/external/wpa_supplicant_8/src/ap/ |
pmksa_cache_auth.h | 20 u8 pmk[PMK_LEN_MAX]; member in struct:rsn_pmksa_cache_entry 51 const u8 *pmk, size_t pmk_len, const u8 *pmkid,
|
wpa_auth.c | 47 const u8 *pmk, unsigned int pmk_len, 449 wpa_printf(MSG_ERROR, "FT PMK cache initialization failed."); 830 const u8 *pmk = NULL; local 835 pmk = wpa_auth_get_psk(sm->wpa_auth, sm->addr, 836 sm->p2p_dev_addr, pmk); 837 if (pmk == NULL) 841 pmk = sm->PMK; 845 wpa_derive_ptk(sm, sm->alt_SNonce, pmk, pmk_len, &PTK); 2049 const u8 *pmk = NULL; local [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
pmksa_cache.h | 18 u8 pmk[PMK_LEN_MAX]; member in struct:rsn_pmksa_cache_entry 59 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 71 const u8 *pmk, size_t pmk_len); 107 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 128 const u8 *pmk, size_t pmk_len)
|
preauth.c | 78 u8 pmk[PMK_LEN]; local 83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 87 * uses only 16-byte PMK. 89 res = eapol_sm_get_key(eapol, pmk, 16); 93 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from pre-auth", 94 pmk, pmk_len); 96 pmksa_cache_add(sm->pmksa, pmk, pmk_len, NULL,
|
wpa_i.h | 22 u8 pmk[PMK_LEN_MAX]; member in struct:wpa_sm 349 const u8 *pmk, size_t pmk_len) 353 return sm->ctx->key_mgmt_set_pmk(sm->ctx->ctx, pmk, pmk_len);
|
/external/wpa_supplicant_8/src/common/ |
sae.h | 47 u8 pmk[SAE_PMK_LEN]; member in struct:sae_data
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpas_glue.c | 273 u8 pmk[PMK_LEN]; local 302 wpa_printf(MSG_DEBUG, "Configure PMK for driver-based RSN 4-way " 309 wpa_printf(MSG_DEBUG, "RSN: Use FT XXKey as PMK for " 313 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN); 320 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 324 * uses only 16-byte PMK. 326 res = eapol_sm_get_key(eapol, pmk, 16); 332 wpa_printf(MSG_DEBUG, "Failed to get PMK from EAPOL state " 337 wpa_hexdump_key(MSG_DEBUG, "RSN: Configure PMK for driver-based 4-way " 338 "handshake", pmk, pmk_len) [all...] |
eapol_test.c | 362 u8 pmk[PMK_LEN]; local 367 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { 368 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); 369 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) { 370 printf("WARNING: PMK mismatch\n"); 371 wpa_hexdump(MSG_DEBUG, "PMK from AS", 376 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) { 377 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16) [all...] |