HomeSort by relevance Sort by last modified time
    Searched refs:PMK_LEN (Results 1 - 25 of 38) sorted by null

1 2

  /external/wpa_supplicant_8/src/ap/
peerkey_auth.c 163 2 + RSN_SELECTOR_LEN + PMK_LEN + WPA_NONCE_LEN +
178 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN,
217 2 + RSN_SELECTOR_LEN + PMK_LEN + WPA_NONCE_LEN +
235 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN,
292 if (random_get_bytes(smk, PMK_LEN)) {
308 sha256_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf),
309 smk, PMK_LEN);
311 sha1_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf),
312 smk, PMK_LEN);
315 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", smk, PMK_LEN);
    [all...]
pmksa_cache_auth.h 20 u8 pmk[PMK_LEN];
21 size_t pmk_len; member in struct:rsn_pmksa_cache_entry
52 const u8 *pmk, size_t pmk_len,
wpa_auth_ft.c 147 u8 pmk_r0[PMK_LEN];
157 u8 pmk_r1[PMK_LEN];
188 os_memset(r0prev->pmk_r0, 0, PMK_LEN);
196 os_memset(r1prev->pmk_r1, 0, PMK_LEN);
217 os_memcpy(r0->pmk_r0, pmk_r0, PMK_LEN);
241 os_memcpy(pmk_r0, r0->pmk_r0, PMK_LEN);
267 os_memcpy(r1->pmk_r1, pmk_r1, PMK_LEN);
291 os_memcpy(pmk_r1, r1->pmk_r1, PMK_LEN);
367 u8 pmk_r0[PMK_LEN], pmk_r0_name[WPA_PMK_NAME_LEN];
368 u8 pmk_r1[PMK_LEN];
    [all...]
preauth_auth.c 205 if (len > PMK_LEN)
206 len = PMK_LEN;
wpa_auth_i.h 63 u8 PMK[PMK_LEN];
115 u8 xxkey[PMK_LEN]; /* PSK or the second 256 bits of MSK */
ap_config.h 125 #define PMK_LEN 32
128 u8 psk[PMK_LEN];
134 u8 psk[PMK_LEN];
wpa_auth.h 71 u8 pmk_r1[PMK_LEN];
90 u8 pmk_r1[PMK_LEN];
wps_hostapd.c 115 if (psk_len != PMK_LEN) {
127 os_memcpy(p->psk, psk, PMK_LEN);
139 char hex[PMK_LEN * 2 + 1];
376 bss->ssid.wpa_psk->psk, PMK_LEN) == 0) {
1094 wps->network_key = os_malloc(2 * PMK_LEN + 1);
1097 wpa_snprintf_hex((char *) wps->network_key, 2 * PMK_LEN + 1,
1098 conf->ssid.wpa_psk->psk, PMK_LEN);
1099 wps->network_key_len = 2 * PMK_LEN;
1110 os_memcpy(wps->psk, conf->ssid.wpa_psk->psk, PMK_LEN);
    [all...]
ap_config.c 271 if (len == 64 && hexstr2bin(pos, psk->psk, PMK_LEN) == 0)
275 4096, psk->psk, PMK_LEN);
310 4096, ssid->wpa_psk->psk, PMK_LEN);
312 ssid->wpa_psk->psk, PMK_LEN);
wpa_auth.c     [all...]
pmksa_cache_auth.c 236 * @pmk_len: PMK length in bytes, usually PMK_LEN (32)
253 const u8 *pmk, size_t pmk_len,
261 if (pmk_len > PMK_LEN)
270 os_memcpy(entry->pmk, pmk, pmk_len);
271 entry->pmk_len = pmk_len;
277 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid,
320 os_memcpy(entry->pmk, old_entry->pmk, old_entry->pmk_len);
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
ibss_rsn.h 50 u8 psk[PMK_LEN];
wpas_glue.c 272 int res, pmk_len; local
273 u8 pmk[PMK_LEN];
305 pmk_len = PMK_LEN;
308 u8 buf[2 * PMK_LEN];
311 res = eapol_sm_get_key(eapol, buf, 2 * PMK_LEN);
313 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN);
320 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
327 pmk_len = 16
    [all...]
eapol_test.c 60 u8 authenticator_pmk[PMK_LEN];
347 u8 pmk[PMK_LEN];
352 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) {
353 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN);
354 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) {
357 e->authenticator_pmk, PMK_LEN);
