HomeSort by relevance Sort by last modified time
    Searched defs:pmk (Results 1 - 8 of 8) sorted by null

  /external/wpa_supplicant_8/src/ap/
pmksa_cache_auth.h 20 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry
49 const u8 *pmk, size_t pmk_len,
wpa_auth.c 409 wpa_printf(MSG_ERROR, "FT PMK cache initialization failed.");
1769 const u8 *pmk = NULL; local
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
pmksa_cache.h 18 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry
59 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
70 const u8 *pmk, size_t pmk_len);
106 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
126 const u8 *pmk, size_t pmk_len)
preauth.c 77 u8 pmk[PMK_LEN]; local
82 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
86 * uses only 16-byte PMK.
88 res = eapol_sm_get_key(eapol, pmk, 16);
92 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from pre-auth",
93 pmk, pmk_len);
95 pmksa_cache_add(sm->pmksa, pmk, pmk_len,
wpa_i.h 22 u8 pmk[PMK_LEN]; member in struct:wpa_sm
  /external/wpa_supplicant_8/src/common/
sae.h 43 u8 pmk[SAE_PMK_LEN]; member in struct:sae_data
  /external/wpa_supplicant_8/wpa_supplicant/
wpas_glue.c 224 u8 pmk[PMK_LEN]; local
247 wpa_printf(MSG_DEBUG, "Configure PMK for driver-based RSN 4-way "
254 wpa_printf(MSG_DEBUG, "RSN: Use FT XXKey as PMK for "
258 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN);
265 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
269 * uses only 16-byte PMK.
271 res = eapol_sm_get_key(eapol, pmk, 16);
277 wpa_printf(MSG_DEBUG, "Failed to get PMK from EAPOL state "
282 wpa_hexdump_key(MSG_DEBUG, "RSN: Configure PMK for driver-based 4-way "
283 "handshake", pmk, pmk_len)
    [all...]
eapol_test.c 336 u8 pmk[PMK_LEN]; local
339 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) {
340 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN);
341 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) {
342 printf("WARNING: PMK mismatch\n");
343 wpa_hexdump(MSG_DEBUG, "PMK from AS",
348 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) {
349 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16)
    [all...]

Completed in 880 milliseconds