/external/wpa_supplicant_8/src/ap/ |
peerkey_auth.c | 169 2 + RSN_SELECTOR_LEN + PMK_LEN + WPA_NONCE_LEN + 184 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN, 223 2 + RSN_SELECTOR_LEN + PMK_LEN + WPA_NONCE_LEN + 241 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN, 298 if (random_get_bytes(smk, PMK_LEN)) { 314 sha256_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf), 315 smk, PMK_LEN); 317 sha1_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf), 318 smk, PMK_LEN); 321 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", smk, PMK_LEN); [all...] |
pmksa_cache_auth.h | 26 u8 pmk[PMK_LEN]; 27 size_t pmk_len; member in struct:rsn_pmksa_cache_entry 54 const u8 *pmk, size_t pmk_len,
|
wpa_auth_ft.c | 155 u8 pmk_r0[PMK_LEN]; 165 u8 pmk_r1[PMK_LEN]; 196 os_memset(r0prev->pmk_r0, 0, PMK_LEN); 204 os_memset(r1prev->pmk_r1, 0, PMK_LEN); 225 os_memcpy(r0->pmk_r0, pmk_r0, PMK_LEN); 249 os_memcpy(pmk_r0, r0->pmk_r0, PMK_LEN); 275 os_memcpy(r1->pmk_r1, pmk_r1, PMK_LEN); 299 os_memcpy(pmk_r1, r1->pmk_r1, PMK_LEN); 362 u8 pmk_r0[PMK_LEN], pmk_r0_name[WPA_PMK_NAME_LEN]; 363 u8 pmk_r1[PMK_LEN]; [all...] |
ap_config.h | 99 #define PMK_LEN 32 103 u8 psk[PMK_LEN];
|
preauth_auth.c | 211 if (len > PMK_LEN) 212 len = PMK_LEN;
|
wpa_auth_i.h | 66 u8 PMK[PMK_LEN]; 113 u8 xxkey[PMK_LEN]; /* PSK or the second 256 bits of MSK */
|
/external/wpa_supplicant_8/wpa_supplicant/ |
ibss_rsn.h | 38 u8 psk[PMK_LEN];
|
wpas_glue.c | 230 int res, pmk_len; local 231 u8 pmk[PMK_LEN]; 257 pmk_len = PMK_LEN; 260 u8 buf[2 * PMK_LEN]; 263 res = eapol_sm_get_key(eapol, buf, 2 * PMK_LEN); 265 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN); 272 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 279 pmk_len = 16 [all...] |
eapol_test.c | 67 u8 authenticator_pmk[PMK_LEN]; 339 u8 pmk[PMK_LEN]; 342 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { 343 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); 344 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) { 347 e->authenticator_pmk, PMK_LEN); 670 keys->recv_len > PMK_LEN ? PMK_LEN :
|
/external/wpa_supplicant/ |
config_ssid.h | 45 #define PMK_LEN 32 149 u8 psk[PMK_LEN];
|
pmksa_cache.h | 24 u8 pmk[PMK_LEN]; 25 size_t pmk_len; member in struct:rsn_pmksa_cache_entry 48 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 92 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
|
eapol_test.c | 60 u8 authenticator_pmk[PMK_LEN]; 294 u8 pmk[PMK_LEN]; 297 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { 298 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); 299 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) { 302 e->authenticator_pmk, PMK_LEN); 587 keys->recv_len > PMK_LEN ? PMK_LEN :
|
wpa_i.h | 58 u8 smk[PMK_LEN]; 79 u8 pmk[PMK_LEN]; 80 size_t pmk_len; member in struct:wpa_sm
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
wpa_i.h | 26 u8 pmk[PMK_LEN]; 27 size_t pmk_len; member in struct:wpa_sm 95 u8 xxkey[PMK_LEN]; /* PSK or the second 256 bits of MSK */ 97 u8 pmk_r0[PMK_LEN]; 99 u8 pmk_r1[PMK_LEN];
|
peerkey.h | 29 u8 smk[PMK_LEN];
|
pmksa_cache.h | 24 u8 pmk[PMK_LEN]; 25 size_t pmk_len; member in struct:rsn_pmksa_cache_entry 58 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 102 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver_ps3.c | 40 iwr.u.data.length = PMK_LEN * 2 + 1; 45 for (i = 0; i < PMK_LEN; i++) {
|
/external/wpa_supplicant_8/src/rsn_supp/ |
peerkey.h | 29 u8 smk[PMK_LEN];
|
pmksa_cache.h | 24 u8 pmk[PMK_LEN]; 25 size_t pmk_len; member in struct:rsn_pmksa_cache_entry 58 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 103 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
|
wpa_i.h | 28 u8 pmk[PMK_LEN]; 29 size_t pmk_len; member in struct:wpa_sm 104 u8 xxkey[PMK_LEN]; /* PSK or the second 256 bits of MSK */ 106 u8 pmk_r0[PMK_LEN]; 108 u8 pmk_r1[PMK_LEN];
|
/external/wpa_supplicant_6/wpa_supplicant/src/common/ |
wpa_common.c | 74 * @pmk_len: Length of PMK 93 void wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, 120 sha256_prf(pmk, pmk_len, label, data, sizeof(data), 124 sha1_prf(pmk, pmk_len, label, data, sizeof(data), ptk, 129 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len); 448 os_memcpy(pmk_r0, r0_key_data, PMK_LEN); 455 addr[1] = r0_key_data + PMK_LEN; 512 sha256_prf(pmk_r0, PMK_LEN, "FT-R1", buf, pos - buf, pmk_r1, PMK_LEN); 547 sha256_prf(pmk_r1, PMK_LEN, "FT-PTK", buf, pos - buf, ptk, ptk_len) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
test_wpa.c | 33 u8 psk[PMK_LEN]; 219 wpa_sm_set_pmk(wpa->supp, wpa->psk, PMK_LEN); 364 os_memset(wpa.psk, 0x44, PMK_LEN);
|
/external/wpa_supplicant_8/wpa_supplicant/tests/ |
test_wpa.c | 33 u8 psk[PMK_LEN]; 204 wpa_sm_set_pmk(wpa->supp, wpa->psk, PMK_LEN); 349 os_memset(wpa.psk, 0x44, PMK_LEN);
|
/external/wpa_supplicant_6/wpa_supplicant/ |
eapol_test.c | 65 u8 authenticator_pmk[PMK_LEN]; 337 u8 pmk[PMK_LEN]; 340 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { 341 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); 342 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) { 345 e->authenticator_pmk, PMK_LEN); 642 keys->recv_len > PMK_LEN ? PMK_LEN :
|
/external/wpa_supplicant_8/src/common/ |
wpa_common.c | 74 * @pmk_len: Length of PMK 93 void wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, 120 sha256_prf(pmk, pmk_len, label, data, sizeof(data), 124 sha1_prf(pmk, pmk_len, label, data, sizeof(data), ptk, 131 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len); 588 os_memcpy(pmk_r0, r0_key_data, PMK_LEN); 595 addr[1] = r0_key_data + PMK_LEN; 652 sha256_prf(pmk_r0, PMK_LEN, "FT-R1", buf, pos - buf, pmk_r1, PMK_LEN); 687 sha256_prf(pmk_r1, PMK_LEN, "FT-PTK", buf, pos - buf, ptk, ptk_len) [all...] |