Home | History | Annotate | Download | only in rsn_supp

Lines Matching refs:pmk

164 		wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from PMKSA cache",
165 sm->pmk, sm->pmk_len);
173 res = eapol_sm_get_key(sm->eapol, sm->pmk, PMK_LEN);
177 * uses only 16-byte PMK.
179 res = eapol_sm_get_key(sm->eapol, sm->pmk, 16);
194 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK from EAPOL state "
195 "machines", sm->pmk, pmk_len);
200 sm->pmk, pmk_len,
209 "RSN: the new PMK matches with the "
365 wpa_pmk_to_ptk(sm->pmk, sm->pmk_len, "Pairwise key expansion",
396 /* RSN: msg 1/4 should contain PMKID for the selected PMK */
1958 os_memcmp(sm->pmk, entry->pmk, sm->pmk_len) == 0)) {
1960 "RSN: deauthenticating due to expired PMK");
1966 os_memset(sm->pmk, 0, sizeof(sm->pmk));
2106 * wpa_sm_set_pmk - Set PMK
2108 * @pmk: The new PMK
2109 * @pmk_len: The length of the new PMK in bytes
2111 * Configure the PMK for WPA state machine.
2113 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len)
2119 os_memcpy(sm->pmk, pmk, pmk_len);
2124 os_memcpy(sm->xxkey, pmk, pmk_len);
2130 * wpa_sm_set_pmk_from_pmksa - Set PMK based on the current PMKSA
2133 * Take the PMK from the current PMKSA into use. If no PMKSA is active, the PMK
2143 os_memcpy(sm->pmk, sm->cur_pmksa->pmk, sm->pmk_len);
2146 os_memset(sm->pmk, 0, PMK_LEN);
2604 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, "WPA: Clear old PMK and PTK");
2607 os_memset(sm->pmk, 0, sizeof(sm->pmk));