HomeSort by relevance Sort by last modified time
    Searched refs:pmk (Results 1 - 25 of 31) sorted by null

1 2

  /external/wpa_supplicant_8/src/rsn_supp/
pmksa_cache.h 18 u8 pmk[PMK_LEN_MAX]; member in struct:rsn_pmksa_cache_entry
59 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
71 const u8 *pmk, size_t pmk_len);
107 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
128 const u8 *pmk, size_t pmk_len)
pmksa_cache.c 110 * @pmk: The new pairwise master key
111 * @pmk_len: PMK length in bytes, usually PMK_LEN (32)
117 * @network_ctx: Network configuration context for this PMK
121 * This function create a PMKSA entry for a new PMK and adds it to the PMKSA
124 * based on the PMK and the driver interface is notified of the new PMKID.
127 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
143 os_memcpy(entry->pmk, pmk, pmk_len);
152 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid,
169 os_memcmp_const(pos->pmk, pmk, pmk_len) == 0 &
    [all...]
preauth.c 78 u8 pmk[PMK_LEN]; local
83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
87 * uses only 16-byte PMK.
89 res = eapol_sm_get_key(eapol, pmk, 16);
93 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from pre-auth",
94 pmk, pmk_len);
96 pmksa_cache_add(sm->pmksa, pmk, pmk_len, NULL,
wpa.c 172 if (wpa_sm_key_mgmt_set_pmk(sm, sm->pmk, sm->pmk_len))
174 "RSN: Cannot set PMK for key management offload");
208 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from PMKSA cache",
209 sm->pmk, sm->pmk_len);
221 res = eapol_sm_get_key(sm->eapol, sm->pmk, pmk_len);
226 * methods: it uses only 16-byte PMK.
228 res = eapol_sm_get_key(sm->eapol, sm->pmk, 16);
244 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK from EAPOL state "
245 "machines", sm->pmk, pmk_len);
252 sm->pmk, pmk_len, NULL
    [all...]
wpa.h 79 int (*key_mgmt_set_pmk)(void *ctx, const u8 *pmk, size_t pmk_len);
116 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len,
183 static inline void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk,
wpa_i.h 22 u8 pmk[PMK_LEN_MAX]; member in struct:wpa_sm
349 const u8 *pmk, size_t pmk_len)
353 return sm->ctx->key_mgmt_set_pmk(sm->ctx->ctx, pmk, pmk_len);
  /prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/
downloadmgr.h 48 IMoniker *pmk,
80 IMoniker *pmk,
102 #define IDownloadManager_Download(This,pmk,pbc,dwBindVerb,grfBINDF,pBindInfo,pszHeaders,pszRedir,uiCP) (This)->lpVtbl->Download(This,pmk,pbc,dwBindVerb,grfBINDF,pBindInfo,pszHeaders,pszRedir,uiCP)
115 static FORCEINLINE HRESULT IDownloadManager_Download(IDownloadManager* This,IMoniker *pmk,IBindCtx *pbc,DWORD dwBindVerb,LONG grfBINDF,BINDINFO *pBindInfo,LPCOLESTR pszHeaders,LPCOLESTR pszRedir,UINT uiCP) {
116 return This->lpVtbl->Download(This,pmk,pbc,dwBindVerb,grfBINDF,pBindInfo,pszHeaders,pszRedir,uiCP);
125 IMoniker *pmk,
reconcil.h 69 STDMETHOD(IsMonikerInBriefcase)(THIS_ IMoniker *pmk) PURE;
oleidl.h 152 virtual HRESULT WINAPI SendOnRename(IMoniker *pmk) = 0;
165 HRESULT (WINAPI *SendOnRename)(IOleAdviseHolder *This,IMoniker *pmk);
180 #define IOleAdviseHolder_SendOnRename(This,pmk) (This)->lpVtbl->SendOnRename(This,pmk)
191 HRESULT WINAPI IOleAdviseHolder_SendOnRename_Proxy(IOleAdviseHolder *This,IMoniker *pmk);
521 virtual HRESULT WINAPI SetMoniker(DWORD dwWhichMoniker,IMoniker *pmk) = 0;
549 HRESULT (WINAPI *SetMoniker)(IOleObject *This,DWORD dwWhichMoniker,IMoniker *pmk);
579 #define IOleObject_SetMoniker(This,dwWhichMoniker,pmk) (This)->lpVtbl->SetMoniker(This,dwWhichMoniker,pmk)
    [all...]
