HomeSort by relevance Sort by last modified time
    Searched refs:PMK_LEN (Results 1 - 25 of 55) sorted by null

1 2 3

  /external/wpa_supplicant_8/src/ap/
peerkey_auth.c 163 2 + RSN_SELECTOR_LEN + PMK_LEN + WPA_NONCE_LEN +
178 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN,
217 2 + RSN_SELECTOR_LEN + PMK_LEN + WPA_NONCE_LEN +
235 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN,
292 if (random_get_bytes(smk, PMK_LEN)) {
308 sha256_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf),
309 smk, PMK_LEN);
311 sha1_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf),
312 smk, PMK_LEN);
315 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", smk, PMK_LEN);
    [all...]
pmksa_cache_auth.h 20 u8 pmk[PMK_LEN];
21 size_t pmk_len; member in struct:rsn_pmksa_cache_entry
48 const u8 *pmk, size_t pmk_len,
wpa_auth_ft.c 126 u8 pmk_r0[PMK_LEN];
136 u8 pmk_r1[PMK_LEN];
167 os_memset(r0prev->pmk_r0, 0, PMK_LEN);
175 os_memset(r1prev->pmk_r1, 0, PMK_LEN);
196 os_memcpy(r0->pmk_r0, pmk_r0, PMK_LEN);
220 os_memcpy(pmk_r0, r0->pmk_r0, PMK_LEN);
246 os_memcpy(r1->pmk_r1, pmk_r1, PMK_LEN);
270 os_memcpy(pmk_r1, r1->pmk_r1, PMK_LEN);
333 u8 pmk_r0[PMK_LEN], pmk_r0_name[WPA_PMK_NAME_LEN];
334 u8 pmk_r1[PMK_LEN];
    [all...]
ieee802_11_auth.c 39 u8 psk[PMK_LEN];
91 os_memcpy(psk, entry->psk, PMK_LEN);
233 os_memset(psk, 0, PMK_LEN);
488 cache->psk, PMK_LEN);
ap_config.h 93 #define PMK_LEN 32
97 u8 psk[PMK_LEN];
preauth_auth.c 205 if (len > PMK_LEN)
206 len = PMK_LEN;
wpa_auth_i.h 60 u8 PMK[PMK_LEN];
110 u8 xxkey[PMK_LEN]; /* PSK or the second 256 bits of MSK */
  /external/wpa_supplicant_8/wpa_supplicant/
ibss_rsn.h 32 u8 psk[PMK_LEN];
wpas_glue.c 223 int res, pmk_len; local
224 u8 pmk[PMK_LEN];
250 pmk_len = PMK_LEN;
253 u8 buf[2 * PMK_LEN];
256 res = eapol_sm_get_key(eapol, buf, 2 * PMK_LEN);
258 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN);
265 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
272 pmk_len = 16
    [all...]
eapol_test.c 62 u8 authenticator_pmk[PMK_LEN];
335 u8 pmk[PMK_LEN];
338 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) {
339 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN);
340 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) {
343 e->authenticator_pmk, PMK_LEN);
685 keys->recv_len > PMK_LEN ? PMK_LEN :
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
wpa_i.h 26 u8 pmk[PMK_LEN];
27 size_t pmk_len; member in struct:wpa_sm
95 u8 xxkey[PMK_LEN]; /* PSK or the second 256 bits of MSK */
97 u8 pmk_r0[PMK_LEN];
99 u8 pmk_r1[PMK_LEN];
peerkey.h 29 u8 smk[PMK_LEN];
pmksa_cache.h 24 u8 pmk[PMK_LEN];
25 size_t pmk_len; member in struct:rsn_pmksa_cache_entry
58 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
102 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
peerkey.c 325 hmac_sha256_vector(smk, PMK_LEN, 5, addr, len, hash);
328 hmac_sha1_vector(smk, PMK_LEN, 5, addr, len, hash);
451 if (os_memcmp(kde->smk + PMK_LEN, peerkey->pnonce, WPA_NONCE_LEN) != 0)
493 if (os_memcmp(kde->smk + PMK_LEN, peerkey->inonce, WPA_NONCE_LEN) != 0)
548 kde.smk == NULL || kde.smk_len < PMK_LEN + WPA_NONCE_LEN ||
578 os_memcpy(peerkey->smk, kde.smk, PMK_LEN);
580 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", peerkey->smk, PMK_LEN);
