HomeSort by relevance Sort by last modified time
    Searched refs:PMK_LEN (Results 1 - 25 of 35) sorted by null

1 2

  /external/wpa_supplicant_8/src/ap/
peerkey_auth.c 151 2 + RSN_SELECTOR_LEN + PMK_LEN + WPA_NONCE_LEN +
166 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN,
205 2 + RSN_SELECTOR_LEN + PMK_LEN + WPA_NONCE_LEN +
223 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN,
279 if (random_get_bytes(smk, PMK_LEN)) {
295 sha256_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf),
296 smk, PMK_LEN);
298 sha1_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf),
299 smk, PMK_LEN);
302 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", smk, PMK_LEN);
    [all...]
wpa_auth_ft.c 158 u8 pmk_r0[PMK_LEN];
168 u8 pmk_r1[PMK_LEN];
199 os_memset(r0prev->pmk_r0, 0, PMK_LEN);
207 os_memset(r1prev->pmk_r1, 0, PMK_LEN);
228 os_memcpy(r0->pmk_r0, pmk_r0, PMK_LEN);
252 os_memcpy(pmk_r0, r0->pmk_r0, PMK_LEN);
278 os_memcpy(r1->pmk_r1, pmk_r1, PMK_LEN);
302 os_memcpy(pmk_r1, r1->pmk_r1, PMK_LEN);
378 u8 pmk_r0[PMK_LEN], pmk_r0_name[WPA_PMK_NAME_LEN];
379 u8 pmk_r1[PMK_LEN];
    [all...]
wpa_auth.h 66 FT_R1KH_ID_LEN + ETH_ALEN + PMK_LEN + \
78 u8 pmk_r1[PMK_LEN];
86 WPA_PMK_NAME_LEN + PMK_LEN + \
101 u8 pmk_r1[PMK_LEN];
295 unsigned int pmk_len,
362 size_t pmk_len, const u8 *snonce, const u8 *anonce);
preauth_auth.c 205 if (len > PMK_LEN)
206 len = PMK_LEN;
ap_config.h 134 #define PMK_LEN 32
140 u8 psk[PMK_LEN];
148 u8 psk[PMK_LEN];
wps_hostapd.c 115 if (psk_len != PMK_LEN) {
127 os_memcpy(p->psk, psk, PMK_LEN);
139 char hex[PMK_LEN * 2 + 1];
370 bss->ssid.wpa_psk->psk, PMK_LEN) == 0) {
452 (cred->key_len < 8 || cred->key_len > 2 * PMK_LEN)) {
1104 wps->network_key = os_malloc(2 * PMK_LEN + 1);
1107 wpa_snprintf_hex((char *) wps->network_key, 2 * PMK_LEN + 1,
1108 conf->ssid.wpa_psk->psk, PMK_LEN);
1109 wps->network_key_len = 2 * PMK_LEN;
1120 os_memcpy(wps->psk, conf->ssid.wpa_psk->psk, PMK_LEN);
    [all...]
wpa_auth.c 53 const u8 *pmk, unsigned int pmk_len,
845 unsigned int pmk_len; local
854 pmk_len = PMK_LEN;
857 pmk_len = sm->pmk_len;
860 if (wpa_derive_ptk(sm, sm->alt_SNonce, pmk, pmk_len, &PTK) < 0)
1944 unsigned int pmk_len; local
2454 unsigned int pmk_len; local
    [all...]
ap_config.c 281 if (len == 64 && hexstr2bin(pos, psk->psk, PMK_LEN) == 0)
285 4096, psk->psk, PMK_LEN);
320 4096, ssid->wpa_psk->psk, PMK_LEN);
322 ssid->wpa_psk->psk, PMK_LEN);
wpa_auth_i.h 57 unsigned int pmk_len; member in struct:wpa_state_machine
110 u8 xxkey[PMK_LEN]; /* PSK or the second 256 bits of MSK */
ctrl_iface_ap.c 683 if (hexstr2bin(pos, pmk, PMK_LEN) < 0)
ieee802_11_auth.c 469 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) {
  /external/wpa_supplicant_8/wpa_supplicant/
ibss_rsn.h 50 u8 psk[PMK_LEN];
wpas_glue.c 273 int res, pmk_len; local
274 u8 pmk[PMK_LEN];
306 pmk_len = PMK_LEN;
309 u8 buf[2 * PMK_LEN];
312 res = eapol_sm_get_key(eapol, buf, 2 * PMK_LEN);
314 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN);
321 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
328 pmk_len = 16
    [all...]
eapol_test.c 61 u8 authenticator_pmk[PMK_LEN];
362 u8 pmk[PMK_LEN];
367 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) {
