HomeSort by relevance Sort by last modified time
    Searched refs:pmk (Results 1 - 25 of 54) sorted by null

1 2 3

  /frameworks/base/wifi/java/android/net/wifi/aware/
WifiAwareUtils.java 75 * Validates that the PMK is a non-null byte array of the right size (32 bytes per spec).
77 * @param pmk PMK to test
78 * @return true if PMK is valid, false if not
80 public static boolean validatePmk(byte[] pmk) {
81 if (pmk == null || pmk.length != 32) {
WifiAwareNetworkSpecifier.java 38 * TYPE: in band, specific peer: role, client_id, session_id, peer_id, pmk/passphrase optional
44 * TYPE: in band, any peer: role, client_id, session_id, pmk/passphrase optional
51 * TYPE: out-of-band: role, client_id, peer_mac, pmk/passphrase optional
57 * TYPE: out-of-band, any peer: role, client_id, pmk/passphrase optional
106 * The PMK of the requested data-path. Can be null. Only one or none of pmk or passphrase should
110 public final byte[] pmk; field in class:WifiAwareNetworkSpecifier
113 * The Passphrase of the requested data-path. Can be null. Only one or none of the pmk or
130 byte[] peerMac, byte[] pmk, String passphrase, int requestorUid) {
137 this.pmk = pmk
    [all...]
DiscoverySession.java 332 * @param passphrase The passphrase to be used to encrypt the link. The PMK is generated from
391 * @param pmk A PMK (pairwise master key, see IEEE 802.11i) specifying the key to use for
407 @NonNull byte[] pmk) {
408 if (!WifiAwareUtils.validatePmk(pmk)) {
409 throw new IllegalArgumentException("PMK must 32 bytes");
427 return mgr.createNetworkSpecifier(mClientId, role, mSessionId, peerHandle, pmk, null);
WifiAwareSession.java 251 * @param passphrase The passphrase to be used to encrypt the link. The PMK is generated from
298 * @param pmk A PMK (pairwise master key, see IEEE 802.11i) specifying the key to use for
314 @WifiAwareManager.DataPathRole int role, @Nullable byte[] peer, @NonNull byte[] pmk) {
324 if (!WifiAwareUtils.validatePmk(pmk)) {
325 throw new IllegalArgumentException("PMK must 32 bytes");
327 return mgr.createNetworkSpecifier(mClientId, role, peer, pmk, null);
WifiAwareManager.java 426 PeerHandle peerHandle, @Nullable byte[] pmk, @Nullable String passphrase) {
430 + ", pmk=" + ((pmk == null) ? "null" : "non-null")
456 pmk,
463 @Nullable byte[] peer, @Nullable byte[] pmk, @Nullable String passphrase) {
466 + ", pmk=" + ((pmk == null) ? "null" : "non-null")
494 pmk,
    [all...]
  /external/syslinux/gpxe/src/net/80211/
wpa_psk.c 51 u8 pmk[WPA_PMK_LEN]; local
66 4096, pmk, WPA_PMK_LEN );
68 DBGC ( ctx, "WPA-PSK %p: derived PMK from passphrase `%s':\n", ctx,
70 DBGC_HD ( ctx, pmk, WPA_PMK_LEN );
72 return wpa_start ( dev, ctx, pmk, WPA_PMK_LEN );
wpa.c 209 * @v pmk Pairwise Master Key to use for session
210 * @v pmk_len Length of PMK, almost always 32
214 const void *pmk, size_t pmk_len )
225 memcpy ( ctx->pmk, pmk, ctx->pmk_len = pmk_len );
282 u8 pmk[ctx->pmk_len]; local
290 memcpy ( pmk, ctx->pmk, ctx->pmk_len );
293 memcpy ( pmkid_data.name, "PMK Name", 8 );
297 hmac_init ( &sha1_algorithm, sha1_ctx, pmk, &pmk_len )
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
pmksa_cache.h 18 u8 pmk[PMK_LEN_MAX]; member in struct:rsn_pmksa_cache_entry
60 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
75 const u8 *pmk, size_t pmk_len);
124 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
145 const u8 *pmk, size_t pmk_len)
pmksa_cache.c 111 * @pmk: The new pairwise master key
112 * @pmk_len: PMK length in bytes, usually PMK_LEN (32)
118 * @network_ctx: Network configuration context for this PMK
122 * This function create a PMKSA entry for a new PMK and adds it to the PMKSA
125 * based on the PMK and the driver interface is notified of the new PMKID.