709 wpa_pmk_to_ptk(peerkey->smk, PMK_LEN, "Peer key expansion",
942 wpa_pmk_to_ptk(peerkey->smk, PMK_LEN, "Peer key expansion",
    [all...]
preauth.c 87 u8 pmk[PMK_LEN];
90 int res, pmk_len; local
91 pmk_len = PMK_LEN;
92 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
99 pmk_len = 16;
103 pmk, pmk_len);
104 sm->pmk_len = pmk_len;
105 pmksa_cache_add(sm->pmksa, pmk, pmk_len,
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/drivers/
driver_ps3.c 40 iwr.u.data.length = PMK_LEN * 2 + 1;
45 for (i = 0; i < PMK_LEN; i++) {
  /external/wpa_supplicant_8/src/rsn_supp/
peerkey.h 23 u8 smk[PMK_LEN];
pmksa_cache.h 18 u8 pmk[PMK_LEN];
19 size_t pmk_len; member in struct:rsn_pmksa_cache_entry
53 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
99 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
wpa_i.h 22 u8 pmk[PMK_LEN];
23 size_t pmk_len; member in struct:wpa_sm
107 u8 xxkey[PMK_LEN]; /* PSK or the second 256 bits of MSK */
109 u8 pmk_r0[PMK_LEN];
111 u8 pmk_r1[PMK_LEN];
peerkey.c 320 hmac_sha256_vector(smk, PMK_LEN, 5, addr, len, hash);
323 hmac_sha1_vector(smk, PMK_LEN, 5, addr, len, hash);
446 if (os_memcmp(kde->smk + PMK_LEN, peerkey->pnonce, WPA_NONCE_LEN) != 0)
488 if (os_memcmp(kde->smk + PMK_LEN, peerkey->inonce, WPA_NONCE_LEN) != 0)
543 kde.smk == NULL || kde.smk_len < PMK_LEN + WPA_NONCE_LEN ||
573 os_memcpy(peerkey->smk, kde.smk, PMK_LEN);
575 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", peerkey->smk, PMK_LEN);
706 wpa_pmk_to_ptk(peerkey->smk, PMK_LEN, "Peer key expansion",
939 wpa_pmk_to_ptk(peerkey->smk, PMK_LEN, "Peer key expansion",
    [all...]
preauth.c 77 u8 pmk[PMK_LEN];
80 int res, pmk_len; local
81 pmk_len = PMK_LEN;
82 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
89 pmk_len = 16;
93 pmk, pmk_len);
94 sm->pmk_len = pmk_len;
95 pmksa_cache_add(sm->pmksa, pmk, pmk_len,
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/common/
wpa_common.c 74 * @pmk_len: Length of PMK
93 void wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label,
120 sha256_prf(pmk, pmk_len, label, data, sizeof(data),
124 sha1_prf(pmk, pmk_len, label, data, sizeof(data), ptk,
129 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len);
448 os_memcpy(pmk_r0, r0_key_data, PMK_LEN);
455 addr[1] = r0_key_data + PMK_LEN;
512 sha256_prf(pmk_r0, PMK_LEN, "FT-R1", buf, pos - buf, pmk_r1, PMK_LEN);
547 sha256_prf(pmk_r1, PMK_LEN, "FT-PTK", buf, pos - buf, ptk, ptk_len)
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/tests/
test_wpa.c 33 u8 psk[PMK_LEN];
219 wpa_sm_set_pmk(wpa->supp, wpa->psk, PMK_LEN);
364 os_memset(wpa.psk, 0x44, PMK_LEN);
  /external/wpa_supplicant_8/wpa_supplicant/tests/
test_wpa.c 27 u8 psk[PMK_LEN];
198 wpa_sm_set_pmk(wpa->supp, wpa->psk, PMK_LEN);
343 os_memset(wpa.psk, 0x44, PMK_LEN);
  /external/wpa_supplicant_6/wpa_supplicant/
eapol_test.c 65 u8 authenticator_pmk[PMK_LEN];
337 u8 pmk[PMK_LEN];
340 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) {
341 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN);
342 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) {
345 e->authenticator_pmk, PMK_LEN);
642 keys->recv_len > PMK_LEN ? PMK_LEN :

Completed in 3730 milliseconds

1 2 3