HomeSort by relevance Sort by last modified time
    Searched refs:PMK_LEN (Results 26 - 50 of 61) sorted by null

12 3

  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
peerkey.c 325 hmac_sha256_vector(smk, PMK_LEN, 5, addr, len, hash);
328 hmac_sha1_vector(smk, PMK_LEN, 5, addr, len, hash);
451 if (os_memcmp(kde->smk + PMK_LEN, peerkey->pnonce, WPA_NONCE_LEN) != 0)
493 if (os_memcmp(kde->smk + PMK_LEN, peerkey->inonce, WPA_NONCE_LEN) != 0)
548 kde.smk == NULL || kde.smk_len < PMK_LEN + WPA_NONCE_LEN ||
578 os_memcpy(peerkey->smk, kde.smk, PMK_LEN);
580 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", peerkey->smk, PMK_LEN);
709 wpa_pmk_to_ptk(peerkey->smk, PMK_LEN, "Peer key expansion",
942 wpa_pmk_to_ptk(peerkey->smk, PMK_LEN, "Peer key expansion",
    [all...]
preauth.c 87 u8 pmk[PMK_LEN];
90 int res, pmk_len; local
91 pmk_len = PMK_LEN;
92 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
99 pmk_len = 16;
103 pmk, pmk_len);
104 sm->pmk_len = pmk_len;
105 pmksa_cache_add(sm->pmksa, pmk, pmk_len,
    [all...]
wpa.c 218 sm->pmk, sm->pmk_len);
224 int res, pmk_len; local
225 pmk_len = PMK_LEN;
226 res = eapol_sm_get_key(sm->eapol, sm->pmk, PMK_LEN);
233 pmk_len = 16;
236 u8 buf[2 * PMK_LEN];
237 if (eapol_sm_get_key(sm->eapol, buf, 2 * PMK_LEN) == 0)
239 os_memcpy(sm->xxkey, buf + PMK_LEN, PMK_LEN);
    [all...]
wpa_ft.c 44 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R0", sm->pmk_r0, PMK_LEN);
49 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", sm->pmk_r1, PMK_LEN);
543 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", sm->pmk_r1, PMK_LEN);
pmksa_cache.c 44 * @pmk_len: Length of pmk in bytes
52 static void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa,
66 hmac_sha256_vector(pmk, pmk_len, 3, addr, len, hash);
69 hmac_sha1_vector(pmk, pmk_len, 3, addr, len, hash);
151 * @pmk_len: PMK length in bytes, usually PMK_LEN (32)
164 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
170 if (pmksa->sm->proto != WPA_PROTO_RSN || pmk_len > PMK_LEN)
176 os_memcpy(entry->pmk, pmk, pmk_len);
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
peerkey.c 326 hmac_sha256_vector(smk, PMK_LEN, 5, addr, len, hash);
329 hmac_sha1_vector(smk, PMK_LEN, 5, addr, len, hash);
452 if (os_memcmp(kde->smk + PMK_LEN, peerkey->pnonce, WPA_NONCE_LEN) != 0)
494 if (os_memcmp(kde->smk + PMK_LEN, peerkey->inonce, WPA_NONCE_LEN) != 0)
549 kde.smk == NULL || kde.smk_len < PMK_LEN + WPA_NONCE_LEN ||
579 os_memcpy(peerkey->smk, kde.smk, PMK_LEN);
581 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", peerkey->smk, PMK_LEN);
712 wpa_pmk_to_ptk(peerkey->smk, PMK_LEN, "Peer key expansion",
945 wpa_pmk_to_ptk(peerkey->smk, PMK_LEN, "Peer key expansion",
    [all...]
preauth.c 84 u8 pmk[PMK_LEN];
87 int res, pmk_len; local
88 pmk_len = PMK_LEN;
89 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
96 pmk_len = 16;
100 pmk, pmk_len);
101 sm->pmk_len = pmk_len;
102 pmksa_cache_add(sm->pmksa, pmk, pmk_len,
    [all...]
wpa.c 170 sm->pmk, sm->pmk_len);
176 int res, pmk_len; local
177 pmk_len = PMK_LEN;
178 res = eapol_sm_get_key(sm->eapol, sm->pmk, PMK_LEN);
185 pmk_len = 16;
188 u8 buf[2 * PMK_LEN];
189 if (eapol_sm_get_key(sm->eapol, buf, 2 * PMK_LEN) == 0)
191 os_memcpy(sm->xxkey, buf + PMK_LEN, PMK_LEN);
    [all...]
wpa_ft.c 70 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R0", sm->pmk_r0, PMK_LEN);
75 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", sm->pmk_r1, PMK_LEN);
662 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", sm->pmk_r1, PMK_LEN);
  /external/wpa_supplicant/
