Lines Matching refs:pmk
409 wpa_printf(MSG_ERROR, "FT PMK cache initialization failed.");
1654 wpa_printf(MSG_DEBUG, "WPA: PMK from PMKSA cache");
1655 os_memcpy(sm->PMK, sm->pmksa->pmk, PMK_LEN);
1657 wpa_printf(MSG_DEBUG, "WPA: PMK from EAPOL state machine "
1659 os_memcpy(sm->PMK, msk, PMK_LEN);
1667 wpa_printf(MSG_DEBUG, "WPA: Could not get PMK");
1675 * state and takes PMK from the previously used AAA Key. This will
1676 * eventually fail in 4-Way Handshake because Supplicant uses PMK
1689 os_memcpy(sm->PMK, psk, PMK_LEN);
1736 rsn_pmkid(sm->PMK, PMK_LEN, sm->wpa_auth->addr,
1747 static int wpa_derive_ptk(struct wpa_state_machine *sm, const u8 *pmk,
1753 return wpa_auth_derive_ptk_ft(sm, pmk, ptk, ptk_len);
1756 wpa_pmk_to_ptk(pmk, PMK_LEN, "Pairwise key expansion",
1769 const u8 *pmk = NULL;
1775 /* WPA with IEEE 802.1X: use the derived PMK from EAP
1780 pmk = wpa_auth_get_psk(sm->wpa_auth, sm->addr,
1781 sm->p2p_dev_addr, pmk);
1782 if (pmk == NULL)
1785 pmk = sm->PMK;
1787 wpa_derive_ptk(sm, pmk, &PTK);
1833 os_memcpy(sm->PMK, pmk, PMK_LEN);
2922 int wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk,
2929 if (pmksa_cache_auth_add(sm->wpa_auth->pmksa, pmk, PMK_LEN,
2939 const u8 *pmk, size_t len, const u8 *sta_addr,
2946 if (pmksa_cache_auth_add(wpa_auth->pmksa, pmk, len, wpa_auth->addr,