/external/wpa_supplicant_8/src/rsn_supp/ |
pmksa_cache.h | 18 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry 59 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 70 const u8 *pmk, size_t pmk_len); 106 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 126 const u8 *pmk, size_t pmk_len)
|
pmksa_cache.c | 110 * @pmk: The new pairwise master key 111 * @pmk_len: PMK length in bytes, usually PMK_LEN (32) 114 * @network_ctx: Network configuration context for this PMK 118 * This function create a PMKSA entry for a new PMK and adds it to the PMKSA 121 * based on the PMK and the driver interface is notified of the new PMKID. 124 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 136 os_memcpy(entry->pmk, pmk, pmk_len); 138 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, 155 os_memcmp_const(pos->pmk, pmk, pmk_len) == 0 & [all...] |
preauth.c | 78 u8 pmk[PMK_LEN]; local 83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 87 * uses only 16-byte PMK. 89 res = eapol_sm_get_key(eapol, pmk, 16); 93 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from pre-auth", 94 pmk, pmk_len); 96 pmksa_cache_add(sm->pmksa, pmk, pmk_len,
|
wpa.c | 168 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from PMKSA cache", 169 sm->pmk, sm->pmk_len); 177 res = eapol_sm_get_key(sm->eapol, sm->pmk, PMK_LEN); 181 * uses only 16-byte PMK. 183 res = eapol_sm_get_key(sm->eapol, sm->pmk, 16); 198 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK from EAPOL state " 199 "machines", sm->pmk, pmk_len); 204 sm->pmk, pmk_len, 213 "RSN: the new PMK matches with the " 371 wpa_pmk_to_ptk(sm->pmk, sm->pmk_len, "Pairwise key expansion" [all...] |
wpa.h | 108 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len); 169 static inline void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk,
|
wpa_i.h | 22 u8 pmk[PMK_LEN]; member in struct:wpa_sm
|
/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/ |
downloadmgr.h | 48 IMoniker *pmk, 80 IMoniker *pmk, 102 #define IDownloadManager_Download(This,pmk,pbc,dwBindVerb,grfBINDF,pBindInfo,pszHeaders,pszRedir,uiCP) (This)->lpVtbl->Download(This,pmk,pbc,dwBindVerb,grfBINDF,pBindInfo,pszHeaders,pszRedir,uiCP) 115 static FORCEINLINE HRESULT IDownloadManager_Download(IDownloadManager* This,IMoniker *pmk,IBindCtx *pbc,DWORD dwBindVerb,LONG grfBINDF,BINDINFO *pBindInfo,LPCOLESTR pszHeaders,LPCOLESTR pszRedir,UINT uiCP) { 116 return This->lpVtbl->Download(This,pmk,pbc,dwBindVerb,grfBINDF,pBindInfo,pszHeaders,pszRedir,uiCP); 125 IMoniker *pmk,
|
reconcil.h | 69 STDMETHOD(IsMonikerInBriefcase)(THIS_ IMoniker *pmk) PURE;
|
oleidl.h | 152 virtual HRESULT WINAPI SendOnRename(IMoniker *pmk) = 0; 165 HRESULT (WINAPI *SendOnRename)(IOleAdviseHolder *This,IMoniker *pmk); 180 #define IOleAdviseHolder_SendOnRename(This,pmk) (This)->lpVtbl->SendOnRename(This,pmk) 191 HRESULT WINAPI IOleAdviseHolder_SendOnRename_Proxy(IOleAdviseHolder *This,IMoniker *pmk); 521 virtual HRESULT WINAPI SetMoniker(DWORD dwWhichMoniker,IMoniker *pmk) = 0; 549 HRESULT (WINAPI *SetMoniker)(IOleObject *This,DWORD dwWhichMoniker,IMoniker *pmk); 579 #define IOleObject_SetMoniker(This,dwWhichMoniker,pmk) (This)->lpVtbl->SetMoniker(This,dwWhichMoniker,pmk) [all...] |
mshtmhst.h | 117 typedef HRESULT WINAPI SHOWHTMLDIALOGFN (HWND hwndParent,IMoniker *pmk,VARIANT *pvarArgIn,WCHAR *pchOptions,VARIANT *pvArgOut); 118 typedef HRESULT WINAPI SHOWHTMLDIALOGEXFN (HWND hwndParent,IMoniker *pmk,DWORD dwDialogFlags,VARIANT *pvarArgIn,WCHAR *pchOptions,VARIANT *pvArgOut); 119 typedef HRESULT WINAPI SHOWMODELESSHTMLDIALOGFN (HWND hwndParent,IMoniker *pmk,VARIANT *pvarArgIn,VARIANT *pvarOptions,IHTMLWindow2 **ppWindow); 121 STDAPI ShowHTMLDialog(HWND hwndParent,IMoniker *pMk,VARIANT *pvarArgIn,WCHAR *pchOptions,VARIANT *pvarArgOut); 122 STDAPI ShowHTMLDialogEx(HWND hwndParent,IMoniker *pMk,DWORD dwDialogFlags,VARIANT *pvarArgIn,WCHAR *pchOptions,VARIANT *pvarArgOut); 123 STDAPI ShowModelessHTMLDialog(HWND hwndParent,IMoniker *pMk,VARIANT *pvarArgIn,VARIANT *pvarOptions,IHTMLWindow2 **ppWindow); 125 STDAPI CreateHTMLPropertyPage(IMoniker *pmk,IPropertyPage **ppPP); 136 virtual HRESULT WINAPI ShowHTMLDialog(HWND hwndParent,IMoniker *pMk,VARIANT *pvarArgIn,WCHAR *pchOptions,VARIANT *pvarArgOut,IUnknown *punkHost) = 0; 144 HRESULT (WINAPI *ShowHTMLDialog)(IHostDialogHelper *This,HWND hwndParent,IMoniker *pMk,VARIANT *pvarArgIn,WCHAR *pchOptions,VARIANT *pvarArgOut,IUnknown *punkHost); 154 #define IHostDialogHelper_ShowHTMLDialog(This,hwndParent,pMk,pvarArgIn,pchOptions,pvarArgOut,punkHost) (This)->lpVtbl->ShowHTMLDialog(This,hwndParent,pMk,pvarA (…) [all...] |
