/external/wpa_supplicant/ |
pmksa_cache.h | 24 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry 48 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 92 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
|
preauth.c | 88 u8 pmk[PMK_LEN]; local 93 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 97 * uses only 16-byte PMK. 99 res = eapol_sm_get_key(eapol, pmk, 16); 103 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from pre-auth", 104 pmk, pmk_len); 106 pmksa_cache_add(sm->pmksa, pmk, pmk_len,
|
eapol_test.c | 294 u8 pmk[PMK_LEN]; local 297 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { 298 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); 299 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) { 300 printf("WARNING: PMK mismatch\n"); 301 wpa_hexdump(MSG_DEBUG, "PMK from AS", 306 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) { 307 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16) [all...] |
wpa_i.h | 79 u8 pmk[PMK_LEN]; member in struct:wpa_sm
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
pmksa_cache.h | 24 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry 58 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 102 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
|
preauth.c | 87 u8 pmk[PMK_LEN]; local 92 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 96 * uses only 16-byte PMK. 98 res = eapol_sm_get_key(eapol, pmk, 16); 102 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from pre-auth", 103 pmk, pmk_len); 105 pmksa_cache_add(sm->pmksa, pmk, pmk_len,
|
wpa_i.h | 26 u8 pmk[PMK_LEN]; member in struct:wpa_sm
|
/external/wpa_supplicant_6/wpa_supplicant/ |
wpas_glue.c | 227 u8 pmk[PMK_LEN]; local 250 wpa_printf(MSG_DEBUG, "Configure PMK for driver-based RSN 4-way " 254 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 258 * uses only 16-byte PMK. 260 res = eapol_sm_get_key(eapol, pmk, 16); 265 wpa_printf(MSG_DEBUG, "Failed to get PMK from EAPOL state " 270 if (wpa_drv_set_key(wpa_s, WPA_ALG_PMK, NULL, 0, 0, NULL, 0, pmk, 272 wpa_printf(MSG_DEBUG, "Failed to set PMK to the driver");
|
eapol_test.c | 337 u8 pmk[PMK_LEN]; local 340 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { 341 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); 342 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) { 343 printf("WARNING: PMK mismatch\n"); 344 wpa_hexdump(MSG_DEBUG, "PMK from AS", 349 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) { 350 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16) [all...] |