Lines Matching refs:PMK
425 wpa_printf(MSG_ERROR, "FT PMK cache initialization failed.");
1555 wpa_printf(MSG_DEBUG, "WPA: PMK from PMKSA cache");
1556 os_memcpy(sm->PMK, sm->pmksa->pmk, PMK_LEN);
1558 wpa_printf(MSG_DEBUG, "WPA: PMK from EAPOL state machine "
1560 os_memcpy(sm->PMK, msk, PMK_LEN);
1568 wpa_printf(MSG_DEBUG, "WPA: Could not get PMK");
1576 * state and takes PMK from the previously used AAA Key. This will
1577 * eventually fail in 4-Way Handshake because Supplicant uses PMK
1590 os_memcpy(sm->PMK, psk, PMK_LEN);
1637 rsn_pmkid(sm->PMK, PMK_LEN, sm->wpa_auth->addr,
1648 static int wpa_derive_ptk(struct wpa_state_machine *sm, const u8 *pmk,
1654 return wpa_auth_derive_ptk_ft(sm, pmk, ptk, ptk_len);
1657 wpa_pmk_to_ptk(pmk, PMK_LEN, "Pairwise key expansion",
1670 const u8 *pmk = NULL;
1675 /* WPA with IEEE 802.1X: use the derived PMK from EAP
1680 pmk = wpa_auth_get_psk(sm->wpa_auth, sm->addr, pmk);
1681 if (pmk == NULL)
1684 pmk = sm->PMK;
1686 wpa_derive_ptk(sm, pmk, &PTK);
1732 os_memcpy(sm->PMK, pmk, PMK_LEN);
2731 int wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk,
2738 if (pmksa_cache_auth_add(sm->wpa_auth->pmksa, pmk, PMK_LEN,
2748 const u8 *pmk, size_t len, const u8 *sta_addr,
2755 if (pmksa_cache_auth_add(wpa_auth->pmksa, pmk, len, wpa_auth->addr,