/external/wpa_supplicant_8/src/ap/ |
peerkey_auth.c | 151 2 + RSN_SELECTOR_LEN + PMK_LEN + WPA_NONCE_LEN + 166 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN, 205 2 + RSN_SELECTOR_LEN + PMK_LEN + WPA_NONCE_LEN + 223 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN, 279 if (random_get_bytes(smk, PMK_LEN)) { 295 sha256_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf), 296 smk, PMK_LEN); 298 sha1_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf), 299 smk, PMK_LEN); 302 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", smk, PMK_LEN); [all...] |
wpa_auth_ft.c | 158 u8 pmk_r0[PMK_LEN]; 168 u8 pmk_r1[PMK_LEN]; 199 os_memset(r0prev->pmk_r0, 0, PMK_LEN); 207 os_memset(r1prev->pmk_r1, 0, PMK_LEN); 228 os_memcpy(r0->pmk_r0, pmk_r0, PMK_LEN); 252 os_memcpy(pmk_r0, r0->pmk_r0, PMK_LEN); 278 os_memcpy(r1->pmk_r1, pmk_r1, PMK_LEN); 302 os_memcpy(pmk_r1, r1->pmk_r1, PMK_LEN); 378 u8 pmk_r0[PMK_LEN], pmk_r0_name[WPA_PMK_NAME_LEN]; 379 u8 pmk_r1[PMK_LEN]; [all...] |
wpa_auth.h | 66 FT_R1KH_ID_LEN + ETH_ALEN + PMK_LEN + \ 78 u8 pmk_r1[PMK_LEN]; 86 WPA_PMK_NAME_LEN + PMK_LEN + \ 101 u8 pmk_r1[PMK_LEN]; 294 unsigned int pmk_len, 361 size_t pmk_len, const u8 *snonce, const u8 *anonce);
|
preauth_auth.c | 205 if (len > PMK_LEN) 206 len = PMK_LEN;
|
ap_config.h | 134 #define PMK_LEN 32 140 u8 psk[PMK_LEN]; 148 u8 psk[PMK_LEN];
|
wps_hostapd.c | 115 if (psk_len != PMK_LEN) { 127 os_memcpy(p->psk, psk, PMK_LEN); 139 char hex[PMK_LEN * 2 + 1]; 370 bss->ssid.wpa_psk->psk, PMK_LEN) == 0) { 452 (cred->key_len < 8 || cred->key_len > 2 * PMK_LEN)) { 1104 wps->network_key = os_malloc(2 * PMK_LEN + 1); 1107 wpa_snprintf_hex((char *) wps->network_key, 2 * PMK_LEN + 1, 1108 conf->ssid.wpa_psk->psk, PMK_LEN); 1109 wps->network_key_len = 2 * PMK_LEN; 1120 os_memcpy(wps->psk, conf->ssid.wpa_psk->psk, PMK_LEN); [all...] |
wpa_auth.c | 53 const u8 *pmk, unsigned int pmk_len, 845 unsigned int pmk_len; local 854 pmk_len = PMK_LEN; 857 pmk_len = sm->pmk_len; 860 if (wpa_derive_ptk(sm, sm->alt_SNonce, pmk, pmk_len, &PTK) < 0) 1926 unsigned int pmk_len; local 2436 unsigned int pmk_len; local [all...] |
ap_config.c | 281 if (len == 64 && hexstr2bin(pos, psk->psk, PMK_LEN) == 0) 285 4096, psk->psk, PMK_LEN); 320 4096, ssid->wpa_psk->psk, PMK_LEN); 322 ssid->wpa_psk->psk, PMK_LEN);
|
wpa_auth_i.h | 57 unsigned int pmk_len; member in struct:wpa_state_machine 109 u8 xxkey[PMK_LEN]; /* PSK or the second 256 bits of MSK */
|
ctrl_iface_ap.c | 683 if (hexstr2bin(pos, pmk, PMK_LEN) < 0)
|
ieee802_11_auth.c | 469 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) {
|
/external/wpa_supplicant_8/wpa_supplicant/ |
ibss_rsn.h | 50 u8 psk[PMK_LEN];
|
wpas_glue.c | 273 int res, pmk_len; local 274 u8 pmk[PMK_LEN]; 306 pmk_len = PMK_LEN; 309 u8 buf[2 * PMK_LEN]; 312 res = eapol_sm_get_key(eapol, buf, 2 * PMK_LEN); 314 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN); 321 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 328 pmk_len = 16 [all...] |
eapol_test.c | 61 u8 authenticator_pmk[PMK_LEN]; 362 u8 pmk[PMK_LEN]; 367 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { 368 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); 369 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) { 372 e->authenticator_pmk, PMK_LEN); 870 keys->recv_len > PMK_LEN ? PMK_LEN : [all...] |
