/frameworks/base/wifi/java/android/net/wifi/aware/ |
WifiAwareUtils.java | 75 * Validates that the PMK is a non-null byte array of the right size (32 bytes per spec). 77 * @param pmk PMK to test 78 * @return true if PMK is valid, false if not 80 public static boolean validatePmk(byte[] pmk) { 81 if (pmk == null || pmk.length != 32) {
|
WifiAwareNetworkSpecifier.java | 38 * TYPE: in band, specific peer: role, client_id, session_id, peer_id, pmk/passphrase optional 44 * TYPE: in band, any peer: role, client_id, session_id, pmk/passphrase optional 51 * TYPE: out-of-band: role, client_id, peer_mac, pmk/passphrase optional 57 * TYPE: out-of-band, any peer: role, client_id, pmk/passphrase optional 106 * The PMK of the requested data-path. Can be null. Only one or none of pmk or passphrase should 110 public final byte[] pmk; field in class:WifiAwareNetworkSpecifier 113 * The Passphrase of the requested data-path. Can be null. Only one or none of the pmk or 130 byte[] peerMac, byte[] pmk, String passphrase, int requestorUid) { 137 this.pmk = pmk [all...] |
DiscoverySession.java | 332 * @param passphrase The passphrase to be used to encrypt the link. The PMK is generated from 391 * @param pmk A PMK (pairwise master key, see IEEE 802.11i) specifying the key to use for 407 @NonNull byte[] pmk) { 408 if (!WifiAwareUtils.validatePmk(pmk)) { 409 throw new IllegalArgumentException("PMK must 32 bytes"); 427 return mgr.createNetworkSpecifier(mClientId, role, mSessionId, peerHandle, pmk, null);
|
WifiAwareSession.java | 251 * @param passphrase The passphrase to be used to encrypt the link. The PMK is generated from 298 * @param pmk A PMK (pairwise master key, see IEEE 802.11i) specifying the key to use for 314 @WifiAwareManager.DataPathRole int role, @Nullable byte[] peer, @NonNull byte[] pmk) { 324 if (!WifiAwareUtils.validatePmk(pmk)) { 325 throw new IllegalArgumentException("PMK must 32 bytes"); 327 return mgr.createNetworkSpecifier(mClientId, role, peer, pmk, null);
|
WifiAwareManager.java | 426 PeerHandle peerHandle, @Nullable byte[] pmk, @Nullable String passphrase) { 430 + ", pmk=" + ((pmk == null) ? "null" : "non-null") 456 pmk, 463 @Nullable byte[] peer, @Nullable byte[] pmk, @Nullable String passphrase) { 466 + ", pmk=" + ((pmk == null) ? "null" : "non-null") 494 pmk, [all...] |
/external/syslinux/gpxe/src/net/80211/ |
wpa_psk.c | 51 u8 pmk[WPA_PMK_LEN]; local 66 4096, pmk, WPA_PMK_LEN ); 68 DBGC ( ctx, "WPA-PSK %p: derived PMK from passphrase `%s':\n", ctx, 70 DBGC_HD ( ctx, pmk, WPA_PMK_LEN ); 72 return wpa_start ( dev, ctx, pmk, WPA_PMK_LEN );
|
wpa.c | 209 * @v pmk Pairwise Master Key to use for session 210 * @v pmk_len Length of PMK, almost always 32 214 const void *pmk, size_t pmk_len ) 225 memcpy ( ctx->pmk, pmk, ctx->pmk_len = pmk_len ); 282 u8 pmk[ctx->pmk_len]; local 290 memcpy ( pmk, ctx->pmk, ctx->pmk_len ); 293 memcpy ( pmkid_data.name, "PMK Name", 8 ); 297 hmac_init ( &sha1_algorithm, sha1_ctx, pmk, &pmk_len ) [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
pmksa_cache.h | 18 u8 pmk[PMK_LEN_MAX]; member in struct:rsn_pmksa_cache_entry 60 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 75 const u8 *pmk, size_t pmk_len); 124 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 145 const u8 *pmk, size_t pmk_len)
|