mshtmhst.h 117 typedef HRESULT WINAPI SHOWHTMLDIALOGFN (HWND hwndParent,IMoniker *pmk,VARIANT *pvarArgIn,WCHAR *pchOptions,VARIANT *pvArgOut);
118 typedef HRESULT WINAPI SHOWHTMLDIALOGEXFN (HWND hwndParent,IMoniker *pmk,DWORD dwDialogFlags,VARIANT *pvarArgIn,WCHAR *pchOptions,VARIANT *pvArgOut);
119 typedef HRESULT WINAPI SHOWMODELESSHTMLDIALOGFN (HWND hwndParent,IMoniker *pmk,VARIANT *pvarArgIn,VARIANT *pvarOptions,IHTMLWindow2 **ppWindow);
121 STDAPI ShowHTMLDialog(HWND hwndParent,IMoniker *pMk,VARIANT *pvarArgIn,WCHAR *pchOptions,VARIANT *pvarArgOut);
122 STDAPI ShowHTMLDialogEx(HWND hwndParent,IMoniker *pMk,DWORD dwDialogFlags,VARIANT *pvarArgIn,WCHAR *pchOptions,VARIANT *pvarArgOut);
123 STDAPI ShowModelessHTMLDialog(HWND hwndParent,IMoniker *pMk,VARIANT *pvarArgIn,VARIANT *pvarOptions,IHTMLWindow2 **ppWindow);
125 STDAPI CreateHTMLPropertyPage(IMoniker *pmk,IPropertyPage **ppPP);
136 virtual HRESULT WINAPI ShowHTMLDialog(HWND hwndParent,IMoniker *pMk,VARIANT *pvarArgIn,WCHAR *pchOptions,VARIANT *pvarArgOut,IUnknown *punkHost) = 0;
144 HRESULT (WINAPI *ShowHTMLDialog)(IHostDialogHelper *This,HWND hwndParent,IMoniker *pMk,VARIANT *pvarArgIn,WCHAR *pchOptions,VARIANT *pvarArgOut,IUnknown *punkHost);
154 #define IHostDialogHelper_ShowHTMLDialog(This,hwndParent,pMk,pvarArgIn,pchOptions,pvarArgOut,punkHost) (This)->lpVtbl->ShowHTMLDialog(This,hwndParent,pMk,pvarA (…)
    [all...]
txcoord.h 245 virtual HRESULT WINAPI PrepareRequestDone(HRESULT hr,IMoniker *pmk,BOID *pboidReason) = 0;
255 HRESULT (WINAPI *PrepareRequestDone)(ITransactionEnlistmentAsync *This,HRESULT hr,IMoniker *pmk,BOID *pboidReason);
267 #define ITransactionEnlistmentAsync_PrepareRequestDone(This,hr,pmk,pboidReason) (This)->lpVtbl->PrepareRequestDone(This,hr,pmk,pboidReason)
272 HRESULT WINAPI ITransactionEnlistmentAsync_PrepareRequestDone_Proxy(ITransactionEnlistmentAsync *This,HRESULT hr,IMoniker *pmk,BOID *pboidReason);
    [all...]
objidl.h     [all...]
objbase.h 336 WINOLEAPI BindMoniker(LPMONIKER pmk,DWORD grfOpt,REFIID iidResult,LPVOID *ppvResult);
  /external/wpa_supplicant_8/src/ap/
pmksa_cache_auth.h 20 u8 pmk[PMK_LEN_MAX]; member in struct:rsn_pmksa_cache_entry
51 const u8 *pmk, size_t pmk_len, const u8 *pmkid,
pmksa_cache_auth.c 261 * @pmk: The new pairwise master key
262 * @pmk_len: PMK length in bytes, usually PMK_LEN (32)
273 * This function create a PMKSA entry for a new PMK and adds it to the PMKSA
276 * based on the PMK.
