/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | wpa.h | 81 int (*key_mgmt_set_pmk)(void *ctx, const u8 *pmk, size_t pmk_len); 120 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, 191 static inline void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, argument
|
H A D | wpa.c | 246 if (wpa_sm_key_mgmt_set_pmk(sm, sm->pmk, sm->pmk_len)) 283 sm->pmk, sm->pmk_len); 295 res = eapol_sm_get_key(sm->eapol, sm->pmk, pmk_len); 302 res = eapol_sm_get_key(sm->eapol, sm->pmk, 16); 319 "machines", sm->pmk, pmk_len); 326 sm->pmk, pmk_len, NULL, 509 return wpa_pmk_to_ptk(sm->pmk, sm->pmk_len, "Pairwise key expansion", 1371 sa = pmksa_cache_add(sm->pmksa, sm->pmk, sm->pmk_len, NULL, 2370 os_memcmp(sm->pmk, entry->pmk, s 2558 wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *bssid) argument [all...] |
H A D | wpa_i.h | 22 u8 pmk[PMK_LEN_MAX]; member in struct:wpa_sm 361 const u8 *pmk, size_t pmk_len) 365 return sm->ctx->key_mgmt_set_pmk(sm->ctx->ctx, pmk, pmk_len); 360 wpa_sm_key_mgmt_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | wpa.h | 81 int (*key_mgmt_set_pmk)(void *ctx, const u8 *pmk, size_t pmk_len); 120 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, 191 static inline void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, argument
|
H A D | wpa.c | 246 if (wpa_sm_key_mgmt_set_pmk(sm, sm->pmk, sm->pmk_len)) 283 sm->pmk, sm->pmk_len); 295 res = eapol_sm_get_key(sm->eapol, sm->pmk, pmk_len); 302 res = eapol_sm_get_key(sm->eapol, sm->pmk, 16); 319 "machines", sm->pmk, pmk_len); 326 sm->pmk, pmk_len, NULL, 509 return wpa_pmk_to_ptk(sm->pmk, sm->pmk_len, "Pairwise key expansion", 1371 sa = pmksa_cache_add(sm->pmksa, sm->pmk, sm->pmk_len, NULL, 2370 os_memcmp(sm->pmk, entry->pmk, s 2558 wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *bssid) argument [all...] |
H A D | wpa_i.h | 22 u8 pmk[PMK_LEN_MAX]; member in struct:wpa_sm 361 const u8 *pmk, size_t pmk_len) 365 return sm->ctx->key_mgmt_set_pmk(sm->ctx->ctx, pmk, pmk_len); 360 wpa_sm_key_mgmt_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len) argument
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ieee802_11.c | 576 sta->sae->pmk, sta->sae->pmkid); 1168 const u8 *pmk = NULL; local 1248 pmk = pmk_buf; 1250 pmk = pmksa->pmk; 1254 if (!pmk) { 1262 if (fils_auth_pmk_to_ptk(sta->wpa_sm, pmk, pmk_len,
|
H A D | wpa_auth_ft.c | 375 int wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, const u8 *pmk, argument 820 const u8 *pmk = NULL; local 835 pmk = wpa_ft_get_psk(wpa_auth, sm->addr, sm->p2p_dev_addr, 836 pmk); 837 if (pmk == NULL) 840 if (wpa_derive_pmk_r0(pmk, PMK_LEN, ssid, ssid_len, mdid, r0kh,
|
H A D | wpa_auth.c | 53 const u8 *pmk, unsigned int pmk_len, 844 const u8 *pmk = NULL; local 850 pmk = wpa_auth_get_psk(sm->wpa_auth, sm->addr, 851 sm->p2p_dev_addr, pmk); 852 if (pmk == NULL) 856 pmk = sm->PMK; 860 if (wpa_derive_ptk(sm, sm->alt_SNonce, pmk, pmk_len, &PTK) < 0) 1923 os_memcpy(sm->PMK, sm->pmksa->pmk, sm->pmksa->pmk_len); 2042 const u8 *pmk, unsigned int pmk_len, 2047 return wpa_auth_derive_ptk_ft(sm, pmk, pt 2041 wpa_derive_ptk(struct wpa_state_machine *sm, const u8 *snonce, const u8 *pmk, unsigned int pmk_len, struct wpa_ptk *ptk) argument 2058 fils_auth_pmk_to_ptk(struct