/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
peerkey.c | 325 hmac_sha256_vector(smk, PMK_LEN, 5, addr, len, hash); 328 hmac_sha1_vector(smk, PMK_LEN, 5, addr, len, hash); 451 if (os_memcmp(kde->smk + PMK_LEN, peerkey->pnonce, WPA_NONCE_LEN) != 0) 493 if (os_memcmp(kde->smk + PMK_LEN, peerkey->inonce, WPA_NONCE_LEN) != 0) 548 kde.smk == NULL || kde.smk_len < PMK_LEN + WPA_NONCE_LEN || 578 os_memcpy(peerkey->smk, kde.smk, PMK_LEN); 580 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", peerkey->smk, PMK_LEN); 709 wpa_pmk_to_ptk(peerkey->smk, PMK_LEN, "Peer key expansion", 942 wpa_pmk_to_ptk(peerkey->smk, PMK_LEN, "Peer key expansion", [all...] |
preauth.c | 87 u8 pmk[PMK_LEN]; 90 int res, pmk_len; local 91 pmk_len = PMK_LEN; 92 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 99 pmk_len = 16; 103 pmk, pmk_len); 104 sm->pmk_len = pmk_len; 105 pmksa_cache_add(sm->pmksa, pmk, pmk_len, [all...] |
wpa.c | 218 sm->pmk, sm->pmk_len); 224 int res, pmk_len; local 225 pmk_len = PMK_LEN; 226 res = eapol_sm_get_key(sm->eapol, sm->pmk, PMK_LEN); 233 pmk_len = 16; 236 u8 buf[2 * PMK_LEN]; 237 if (eapol_sm_get_key(sm->eapol, buf, 2 * PMK_LEN) == 0) 239 os_memcpy(sm->xxkey, buf + PMK_LEN, PMK_LEN); [all...] |
wpa_ft.c | 44 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R0", sm->pmk_r0, PMK_LEN); 49 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", sm->pmk_r1, PMK_LEN); 543 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", sm->pmk_r1, PMK_LEN);
|
pmksa_cache.c | 44 * @pmk_len: Length of pmk in bytes 52 static void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, 66 hmac_sha256_vector(pmk, pmk_len, 3, addr, len, hash); 69 hmac_sha1_vector(pmk, pmk_len, 3, addr, len, hash); 151 * @pmk_len: PMK length in bytes, usually PMK_LEN (32) 164 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 170 if (pmksa->sm->proto != WPA_PROTO_RSN || pmk_len > PMK_LEN) 176 os_memcpy(entry->pmk, pmk, pmk_len); [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
peerkey.c | 326 hmac_sha256_vector(smk, PMK_LEN, 5, addr, len, hash); 329 hmac_sha1_vector(smk, PMK_LEN, 5, addr, len, hash); 452 if (os_memcmp(kde->smk + PMK_LEN, peerkey->pnonce, WPA_NONCE_LEN) != 0) 494 if (os_memcmp(kde->smk + PMK_LEN, peerkey->inonce, WPA_NONCE_LEN) != 0) 549 kde.smk == NULL || kde.smk_len < PMK_LEN + WPA_NONCE_LEN || 579 os_memcpy(peerkey->smk, kde.smk, PMK_LEN); 581 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", peerkey->smk, PMK_LEN); 712 wpa_pmk_to_ptk(peerkey->smk, PMK_LEN, "Peer key expansion", 945 wpa_pmk_to_ptk(peerkey->smk, PMK_LEN, "Peer key expansion", [all...] |
preauth.c | 84 u8 pmk[PMK_LEN]; 87 int res, pmk_len; local 88 pmk_len = PMK_LEN; 89 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 96 pmk_len = 16; 100 pmk, pmk_len); 101 sm->pmk_len = pmk_len; 102 pmksa_cache_add(sm->pmksa, pmk, pmk_len, [all...] |
wpa.c | 170 sm->pmk, sm->pmk_len); 176 int res, pmk_len; local 177 pmk_len = PMK_LEN; 178 res = eapol_sm_get_key(sm->eapol, sm->pmk, PMK_LEN); 185 pmk_len = 16; 188 u8 buf[2 * PMK_LEN]; 189 if (eapol_sm_get_key(sm->eapol, buf, 2 * PMK_LEN) == 0) 191 os_memcpy(sm->xxkey, buf + PMK_LEN, PMK_LEN); [all...] |
wpa_ft.c | 70 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R0", sm->pmk_r0, PMK_LEN); 75 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", sm->pmk_r1, PMK_LEN); 662 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", sm->pmk_r1, PMK_LEN);
|
/external/wpa_supplicant/ |