txcoord.h | 245 virtual HRESULT WINAPI PrepareRequestDone(HRESULT hr,IMoniker *pmk,BOID *pboidReason) = 0; 255 HRESULT (WINAPI *PrepareRequestDone)(ITransactionEnlistmentAsync *This,HRESULT hr,IMoniker *pmk,BOID *pboidReason); 267 #define ITransactionEnlistmentAsync_PrepareRequestDone(This,hr,pmk,pboidReason) (This)->lpVtbl->PrepareRequestDone(This,hr,pmk,pboidReason) 272 HRESULT WINAPI ITransactionEnlistmentAsync_PrepareRequestDone_Proxy(ITransactionEnlistmentAsync *This,HRESULT hr,IMoniker *pmk,BOID *pboidReason); [all...] |
objidl.h | [all...] |
objbase.h | 336 WINOLEAPI BindMoniker(LPMONIKER pmk,DWORD grfOpt,REFIID iidResult,LPVOID *ppvResult);
|
/external/wpa_supplicant_8/src/ap/ |
pmksa_cache_auth.h | 20 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry 49 const u8 *pmk, size_t pmk_len,
|
pmksa_cache_auth.c | 228 * @pmk: The new pairwise master key 229 * @pmk_len: PMK length in bytes, usually PMK_LEN (32) 237 * This function create a PMKSA entry for a new PMK and adds it to the PMKSA 240 * based on the PMK. 244 const u8 *pmk, size_t pmk_len, 257 os_memcpy(entry->pmk, pmk, pmk_len); 259 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, 302 os_memcpy(entry->pmk, old_entry->pmk, old_entry->pmk_len) [all...] |
wpa_auth.h | 273 int wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk, 276 const u8 *pmk, size_t len, const u8 *sta_addr,
|
wpa_auth.c | 412 wpa_printf(MSG_ERROR, "FT PMK cache initialization failed."); 1839 const u8 *pmk = NULL; local [all...] |
wpa_auth_i.h | 61 u8 PMK[PMK_LEN]; 244 int wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, const u8 *pmk,
|
wpa_auth_glue.c | 219 return sta->sae->pmk;
|
/external/wpa_supplicant_8/src/common/ |
sae.h | 43 u8 pmk[SAE_PMK_LEN]; member in struct:sae_data
|
wpa_common.c | 74 * wpa_pmk_to_ptk - Calculate PTK from PMK, addresses, and nonces 75 * @pmk: Pairwise master key 76 * @pmk_len: Length of PMK 87 * PTK = PRF-X(PMK, "Pairwise key expansion", 95 void wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, 122 sha256_prf(pmk, pmk_len, label, data, sizeof(data), 126 sha1_prf(pmk, pmk_len, label, data, sizeof(data), ptk, 133 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len); 733 * wpa_derive_pmk_r0 - Derive PMK-R0 and PMKR0Nam [all...] |
wpa_common.h | 332 void wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, 375 void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa,
|
sae.c | 609 * KCK || PMK = KDF-512(keyseed, "SAE KCK and PMK", 624 sha256_prf(keyseed, sizeof(keyseed), "SAE KCK and PMK", 627 os_memcpy(sae->pmk, keys + SAE_KCK_LEN, SAE_PMK_LEN); 629 wpa_hexdump_key(MSG_DEBUG, "SAE: PMK", sae->pmk, SAE_PMK_LEN);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpas_glue.c | 258 u8 pmk[PMK_LEN]; local 287 wpa_printf(MSG_DEBUG, "Configure PMK for driver-based RSN 4-way " 294 wpa_printf(MSG_DEBUG, "RSN: Use FT XXKey as PMK for " 298 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN); 305 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 309 * uses only 16-byte PMK. 311 res = eapol_sm_get_key(eapol, pmk, 16); 317 wpa_printf(MSG_DEBUG, "Failed to get PMK from EAPOL state " 322 wpa_hexdump_key(MSG_DEBUG, "RSN: Configure PMK for driver-based 4-way " 323 "handshake", pmk, pmk_len) [all...] |
eapol_test.c | 347 u8 pmk[PMK_LEN]; local 352 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { 353 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); 354 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) { 355 printf("WARNING: PMK mismatch\n"); 356 wpa_hexdump(MSG_DEBUG, "PMK from AS", 361 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) { 362 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16) [all...] |