280 const u8 *pmk, size_t pmk_len, const u8 *pmkid,
297 os_memcpy(entry->pmk, pmk, pmk_len);
306 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid,
349 os_memcpy(entry->pmk, old_entry->pmk, old_entry->pmk_len)
    [all...]
wpa_auth.h 290 int wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk,
294 const u8 *pmk, size_t len, const u8 *sta_addr,
298 const u8 *pmk, const u8 *pmkid);
309 u8 *pmkid, u8 *pmk);
wpa_auth.c 47 const u8 *pmk, unsigned int pmk_len,
449 wpa_printf(MSG_ERROR, "FT PMK cache initialization failed.");
830 const u8 *pmk = NULL; local
835 pmk = wpa_auth_get_psk(sm->wpa_auth, sm->addr,
836 sm->p2p_dev_addr, pmk);
837 if (pmk == NULL)
841 pmk = sm->PMK;
845 wpa_derive_ptk(sm, sm->alt_SNonce, pmk, pmk_len, &PTK);
2049 const u8 *pmk = NULL; local
    [all...]
wpa_auth_i.h 63 u8 PMK[PMK_LEN_MAX];
254 int wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, const u8 *pmk,
  /external/wpa_supplicant_8/src/common/
sae.h 47 u8 pmk[SAE_PMK_LEN]; member in struct:sae_data
wpa_common.c 119 * wpa_pmk_to_ptk - Calculate PTK from PMK, addresses, and nonces
120 * @pmk: Pairwise master key
121 * @pmk_len: Length of PMK
133 * PTK = PRF-X(PMK, "Pairwise key expansion",
141 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label,
175 sha384_prf(pmk, pmk_len, label, data, sizeof(data),
181 sha256_prf(pmk, pmk_len, label, data, sizeof(data),
185 sha1_prf(pmk, pmk_len, label, data, sizeof(data), tmp, ptk_len);
191 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len)
    [all...]
wpa_common.h 339 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label,
383 void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa,
sae.c 799 * KCK || PMK = KDF-512(keyseed, "SAE KCK and PMK",
814 if (sha256_prf(keyseed, sizeof(keyseed), "SAE KCK and PMK",
819 os_memcpy(sae->pmk, keys + SAE_KCK_LEN, SAE_PMK_LEN);
823 wpa_hexdump_key(MSG_DEBUG, "SAE: PMK", sae->pmk, SAE_PMK_LEN);
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
mesh_rsn.c 90 return sta->sae->pmk;
323 sta->sae->pmkid, sta->sae->pmk);
374 sha256_prf(sta->sae->pmk, sizeof(sta->sae->pmk), "AEK Derivation",
379 /* derive mesh temporal key from pmk */
429 sha256_prf(sta->sae->pmk, sizeof(sta->sae->pmk),
551 "Mesh RSN: Invalid PMKID (Chosen PMK did not match calculated PMKID)");
wpas_glue.c 273 u8 pmk[PMK_LEN]; local
302 wpa_printf(MSG_DEBUG, "Configure PMK for driver-based RSN 4-way "
309 wpa_printf(MSG_DEBUG, "RSN: Use FT XXKey as PMK for "
313 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN);
320 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
324 * uses only 16-byte PMK.
326 res = eapol_sm_get_key(eapol, pmk, 16);
332 wpa_printf(MSG_DEBUG, "Failed to get PMK from EAPOL state "
337 wpa_hexdump_key(MSG_DEBUG, "RSN: Configure PMK for driver-based 4-way "
338 "handshake", pmk, pmk_len)
    [all...]
eapol_test.c 362 u8 pmk[PMK_LEN]; local
367 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) {
368 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN);
369 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) {
370 printf("WARNING: PMK mismatch\n");
371 wpa_hexdump(MSG_DEBUG, "PMK from AS",
376 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) {
377 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16)
    [all...]

Completed in 730 milliseconds

1 2