/external/wpa_supplicant_8/src/rsn_supp/ |
pmksa_cache.h | 19 size_t pmk_len; member in struct:rsn_pmksa_cache_entry 69 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 86 const u8 *pmk, size_t pmk_len); 135 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 159 const u8 *pmk, size_t pmk_len)
|
pmksa_cache.c | 114 * @pmk_len: PMK length in bytes, usually PMK_LEN (32) 131 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 139 if (pmk_len > PMK_LEN_MAX) 148 os_memcpy(entry->pmk, pmk, pmk_len); 149 entry->pmk_len = pmk_len; 157 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); 186 if (pos->pmk_len == entry->pmk_len & [all...] |
preauth.c | 78 u8 pmk[PMK_LEN]; 81 int res, pmk_len; local 82 pmk_len = PMK_LEN; 83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 90 pmk_len = 16; 94 pmk, pmk_len); 95 sm->pmk_len = pmk_len; 96 pmksa_cache_add(sm->pmksa, pmk, pmk_len, NULL [all...] |
wpa.c | 55 size_t mic_len = wpa_mic_len(sm->key_mgmt, sm->pmk_len); 202 mic_len = wpa_mic_len(sm->key_mgmt, sm->pmk_len); 252 if (wpa_sm_key_mgmt_set_pmk(sm, sm->pmk, sm->pmk_len)) 289 sm->pmk, sm->pmk_len); 295 sm->pmk_len == PMK_LEN) { 301 os_memcpy(sm->xxkey, sm->pmk, sm->pmk_len); 302 sm->xxkey_len = sm->pmk_len; 307 int res, pmk_len; local 310 pmk_len = PMK_LEN_SUITE_B_192 [all...] |
wpa_i.h | 22 size_t pmk_len; member in struct:wpa_sm 249 size_t pmk_len) 253 cache_id, pmk, pmk_len); 388 const u8 *pmk, size_t pmk_len) 392 return sm->ctx->key_mgmt_set_pmk(sm->ctx->ctx, pmk, pmk_len);
|
wpa.h | 44 const u8 *pmk, size_t pmk_len); 83 int (*key_mgmt_set_pmk)(void *ctx, const u8 *pmk, size_t pmk_len); 124 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, 163 void wpa_sm_pmksa_cache_add(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, 203 size_t pmk_len, const u8 *pmkid,
|
/external/wpa_supplicant_8/src/ap/ |
pmksa_cache_auth.h | 21 size_t pmk_len; member in struct:rsn_pmksa_cache_entry 52 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 57 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid,
|
pmksa_cache_auth.c | 262 * @pmk_len: PMK length in bytes, usually PMK_LEN (32) 280 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 287 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len, 301 * @pmk_len: PMK length in bytes, usually PMK_LEN (32) 315 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid, 323 if (pmk_len > PMK_LEN_MAX) 332 os_memcpy(entry->pmk, pmk, pmk_len); 333 entry->pmk_len = pmk_len [all...] |
wpa_auth.c | 41 static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK, 58 const u8 *pmk, unsigned int pmk_len, 867 size_t pmk_len; local 875 sm->p2p_dev_addr, pmk, &pmk_len, 881 os_memcpy(sm->xxkey, pmk, pmk_len); 882 sm->xxkey_len = pmk_len; 887 pmk_len = sm->pmk_len; 890 if (wpa_derive_ptk(sm, sm->alt_SNonce, pmk, pmk_len, &PTK) < 0) 893 if (wpa_verify_key_mic(sm->wpa_key_mgmt, pmk_len, &PTK 1998 unsigned int pmk_len; local 2759 size_t pmk_len; local [all...] |
ctrl_iface_ap.c | 897 size_t pmk_len; local 925 pmk_len = (pos2 - pos) / 2; 926 if (pmk_len < PMK_LEN || pmk_len > PMK_LEN_MAX || 927 hexstr2bin(pos, pmk, pmk_len) < 0) 935 return wpa_auth_pmksa_add2(hapd->wpa_auth, spa, pmk, pmk_len, 979 if (hexstr2bin(pos, pmk, PMK_LEN) < 0)
|
wpa_auth.h | 77 #define FT_RRB_PMK_R0 8 /* PMK_LEN */ 79 #define FT_RRB_PMK_R1 10 /* PMK_LEN */ 367 unsigned int pmk_len, 377 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 446 size_t pmk_len, const u8 *snonce, const u8 *anonce,
|
wpa_auth_i.h | 61 unsigned int pmk_len; member in struct:wpa_state_machine
|
sta_info.c | 1185 int pmk_len; local [all...] |
ieee802_11.c | 1680 size_t pmk_len = 0; local [all...] |
wpa_auth_glue.c | 259 *psk_len = PMK_LEN; 287 *psk_len = sa->pmk_len; 311 pos->psk, PMK_LEN); [all...] |
dpp_hostapd.c | 626 char hex[PMK_LEN * 2 + 1]; 628 wpa_snprintf_hex(hex, sizeof(hex), auth->psk, PMK_LEN); [all...] |
/external/wpa_supplicant_8/src/common/ |
wpa_common.c | 24 static unsigned int wpa_kck_len(int akmp, size_t pmk_len) 36 return pmk_len / 2; 38 return pmk_len / 2; 60 static unsigned int wpa_kek_len(int akmp, size_t pmk_len) 72 return pmk_len <= 32 ? 16 : 32; 74 return pmk_len <= 32 ? 16 : 32; 96 unsigned int wpa_mic_len(int akmp, size_t pmk_len) 108 return pmk_len / 2; 110 return pmk_len / 2; 329 * @pmk_len: Length of PM [all...] |
wpa_common.h | 14 #define PMK_LEN 32 347 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, 354 size_t dh_ss_len, u8 *pmk, size_t *pmk_len); 357 int fils_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const u8 *spa, const u8 *aa, 413 void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa, 488 unsigned int wpa_mic_len(int akmp, size_t pmk_len);
|
dpp.h | 233 u8 psk[PMK_LEN]; 259 size_t pmk_len; member in struct:dpp_introduction
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpas_glue.c | 275 int res, pmk_len; local 276 u8 pmk[PMK_LEN]; 308 pmk_len = PMK_LEN; 311 u8 buf[2 * PMK_LEN]; 314 res = eapol_sm_get_key(eapol, buf, 2 * PMK_LEN); 316 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN); 323 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 330 pmk_len = 16 [all...] |
preauth_test.c | 149 const u8 *pmk, size_t pmk_len)
|
dpp_supplicant.c | 869 os_memcpy(ssid->psk, auth->psk, PMK_LEN); [all...] |
ctrl_iface.c | [all...] |
/external/wpa_supplicant_8/hostapd/ |
ctrl_iface.c | 1218 char hex[PMK_LEN * 2 + 1]; 1220 hapd->conf->ssid.wpa_psk->psk, PMK_LEN); 1497 int pmk_len; local [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver.h | 2132 size_t pmk_len; member in struct:wpa_pmkid_params [all...] |