HomeSort by relevance Sort by last modified time
    Searched refs:pmk (Results 1 - 25 of 26) sorted by null

1 2

  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
pmksa_cache.h 24 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry
58 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
102 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
pmksa_cache.c 42 * rsn_pmkid - Calculate PMK identifier
43 * @pmk: Pairwise master key
44 * @pmk_len: Length of pmk in bytes
50 * PMKID = HMAC-SHA1-128(PMK, "PMK Name" || AA || SPA)
52 static void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa,
55 char *title = "PMK Name";
66 hmac_sha256_vector(pmk, pmk_len, 3, addr, len, hash);
69 hmac_sha1_vector(pmk, pmk_len, 3, addr, len, hash);
150 * @pmk: The new pairwise master ke
    [all...]
preauth.c 87 u8 pmk[PMK_LEN]; local
92 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
96 * uses only 16-byte PMK.
98 res = eapol_sm_get_key(eapol, pmk, 16);
102 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from pre-auth",
103 pmk, pmk_len);
105 pmksa_cache_add(sm->pmksa, pmk, pmk_len,
wpa.c 217 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from PMKSA cache",
218 sm->pmk, sm->pmk_len);
226 res = eapol_sm_get_key(sm->eapol, sm->pmk, PMK_LEN);
230 * uses only 16-byte PMK.
232 res = eapol_sm_get_key(sm->eapol, sm->pmk, 16);
246 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK from EAPOL state "
247 "machines", sm->pmk, pmk_len);
249 pmksa_cache_add(sm->pmksa, sm->pmk, pmk_len, src_addr,
254 wpa_printf(MSG_DEBUG, "RSN: the new PMK "
368 wpa_pmk_to_ptk(sm->pmk, sm->pmk_len, "Pairwise key expansion"
    [all...]
wpa.h 97 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len);
150 static inline void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk,
wpa_i.h 26 u8 pmk[PMK_LEN]; member in struct:wpa_sm
  /external/wpa_supplicant_8/src/rsn_supp/
pmksa_cache.h 18 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry
53 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
99 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
pmksa_cache.c 110 * @pmk: The new pairwise master key
111 * @pmk_len: PMK length in bytes, usually PMK_LEN (32)
114 * @network_ctx: Network configuration context for this PMK
118 * This function create a PMKSA entry for a new PMK and adds it to the PMKSA
121 * based on the PMK and the driver interface is notified of the new PMKID.
124 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
136 os_memcpy(entry->pmk, pmk, pmk_len);
138 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid,
155 os_memcmp(pos->pmk, pmk, pmk_len) == 0 &
    [all...]
preauth.c 77 u8 pmk[PMK_LEN]; local
82 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
86 * uses only 16-byte PMK.
88 res = eapol_sm_get_key(eapol, pmk, 16);
92 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from pre-auth",
93 pmk, pmk_len);
95 pmksa_cache_add(sm->pmksa, pmk, pmk_len,
wpa.c 164 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from PMKSA cache",
165 sm->pmk, sm->pmk_len);
173 res = eapol_sm_get_key(sm->eapol, sm->pmk, PMK_LEN);
177 * uses only 16-byte PMK.
179 res = eapol_sm_get_key(sm->eapol, sm->pmk, 16);
193 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK from EAPOL state "
194 "machines", sm->pmk, pmk_len);
198 pmksa_cache_add(sm->pmksa, sm->pmk, pmk_len,
206 "RSN: the new PMK matches with the "
359 wpa_pmk_to_ptk(sm->pmk, sm->pmk_len, "Pairwise key expansion"
    [all...]
wpa.h 99 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len);
159 static inline void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk,
wpa_i.h 22 u8 pmk[PMK_LEN]; member in struct:wpa_sm
  /external/wpa_supplicant_8/src/ap/
pmksa_cache_auth.h 20 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry
48 const u8 *pmk, size_t pmk_len,
pmksa_cache_auth.c 214 * @pmk: The new pairwise master key
215 * @pmk_len: PMK length in bytes, usually PMK_LEN (32)