128 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
144 os_memcpy(entry->pmk, pmk, pmk_len);
153 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid,
180 os_memcmp_const(pos->pmk, entry->pmk
    [all...]
preauth.c 78 u8 pmk[PMK_LEN]; local
83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
87 * uses only 16-byte PMK.
89 res = eapol_sm_get_key(eapol, pmk, 16);
93 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from pre-auth",
94 pmk, pmk_len);
96 pmksa_cache_add(sm->pmksa, pmk, pmk_len, NULL,
wpa.h 81 int (*key_mgmt_set_pmk)(void *ctx, const u8 *pmk, size_t pmk_len);
120 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len,
191 static inline void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk,
  /prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/
downloadmgr.h 48 IMoniker *pmk,
80 IMoniker *pmk,
102 #define IDownloadManager_Download(This,pmk,pbc,dwBindVerb,grfBINDF,pBindInfo,pszHeaders,pszRedir,uiCP) (This)->lpVtbl->Download(This,pmk,pbc,dwBindVerb,grfBINDF,pBindInfo,pszHeaders,pszRedir,uiCP)
115 static FORCEINLINE HRESULT IDownloadManager_Download(IDownloadManager* This,IMoniker *pmk,IBindCtx *pbc,DWORD dwBindVerb,LONG grfBINDF,BINDINFO *pBindInfo,LPCOLESTR pszHeaders,LPCOLESTR pszRedir,UINT uiCP) {
116 return This->lpVtbl->Download(This,pmk,pbc,dwBindVerb,grfBINDF,pBindInfo,pszHeaders,pszRedir,uiCP);
125 IMoniker *pmk,
  /external/wpa_supplicant_8/src/ap/
pmksa_cache_auth.h 20 u8 pmk[PMK_LEN_MAX]; member in struct:rsn_pmksa_cache_entry
51 const u8 *pmk, size_t pmk_len, const u8 *pmkid,
56 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid,
pmksa_cache_auth.c 261 * @pmk: The new pairwise master key
262 * @pmk_len: PMK length in bytes, usually PMK_LEN (32)
273 * This function create a PMKSA entry for a new PMK and adds it to the PMKSA
276 * based on the PMK.
280 const u8 *pmk, size_t pmk_len, const u8 *pmkid,
287 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len,
300 * @pmk: The new pairwise master key
301 * @pmk_len: PMK length in bytes, usually PMK_LEN (32)
315 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid,
332 os_memcpy(entry->pmk, pmk, pmk_len)
    [all...]
wpa_auth.h 294 int wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk,
298 const u8 *pmk, size_t len, const u8 *sta_addr,
302 const u8 *pmk, const u8 *pmkid);
311 wpa_auth_pmksa_create_entry(const u8 *aa, const u8 *spa, const u8 *pmk,
321 u8 *pmkid, u8 *pmk);
361 int fils_auth_pmk_to_ptk(struct wpa_state_machine *sm, const u8 *pmk,
wpa_auth.c 53 const u8 *pmk, unsigned int pmk_len,
456 wpa_printf(MSG_ERROR, "FT PMK cache initialization failed.");
844 const u8 *pmk = NULL; local
850 pmk = wpa_auth_get_psk(sm->wpa_auth, sm->addr,
851 sm->p2p_dev_addr, pmk);
852 if (pmk == NULL)
856 pmk = sm->PMK;
860 if (wpa_derive_ptk(sm, sm->alt_SNonce, pmk, pmk_len, &PTK) < 0)
2453 const u8 *pmk = NULL; local
    [all...]
  /frameworks/opt/net/wifi/tests/wifitests/src/com/android/server/wifi/aware/
WifiAwareDataPathStateManagerTest.java 261 * Validate that trying to specify a PMK without permission results in failure.