368 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN);
369 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) {
372 e->authenticator_pmk, PMK_LEN);
870 keys->recv_len > PMK_LEN ? PMK_LEN :
    [all...]
wpa_supplicant.c     [all...]
config.c 506 if (hexstr2bin(value, ssid->psk, PMK_LEN) ||
507 value[PMK_LEN * 2] != '\0') {
517 wpa_hexdump_key(MSG_MSGDUMP, "PSK", ssid->psk, PMK_LEN);
549 return wpa_config_write_string_hex(ssid->psk, PMK_LEN);
    [all...]
ibss_rsn.c 234 wpa_sm_set_pmk(peer->supp, psk, PMK_LEN, NULL, NULL);
829 os_memcpy(ibss_rsn->psk, psk, PMK_LEN);
  /external/wpa_supplicant_8/src/rsn_supp/
peerkey.h 23 u8 smk[PMK_LEN];
peerkey.c 312 hmac_sha256_vector(smk, PMK_LEN, 5, addr, len, hash);
315 hmac_sha1_vector(smk, PMK_LEN, 5, addr, len, hash);
440 if (os_memcmp(kde->smk + PMK_LEN, peerkey->pnonce, WPA_NONCE_LEN) != 0)
482 if (os_memcmp(kde->smk + PMK_LEN, peerkey->inonce, WPA_NONCE_LEN) != 0)
534 kde.smk == NULL || kde.smk_len < PMK_LEN + WPA_NONCE_LEN ||
564 os_memcpy(peerkey->smk, kde.smk, PMK_LEN);
566 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", peerkey->smk, PMK_LEN);
693 wpa_pmk_to_ptk(peerkey->smk, PMK_LEN, "Peer key expansion",
927 wpa_pmk_to_ptk(peerkey->smk, PMK_LEN, "Peer key expansion",
    [all...]
preauth.c 78 u8 pmk[PMK_LEN];
81 int res, pmk_len; local
82 pmk_len = PMK_LEN;
83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
90 pmk_len = 16;
94 pmk, pmk_len);
95 sm->pmk_len = pmk_len;
96 pmksa_cache_add(sm->pmksa, pmk, pmk_len, NULL
    [all...]
wpa_i.h 23 size_t pmk_len; member in struct:wpa_sm
120 u8 xxkey[PMK_LEN]; /* PSK or the second 256 bits of MSK */
122 u8 pmk_r0[PMK_LEN];
124 u8 pmk_r1[PMK_LEN];
367 const u8 *pmk, size_t pmk_len)
371 return sm->ctx->key_mgmt_set_pmk(sm->ctx->ctx, pmk, pmk_len);
wpa_ft.c 37 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R0", sm->pmk_r0, PMK_LEN);
42 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", sm->pmk_r1, PMK_LEN);
472 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", sm->pmk_r1, PMK_LEN);
wpa.c 246 if (wpa_sm_key_mgmt_set_pmk(sm, sm->pmk, sm->pmk_len))
283 sm->pmk, sm->pmk_len);
289 int res, pmk_len; local
292 pmk_len = PMK_LEN_SUITE_B_192;
294 pmk_len = PMK_LEN;
295 res = eapol_sm_get_key(sm->eapol, sm->pmk, pmk_len);
297 if (pmk_len == PMK_LEN) {
303 pmk_len = 16
    [all...]
  /external/wpa_supplicant_8/src/common/
wpa_common.c 145 * @pmk_len: Length of PMK
165 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label,
199 sha384_prf(pmk, pmk_len, label, data, sizeof(data),
205 sha256_prf(pmk, pmk_len, label, data, sizeof(data),
209 sha1_prf(pmk, pmk_len, label, data, sizeof(data), tmp, ptk_len);
215 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len);
235 size_t dh_ss_len, u8 *pmk, size_t *pmk_len)
247 *pmk_len = SHA384_MAC_LEN;
249 *pmk_len = SHA256_MAC_LEN;
275 wpa_hexdump_key(MSG_DEBUG, "FILS: PMK", pmk, *pmk_len);
    [all...]
wpa_common.h 14 #define PMK_LEN 32
347 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label,
353 size_t dh_ss_len, u8 *pmk, size_t *pmk_len);
356 int fils_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const u8 *spa, const u8 *aa,
405 void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa,

Completed in 658 milliseconds

1 2