HomeSort by relevance Sort by last modified time
    Searched refs:pmk (Results 1 - 25 of 29) sorted by null

1 2

  /external/wpa_supplicant_8/src/rsn_supp/
pmksa_cache.h 18 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry
59 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
70 const u8 *pmk, size_t pmk_len);
106 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
126 const u8 *pmk, size_t pmk_len)
pmksa_cache.c 110 * @pmk: The new pairwise master key
111 * @pmk_len: PMK length in bytes, usually PMK_LEN (32)
114 * @network_ctx: Network configuration context for this PMK
118 * This function create a PMKSA entry for a new PMK and adds it to the PMKSA
121 * based on the PMK and the driver interface is notified of the new PMKID.
124 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
136 os_memcpy(entry->pmk, pmk, pmk_len);
138 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid,
155 os_memcmp_const(pos->pmk, pmk, pmk_len) == 0 &
    [all...]
preauth.c 78 u8 pmk[PMK_LEN]; local
83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
87 * uses only 16-byte PMK.
89 res = eapol_sm_get_key(eapol, pmk, 16);
93 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from pre-auth",
94 pmk, pmk_len);
96 pmksa_cache_add(sm->pmksa, pmk, pmk_len,
wpa.c 168 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from PMKSA cache",
169 sm->pmk, sm->pmk_len);
177 res = eapol_sm_get_key(sm->eapol, sm->pmk, PMK_LEN);
181 * uses only 16-byte PMK.
183 res = eapol_sm_get_key(sm->eapol, sm->pmk, 16);
198 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK from EAPOL state "
199 "machines", sm->pmk, pmk_len);
204 sm->pmk, pmk_len,
213 "RSN: the new PMK matches with the "
371 wpa_pmk_to_ptk(sm->pmk, sm->pmk_len, "Pairwise key expansion"
    [all...]
wpa.h 108 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len);
169 static inline void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk,
wpa_i.h 22 u8 pmk[PMK_LEN]; member in struct:wpa_sm
  /prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/
downloadmgr.h 48 IMoniker *pmk,
80 IMoniker *pmk,
102 #define IDownloadManager_Download(This,pmk,pbc,dwBindVerb,grfBINDF,pBindInfo,pszHeaders,pszRedir,uiCP) (This)->lpVtbl->Download(This,pmk,pbc,dwBindVerb,grfBINDF,pBindInfo,pszHeaders,pszRedir,uiCP)
115 static FORCEINLINE HRESULT IDownloadManager_Download(IDownloadManager* This,IMoniker *pmk,IBindCtx *pbc,DWORD dwBindVerb,LONG grfBINDF,BINDINFO *pBindInfo,LPCOLESTR pszHeaders,LPCOLESTR pszRedir,UINT uiCP) {
116 return This->lpVtbl->Download(This,pmk,pbc,dwBindVerb,grfBINDF,pBindInfo,pszHeaders,pszRedir,uiCP);
125 IMoniker *pmk,
reconcil.h 69 STDMETHOD(IsMonikerInBriefcase)(THIS_ IMoniker *pmk) PURE;
oleidl.h 152 virtual HRESULT WINAPI SendOnRename(IMoniker *pmk) = 0;
165 HRESULT (WINAPI *SendOnRename)(IOleAdviseHolder *This,IMoniker *pmk);
180 #define IOleAdviseHolder_SendOnRename(This,pmk) (This)->lpVtbl->SendOnRename(This,pmk)
191 HRESULT WINAPI IOleAdviseHolder_SendOnRename_Proxy(IOleAdviseHolder *This,IMoniker *pmk);
521 virtual HRESULT WINAPI SetMoniker(DWORD dwWhichMoniker,IMoniker *pmk) = 0;
549 HRESULT (WINAPI *SetMoniker)(IOleObject *This,DWORD dwWhichMoniker,IMoniker *pmk);
579 #define IOleObject_SetMoniker(This,dwWhichMoniker,pmk) (This)->lpVtbl->SetMoniker(This,dwWhichMoniker,pmk)
    [all...]
mshtmhst.h 117 typedef HRESULT WINAPI SHOWHTMLDIALOGFN (HWND hwndParent,IMoniker *pmk,VARIANT *pvarArgIn,WCHAR *pchOptions,VARIANT *pvArgOut);
118 typedef HRESULT WINAPI SHOWHTMLDIALOGEXFN (HWND hwndParent,IMoniker *pmk,DWORD dwDialogFlags,VARIANT *pvarArgIn,WCHAR *pchOptions,VARIANT *pvArgOut);
119 typedef HRESULT WINAPI SHOWMODELESSHTMLDIALOGFN (HWND hwndParent,IMoniker *pmk,VARIANT *pvarArgIn,VARIANT *pvarOptions,IHTMLWindow2 **ppWindow);
121 STDAPI ShowHTMLDialog(HWND hwndParent,IMoniker *pMk,VARIANT *pvarArgIn,WCHAR *pchOptions,VARIANT *pvarArgOut);
122 STDAPI ShowHTMLDialogEx(HWND hwndParent,IMoniker *pMk,DWORD dwDialogFlags,VARIANT *pvarArgIn,WCHAR *pchOptions,VARIANT *pvarArgOut);
123 STDAPI ShowModelessHTMLDialog(HWND hwndParent,IMoniker *pMk,VARIANT *pvarArgIn,VARIANT *pvarOptions,IHTMLWindow2 **ppWindow);
125 STDAPI CreateHTMLPropertyPage(IMoniker *pmk,IPropertyPage **ppPP);
