK_LEN]; local 83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 89 res = eapol_sm_get_key(eapol, pmk, 16); 94 pmk, pmk_len); 96 pmksa_cache_add(sm->pmksa, pmk, pmk_len, NULL,
|
H A D | wpa.c | 172 if (wpa_sm_key_mgmt_set_pmk(sm, sm->pmk, sm->pmk_len)) 209 sm->pmk, sm->pmk_len); 221 res = eapol_sm_get_key(sm->eapol, sm->pmk, pmk_len); 228 res = eapol_sm_get_key(sm->eapol, sm->pmk, 16); 245 "machines", sm->pmk, pmk_len); 252 sm->pmk, pmk_len, NULL, 437 return wpa_pmk_to_ptk(sm->pmk, sm->pmk_len, "Pairwise key expansion", 1356 sa = pmksa_cache_add(sm->pmksa, sm->pmk, sm->pmk_len, NULL, 2280 os_memcmp(sm->pmk, entry->pmk, s 2463 wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *bssid) argument [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | pmksa_cache.h | 18 u8 pmk[PMK_LEN_MAX]; member in struct:rsn_pmksa_cache_entry 59 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 71 const u8 *pmk, size_t pmk_len); 107 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument 128 const u8 *pmk, size_t pmk_len) 126 pmksa_cache_flush(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *pmk, size_t pmk_len) argument
|
H A D | pmksa_cache.c | 110 * @pmk: The new pairwise master key 127 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument 143 os_memcpy(entry->pmk, pmk, pmk_len); 152 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, 169 os_memcmp_const(pos->pmk, pmk, pmk_len) == 0 && 195 pmksa_cache_flush(pmksa, network_ctx, pos->pmk, 258 * @pmk: PMK to match for or %NYLL to match all PMKs 262 const u8 *pmk, size_ 261 pmksa_cache_flush(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *pmk, size_t pmk_len) argument [all...] |
H A D | preauth.c | 78 u8 pmk[PMK_LEN]; local 83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 89 res = eapol_sm_get_key(eapol, pmk, 16); 94 pmk, pmk_len); 96 pmksa_cache_add(sm->pmksa, pmk, pmk_len, NULL,
|
H A D | wpa.c | 172 if (wpa_sm_key_mgmt_set_pmk(sm, sm->pmk, sm->pmk_len)) 209 sm->pmk, sm->pmk_len); 221 res = eapol_sm_get_key(sm->eapol, sm->pmk, pmk_len); 228 res = eapol_sm_get_key(sm->eapol, sm->pmk, 16); 245 "machines", sm->pmk, pmk_len); 252 sm->pmk, pmk_len, NULL, 437 return wpa_pmk_to_ptk(sm->pmk, sm->pmk_len, "Pairwise key expansion", 1356 sa = pmksa_cache_add(sm->pmksa, sm->pmk, sm->pmk_len, NULL, 2280 os_memcmp(sm->pmk, entry->pmk, s 2463 wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *bssid) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | pmksa_cache.h | 18 u8 pmk[PMK_LEN_MAX]; member in struct:rsn_pmksa_cache_entry 59 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 71 const u8 *pmk, size_t pmk_len); 107 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument 128 const u8 *pmk, size_t pmk_len) 126 pmksa_cache_flush(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *pmk, size_t pmk_len) argument
|
H A D | pmksa_cache.c | 110 * @pmk: The new pairwise master key 127 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument 143 os_memcpy(entry->pmk, pmk, pmk_len); 152 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, 169 os_memcmp_const(pos->pmk, pmk, pmk_len) == 0 && 195 pmksa_cache_flush(pmksa, network_ctx, pos->pmk, 258 * @pmk: PMK to match for or %NYLL to match all PMKs 262 const u8 *pmk, size_ 261 pmksa_cache_flush(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *pmk, size_t pmk_len) argument [all...] |
H A D | preauth.c | 78 u8 pmk[PMK_LEN]; local 83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 89 res = eapol_sm_get_key(eapol, pmk, 16); 94 pmk, pmk_len); 96 pmksa_cache_add(sm->pmksa, pmk, pmk_len, NULL,