wpa_state_machine *sm, const u8 *pmk, size_t pmk_len, const u8 *snonce, const u8 *anonce) argument 2435 const u8 *pmk = NULL; local 3770 wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk, unsigned int pmk_len, int session_timeout, struct eapol_state_machine *eapol) argument 3795 wpa_auth_pmksa_add_preauth(struct wpa_authenticator *wpa_auth, const u8 *pmk, size_t len, const u8 *sta_addr, int session_timeout, struct eapol_state_machine *eapol) argument 3814 wpa_auth_pmksa_add_sae(struct wpa_authenticator *wpa_auth, const u8 *addr, const u8 *pmk, const u8 *pmkid) argument 3876 wpa_auth_pmksa_create_entry(const u8 *aa, const u8 *spa, const u8 *pmk, const u8 *pmkid, int expiration) argument 3924 wpa_auth_pmksa_set_to_sm(struct rsn_pmksa_cache_entry *pmksa, struct wpa_state_machine *sm, struct wpa_authenticator *wpa_auth, u8 *pmkid, u8 *pmk) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | wpa_common.c | 144 * @pmk: Pairwise master key 165 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, argument 199 sha384_prf(pmk, pmk_len, label, data, sizeof(data), 205 sha256_prf(pmk, pmk_len, label, data, sizeof(data), 209 sha1_prf(pmk, pmk_len, label, data, sizeof(data), tmp, ptk_len); 215 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len); 235 size_t dh_ss_len, u8 *pmk, size_t *pmk_len) 270 addr, len, pmk); 273 addr, len, pmk); 275 wpa_hexdump_key(MSG_DEBUG, "FILS: PMK", pmk, *pmk_le 233 fils_rmsk_to_pmk(int akmp, const u8 *rmsk, size_t rmsk_len, const u8 *snonce, const u8 *anonce, const u8 *dh_ss, size_t dh_ss_len, u8 *pmk, size_t *pmk_len) argument 305 fils_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const u8 *spa, const u8 *aa, const u8 *snonce, const u8 *anonce, struct wpa_ptk *ptk, u8 *ick, size_t *ick_len, int akmp, int cipher) argument 1310 rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa, u8 *pmkid, int use_sha256) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa.c | 246 if (wpa_sm_key_mgmt_set_pmk(sm, sm->pmk, sm->pmk_len)) 283 sm->pmk, sm->pmk_len); 295 res = eapol_sm_get_key(sm->eapol, sm->pmk, pmk_len); 302 res = eapol_sm_get_key(sm->eapol, sm->pmk, 16); 319 "machines", sm->pmk, pmk_len); 326 sm->pmk, pmk_len, NULL, 509 return wpa_pmk_to_ptk(sm->pmk, sm->pmk_len, "Pairwise key expansion", 1371 sa = pmksa_cache_add(sm->pmksa, sm->pmk, sm->pmk_len, NULL, 2370 os_memcmp(sm->pmk, entry->pmk, s 2558 wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *bssid) argument [all...] |
H A D | wpa_i.h | 22 u8 pmk[PMK_LEN_MAX]; member in struct:wpa_sm 361 const u8 *pmk, size_t pmk_len) 365 return sm->ctx->key_mgmt_set_pmk(sm->ctx->ctx, pmk, pmk_len); 360 wpa_sm_key_mgmt_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len) argument
|
/external/wpa_supplicant_8/src/ap/ |
H A D | ieee802_11.c | 576 sta->sae->pmk, sta->sae->pmkid); 1168 const u8 *pmk = NULL; local 1248 pmk = pmk_buf; 1250 pmk = pmksa->pmk; 1254 if (!pmk) { 1262 if (fils_auth_pmk_to_ptk(sta->wpa_sm, pmk, pmk_len,
|
H A D | wpa_auth_ft.c | 375 int wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, const u8 *pmk, argument 820 const u8 *pmk = NULL; local 835 pmk = wpa_ft_get_psk(wpa_auth, sm->addr, sm->p2p_dev_addr, 836 pmk); 837 if (pmk == NULL) 840 if (wpa_derive_pmk_r0(pmk, PMK_LEN, ssid, ssid_len, mdid, r0kh,
