/external/syslinux/gpxe/src/net/80211/ |
wpa_psk.c | 51 u8 pmk[WPA_PMK_LEN]; local 66 4096, pmk, WPA_PMK_LEN ); 68 DBGC ( ctx, "WPA-PSK %p: derived PMK from passphrase `%s':\n", ctx, 70 DBGC_HD ( ctx, pmk, WPA_PMK_LEN ); 72 return wpa_start ( dev, ctx, pmk, WPA_PMK_LEN );
|
wpa.c | 209 * @v pmk Pairwise Master Key to use for session 210 * @v pmk_len Length of PMK, almost always 32 214 const void *pmk, size_t pmk_len ) 225 memcpy ( ctx->pmk, pmk, ctx->pmk_len = pmk_len ); 282 u8 pmk[ctx->pmk_len]; local 290 memcpy ( pmk, ctx->pmk, ctx->pmk_len ); 293 memcpy ( pmkid_data.name, "PMK Name", 8 ); 297 hmac_init ( &sha1_algorithm, sha1_ctx, pmk, &pmk_len ) [all...] |
/external/wpa_supplicant_8/src/ap/ |
pmksa_cache_auth.h | 20 u8 pmk[PMK_LEN_MAX]; member in struct:rsn_pmksa_cache_entry 52 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 57 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid,
|
ctrl_iface_ap.c | 717 u8 pmk[PMK_LEN_MAX]; local 724 * <STA addr> <PMKID> <PMK> <expiration in seconds> <akmp> 748 hexstr2bin(pos, pmk, pmk_len) < 0) 756 return wpa_auth_pmksa_add2(hapd->wpa_auth, spa, pmk, pmk_len, 775 u8 pmk[PMK_LEN_MAX]; local 781 * <BSSID> <PMKID> <PMK> <expiration in seconds> 800 if (hexstr2bin(pos, pmk, PMK_LEN) < 0) 811 return wpa_auth_pmksa_create_entry(aa, spa, pmk, pmkid, expiration);
|
ieee802_11.c | 593 sta->sae->pmk, sta->sae->pmkid); 1304 const u8 *pmk = NULL; local [all...] |
wpa_auth.c | 55 const u8 *pmk, unsigned int pmk_len, 459 wpa_printf(MSG_ERROR, "FT PMK cache initialization failed."); 851 const u8 *pmk = NULL; local 858 pmk = wpa_auth_get_psk(sm->wpa_auth, sm->addr, 859 sm->p2p_dev_addr, pmk, &pmk_len); 860 if (pmk == NULL) 863 pmk = sm->PMK; 867 if (wpa_derive_ptk(sm, sm->alt_SNonce, pmk, pmk_len, &PTK) < 0) 2604 const u8 *pmk = NULL; local [all...] |
wpa_auth_ft.c | 1969 const u8 *pmk = NULL; local [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
pmksa_cache.h | 18 u8 pmk[PMK_LEN_MAX]; member in struct:rsn_pmksa_cache_entry 68 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 84 const u8 *pmk, size_t pmk_len); 133 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 156 const u8 *pmk, size_t pmk_len)
|
preauth.c | 78 u8 pmk[PMK_LEN]; local 83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 87 * uses only 16-byte PMK. 89 res = eapol_sm_get_key(eapol, pmk, 16); 93 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from pre-auth", 94 pmk, pmk_len); 96 pmksa_cache_add(sm->pmksa, pmk, pmk_len, NULL, 346 NULL, p->pmk, p->pmk_len);
|
wpa_i.h | 21 u8 pmk[PMK_LEN_MAX]; member in struct:wpa_sm 240 const u8 *cache_id, const u8 *pmk, 245 cache_id, pmk, pmk_len); 380 const u8 *pmk, size_t pmk_len) 384 return sm->ctx->key_mgmt_set_pmk(sm->ctx->ctx, pmk, pmk_len);
|
/frameworks/base/wifi/java/android/net/wifi/aware/ |
WifiAwareNetworkSpecifier.java | 38 * TYPE: in band, specific peer: role, client_id, session_id, peer_id, pmk/passphrase optional 44 * TYPE: in band, any peer: role, client_id, session_id, pmk/passphrase optional 51 * TYPE: out-of-band: role, client_id, peer_mac, pmk/passphrase optional 57 * TYPE: out-of-band, any peer: role, client_id, pmk/passphrase optional 106 * The PMK of the requested data-path. Can be null. Only one or none of pmk or passphrase should 110 public final byte[] pmk; field in class:WifiAwareNetworkSpecifier 113 * The Passphrase of the requested data-path. Can be null. Only one or none of the pmk or 130 byte[] peerMac, byte[] pmk, String passphrase, int requestorUid) { 137 this.pmk = pmk [all...] |
/external/wpa_supplicant_8/src/common/ |
sae.h | 47 u8 pmk[SAE_PMK_LEN]; member in struct:sae_data
|
dpp.h | 202 u8 pmk[PMK_LEN_MAX]; member in struct:dpp_introduction
|
/external/syslinux/gpxe/src/include/gpxe/ |
wpa.h | 176 /** Waiting for PMK to be set */ 280 * to call wpa_start(), passing the PMK (derived from PSK or EAP MSK) 302 u8 pmk[WPA_PMK_LEN]; member in struct:wpa_common_ctx 500 const void *pmk, size_t pmk_len );
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpas_glue.c | 276 u8 pmk[PMK_LEN]; local 305 wpa_printf(MSG_DEBUG, "Configure PMK for driver-based RSN 4-way " 312 wpa_printf(MSG_DEBUG, "RSN: Use FT XXKey as PMK for " 316 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN); 323 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 327 * uses only 16-byte PMK. 329 res = eapol_sm_get_key(eapol, pmk, 16); 335 wpa_printf(MSG_DEBUG, "Failed to get PMK from EAPOL state " 340 wpa_hexdump_key(MSG_DEBUG, "RSN: Configure PMK for driver-based 4-way " 341 "handshake", pmk, pmk_len) [all...] |
eapol_test.c | 362 u8 pmk[PMK_LEN]; local 367 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { 368 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); 369 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) { 370 printf("WARNING: PMK mismatch\n"); 371 wpa_hexdump(MSG_DEBUG, "PMK from AS", 376 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) { 377 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16) [all...] |
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/aware/ |
WifiAwareDataPathStateManager.java | 392 mMgr.respondToDataPathRequest(true, ndpId, nnri.interfaceName, nnri.networkSpecifier.pmk, 1256 public final byte[] pmk; field in class:WifiAwareDataPathStateManager.CanonicalConnectionInfo [all...] |
/hardware/libhardware_legacy/include/hardware_legacy/ |
wifi_nan.h | 279 /* pmk length */ 282 PMK: Info is optional in Discovery phase. 283 PMK info can be passed during 286 u8 pmk[NAN_PMK_INFO_LEN]; member in struct:__anon48508 [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver.h | 2043 const u8 *pmk; member in struct:wpa_pmkid_params [all...] |
/prebuilts/sdk/system_28/ |
android.jar | |
/prebuilts/sdk/system_current/ |
android.jar | |