136 virtual HRESULT WINAPI ShowHTMLDialog(HWND hwndParent,IMoniker *pMk,VARIANT *pvarArgIn,WCHAR *pchOptions,VARIANT *pvarArgOut,IUnknown *punkHost) = 0;
144 HRESULT (WINAPI *ShowHTMLDialog)(IHostDialogHelper *This,HWND hwndParent,IMoniker *pMk,VARIANT *pvarArgIn,WCHAR *pchOptions,VARIANT *pvarArgOut,IUnknown *punkHost);
154 #define IHostDialogHelper_ShowHTMLDialog(This,hwndParent,pMk,pvarArgIn,pchOptions,pvarArgOut,punkHost) (This)->lpVtbl->ShowHTMLDialog(This,hwndParent,pMk,pvarA (…)
    [all...]
txcoord.h 245 virtual HRESULT WINAPI PrepareRequestDone(HRESULT hr,IMoniker *pmk,BOID *pboidReason) = 0;
255 HRESULT (WINAPI *PrepareRequestDone)(ITransactionEnlistmentAsync *This,HRESULT hr,IMoniker *pmk,BOID *pboidReason);
267 #define ITransactionEnlistmentAsync_PrepareRequestDone(This,hr,pmk,pboidReason) (This)->lpVtbl->PrepareRequestDone(This,hr,pmk,pboidReason)
272 HRESULT WINAPI ITransactionEnlistmentAsync_PrepareRequestDone_Proxy(ITransactionEnlistmentAsync *This,HRESULT hr,IMoniker *pmk,BOID *pboidReason);
    [all...]
objidl.h     [all...]
objbase.h 336 WINOLEAPI BindMoniker(LPMONIKER pmk,DWORD grfOpt,REFIID iidResult,LPVOID *ppvResult);
  /external/wpa_supplicant_8/src/ap/
pmksa_cache_auth.h 20 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry
49 const u8 *pmk, size_t pmk_len,
pmksa_cache_auth.c 228 * @pmk: The new pairwise master key
229 * @pmk_len: PMK length in bytes, usually PMK_LEN (32)
237 * This function create a PMKSA entry for a new PMK and adds it to the PMKSA
240 * based on the PMK.
244 const u8 *pmk, size_t pmk_len,
257 os_memcpy(entry->pmk, pmk, pmk_len);
259 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid,
302 os_memcpy(entry->pmk, old_entry->pmk, old_entry->pmk_len)
    [all...]
wpa_auth.h 273 int wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk,
276 const u8 *pmk, size_t len, const u8 *sta_addr,
wpa_auth.c 412 wpa_printf(MSG_ERROR, "FT PMK cache initialization failed.");
1839 const u8 *pmk = NULL; local
    [all...]
wpa_auth_i.h 61 u8 PMK[PMK_LEN];
244 int wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, const u8 *pmk,
wpa_auth_glue.c 219 return sta->sae->pmk;
  /external/wpa_supplicant_8/src/common/
sae.h 43 u8 pmk[SAE_PMK_LEN]; member in struct:sae_data
wpa_common.c 74 * wpa_pmk_to_ptk - Calculate PTK from PMK, addresses, and nonces
75 * @pmk: Pairwise master key
76 * @pmk_len: Length of PMK
87 * PTK = PRF-X(PMK, "Pairwise key expansion",
95 void wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label,
122 sha256_prf(pmk, pmk_len, label, data, sizeof(data),
126 sha1_prf(pmk, pmk_len, label, data, sizeof(data), ptk,
133 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len);
733 * wpa_derive_pmk_r0 - Derive PMK-R0 and PMKR0Nam
    [all...]
wpa_common.h 332 void wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label,
375 void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa,
sae.c 609 * KCK || PMK = KDF-512(keyseed, "SAE KCK and PMK",
624 sha256_prf(keyseed, sizeof(keyseed), "SAE KCK and PMK",
627 os_memcpy(sae->pmk, keys + SAE_KCK_LEN, SAE_PMK_LEN);
629 wpa_hexdump_key(MSG_DEBUG, "SAE: PMK", sae->pmk, SAE_PMK_LEN);
  /external/wpa_supplicant_8/wpa_supplicant/
wpas_glue.c 258 u8 pmk[PMK_LEN]; local
287 wpa_printf(MSG_DEBUG, "Configure PMK for driver-based RSN 4-way "
294 wpa_printf(MSG_DEBUG, "RSN: Use FT XXKey as PMK for "
298 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN);
305 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
309 * uses only 16-byte PMK.
311 res = eapol_sm_get_key(eapol, pmk, 16);
317 wpa_printf(MSG_DEBUG, "Failed to get PMK from EAPOL state "
322 wpa_hexdump_key(MSG_DEBUG, "RSN: Configure PMK for driver-based 4-way "
323 "handshake", pmk, pmk_len)
    [all...]
eapol_test.c 347 u8 pmk[PMK_LEN]; local
352 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) {
353 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN);
354 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) {
355 printf("WARNING: PMK mismatch\n");
356 wpa_hexdump(MSG_DEBUG, "PMK from AS",
361 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) {
362 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16)
    [all...]

Completed in 297 milliseconds

1 2