223 * This function create a PMKSA entry for a new PMK and adds it to the PMKSA
226 * based on the PMK.
230 const u8 *pmk, size_t pmk_len,
243 os_memcpy(entry->pmk, pmk, pmk_len);
245 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid,
288 os_memcpy(entry->pmk, old_entry->pmk, old_entry->pmk_len)
    [all...]
wpa_auth.h 253 int wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk,
256 const u8 *pmk, size_t len, const u8 *sta_addr,
wpa_auth.c 423 wpa_printf(MSG_ERROR, "FT PMK cache initialization failed.");
1782 const u8 *pmk = NULL; local
    [all...]
wpa_auth_i.h 60 u8 PMK[PMK_LEN];
224 int wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, const u8 *pmk,
  /external/wpa_supplicant_8/wpa_supplicant/
wpas_glue.c 224 u8 pmk[PMK_LEN]; local
247 wpa_printf(MSG_DEBUG, "Configure PMK for driver-based RSN 4-way "
254 wpa_printf(MSG_DEBUG, "RSN: Use FT XXKey as PMK for "
258 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN);
265 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
269 * uses only 16-byte PMK.
271 res = eapol_sm_get_key(eapol, pmk, 16);
277 wpa_printf(MSG_DEBUG, "Failed to get PMK from EAPOL state "
282 wpa_hexdump_key(MSG_DEBUG, "RSN: Configure PMK for driver-based 4-way "
283 "handshake", pmk, pmk_len)
    [all...]
eapol_test.c 335 u8 pmk[PMK_LEN]; local
338 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) {
339 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN);
340 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) {
341 printf("WARNING: PMK mismatch\n");
342 wpa_hexdump(MSG_DEBUG, "PMK from AS",
347 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) {
348 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16)
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/common/
wpa_common.c 72 * wpa_pmk_to_ptk - Calculate PTK from PMK, addresses, and nonces
73 * @pmk: Pairwise master key
74 * @pmk_len: Length of PMK
85 * PTK = PRF-X(PMK, "Pairwise key expansion",
93 void wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label,
120 sha256_prf(pmk, pmk_len, label, data, sizeof(data),
124 sha1_prf(pmk, pmk_len, label, data, sizeof(data), ptk,
129 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len);
409 * wpa_derive_pmk_r0 - Derive PMK-R0 and PMKR0Nam
    [all...]
wpa_common.h 294 void wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label,
  /external/wpa_supplicant_6/wpa_supplicant/
eapol_test.c 337 u8 pmk[PMK_LEN]; local
340 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) {
341 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN);
342 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) {
343 printf("WARNING: PMK mismatch\n");
344 wpa_hexdump(MSG_DEBUG, "PMK from AS",
349 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) {
350 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16)
    [all...]
wpas_glue.c 227 u8 pmk[PMK_LEN]; local
250 wpa_printf(MSG_DEBUG, "Configure PMK for driver-based RSN 4-way "
254 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
258 * uses only 16-byte PMK.
260 res = eapol_sm_get_key(eapol, pmk, 16);
265 wpa_printf(MSG_DEBUG, "Failed to get PMK from EAPOL state "
270 if (wpa_drv_set_key(wpa_s, WPA_ALG_PMK, NULL, 0, 0, NULL, 0, pmk,
272 wpa_printf(MSG_DEBUG, "Failed to set PMK to the driver");
  /external/wpa_supplicant_8/src/common/
wpa_common.c 66 * wpa_pmk_to_ptk - Calculate PTK from PMK, addresses, and nonces
67 * @pmk: Pairwise master key
68 * @pmk_len: Length of PMK
79 * PTK = PRF-X(PMK, "Pairwise key expansion",
87 void wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label,
114 sha256_prf(pmk, pmk_len, label, data, sizeof(data),
118 sha1_prf(pmk, pmk_len, label, data, sizeof(data), ptk,
125 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len);
691 * wpa_derive_pmk_r0 - Derive PMK-R0 and PMKR0Nam
    [all...]
wpa_common.h 302 void wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label,
345 void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa,

Completed in 531 milliseconds

1 2