| /src/external/bsd/wpa/dist/src/ap/ |
| pmksa_cache_auth.h | 20 u8 pmk[PMK_LEN_MAX]; member in struct:rsn_pmksa_cache_entry 56 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 61 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid,
|
| ctrl_iface_ap.c | 1173 u8 pmk[PMK_LEN_MAX]; local 1180 * <STA addr> <PMKID> <PMK> <expiration in seconds> <akmp> 1204 hexstr2bin(pos, pmk, pmk_len) < 0) 1212 return wpa_auth_pmksa_add2(hapd->wpa_auth, spa, pmk, pmk_len, 1231 u8 pmk[PMK_LEN_MAX]; local 1237 * <BSSID> <PMKID> <PMK> <expiration in seconds> 1256 if (hexstr2bin(pos, pmk, PMK_LEN) < 0) 1267 return wpa_auth_pmksa_create_entry(aa, spa, pmk, PMK_LEN,
|
| sta_info.c | 1445 const u8 *pmk; local 1450 pmk = wpa_auth_get_pmk(sta->wpa_sm, &pmk_len); 1451 if (!pmk || pmk_len != PMK_LEN) 1455 if (os_memcmp(pmk, psk->psk, PMK_LEN) == 0)
|
| ieee802_11.c | 974 sta->sae->pmk, sta->sae->pmk_len, 2068 const u8 *pmk = NULL; local 2182 wpa_printf(MSG_DEBUG, "FILS: Failed to derive PMK"); 2188 pmk = pmk_buf; 2211 wpa_auth_add_fils_pmk_pmkid(sta->wpa_sm, pmk, pmk_len, 2216 pmk, pmk_len, 2226 pmk = pmksa->pmk; 2230 if (!pmk) { 2231 wpa_printf(MSG_DEBUG, "FILS: No PMK available") 2429 u8 pmk[PMK_LEN_MAX]; local [all...] |
| wpa_auth.c | 62 const u8 *pmk, unsigned int pmk_len, 783 wpa_printf(MSG_ERROR, "FT PMK cache initialization failed."); 1297 const u8 *pmk = NULL; local 1309 pmk = wpa_auth_get_psk(sm->wpa_auth, sm->addr, 1310 sm->p2p_dev_addr, pmk, &pmk_len, 1312 if (!pmk) 1316 os_memcpy(sm->xxkey, pmk, pmk_len); 1321 pmk = sm->PMK; 1325 if (wpa_derive_ptk(sm, sm->alt_SNonce, pmk, pmk_len, &PTK, 0 3631 const u8 *pmk = NULL; local [all...] |
| wpa_auth_ft.c | 2044 wpa_printf(MSG_DEBUG, "FT: Send PMK-R1 pull request from " MACSTR 2145 mpmk = sm->pmksa->pmk; 2970 /* Derive PMK-R1 from PSK, check all available PSK */ 2980 const u8 *pmk = NULL; local 2995 pmk = wpa_ft_get_psk(wpa_auth, sm->addr, sm->p2p_dev_addr, 2996 pmk); 2997 if (pmk == NULL) 3000 if (wpa_derive_pmk_r0(pmk, PMK_LEN, ssid, ssid_len, mdid, r0kh, 3012 "FT: Found PSK to generate PMK-R1 locally"); 3016 os_memcpy(sm->PMK, pmk, PMK_LEN) [all...] |
| /src/external/bsd/wpa/dist/src/rsn_supp/ |
| pmksa_cache.h | 18 u8 pmk[PMK_LEN_MAX]; member in struct:rsn_pmksa_cache_entry 84 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 101 const u8 *pmk, size_t pmk_len, bool external_only);
|
| preauth.c | 89 u8 pmk[PMK_LEN]; local 94 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 98 * uses only 16-byte PMK. 100 res = eapol_sm_get_key(eapol, pmk, 16); 104 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from pre-auth", 105 pmk, pmk_len); 107 pmksa_cache_add(sm->pmksa, pmk, pmk_len, NULL, 355 NULL, p->pmk, p->pmk_len, 0, 0,
|
| wpa_i.h | 26 u8 pmk[PMK_LEN_MAX]; member in struct:wpa_sm 83 * If set Key Derivation Key should be derived as part of PMK to 169 * Currently, the WPA state machine stores the PMK-R1, PMK-R1-Name and 170 * R1KH-ID only for the current association. As PMK-R1 is required to 172 * associations, which would later be used to derive the PMK-R1 as part 312 const u8 *cache_id, const u8 *pmk, 318 cache_id, pmk, pmk_len, pmk_lifetime, 463 const u8 *pmk, size_t pmk_len) 467 return sm->ctx->key_mgmt_set_pmk(sm->ctx->ctx, pmk, pmk_len) [all...] |
