HomeSort by: relevance | last modified time | path
    Searched defs:pmk (Results 1 - 18 of 18) sorted by relevancy

  /src/external/bsd/wpa/dist/src/ap/
pmksa_cache_auth.h 20 u8 pmk[PMK_LEN_MAX]; member in struct:rsn_pmksa_cache_entry
56 const u8 *pmk, size_t pmk_len, const u8 *pmkid,
61 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid,
ctrl_iface_ap.c 1173 u8 pmk[PMK_LEN_MAX]; local
1180 * <STA addr> <PMKID> <PMK> <expiration in seconds> <akmp>
1204 hexstr2bin(pos, pmk, pmk_len) < 0)
1212 return wpa_auth_pmksa_add2(hapd->wpa_auth, spa, pmk, pmk_len,
1231 u8 pmk[PMK_LEN_MAX]; local
1237 * <BSSID> <PMKID> <PMK> <expiration in seconds>
1256 if (hexstr2bin(pos, pmk, PMK_LEN) < 0)
1267 return wpa_auth_pmksa_create_entry(aa, spa, pmk, PMK_LEN,
sta_info.c 1445 const u8 *pmk; local
1450 pmk = wpa_auth_get_pmk(sta->wpa_sm, &pmk_len);
1451 if (!pmk || pmk_len != PMK_LEN)
1455 if (os_memcmp(pmk, psk->psk, PMK_LEN) == 0)
ieee802_11.c 974 sta->sae->pmk, sta->sae->pmk_len,
2068 const u8 *pmk = NULL; local
2182 wpa_printf(MSG_DEBUG, "FILS: Failed to derive PMK");
2188 pmk = pmk_buf;
2211 wpa_auth_add_fils_pmk_pmkid(sta->wpa_sm, pmk, pmk_len,
2216 pmk, pmk_len,
2226 pmk = pmksa->pmk;
2230 if (!pmk) {
2231 wpa_printf(MSG_DEBUG, "FILS: No PMK available")
2429 u8 pmk[PMK_LEN_MAX]; local
    [all...]
wpa_auth.c 62 const u8 *pmk, unsigned int pmk_len,
783 wpa_printf(MSG_ERROR, "FT PMK cache initialization failed.");
1297 const u8 *pmk = NULL; local
1309 pmk = wpa_auth_get_psk(sm->wpa_auth, sm->addr,
1310 sm->p2p_dev_addr, pmk, &pmk_len,
1312 if (!pmk)
1316 os_memcpy(sm->xxkey, pmk, pmk_len);
1321 pmk = sm->PMK;
1325 if (wpa_derive_ptk(sm, sm->alt_SNonce, pmk, pmk_len, &PTK, 0
3631 const u8 *pmk = NULL; local
    [all...]
wpa_auth_ft.c 2044 wpa_printf(MSG_DEBUG, "FT: Send PMK-R1 pull request from " MACSTR
2145 mpmk = sm->pmksa->pmk;
2970 /* Derive PMK-R1 from PSK, check all available PSK */
2980 const u8 *pmk = NULL; local
2995 pmk = wpa_ft_get_psk(wpa_auth, sm->addr, sm->p2p_dev_addr,
2996 pmk);
2997 if (pmk == NULL)
3000 if (wpa_derive_pmk_r0(pmk, PMK_LEN, ssid, ssid_len, mdid, r0kh,
3012 "FT: Found PSK to generate PMK-R1 locally");
3016 os_memcpy(sm->PMK, pmk, PMK_LEN)
    [all...]
  /src/external/bsd/wpa/dist/src/rsn_supp/
pmksa_cache.h 18 u8 pmk[PMK_LEN_MAX]; member in struct:rsn_pmksa_cache_entry
84 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
101 const u8 *pmk, size_t pmk_len, bool external_only);
preauth.c 89 u8 pmk[PMK_LEN]; local
94 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
98 * uses only 16-byte PMK.
100 res = eapol_sm_get_key(eapol, pmk, 16);
104 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from pre-auth",
105 pmk, pmk_len);
107 pmksa_cache_add(sm->pmksa, pmk, pmk_len, NULL,
355 NULL, p->pmk, p->pmk_len, 0, 0,
wpa_i.h 26 u8 pmk[PMK_LEN_MAX]; member in struct:wpa_sm
83 * If set Key Derivation Key should be derived as part of PMK to
169 * Currently, the WPA state machine stores the PMK-R1, PMK-R1-Name and
170 * R1KH-ID only for the current association. As PMK-R1 is required to
172 * associations, which would later be used to derive the PMK-R1 as part
312 const u8 *cache_id, const u8 *pmk,
318 cache_id, pmk, pmk_len, pmk_lifetime,
463 const u8 *pmk, size_t pmk_len)
467 return sm->ctx->key_mgmt_set_pmk(sm->ctx->ctx, pmk, pmk_len)
    [all...]
