HomeSort by relevance Sort by last modified time
    Searched defs:pmk (Results 1 - 8 of 8) sorted by null

  /external/wpa_supplicant_8/src/ap/
pmksa_cache_auth.h 20 u8 pmk[PMK_LEN_MAX]; member in struct:rsn_pmksa_cache_entry
51 const u8 *pmk, size_t pmk_len, const u8 *pmkid,
wpa_auth.c 47 const u8 *pmk, unsigned int pmk_len,
449 wpa_printf(MSG_ERROR, "FT PMK cache initialization failed.");
830 const u8 *pmk = NULL; local
835 pmk = wpa_auth_get_psk(sm->wpa_auth, sm->addr,
836 sm->p2p_dev_addr, pmk);
837 if (pmk == NULL)
841 pmk = sm->PMK;
845 wpa_derive_ptk(sm, sm->alt_SNonce, pmk, pmk_len, &PTK);
2049 const u8 *pmk = NULL; local
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
pmksa_cache.h 18 u8 pmk[PMK_LEN_MAX]; member in struct:rsn_pmksa_cache_entry
59 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
71 const u8 *pmk, size_t pmk_len);
107 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
128 const u8 *pmk, size_t pmk_len)
preauth.c 78 u8 pmk[PMK_LEN]; local
83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
87 * uses only 16-byte PMK.
89 res = eapol_sm_get_key(eapol, pmk, 16);
93 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from pre-auth",
94 pmk, pmk_len);
96 pmksa_cache_add(sm->pmksa, pmk, pmk_len, NULL,
wpa_i.h 22 u8 pmk[PMK_LEN_MAX]; member in struct:wpa_sm
349 const u8 *pmk, size_t pmk_len)
353 return sm->ctx->key_mgmt_set_pmk(sm->ctx->ctx, pmk, pmk_len);
  /external/wpa_supplicant_8/src/common/
sae.h 47 u8 pmk[SAE_PMK_LEN]; member in struct:sae_data
  /external/wpa_supplicant_8/wpa_supplicant/
wpas_glue.c 273 u8 pmk[PMK_LEN]; local
302 wpa_printf(MSG_DEBUG, "Configure PMK for driver-based RSN 4-way "
309 wpa_printf(MSG_DEBUG, "RSN: Use FT XXKey as PMK for "
313 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN);
320 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
324 * uses only 16-byte PMK.
326 res = eapol_sm_get_key(eapol, pmk, 16);
332 wpa_printf(MSG_DEBUG, "Failed to get PMK from EAPOL state "
337 wpa_hexdump_key(MSG_DEBUG, "RSN: Configure PMK for driver-based 4-way "
338 "handshake", pmk, pmk_len)
    [all...]
eapol_test.c 362 u8 pmk[PMK_LEN]; local
367 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) {
368 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN);
369 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) {
370 printf("WARNING: PMK mismatch\n");
371 wpa_hexdump(MSG_DEBUG, "PMK from AS",
376 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) {
377 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16)
    [all...]

Completed in 91 milliseconds