819 keys->recv_len > PMK_LEN ? PMK_LEN :
    [all...]
wpa_supplicant.c     [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
peerkey.h 23 u8 smk[PMK_LEN];
pmksa_cache.h 18 u8 pmk[PMK_LEN];
19 size_t pmk_len; member in struct:rsn_pmksa_cache_entry
59 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
71 const u8 *pmk, size_t pmk_len);
107 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
128 const u8 *pmk, size_t pmk_len)
wpa_i.h 22 u8 pmk[PMK_LEN];
23 size_t pmk_len; member in struct:wpa_sm
113 u8 xxkey[PMK_LEN]; /* PSK or the second 256 bits of MSK */
115 u8 pmk_r0[PMK_LEN];
117 u8 pmk_r1[PMK_LEN];
343 const u8 *pmk, size_t pmk_len)
349 return sm->ctx->key_mgmt_set_pmk(sm->ctx->ctx, pmk, pmk_len);
peerkey.c 314 hmac_sha256_vector(smk, PMK_LEN, 5, addr, len, hash);
317 hmac_sha1_vector(smk, PMK_LEN, 5, addr, len, hash);
441 if (os_memcmp(kde->smk + PMK_LEN, peerkey->pnonce, WPA_NONCE_LEN) != 0)
483 if (os_memcmp(kde->smk + PMK_LEN, peerkey->inonce, WPA_NONCE_LEN) != 0)
535 kde.smk == NULL || kde.smk_len < PMK_LEN + WPA_NONCE_LEN ||
565 os_memcpy(peerkey->smk, kde.smk, PMK_LEN);
567 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", peerkey->smk, PMK_LEN);
695 wpa_pmk_to_ptk(peerkey->smk, PMK_LEN, "Peer key expansion",
922 wpa_pmk_to_ptk(peerkey->smk, PMK_LEN, "Peer key expansion",
    [all...]
preauth.c 78 u8 pmk[PMK_LEN];
81 int res, pmk_len; local
82 pmk_len = PMK_LEN;
83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
90 pmk_len = 16;
94 pmk, pmk_len);
95 sm->pmk_len = pmk_len;
96 pmksa_cache_add(sm->pmksa, pmk, pmk_len,
    [all...]
wpa.c 165 if (wpa_sm_key_mgmt_set_pmk(sm, sm->pmk, sm->pmk_len))
202 sm->pmk, sm->pmk_len);
208 int res, pmk_len; local
209 pmk_len = PMK_LEN;
210 res = eapol_sm_get_key(sm->eapol, sm->pmk, PMK_LEN);
217 pmk_len = 16;
220 u8 buf[2 * PMK_LEN];
221 if (eapol_sm_get_key(sm->eapol, buf, 2 * PMK_LEN) == 0)
223 os_memcpy(sm->xxkey, buf + PMK_LEN, PMK_LEN)
    [all...]
wpa_ft.c 37 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R0", sm->pmk_r0, PMK_LEN);
42 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", sm->pmk_r1, PMK_LEN);
473 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", sm->pmk_r1, PMK_LEN);
  /external/wpa_supplicant_8/wpa_supplicant/tests/
test_wpa.c 23 u8 psk[PMK_LEN];
194 wpa_sm_set_pmk(wpa->supp, wpa->psk, PMK_LEN);
339 os_memset(wpa.psk, 0x44, PMK_LEN);
  /external/wpa_supplicant_8/src/common/
wpa_common.c 121 * @pmk_len: Length of PMK
141 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label,
175 sha256_prf(pmk, pmk_len, label, data, sizeof(data),
179 sha1_prf(pmk, pmk_len, label, data, sizeof(data), tmp, ptk_len);
185 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len);
860 os_memcpy(pmk_r0, r0_key_data, PMK_LEN);
867 addr[1] = r0_key_data + PMK_LEN;
924 sha256_prf(pmk_r0, PMK_LEN, "FT-R1", buf, pos - buf, pmk_r1, PMK_LEN);
966 sha256_prf(pmk_r1, PMK_LEN, "FT-PTK", buf, pos - buf, tmp, ptk_len)
    [all...]
wpa_common.h 14 #define PMK_LEN 32
337 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label,
381 void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa,

Completed in 354 milliseconds

1 2