/external/syslinux/gpxe/src/net/80211/ |
H A D | wpa_psk.c | 51 u8 pmk[WPA_PMK_LEN]; local 66 4096, pmk, WPA_PMK_LEN ); 70 DBGC_HD ( ctx, pmk, WPA_PMK_LEN ); 72 return wpa_start ( dev, ctx, pmk, WPA_PMK_LEN );
|
H A D | wpa.c | 209 * @v pmk Pairwise Master Key to use for session 214 const void *pmk, size_t pmk_len ) 225 memcpy ( ctx->pmk, pmk, ctx->pmk_len = pmk_len ); 282 u8 pmk[ctx->pmk_len]; local 290 memcpy ( pmk, ctx->pmk, ctx->pmk_len ); 297 hmac_init ( &sha1_algorithm, sha1_ctx, pmk, &pmk_len ); 300 hmac_final ( &sha1_algorithm, sha1_ctx, pmk, &pmk_len, my_pmkid ); 348 prf_sha1 ( ctx->pmk, ct 213 wpa_start( struct net80211_device *dev, struct wpa_common_ctx *ctx, const void *pmk, size_t pmk_len ) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | pmksa_cache_auth.h | 20 u8 pmk[PMK_LEN_MAX]; member in struct:rsn_pmksa_cache_entry 51 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 56 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid,
|
H A D | ctrl_iface_ap.c | 658 u8 pmk[PMK_LEN_MAX]; local 683 if (hexstr2bin(pos, pmk, PMK_LEN) < 0) 694 return wpa_auth_pmksa_create_entry(aa, spa, pmk, pmkid, expiration);
|
H A D | pmksa_cache_auth.c | 261 * @pmk: The new pairwise master key 280 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 287 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len, 300 * @pmk: The new pairwise master key 315 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid, argument 332 os_memcpy(entry->pmk, pmk, pmk_len); 341 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, 405 os_memcpy(entry->pmk, old_entry->pmk, old_entr 279 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | pmksa_cache_auth.h | 20 u8 pmk[PMK_LEN_MAX]; member in struct:rsn_pmksa_cache_entry 51 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 56 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid,
|
H A D | ctrl_iface_ap.c | 658 u8 pmk[PMK_LEN_MAX]; local 683 if (hexstr2bin(pos, pmk, PMK_LEN) < 0) 694 return wpa_auth_pmksa_create_entry(aa, spa, pmk, pmkid, expiration);
|
H A D | pmksa_cache_auth.c | 261 * @pmk: The new pairwise master key 280 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 287 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len, 300 * @pmk: The new pairwise master key 315 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid, argument 332 os_memcpy(entry->pmk, pmk, pmk_len); 341 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, 405 os_memcpy(entry->pmk, old_entry->pmk, old_entr 279 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | pmksa_cache_auth.h | 20 u8 pmk[PMK_LEN_MAX]; member in struct:rsn_pmksa_cache_entry 51 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 56 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid,
|
H A D | ctrl_iface_ap.c | 658 u8 pmk[PMK_LEN_MAX]; local 683 if (hexstr2bin(pos, pmk, PMK_LEN) < 0) 694 return wpa_auth_pmksa_create_entry(aa, spa, pmk, pmkid, expiration);
|
H A D | pmksa_cache_auth.c | 261 * @pmk: The new pairwise master key 280 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 287 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len, 300 * @pmk: The new pairwise master key 315 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid, argument 332 os_memcpy(entry->pmk, pmk, pmk_len); 341 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, 405 os_memcpy(entry->pmk, old_entry->pmk, old_entr 279 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | pmksa_cache.h | 18 u8 pmk[PMK_LEN_MAX]; member in struct:rsn_pmksa_cache_entry 60 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 75 const u8 *pmk, size_t pmk_len); 124 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument 145 const u8 *pmk, size_t pmk_len) 143 pmksa_cache_flush(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *pmk, size_t pmk_len) argument
|
H A D | pmksa_cache.c | 111 * @pmk: The new pairwise master key 128 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument 144 os_memcpy(entry->pmk, pmk, pmk_len); 153 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, 180 os_memcmp_const(pos->pmk, entry->pmk, 208 pos->pmk, pos->pmk_len); 271 * @pmk: PMK to match for or %NYLL to match all PMKs 275 const u8 *pmk, size_ 274 pmksa_cache_flush(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *pmk, size_t pmk_len) argument [all...] |
H A D | preauth.c | 78 u8 pmk[PMK_LEN]; local 83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 89 res = eapol_sm_get_key(eapol, pmk, 16); 94 pmk, pmk_len); 96 pmksa_cache_add(sm->pmksa, pmk, pmk_len, NULL,
|
H A D | wpa.h | 81 int (*key_mgmt_set_pmk)(void *ctx, const u8 *pmk, size_t pmk_len); 120 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, 191 static inline void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, argument
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | pmksa_cache.h | 18 u8 pmk[PMK_LEN_MAX]; member in struct:rsn_pmksa_cache_entry 60 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 75 const u8 *pmk, size_t pmk_len); 124 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument 145 const u8 *pmk, size_t pmk_len) 143 pmksa_cache_flush(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *pmk, size_t pmk_len) argument
|
H A D | pmksa_cache.c | 111 * @pmk: The new pairwise master key 128 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument 144 os_memcpy(entry->pmk, pmk, pmk_len); 153 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, 180 os_memcmp_const(pos->pmk, entry->pmk, 208 pos->pmk, pos->pmk_len); 271 * @pmk: PMK to match for or %NYLL to match all PMKs 275 const u8 *pmk, size_ 274 pmksa_cache_flush(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *pmk, size_t pmk_len) argument [all...] |
H A D | preauth.c | 78 u8 pmk[PMK_LEN]; local 83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 89 res = eapol_sm_get_key(eapol, pmk, 16); 94 pmk, pmk_len); 96 pmksa_cache_add(sm->pmksa, pmk, pmk_len, NULL,
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | pmksa_cache.h | 18 u8 pmk[PMK_LEN_MAX]; member in struct:rsn_pmksa_cache_entry 60 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 75 const u8 *pmk, size_t pmk_len); 124 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument 145 const u8 *pmk, size_t pmk_len) 143 pmksa_cache_flush(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *pmk, size_t pmk_len) argument
|
H A D | pmksa_cache.c | 111 * @pmk: The new pairwise master key 128 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument 144 os_memcpy(entry->pmk, pmk, pmk_len); 153 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, 180 os_memcmp_const(pos->pmk, entry->pmk, 208 pos->pmk, pos->pmk_len); 271 * @pmk: PMK to match for or %NYLL to match all PMKs 275 const u8 *pmk, size_ 274 pmksa_cache_flush(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *pmk, size_t pmk_len) argument [all...] |
H A D | preauth.c | 78 u8 pmk[PMK_LEN]; local 83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 89 res = eapol_sm_get_key(eapol, pmk, 16); 94 pmk, pmk_len); 96 pmksa_cache_add(sm->pmksa, pmk, pmk_len, NULL,
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | sae.h | 47 u8 pmk[SAE_PMK_LEN]; member in struct:sae_data
|
/external/wpa_supplicant_8/src/common/ |
H A D | sae.h | 47 u8 pmk[SAE_PMK_LEN]; member in struct:sae_data
|
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | sae.h | 47 u8 pmk[SAE_PMK_LEN]; member in struct:sae_data
|
/external/syslinux/gpxe/src/include/gpxe/ |
H A D | wpa.h | 302 u8 pmk[WPA_PMK_LEN]; member in struct:wpa_common_ctx 500 const void *pmk, size_t pmk_len );
|