/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
pmksa_cache.h | 24 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry 58 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 102 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
|
pmksa_cache.c | 42 * rsn_pmkid - Calculate PMK identifier 43 * @pmk: Pairwise master key 44 * @pmk_len: Length of pmk in bytes 50 * PMKID = HMAC-SHA1-128(PMK, "PMK Name" || AA || SPA) 52 static void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, 55 char *title = "PMK Name"; 66 hmac_sha256_vector(pmk, pmk_len, 3, addr, len, hash); 69 hmac_sha1_vector(pmk, pmk_len, 3, addr, len, hash); 150 * @pmk: The new pairwise master ke [all...] |
preauth.c | 87 u8 pmk[PMK_LEN]; local 92 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 96 * uses only 16-byte PMK. 98 res = eapol_sm_get_key(eapol, pmk, 16); 102 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from pre-auth", 103 pmk, pmk_len); 105 pmksa_cache_add(sm->pmksa, pmk, pmk_len,
|
wpa.c | 217 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from PMKSA cache", 218 sm->pmk, sm->pmk_len); 226 res = eapol_sm_get_key(sm->eapol, sm->pmk, PMK_LEN); 230 * uses only 16-byte PMK. 232 res = eapol_sm_get_key(sm->eapol, sm->pmk, 16); 246 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK from EAPOL state " 247 "machines", sm->pmk, pmk_len); 249 pmksa_cache_add(sm->pmksa, sm->pmk, pmk_len, src_addr, 254 wpa_printf(MSG_DEBUG, "RSN: the new PMK " 368 wpa_pmk_to_ptk(sm->pmk, sm->pmk_len, "Pairwise key expansion" [all...] |
wpa.h | 97 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len); 150 static inline void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk,
|
wpa_i.h | 26 u8 pmk[PMK_LEN]; member in struct:wpa_sm
|
/external/wpa_supplicant_8/src/rsn_supp/ |
pmksa_cache.h | 18 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry 53 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 99 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
|
pmksa_cache.c | 110 * @pmk: The new pairwise master key 111 * @pmk_len: PMK length in bytes, usually PMK_LEN (32) 114 * @network_ctx: Network configuration context for this PMK 118 * This function create a PMKSA entry for a new PMK and adds it to the PMKSA 121 * based on the PMK and the driver interface is notified of the new PMKID. 124 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 136 os_memcpy(entry->pmk, pmk, pmk_len); 138 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, 155 os_memcmp(pos->pmk, pmk, pmk_len) == 0 & [all...] |
preauth.c | 77 u8 pmk[PMK_LEN]; local 82 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 86 * uses only 16-byte PMK. 88 res = eapol_sm_get_key(eapol, pmk, 16); 92 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from pre-auth", 93 pmk, pmk_len); 95 pmksa_cache_add(sm->pmksa, pmk, pmk_len,
|
wpa.c | 164 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from PMKSA cache", 165 sm->pmk, sm->pmk_len); 173 res = eapol_sm_get_key(sm->eapol, sm->pmk, PMK_LEN); 177 * uses only 16-byte PMK. 179 res = eapol_sm_get_key(sm->eapol, sm->pmk, 16); 193 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK from EAPOL state " 194 "machines", sm->pmk, pmk_len); 198 pmksa_cache_add(sm->pmksa, sm->pmk, pmk_len, 206 "RSN: the new PMK matches with the " 359 wpa_pmk_to_ptk(sm->pmk, sm->pmk_len, "Pairwise key expansion" [all...] |
wpa.h | 99 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len); 159 static inline void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk,
|
wpa_i.h | 22 u8 pmk[PMK_LEN]; member in struct:wpa_sm
|
/external/wpa_supplicant_8/src/ap/ |
pmksa_cache_auth.h | 20 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry 48 const u8 *pmk, size_t pmk_len,
|
