HomeSort by relevance Sort by last modified time
    Searched defs:pmk (Results 1 - 21 of 21) sorted by null

  /external/syslinux/gpxe/src/net/80211/
wpa_psk.c 51 u8 pmk[WPA_PMK_LEN]; local
66 4096, pmk, WPA_PMK_LEN );
68 DBGC ( ctx, "WPA-PSK %p: derived PMK from passphrase `%s':\n", ctx,
70 DBGC_HD ( ctx, pmk, WPA_PMK_LEN );
72 return wpa_start ( dev, ctx, pmk, WPA_PMK_LEN );
wpa.c 209 * @v pmk Pairwise Master Key to use for session
210 * @v pmk_len Length of PMK, almost always 32
214 const void *pmk, size_t pmk_len )
225 memcpy ( ctx->pmk, pmk, ctx->pmk_len = pmk_len );
282 u8 pmk[ctx->pmk_len]; local
290 memcpy ( pmk, ctx->pmk, ctx->pmk_len );
293 memcpy ( pmkid_data.name, "PMK Name", 8 );
297 hmac_init ( &sha1_algorithm, sha1_ctx, pmk, &pmk_len )
    [all...]
  /external/wpa_supplicant_8/src/ap/
pmksa_cache_auth.h 20 u8 pmk[PMK_LEN_MAX]; member in struct:rsn_pmksa_cache_entry
52 const u8 *pmk, size_t pmk_len, const u8 *pmkid,
57 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid,
ctrl_iface_ap.c 717 u8 pmk[PMK_LEN_MAX]; local
724 * <STA addr> <PMKID> <PMK> <expiration in seconds> <akmp>
748 hexstr2bin(pos, pmk, pmk_len) < 0)
756 return wpa_auth_pmksa_add2(hapd->wpa_auth, spa, pmk, pmk_len,
775 u8 pmk[PMK_LEN_MAX]; local
781 * <BSSID> <PMKID> <PMK> <expiration in seconds>
800 if (hexstr2bin(pos, pmk, PMK_LEN) < 0)
811 return wpa_auth_pmksa_create_entry(aa, spa, pmk, pmkid, expiration);
ieee802_11.c 593 sta->sae->pmk, sta->sae->pmkid);
1304 const u8 *pmk = NULL; local
    [all...]
wpa_auth.c 55 const u8 *pmk, unsigned int pmk_len,
459 wpa_printf(MSG_ERROR, "FT PMK cache initialization failed.");
851 const u8 *pmk = NULL; local
858 pmk = wpa_auth_get_psk(sm->wpa_auth, sm->addr,
859 sm->p2p_dev_addr, pmk, &pmk_len);
860 if (pmk == NULL)
863 pmk = sm->PMK;
867 if (wpa_derive_ptk(sm, sm->alt_SNonce, pmk, pmk_len, &PTK) < 0)
2604 const u8 *pmk = NULL; local
    [all...]
wpa_auth_ft.c 1969 const u8 *pmk = NULL; local
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
pmksa_cache.h 18 u8 pmk[PMK_LEN_MAX]; member in struct:rsn_pmksa_cache_entry
68 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
84 const u8 *pmk, size_t pmk_len);
133 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
156 const u8 *pmk, size_t pmk_len)
preauth.c 78 u8 pmk[PMK_LEN]; local
83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
87 * uses only 16-byte PMK.
89 res = eapol_sm_get_key(eapol, pmk, 16);
93 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from pre-auth",
94 pmk, pmk_len);
96 pmksa_cache_add(sm->pmksa, pmk, pmk_len, NULL,
346 NULL, p->pmk, p->pmk_len);
wpa_i.h 21 u8 pmk[PMK_LEN_MAX]; member in struct:wpa_sm
240 const u8 *cache_id, const u8 *pmk,
245 cache_id, pmk, pmk_len);
380 const u8 *pmk, size_t pmk_len)
384 return sm->ctx->key_mgmt_set_pmk(sm->ctx->ctx, pmk, pmk_len);
  /frameworks/base/wifi/java/android/net/wifi/aware/
WifiAwareNetworkSpecifier.java 38 * TYPE: in band, specific peer: role, client_id, session_id, peer_id, pmk/passphrase optional
44 * TYPE: in band, any peer: role, client_id, session_id, pmk/passphrase optional
51 * TYPE: out-of-band: role, client_id, peer_mac, pmk/passphrase optional
57 * TYPE: out-of-band, any peer: role, client_id, pmk/passphrase optional
106 * The PMK of the requested data-path. Can be null. Only one or none of pmk or passphrase should
110 public final byte[] pmk; field in class:WifiAwareNetworkSpecifier
113 * The Passphrase of the requested data-path. Can be null. Only one or none of the pmk or
130 byte[] peerMac, byte[] pmk, String passphrase, int requestorUid) {
137 this.pmk = pmk
    [all...]
  /external/wpa_supplicant_8/src/common/
sae.h 47 u8 pmk[SAE_PMK_LEN]; member in struct:sae_data
dpp.h 202 u8 pmk[PMK_LEN_MAX]; member in struct:dpp_introduction
  /external/syslinux/gpxe/src/include/gpxe/
wpa.h 176 /** Waiting for PMK to be set */
280 * to call wpa_start(), passing the PMK (derived from PSK or EAP MSK)
302 u8 pmk[WPA_PMK_LEN]; member in struct:wpa_common_ctx
500 const void *pmk, size_t pmk_len );
  /external/wpa_supplicant_8/wpa_supplicant/
wpas_glue.c 276 u8 pmk[PMK_LEN]; local
305 wpa_printf(MSG_DEBUG, "Configure PMK for driver-based RSN 4-way "
312 wpa_printf(MSG_DEBUG, "RSN: Use FT XXKey as PMK for "
316 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN);
323 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
327 * uses only 16-byte PMK.
329 res = eapol_sm_get_key(eapol, pmk, 16);
335 wpa_printf(MSG_DEBUG, "Failed to get PMK from EAPOL state "
340 wpa_hexdump_key(MSG_DEBUG, "RSN: Configure PMK for driver-based 4-way "
341 "handshake", pmk, pmk_len)
    [all...]
eapol_test.c 362 u8 pmk[PMK_LEN]; local
367 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) {
368 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN);
369 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) {
370 printf("WARNING: PMK mismatch\n");
371 wpa_hexdump(MSG_DEBUG, "PMK from AS",
376 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) {
377 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16)
    [all...]
  /frameworks/opt/net/wifi/service/java/com/android/server/wifi/aware/
WifiAwareDataPathStateManager.java 392 mMgr.respondToDataPathRequest(true, ndpId, nnri.interfaceName, nnri.networkSpecifier.pmk,
1256 public final byte[] pmk; field in class:WifiAwareDataPathStateManager.CanonicalConnectionInfo
    [all...]
  /hardware/libhardware_legacy/include/hardware_legacy/
wifi_nan.h 279 /* pmk length */
282 PMK: Info is optional in Discovery phase.
283 PMK info can be passed during
286 u8 pmk[NAN_PMK_INFO_LEN]; member in struct:__anon48508
    [all...]
  /external/wpa_supplicant_8/src/drivers/
driver.h 2043 const u8 *pmk; member in struct:wpa_pmkid_params
    [all...]
  /prebuilts/sdk/system_28/
android.jar 
  /prebuilts/sdk/system_current/
android.jar 

Completed in 424 milliseconds