preauth.c 88 u8 pmk[PMK_LEN];
91 int res, pmk_len; local
92 pmk_len = PMK_LEN;
93 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
100 pmk_len = 16;
104 pmk, pmk_len);
105 sm->pmk_len = pmk_len;
106 pmksa_cache_add(sm->pmksa, pmk, pmk_len,
    [all...]
config.c 351 if (hexstr2bin(value, ssid->psk, PMK_LEN) ||
352 value[PMK_LEN * 2] != '\0') {
362 wpa_hexdump_key(MSG_MSGDUMP, "PSK", ssid->psk, PMK_LEN);
376 return wpa_config_write_string_hex(ssid->psk, PMK_LEN);
    [all...]
wpa.c 861 * @pmk_len: Length of PMK
879 static void wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len,
903 sha1_prf(pmk, pmk_len, label, data, sizeof(data), ptk, ptk_len);
905 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len);
1374 int res, pmk_len; local
    [all...]
pmksa_cache.c 45 * @pmk_len: Length of pmk in bytes
52 static void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa,
64 hmac_sha1_vector(pmk, pmk_len, 3, addr, len, hash);
146 * @pmk_len: PMK length in bytes, usually PMK_LEN (32)
158 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
164 if (pmksa->sm->proto != WPA_PROTO_RSN || pmk_len > PMK_LEN)
170 os_memcpy(entry->pmk, pmk, pmk_len);
171 entry->pmk_len = pmk_len
    [all...]
  /external/wpa_supplicant_8/src/ap/
ap_config.c 246 if (len == 64 && hexstr2bin(pos, psk->psk, PMK_LEN) == 0)
250 4096, psk->psk, PMK_LEN);
285 4096, ssid->wpa_psk->psk, PMK_LEN);
287 ssid->wpa_psk->psk, PMK_LEN);
wpa_auth.h 75 u8 pmk_r1[PMK_LEN];
94 u8 pmk_r1[PMK_LEN];
wps_hostapd.c 99 if (psk_len != PMK_LEN) {
110 os_memcpy(p->psk, psk, PMK_LEN);
117 char hex[PMK_LEN * 2 + 1];
815 wps->network_key = os_malloc(2 * PMK_LEN + 1);
820 wpa_snprintf_hex((char *) wps->network_key, 2 * PMK_LEN + 1,
821 conf->ssid.wpa_psk->psk, PMK_LEN);
822 wps->network_key_len = 2 * PMK_LEN;
835 os_memcpy(wps->psk, conf->ssid.wpa_psk->psk, PMK_LEN);
    [all...]
wpa_auth.c     [all...]
pmksa_cache_auth.c 221 * @pmk_len: PMK length in bytes, usually PMK_LEN (32)
236 const u8 *pmk, size_t pmk_len,
243 if (pmk_len > PMK_LEN)
249 os_memcpy(entry->pmk, pmk, pmk_len);
250 entry->pmk_len = pmk_len;
251 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid,
294 os_memcpy(entry->pmk, old_entry->pmk, old_entry->pmk_len);
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/
wpas_glue.c 226 int res, pmk_len; local
227 u8 pmk[PMK_LEN];
253 pmk_len = PMK_LEN;
254 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
261 pmk_len = 16;
271 pmk_len)) {
config.c 382 if (hexstr2bin(value, ssid->psk, PMK_LEN) ||
383 value[PMK_LEN * 2] != '\0') {
393 wpa_hexdump_key(MSG_MSGDUMP, "PSK", ssid->psk, PMK_LEN);
408 return wpa_config_write_string_hex(ssid->psk, PMK_LEN);
    [all...]
wps_supplicant.c 344 if (cred->key_len == 2 * PMK_LEN) {
346 PMK_LEN)) {
352 } else if (cred->key_len >= 8 && cred->key_len < 2 * PMK_LEN) {
  /external/wpa_supplicant_6/wpa_supplicant/src/common/
wpa_common.h 22 #define PMK_LEN 32
294 void wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label,
  /external/wpa_supplicant_8/wpa_supplicant/
ibss_rsn.c 202 wpa_sm_set_pmk(peer->supp, psk, PMK_LEN);
603 os_memcpy(ibss_rsn->psk, psk, PMK_LEN);
config.c 389 if (hexstr2bin(value, ssid->psk, PMK_LEN) ||
390 value[PMK_LEN * 2] != '\0') {
400 wpa_hexdump_key(MSG_MSGDUMP, "PSK", ssid->psk, PMK_LEN);
415 return wpa_config_write_string_hex(ssid->psk, PMK_LEN);
    [all...]
  /external/wpa_supplicant_8/src/common/
wpa_common.h 22 #define PMK_LEN 32
308 void wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label,
351 void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa,

Completed in 527 milliseconds

12 3