267 final byte[] pmk = "01234567890123456789012345678901".getBytes();
282 NetworkRequest nr = getSessionNetworkRequest(clientId, res.mSessionId, res.mPeerHandle, pmk,
604 byte[] pmk = new byte[32];
605 pmk[0] = (byte) i;
608 WifiAwareManager.WIFI_AWARE_DATA_PATH_ROLE_INITIATOR, peerDiscoveryMac, pmk,
621 ifNameCaptor.capture(), eq(pmk), eq(null), eq(true), any());
    [all...]
  /external/sl4a/Common/src/com/googlecode/android_scripting/facade/wifi/
WifiAwareManagerFacade.java 111 private static final String NS_KEY_PMK = "pmk";
125 if (ns.pmk != null) {
126 j.put(NS_KEY_PMK, Base64.encodeToString(ns.pmk, Base64.DEFAULT));
142 byte[] pmk = null;
164 pmk = Base64.decode(j.getString(NS_KEY_PMK), Base64.DEFAULT);
170 return new WifiAwareNetworkSpecifier(type, role, clientId, sessionId, peerId, peerMac, pmk,
579 @RpcParameter(name = "pmk",
580 description = "PMK of the data-path (base64 encoded). Optional, can be empty/null.")
581 @RpcOptional String pmk)
597 if (TextUtils.isEmpty(passphrase) && TextUtils.isEmpty(pmk)) {
    [all...]
  /external/syslinux/gpxe/src/include/gpxe/
wpa.h 176 /** Waiting for PMK to be set */
280 * to call wpa_start(), passing the PMK (derived from PSK or EAP MSK)
302 u8 pmk[WPA_PMK_LEN]; member in struct:wpa_common_ctx
500 const void *pmk, size_t pmk_len );
  /external/wpa_supplicant_8/src/common/
sae.h 47 u8 pmk[SAE_PMK_LEN]; member in struct:sae_data
wpa_common.c 143 * wpa_pmk_to_ptk - Calculate PTK from PMK, addresses, and nonces
144 * @pmk: Pairwise master key
145 * @pmk_len: Length of PMK
157 * PTK = PRF-X(PMK, "Pairwise key expansion",
165 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label,
199 sha384_prf(pmk, pmk_len, label, data, sizeof(data),
205 sha256_prf(pmk, pmk_len, label, data, sizeof(data),
209 sha1_prf(pmk, pmk_len, label, data, sizeof(data), tmp, ptk_len);
215 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len)
    [all...]
  /frameworks/opt/net/wifi/service/java/com/android/server/wifi/aware/
WifiAwareDataPathStateManager.java 379 mMgr.respondToDataPathRequest(true, ndpId, nnri.interfaceName, nnri.networkSpecifier.pmk,
750 nnri.peerDiscoveryMac, nnri.interfaceName, nnri.networkSpecifier.pmk,
1189 public final byte[] pmk; field in class:WifiAwareDataPathStateManager.CanonicalConnectionInfo
    [all...]
WifiAwareNativeApi.java 706 * PMK or Passphrase (not both) - if both are null then an open (unencrypted) link is set up.
718 * @param pmk Pairwise master key (PMK - see IEEE 802.11i) for the data-path.
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
wpas_glue.c 274 u8 pmk[PMK_LEN]; local
303 wpa_printf(MSG_DEBUG, "Configure PMK for driver-based RSN 4-way "
310 wpa_printf(MSG_DEBUG, "RSN: Use FT XXKey as PMK for "
314 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN);
321 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
325 * uses only 16-byte PMK.
327 res = eapol_sm_get_key(eapol, pmk, 16);
333 wpa_printf(MSG_DEBUG, "Failed to get PMK from EAPOL state "
338 wpa_hexdump_key(MSG_DEBUG, "RSN: Configure PMK for driver-based 4-way "
339 "handshake", pmk, pmk_len)
    [all...]
  /tools/test/connectivity/acts/tests/google/wifi/aware/functional/
DataPathTest.py 38 PMK = "ODU0YjE3YzdmNDJiNWI4NTQ2NDJjNDI3M2VkZTQyZGU="
151 pmk = None
155 pmk = self.PMK
161 use_peer_id else None, passphrase, pmk))
167 passphrase, pmk))
244 pmk = None
248 pmk = self.PMK
255 if use_peer_id else None, passphrase, pmk))
    [all...]

Completed in 3728 milliseconds

1 2 3