wpa_supplicant.c | [all...] |
config.c | 506 if (hexstr2bin(value, ssid->psk, PMK_LEN) || 507 value[PMK_LEN * 2] != '\0') { 517 wpa_hexdump_key(MSG_MSGDUMP, "PSK", ssid->psk, PMK_LEN); 549 return wpa_config_write_string_hex(ssid->psk, PMK_LEN); [all...] |
ibss_rsn.c | 234 wpa_sm_set_pmk(peer->supp, psk, PMK_LEN, NULL, NULL); 829 os_memcpy(ibss_rsn->psk, psk, PMK_LEN);
|
/external/wpa_supplicant_8/src/rsn_supp/ |
peerkey.h | 23 u8 smk[PMK_LEN];
|
peerkey.c | 312 hmac_sha256_vector(smk, PMK_LEN, 5, addr, len, hash); 315 hmac_sha1_vector(smk, PMK_LEN, 5, addr, len, hash); 440 if (os_memcmp(kde->smk + PMK_LEN, peerkey->pnonce, WPA_NONCE_LEN) != 0) 482 if (os_memcmp(kde->smk + PMK_LEN, peerkey->inonce, WPA_NONCE_LEN) != 0) 534 kde.smk == NULL || kde.smk_len < PMK_LEN + WPA_NONCE_LEN || 564 os_memcpy(peerkey->smk, kde.smk, PMK_LEN); 566 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", peerkey->smk, PMK_LEN); 693 wpa_pmk_to_ptk(peerkey->smk, PMK_LEN, "Peer key expansion", 927 wpa_pmk_to_ptk(peerkey->smk, PMK_LEN, "Peer key expansion", [all...] |
preauth.c | 78 u8 pmk[PMK_LEN]; 81 int res, pmk_len; local 82 pmk_len = PMK_LEN; 83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 90 pmk_len = 16; 94 pmk, pmk_len); 95 sm->pmk_len = pmk_len; 96 pmksa_cache_add(sm->pmksa, pmk, pmk_len, NULL [all...] |
wpa_i.h | 23 size_t pmk_len; member in struct:wpa_sm 115 u8 xxkey[PMK_LEN]; /* PSK or the second 256 bits of MSK */ 117 u8 pmk_r0[PMK_LEN]; 119 u8 pmk_r1[PMK_LEN]; 361 const u8 *pmk, size_t pmk_len) 365 return sm->ctx->key_mgmt_set_pmk(sm->ctx->ctx, pmk, pmk_len);
|
wpa_ft.c | 37 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R0", sm->pmk_r0, PMK_LEN); 42 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", sm->pmk_r1, PMK_LEN); 471 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", sm->pmk_r1, PMK_LEN);
|
wpa.c | 246 if (wpa_sm_key_mgmt_set_pmk(sm, sm->pmk, sm->pmk_len)) 283 sm->pmk, sm->pmk_len); 289 int res, pmk_len; local 292 pmk_len = PMK_LEN_SUITE_B_192; 294 pmk_len = PMK_LEN; 295 res = eapol_sm_get_key(sm->eapol, sm->pmk, pmk_len); 297 if (pmk_len == PMK_LEN) { 303 pmk_len = 16 [all...] |
/external/wpa_supplicant_8/src/common/ |
wpa_common.c | 145 * @pmk_len: Length of PMK 165 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, 199 sha384_prf(pmk, pmk_len, label, data, sizeof(data), 205 sha256_prf(pmk, pmk_len, label, data, sizeof(data), 209 sha1_prf(pmk, pmk_len, label, data, sizeof(data), tmp, ptk_len); 215 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len); 235 size_t dh_ss_len, u8 *pmk, size_t *pmk_len) 247 *pmk_len = SHA384_MAC_LEN; 249 *pmk_len = SHA256_MAC_LEN; 275 wpa_hexdump_key(MSG_DEBUG, "FILS: PMK", pmk, *pmk_len); [all...] |
wpa_common.h | 14 #define PMK_LEN 32 335 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, 341 size_t dh_ss_len, u8 *pmk, size_t *pmk_len); 344 int fils_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const u8 *spa, const u8 *aa, 393 void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa,
|