Home | History | Annotate | Download | only in wpa_supplicant

Lines Matching defs:pmk

362 	u8 pmk[PMK_LEN];
367 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) {
368 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN);
369 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) {
370 printf("WARNING: PMK mismatch\n");
371 wpa_hexdump(MSG_DEBUG, "PMK from AS",
376 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) {
377 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16);
378 if (os_memcmp(pmk, e->authenticator_pmk, 16) != 0) {
379 printf("WARNING: PMK mismatch\n");
380 wpa_hexdump(MSG_DEBUG, "PMK from AS",
878 "to extend PMK to 32 octets");