Home | History | Annotate | Download | only in wpa_supplicant

Lines Matching refs:pmk

337 	u8 pmk[PMK_LEN];
340 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) {
341 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN);
342 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) {
343 printf("WARNING: PMK mismatch\n");
344 wpa_hexdump(MSG_DEBUG, "PMK from AS",
349 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) {
350 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16);
351 if (os_memcmp(pmk, e->authenticator_pmk, 16) != 0) {
352 printf("WARNING: PMK mismatch\n");
353 wpa_hexdump(MSG_DEBUG, "PMK from AS",
650 "to extend PMK to 32 octets");