pmksa_cache.c | 111 * @pmk: The new pairwise master key 112 * @pmk_len: PMK length in bytes, usually PMK_LEN (32) 118 * @network_ctx: Network configuration context for this PMK 122 * This function create a PMKSA entry for a new PMK and adds it to the PMKSA 125 * based on the PMK and the driver interface is notified of the new PMKID. 128 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 144 os_memcpy(entry->pmk, pmk, pmk_len); 153 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, 180 os_memcmp_const(pos->pmk, entry->pmk [all...] |
preauth.c | 78 u8 pmk[PMK_LEN]; local 83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 87 * uses only 16-byte PMK. 89 res = eapol_sm_get_key(eapol, pmk, 16); 93 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from pre-auth", 94 pmk, pmk_len); 96 pmksa_cache_add(sm->pmksa, pmk, pmk_len, NULL,
|
wpa.h | 81 int (*key_mgmt_set_pmk)(void *ctx, const u8 *pmk, size_t pmk_len); 120 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, 191 static inline void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk,
|
/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/ |
downloadmgr.h | 48 IMoniker *pmk, 80 IMoniker *pmk, 102 #define IDownloadManager_Download(This,pmk,pbc,dwBindVerb,grfBINDF,pBindInfo,pszHeaders,pszRedir,uiCP) (This)->lpVtbl->Download(This,pmk,pbc,dwBindVerb,grfBINDF,pBindInfo,pszHeaders,pszRedir,uiCP) 115 static FORCEINLINE HRESULT IDownloadManager_Download(IDownloadManager* This,IMoniker *pmk,IBindCtx *pbc,DWORD dwBindVerb,LONG grfBINDF,BINDINFO *pBindInfo,LPCOLESTR pszHeaders,LPCOLESTR pszRedir,UINT uiCP) { 116 return This->lpVtbl->Download(This,pmk,pbc,dwBindVerb,grfBINDF,pBindInfo,pszHeaders,pszRedir,uiCP); 125 IMoniker *pmk,
|
/external/wpa_supplicant_8/src/ap/ |
pmksa_cache_auth.h | 20 u8 pmk[PMK_LEN_MAX]; member in struct:rsn_pmksa_cache_entry 51 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 56 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid,
|
pmksa_cache_auth.c | 261 * @pmk: The new pairwise master key 262 * @pmk_len: PMK length in bytes, usually PMK_LEN (32) 273 * This function create a PMKSA entry for a new PMK and adds it to the PMKSA 276 * based on the PMK. 280 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 287 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len, 300 * @pmk: The new pairwise master key 301 * @pmk_len: PMK length in bytes, usually PMK_LEN (32) 315 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid, 332 os_memcpy(entry->pmk, pmk, pmk_len) [all...] |
wpa_auth.h | 294 int wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk, 298 const u8 *pmk, size_t len, const u8 *sta_addr, 302 const u8 *pmk, const u8 *pmkid); 311 wpa_auth_pmksa_create_entry(const u8 *aa, const u8 *spa, const u8 *pmk, 321 u8 *pmkid, u8 *pmk); 361 int fils_auth_pmk_to_ptk(struct wpa_state_machine *sm, const u8 *pmk,
|
wpa_auth.c | 53 const u8 *pmk, unsigned int pmk_len, 456 wpa_printf(MSG_ERROR, "FT PMK cache initialization failed."); 844 const u8 *pmk = NULL; local 850 pmk = wpa_auth_get_psk(sm->wpa_auth, sm->addr, 851 sm->p2p_dev_addr, pmk); 852 if (pmk == NULL) 856 pmk = sm->PMK; 860 if (wpa_derive_ptk(sm, sm->alt_SNonce, pmk, pmk_len, &PTK) < 0) 2453 const u8 *pmk = NULL; local [all...] |
/frameworks/opt/net/wifi/tests/wifitests/src/com/android/server/wifi/aware/ |
