Lines Matching refs:pmk
336 u8 pmk[PMK_LEN];
339 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) {
340 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN);
341 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) {
342 printf("WARNING: PMK mismatch\n");
343 wpa_hexdump(MSG_DEBUG, "PMK from AS",
348 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) {
349 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16);
350 if (os_memcmp(pmk, e->authenticator_pmk, 16) != 0) {
351 printf("WARNING: PMK mismatch\n");
352 wpa_hexdump(MSG_DEBUG, "PMK from AS",
729 "to extend PMK to 32 octets");