| /src/external/bsd/wpa/dist/src/pasn/ |
| pasn_responder.c | 103 /* Process the commit message and derive the PMK */ 163 wpa_hexdump_key(MSG_DEBUG, "RSN: Cache PMK from SAE", 164 pasn->sae.pmk, pasn->sae.pmk_len); 168 pmksa_cache_auth_add(pasn->pmksa, pasn->sae.pmk, pasn->sae.pmk_len, 308 u8 pmk[PMK_LEN_MAX]; local 312 os_memset(pmk, 0, sizeof(pmk)); 319 wpa_printf(MSG_DEBUG, "PASN: Using default PMK"); 322 os_memcpy(pmk, pasn_default_pmk, sizeof(pasn_default_pmk)); 327 os_memcpy(pmk, cached_pmk, cached_pmk_len) [all...] |
| pasn_common.h | 77 u8 pmk[PMK_LEN_MAX]; member in struct:pasn_data
|
| /src/external/bsd/wpa/dist/src/common/ |
| common_module_tests.c | 313 const u8 pmk[] = { local 440 if (os_memcmp(pmk, sae.pmk, SAE_PMK_LEN) != 0) { 441 wpa_printf(MSG_ERROR, "SAE: Mismatch in PMK"); 612 const u8 pmk[] = { local 650 ret = pasn_pmk_to_ptk(pmk, sizeof(pmk), 684 const u8 pmk[] = { local 729 ret = wpa_pmk_to_ptk(pmk, sizeof(pmk), [all...] |
| sae.h | 110 u8 pmk[SAE_PMK_LEN_MAX]; member in struct:sae_data
|
| dpp.h | 420 u8 pmk[PMK_LEN_MAX]; member in struct:dpp_introduction
|
| /src/external/bsd/wpa/dist/wpa_supplicant/ |
| wpas_glue.c | 289 u8 pmk[PMK_LEN_MAX]; local 326 wpa_printf(MSG_DEBUG, "Configure PMK for driver-based RSN 4-way " 337 wpa_printf(MSG_DEBUG, "RSN: Use FT XXKey as PMK for " 341 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN); 348 res = eapol_sm_get_key(eapol, pmk, pmk_len); 352 * uses only 16-byte PMK. 354 res = eapol_sm_get_key(eapol, pmk, 16); 360 wpa_printf(MSG_DEBUG, "Failed to get PMK from EAPOL state " 365 wpa_hexdump_key(MSG_DEBUG, "RSN: Configure PMK for driver-based 4-way " 366 "handshake", pmk, pmk_len) [all...] |
| eapol_test.c | 367 u8 pmk[PMK_LEN]; local 372 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { 373 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); 374 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) { 375 printf("WARNING: PMK mismatch\n"); 376 wpa_hexdump(MSG_DEBUG, "PMK from AS", 381 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) { 382 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16) [all...] |
| /src/external/bsd/wpa/dist/hostapd/ |
| ctrl_iface.c | 1425 const u8 *pmk; local 1432 pmk = wpa_auth_get_pmk(sta->wpa_sm, &pmk_len); 1434 for (psk = hapd->conf->ssid.wpa_psk; pmk && psk; psk = psk->next) { 1436 os_memcmp(psk->psk, pmk, pmk_len) == 0; 2394 return wpa_snprintf_hex(buf, buflen, pmksa->pmk, pmksa->pmk_len); 2403 const u8 *pmk; local 2415 pmk = wpa_auth_get_pmk(sta->wpa_sm, &pmk_len); 2416 if (!pmk || !pmk_len) { 2417 wpa_printf(MSG_DEBUG, "No PMK stored for " MACSTR, 2422 return wpa_snprintf_hex(buf, buflen, pmk, pmk_len) [all...] |
| /src/external/bsd/wpa/dist/src/drivers/ |
| driver.h | 1979 * The key is a Pairwise Master Key (PMK). 2141 /** Driver takes care of RSN 4-way handshake internally; PMK is configured with 2875 const u8 *pmk; member in struct:wpa_pmkid_params 3200 * This function is called when a new PMK is received, as a result of 3202 * parameters are either a set of bssid, pmkid, and pmk; or a set of 3203 * ssid, fils_cache_id, pmkid, and pmk. 6085 * fils_pmk - A new PMK if generated in case of FILS
|