HomeSort by relevance Sort by last modified time
    Searched defs:pmk (Results 1 - 9 of 9) sorted by null

  /external/wpa_supplicant/
pmksa_cache.h 24 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry
48 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
92 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
preauth.c 88 u8 pmk[PMK_LEN]; local
93 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
97 * uses only 16-byte PMK.
99 res = eapol_sm_get_key(eapol, pmk, 16);
103 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from pre-auth",
104 pmk, pmk_len);
106 pmksa_cache_add(sm->pmksa, pmk, pmk_len,
eapol_test.c 294 u8 pmk[PMK_LEN]; local
297 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) {
298 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN);
299 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) {
300 printf("WARNING: PMK mismatch\n");
301 wpa_hexdump(MSG_DEBUG, "PMK from AS",
306 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) {
307 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16)
    [all...]
wpa_i.h 79 u8 pmk[PMK_LEN]; member in struct:wpa_sm
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
pmksa_cache.h 24 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry
58 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
102 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
preauth.c 87 u8 pmk[PMK_LEN]; local
92 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
96 * uses only 16-byte PMK.
98 res = eapol_sm_get_key(eapol, pmk, 16);
102 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from pre-auth",
103 pmk, pmk_len);
105 pmksa_cache_add(sm->pmksa, pmk, pmk_len,
wpa_i.h 26 u8 pmk[PMK_LEN]; member in struct:wpa_sm
  /external/wpa_supplicant_6/wpa_supplicant/
wpas_glue.c 227 u8 pmk[PMK_LEN]; local
250 wpa_printf(MSG_DEBUG, "Configure PMK for driver-based RSN 4-way "
254 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
258 * uses only 16-byte PMK.
260 res = eapol_sm_get_key(eapol, pmk, 16);
265 wpa_printf(MSG_DEBUG, "Failed to get PMK from EAPOL state "
270 if (wpa_drv_set_key(wpa_s, WPA_ALG_PMK, NULL, 0, 0, NULL, 0, pmk,
272 wpa_printf(MSG_DEBUG, "Failed to set PMK to the driver");
eapol_test.c 337 u8 pmk[PMK_LEN]; local
340 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) {
341 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN);
342 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) {
343 printf("WARNING: PMK mismatch\n");
344 wpa_hexdump(MSG_DEBUG, "PMK from AS",
349 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) {
350 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16)
    [all...]

Completed in 115 milliseconds