|
H A D | wpa_auth.c | 53 const u8 *pmk, unsigned int pmk_len, 844 const u8 *pmk = NULL; local 850 pmk = wpa_auth_get_psk(sm->wpa_auth, sm->addr, 851 sm->p2p_dev_addr, pmk); 852 if (pmk == NULL) 856 pmk = sm->PMK; 860 if (wpa_derive_ptk(sm, sm->alt_SNonce, pmk, pmk_len, &PTK) < 0) 1923 os_memcpy(sm->PMK, sm->pmksa->pmk, sm->pmksa->pmk_len); 2042 const u8 *pmk, unsigned int pmk_len, 2047 return wpa_auth_derive_ptk_ft(sm, pmk, pt 2041 wpa_derive_ptk(struct wpa_state_machine *sm, const u8 *snonce, const u8 *pmk, unsigned int pmk_len, struct wpa_ptk *ptk) argument 2058 fils_auth_pmk_to_ptk(struct wpa_state_machine *sm, const u8 *pmk, size_t pmk_len, const u8 *snonce, const u8 *anonce) argument 2435 const u8 *pmk = NULL; local 3770 wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk, unsigned int pmk_len, int session_timeout, struct eapol_state_machine *eapol) argument 3795 wpa_auth_pmksa_add_preauth(struct wpa_authenticator *wpa_auth, const u8 *pmk, size_t len, const u8 *sta_addr, int session_timeout, struct eapol_state_machine *eapol) argument 3814 wpa_auth_pmksa_add_sae(struct wpa_authenticator *wpa_auth, const u8 *addr, const u8 *pmk, const u8 *pmkid) argument 3876 wpa_auth_pmksa_create_entry(const u8 *aa, const u8 *spa, const u8 *pmk, const u8 *pmkid, int expiration) argument 3924 wpa_auth_pmksa_set_to_sm(struct rsn_pmksa_cache_entry *pmksa, struct wpa_state_machine *sm, struct wpa_authenticator *wpa_auth, u8 *pmkid, u8 *pmk) argument [all...] |
/external/wpa_supplicant_8/src/common/ |
H A D | wpa_common.c | 144 * @pmk: Pairwise master key 165 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, argument 199 sha384_prf(pmk, pmk_len, label, data, sizeof(data), 205 sha256_prf(pmk, pmk_len, label, data, sizeof(data), 209 sha1_prf(pmk, pmk_len, label, data, sizeof(data), tmp, ptk_len); 215 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len); 235 size_t dh_ss_len, u8 *pmk, size_t *pmk_len) 270 addr, len, pmk); 273 addr, len, pmk); 275 wpa_hexdump_key(MSG_DEBUG, "FILS: PMK", pmk, *pmk_le 233 fils_rmsk_to_pmk(int akmp, const u8 *rmsk, size_t rmsk_len, const u8 *snonce, const u8 *anonce, const u8 *dh_ss, size_t dh_ss_len, u8 *pmk, size_t *pmk_len) argument 305 fils_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const u8 *spa, const u8 *aa, const u8 *snonce, const u8 *anonce, struct wpa_ptk *ptk, u8 *ick, size_t *ick_len, int akmp, int cipher) argument 1310 rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa, u8 *pmkid, int use_sha256) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | eapol_test.c | 362 u8 pmk[PMK_LEN]; local 367 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { 368 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); 369 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) { 376 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) { 377 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16); 378 if (os_memcmp(pmk, e->authenticator_pmk, 16) != 0) {
|