preauth.c | 88 u8 pmk[PMK_LEN]; 91 int res, pmk_len; local 92 pmk_len = PMK_LEN; 93 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 100 pmk_len = 16; 104 pmk, pmk_len); 105 sm->pmk_len = pmk_len; 106 pmksa_cache_add(sm->pmksa, pmk, pmk_len, [all...] |
config.c | 351 if (hexstr2bin(value, ssid->psk, PMK_LEN) || 352 value[PMK_LEN * 2] != '\0') { 362 wpa_hexdump_key(MSG_MSGDUMP, "PSK", ssid->psk, PMK_LEN); 376 return wpa_config_write_string_hex(ssid->psk, PMK_LEN); [all...] |
wpa.c | 861 * @pmk_len: Length of PMK 879 static void wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, 903 sha1_prf(pmk, pmk_len, label, data, sizeof(data), ptk, ptk_len); 905 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len); 1374 int res, pmk_len; local [all...] |
pmksa_cache.c | 45 * @pmk_len: Length of pmk in bytes 52 static void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, 64 hmac_sha1_vector(pmk, pmk_len, 3, addr, len, hash); 146 * @pmk_len: PMK length in bytes, usually PMK_LEN (32) 158 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 164 if (pmksa->sm->proto != WPA_PROTO_RSN || pmk_len > PMK_LEN) 170 os_memcpy(entry->pmk, pmk, pmk_len); 171 entry->pmk_len = pmk_len [all...] |
/external/wpa_supplicant_8/src/ap/ |
ap_config.c | 246 if (len == 64 && hexstr2bin(pos, psk->psk, PMK_LEN) == 0) 250 4096, psk->psk, PMK_LEN); 285 4096, ssid->wpa_psk->psk, PMK_LEN); 287 ssid->wpa_psk->psk, PMK_LEN);
|
wpa_auth.h | 75 u8 pmk_r1[PMK_LEN]; 94 u8 pmk_r1[PMK_LEN];
|
wps_hostapd.c | 99 if (psk_len != PMK_LEN) { 110 os_memcpy(p->psk, psk, PMK_LEN); 117 char hex[PMK_LEN * 2 + 1]; 815 wps->network_key = os_malloc(2 * PMK_LEN + 1); 820 wpa_snprintf_hex((char *) wps->network_key, 2 * PMK_LEN + 1, 821 conf->ssid.wpa_psk->psk, PMK_LEN); 822 wps->network_key_len = 2 * PMK_LEN; 835 os_memcpy(wps->psk, conf->ssid.wpa_psk->psk, PMK_LEN); [all...] |
wpa_auth.c | [all...] |
pmksa_cache_auth.c | 221 * @pmk_len: PMK length in bytes, usually PMK_LEN (32) 236 const u8 *pmk, size_t pmk_len, 243 if (pmk_len > PMK_LEN) 249 os_memcpy(entry->pmk, pmk, pmk_len); 250 entry->pmk_len = pmk_len; 251 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, 294 os_memcpy(entry->pmk, old_entry->pmk, old_entry->pmk_len); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/ |
wpas_glue.c | 226 int res, pmk_len; local 227 u8 pmk[PMK_LEN]; 253 pmk_len = PMK_LEN; 254 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 261 pmk_len = 16; 271 pmk_len)) {
|
config.c | 382 if (hexstr2bin(value, ssid->psk, PMK_LEN) || 383 value[PMK_LEN * 2] != '\0') { 393 wpa_hexdump_key(MSG_MSGDUMP, "PSK", ssid->psk, PMK_LEN); 408 return wpa_config_write_string_hex(ssid->psk, PMK_LEN); [all...] |
wps_supplicant.c | 344 if (cred->key_len == 2 * PMK_LEN) { 346 PMK_LEN)) { 352 } else if (cred->key_len >= 8 && cred->key_len < 2 * PMK_LEN) {
|
/external/wpa_supplicant_6/wpa_supplicant/src/common/ |
wpa_common.h | 22 #define PMK_LEN 32 294 void wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label,
|
/external/wpa_supplicant_8/wpa_supplicant/ |
ibss_rsn.c | 202 wpa_sm_set_pmk(peer->supp, psk, PMK_LEN); 603 os_memcpy(ibss_rsn->psk, psk, PMK_LEN);
|
config.c | 389 if (hexstr2bin(value, ssid->psk, PMK_LEN) || 390 value[PMK_LEN * 2] != '\0') { 400 wpa_hexdump_key(MSG_MSGDUMP, "PSK", ssid->psk, PMK_LEN); 415 return wpa_config_write_string_hex(ssid->psk, PMK_LEN); [all...] |
/external/wpa_supplicant_8/src/common/ |
wpa_common.h | 22 #define PMK_LEN 32 308 void wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, 351 void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa,
|