pmksa_cache_auth.c | 214 * @pmk: The new pairwise master key 215 * @pmk_len: PMK length in bytes, usually PMK_LEN (32) 223 * This function create a PMKSA entry for a new PMK and adds it to the PMKSA 226 * based on the PMK. 230 const u8 *pmk, size_t pmk_len, 243 os_memcpy(entry->pmk, pmk, pmk_len); 245 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, 288 os_memcpy(entry->pmk, old_entry->pmk, old_entry->pmk_len) [all...] |
wpa_auth.h | 253 int wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk, 256 const u8 *pmk, size_t len, const u8 *sta_addr,
|
wpa_auth.c | 423 wpa_printf(MSG_ERROR, "FT PMK cache initialization failed."); 1782 const u8 *pmk = NULL; local [all...] |
wpa_auth_i.h | 60 u8 PMK[PMK_LEN]; 224 int wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, const u8 *pmk,
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpas_glue.c | 224 u8 pmk[PMK_LEN]; local 247 wpa_printf(MSG_DEBUG, "Configure PMK for driver-based RSN 4-way " 254 wpa_printf(MSG_DEBUG, "RSN: Use FT XXKey as PMK for " 258 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN); 265 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 269 * uses only 16-byte PMK. 271 res = eapol_sm_get_key(eapol, pmk, 16); 277 wpa_printf(MSG_DEBUG, "Failed to get PMK from EAPOL state " 282 wpa_hexdump_key(MSG_DEBUG, "RSN: Configure PMK for driver-based 4-way " 283 "handshake", pmk, pmk_len) [all...] |
eapol_test.c | 335 u8 pmk[PMK_LEN]; local 338 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { 339 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); 340 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) { 341 printf("WARNING: PMK mismatch\n"); 342 wpa_hexdump(MSG_DEBUG, "PMK from AS", 347 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) { 348 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/common/ |
wpa_common.c | 72 * wpa_pmk_to_ptk - Calculate PTK from PMK, addresses, and nonces 73 * @pmk: Pairwise master key 74 * @pmk_len: Length of PMK 85 * PTK = PRF-X(PMK, "Pairwise key expansion", 93 void wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, 120 sha256_prf(pmk, pmk_len, label, data, sizeof(data), 124 sha1_prf(pmk, pmk_len, label, data, sizeof(data), ptk, 129 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len); 409 * wpa_derive_pmk_r0 - Derive PMK-R0 and PMKR0Nam [all...] |
wpa_common.h | 294 void wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label,
|
/external/wpa_supplicant_6/wpa_supplicant/ |
eapol_test.c | 337 u8 pmk[PMK_LEN]; local 340 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { 341 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); 342 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) { 343 printf("WARNING: PMK mismatch\n"); 344 wpa_hexdump(MSG_DEBUG, "PMK from AS", 349 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) { 350 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16) [all...] |
wpas_glue.c | 227 u8 pmk[PMK_LEN]; local 250 wpa_printf(MSG_DEBUG, "Configure PMK for driver-based RSN 4-way " 254 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 258 * uses only 16-byte PMK. 260 res = eapol_sm_get_key(eapol, pmk, 16); 265 wpa_printf(MSG_DEBUG, "Failed to get PMK from EAPOL state " 270 if (wpa_drv_set_key(wpa_s, WPA_ALG_PMK, NULL, 0, 0, NULL, 0, pmk, 272 wpa_printf(MSG_DEBUG, "Failed to set PMK to the driver");
|
/external/wpa_supplicant_8/src/common/ |
wpa_common.c | 66 * wpa_pmk_to_ptk - Calculate PTK from PMK, addresses, and nonces 67 * @pmk: Pairwise master key 68 * @pmk_len: Length of PMK 79 * PTK = PRF-X(PMK, "Pairwise key expansion", 87 void wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, 114 sha256_prf(pmk, pmk_len, label, data, sizeof(data), 118 sha1_prf(pmk, pmk_len, label, data, sizeof(data), ptk, 125 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len); 691 * wpa_derive_pmk_r0 - Derive PMK-R0 and PMKR0Nam [all...] |
wpa_common.h | 302 void wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, 345 void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa,
|