H A D | wpas_glue.c | 274 u8 pmk[PMK_LEN]; local 314 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN); 321 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 327 res = eapol_sm_get_key(eapol, pmk, 16); 339 "handshake", pmk, pmk_len); 341 if (wpa_drv_set_key(wpa_s, WPA_ALG_PMK, NULL, 0, 0, NULL, 0, pmk, 1105 static int wpa_supplicant_key_mgmt_set_pmk(void *ctx, const u8 *pmk, argument 1113 NULL, 0, pmk, pmk_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ieee802_11.c | 576 sta->sae->pmk, sta->sae->pmkid); 1168 const u8 *pmk = NULL; local 1248 pmk = pmk_buf; 1250 pmk = pmksa->pmk; 1254 if (!pmk) { 1262 if (fils_auth_pmk_to_ptk(sta->wpa_sm, pmk, pmk_len,
|
H A D | wpa_auth_ft.c | 375 int wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, const u8 *pmk, argument 820 const u8 *pmk = NULL; local 835 pmk = wpa_ft_get_psk(wpa_auth, sm->addr, sm->p2p_dev_addr, 836 pmk); 837 if (pmk == NULL) 840 if (wpa_derive_pmk_r0(pmk, PMK_LEN, ssid, ssid_len, mdid, r0kh,
|
H A D | wpa_auth.c | 53 const u8 *pmk, unsigned int pmk_len, 844 const u8 *pmk = NULL; local 850 pmk = wpa_auth_get_psk(sm->wpa_auth, sm->addr, 851 sm->p2p_dev_addr, pmk); 852 if (pmk == NULL) 856 pmk = sm->PMK; 860 if (wpa_derive_ptk(sm, sm->alt_SNonce, pmk, pmk_len, &PTK) < 0) 1923 os_memcpy(sm->PMK, sm->pmksa->pmk, sm->pmksa->pmk_len); 2042 const u8 *pmk, unsigned int pmk_len, 2047 return wpa_auth_derive_ptk_ft(sm, pmk, pt 2041 wpa_derive_ptk(struct wpa_state_machine *sm, const u8 *snonce, const u8 *pmk, unsigned int pmk_len, struct wpa_ptk *ptk) argument 2058 fils_auth_pmk_to_ptk(struct wpa_state_machine *sm, const u8 *pmk, size_t pmk_len, const u8 *snonce, const u8 *anonce) argument 2435 const u8 *pmk = NULL; local 3770 wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk, unsigned int pmk_len, int session_timeout, struct eapol_state_machine *eapol) argument 3795 wpa_auth_pmksa_add_preauth(struct wpa_authenticator *wpa_auth, const u8 *pmk, size_t len, const u8 *sta_addr, int session_timeout, struct eapol_state_machine *eapol) argument 3814 wpa_auth_pmksa_add_sae(struct wpa_authenticator *wpa_auth, const u8 *addr, const u8 *pmk, const u8 *pmkid) argument 3876 wpa_auth_pmksa_create_entry(const u8 *aa, const u8 *spa, const u8 *pmk, const u8 *pmkid, int expiration) argument 3924 wpa_auth_pmksa_set_to_sm(struct rsn_pmksa_cache_entry *pmksa, struct wpa_state_machine *sm, struct wpa_authenticator *wpa_auth, u8 *pmkid, u8 *pmk) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | wpa_common.c | 144 * @pmk: Pairwise master key 165 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, argument 199 sha384_prf(pmk, pmk_len, label, data, sizeof(data), 205 sha256_prf(pmk, pmk_len, label, data, sizeof(data), 209 sha1_prf(pmk, pmk_len, label, data, sizeof(data), tmp, ptk_len); 215 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len); 235 size_t dh_ss_len, u8 *pmk, size_t *pmk_len) 270 addr, len, pmk); 273 addr, len, pmk); 275 wpa_hexdump_key(MSG_DEBUG, "FILS: PMK", pmk, *pmk_le 233 fils_rmsk_to_pmk(int akmp, const u8 *rmsk, size_t rmsk_len, const u8 *snonce, const u8 *anonce, const u8 *dh_ss, size_t dh_ss_len, u8 *pmk, size_t *pmk_len) argument 305 fils_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const u8 *spa, const u8 *aa, const u8 *snonce, const u8 *anonce, struct wpa_ptk *ptk, u8 *ick, size_t *ick_len, int akmp, int cipher) argument 1310 rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa, u8 *pmkid, int use_sha256) argument [all...] |