|
H A D | wpa.c | 172 if (wpa_sm_key_mgmt_set_pmk(sm, sm->pmk, sm->pmk_len)) 209 sm->pmk, sm->pmk_len); 221 res = eapol_sm_get_key(sm->eapol, sm->pmk, pmk_len); 228 res = eapol_sm_get_key(sm->eapol, sm->pmk, 16); 245 "machines", sm->pmk, pmk_len); 252 sm->pmk, pmk_len, NULL, 437 return wpa_pmk_to_ptk(sm->pmk, sm->pmk_len, "Pairwise key expansion", 1356 sa = pmksa_cache_add(sm->pmksa, sm->pmk, sm->pmk_len, NULL, 2280 os_memcmp(sm->pmk, entry->pmk, s 2463 wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *bssid) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | pmksa_cache_auth.h | 20 u8 pmk[PMK_LEN_MAX]; member in struct:rsn_pmksa_cache_entry 51 const u8 *pmk, size_t pmk_len, const u8 *pmkid,
|
H A D | pmksa_cache_auth.c | 261 * @pmk: The new pairwise master key 280 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 297 os_memcpy(entry->pmk, pmk, pmk_len); 306 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, 349 os_memcpy(entry->pmk, old_entry->pmk, old_entry->pmk_len); 464 rsn_pmkid(entry->pmk, entry->pmk_len, aa, spa, new_pmkid, 279 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument
|
H A D | wpa_auth.h | 291 int wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk, 295 const u8 *pmk, size_t len, const u8 *sta_addr, 299 const u8 *pmk, const u8 *pmkid); 310 u8 *pmkid, u8 *pmk);
|
/external/wpa_supplicant_8/src/ap/ |
H A D | pmksa_cache_auth.h | 20 u8 pmk[PMK_LEN_MAX]; member in struct:rsn_pmksa_cache_entry 51 const u8 *pmk, size_t pmk_len, const u8 *pmkid,
|
H A D | pmksa_cache_auth.c | 261 * @pmk: The new pairwise master key 280 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 297 os_memcpy(entry->pmk, pmk, pmk_len); 306 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, 349 os_memcpy(entry->pmk, old_entry->pmk, old_entry->pmk_len); 464 rsn_pmkid(entry->pmk, entry->pmk_len, aa, spa, new_pmkid, 279 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument
|
H A D | wpa_auth.h | 291 int wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk, 295 const u8 *pmk, size_t len, const u8 *sta_addr, 299 const u8 *pmk, const u8 *pmkid); 310 u8 *pmkid, u8 *pmk);
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | pmksa_cache_auth.h | 20 u8 pmk[PMK_LEN_MAX]; member in struct:rsn_pmksa_cache_entry 51 const u8 *pmk, size_t pmk_len, const u8 *pmkid,
|
H A D | pmksa_cache_auth.c | 261 * @pmk: The new pairwise master key 280 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 297 os_memcpy(entry->pmk, pmk, pmk_len); 306 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, 349 os_memcpy(entry->pmk, old_entry->pmk, old_entry->pmk_len); 464 rsn_pmkid(entry->pmk, entry->pmk_len, aa, spa, new_pmkid, 279 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument
|
H A D | wpa_auth.h | 291 int wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk, 295 const u8 *pmk, size_t len, const u8 *sta_addr, 299 const u8 *pmk, const u8 *pmkid); 310 u8 *pmkid, u8 *pmk);
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | sae.h | 47 u8 pmk[SAE_PMK_LEN]; member in struct:sae_data
|
/external/wpa_supplicant_8/src/common/ |
H A D | sae.h | 47 u8 pmk[SAE_PMK_LEN]; member in struct:sae_data
|
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | sae.h | 47 u8 pmk[SAE_PMK_LEN]; member in struct:sae_data
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | mesh_rsn.c | 90 return sta->sae->pmk; 323 sta->sae->pmkid, sta->sae->pmk); 374 sha256_prf(sta->sae->pmk, sizeof(sta->sae->pmk), "AEK Derivation", 379 /* derive mesh temporal key from pmk */ 429 sha256_prf(sta->sae->pmk, sizeof(sta->sae->pmk),
|