WifiAwareDataPathStateManagerTest.java | 261 * Validate that trying to specify a PMK without permission results in failure. 267 final byte[] pmk = "01234567890123456789012345678901".getBytes(); 282 NetworkRequest nr = getSessionNetworkRequest(clientId, res.mSessionId, res.mPeerHandle, pmk, 604 byte[] pmk = new byte[32]; 605 pmk[0] = (byte) i; 608 WifiAwareManager.WIFI_AWARE_DATA_PATH_ROLE_INITIATOR, peerDiscoveryMac, pmk, 621 ifNameCaptor.capture(), eq(pmk), eq(null), eq(true), any()); [all...] |
/external/sl4a/Common/src/com/googlecode/android_scripting/facade/wifi/ |
WifiAwareManagerFacade.java | 111 private static final String NS_KEY_PMK = "pmk"; 125 if (ns.pmk != null) { 126 j.put(NS_KEY_PMK, Base64.encodeToString(ns.pmk, Base64.DEFAULT)); 142 byte[] pmk = null; 164 pmk = Base64.decode(j.getString(NS_KEY_PMK), Base64.DEFAULT); 170 return new WifiAwareNetworkSpecifier(type, role, clientId, sessionId, peerId, peerMac, pmk, 579 @RpcParameter(name = "pmk", 580 description = "PMK of the data-path (base64 encoded). Optional, can be empty/null.") 581 @RpcOptional String pmk) 597 if (TextUtils.isEmpty(passphrase) && TextUtils.isEmpty(pmk)) { [all...] |
/external/syslinux/gpxe/src/include/gpxe/ |
wpa.h | 176 /** Waiting for PMK to be set */ 280 * to call wpa_start(), passing the PMK (derived from PSK or EAP MSK) 302 u8 pmk[WPA_PMK_LEN]; member in struct:wpa_common_ctx 500 const void *pmk, size_t pmk_len );
|
/external/wpa_supplicant_8/src/common/ |
sae.h | 47 u8 pmk[SAE_PMK_LEN]; member in struct:sae_data
|
wpa_common.c | 143 * wpa_pmk_to_ptk - Calculate PTK from PMK, addresses, and nonces 144 * @pmk: Pairwise master key 145 * @pmk_len: Length of PMK 157 * PTK = PRF-X(PMK, "Pairwise key expansion", 165 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, 199 sha384_prf(pmk, pmk_len, label, data, sizeof(data), 205 sha256_prf(pmk, pmk_len, label, data, sizeof(data), 209 sha1_prf(pmk, pmk_len, label, data, sizeof(data), tmp, ptk_len); 215 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len) [all...] |
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/aware/ |
WifiAwareDataPathStateManager.java | 379 mMgr.respondToDataPathRequest(true, ndpId, nnri.interfaceName, nnri.networkSpecifier.pmk, 750 nnri.peerDiscoveryMac, nnri.interfaceName, nnri.networkSpecifier.pmk, 1189 public final byte[] pmk; field in class:WifiAwareDataPathStateManager.CanonicalConnectionInfo [all...] |
WifiAwareNativeApi.java | 706 * PMK or Passphrase (not both) - if both are null then an open (unencrypted) link is set up. 718 * @param pmk Pairwise master key (PMK - see IEEE 802.11i) for the data-path. [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
wpas_glue.c | 274 u8 pmk[PMK_LEN]; local 303 wpa_printf(MSG_DEBUG, "Configure PMK for driver-based RSN 4-way " 310 wpa_printf(MSG_DEBUG, "RSN: Use FT XXKey as PMK for " 314 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN); 321 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 325 * uses only 16-byte PMK. 327 res = eapol_sm_get_key(eapol, pmk, 16); 333 wpa_printf(MSG_DEBUG, "Failed to get PMK from EAPOL state " 338 wpa_hexdump_key(MSG_DEBUG, "RSN: Configure PMK for driver-based 4-way " 339 "handshake", pmk, pmk_len) [all...] |
/tools/test/connectivity/acts/tests/google/wifi/aware/functional/ |
DataPathTest.py | 38 PMK = "ODU0YjE3YzdmNDJiNWI4NTQ2NDJjNDI3M2VkZTQyZGU=" 151 pmk = None 155 pmk = self.PMK 161 use_peer_id else None, passphrase, pmk)) 167 passphrase, pmk)) 244 pmk = None 248 pmk = self.PMK 255 if use_peer_id else None, passphrase, pmk)) [all...] |