  /src/external/bsd/wpa/dist/src/pasn/
pasn_responder.c 103 /* Process the commit message and derive the PMK */
163 wpa_hexdump_key(MSG_DEBUG, "RSN: Cache PMK from SAE",
164 pasn->sae.pmk, pasn->sae.pmk_len);
168 pmksa_cache_auth_add(pasn->pmksa, pasn->sae.pmk, pasn->sae.pmk_len,
308 u8 pmk[PMK_LEN_MAX]; local
312 os_memset(pmk, 0, sizeof(pmk));
319 wpa_printf(MSG_DEBUG, "PASN: Using default PMK");
322 os_memcpy(pmk, pasn_default_pmk, sizeof(pasn_default_pmk));
327 os_memcpy(pmk, cached_pmk, cached_pmk_len)
    [all...]
pasn_common.h 77 u8 pmk[PMK_LEN_MAX]; member in struct:pasn_data
  /src/external/bsd/wpa/dist/src/common/
common_module_tests.c 313 const u8 pmk[] = { local
440 if (os_memcmp(pmk, sae.pmk, SAE_PMK_LEN) != 0) {
441 wpa_printf(MSG_ERROR, "SAE: Mismatch in PMK");
612 const u8 pmk[] = { local
650 ret = pasn_pmk_to_ptk(pmk, sizeof(pmk),
684 const u8 pmk[] = { local
729 ret = wpa_pmk_to_ptk(pmk, sizeof(pmk),
    [all...]
sae.h 110 u8 pmk[SAE_PMK_LEN_MAX]; member in struct:sae_data
dpp.h 420 u8 pmk[PMK_LEN_MAX]; member in struct:dpp_introduction
  /src/external/bsd/wpa/dist/wpa_supplicant/
wpas_glue.c 289 u8 pmk[PMK_LEN_MAX]; local
326 wpa_printf(MSG_DEBUG, "Configure PMK for driver-based RSN 4-way "
337 wpa_printf(MSG_DEBUG, "RSN: Use FT XXKey as PMK for "
341 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN);
348 res = eapol_sm_get_key(eapol, pmk, pmk_len);
352 * uses only 16-byte PMK.
354 res = eapol_sm_get_key(eapol, pmk, 16);
360 wpa_printf(MSG_DEBUG, "Failed to get PMK from EAPOL state "
365 wpa_hexdump_key(MSG_DEBUG, "RSN: Configure PMK for driver-based 4-way "
366 "handshake", pmk, pmk_len)
    [all...]
eapol_test.c 367 u8 pmk[PMK_LEN]; local
372 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) {
373 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN);
374 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) {
375 printf("WARNING: PMK mismatch\n");
376 wpa_hexdump(MSG_DEBUG, "PMK from AS",
381 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) {
382 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16)
    [all...]
  /src/external/bsd/wpa/dist/hostapd/
ctrl_iface.c 1425 const u8 *pmk; local
1432 pmk = wpa_auth_get_pmk(sta->wpa_sm, &pmk_len);
1434 for (psk = hapd->conf->ssid.wpa_psk; pmk && psk; psk = psk->next) {
1436 os_memcmp(psk->psk, pmk, pmk_len) == 0;
2394 return wpa_snprintf_hex(buf, buflen, pmksa->pmk, pmksa->pmk_len);
2403 const u8 *pmk; local
2415 pmk = wpa_auth_get_pmk(sta->wpa_sm, &pmk_len);
2416 if (!pmk || !pmk_len) {
2417 wpa_printf(MSG_DEBUG, "No PMK stored for " MACSTR,
2422 return wpa_snprintf_hex(buf, buflen, pmk, pmk_len)
    [all...]
  /src/external/bsd/wpa/dist/src/drivers/
driver.h 1979 * The key is a Pairwise Master Key (PMK).
2141 /** Driver takes care of RSN 4-way handshake internally; PMK is configured with
2875 const u8 *pmk; member in struct:wpa_pmkid_params
3200 * This function is called when a new PMK is received, as a result of
3202 * parameters are either a set of bssid, pmkid, and pmk; or a set of
3203 * ssid, fils_cache_id, pmkid, and pmk.
6085 * fils_pmk - A new PMK if generated in case of FILS

Completed in 55 milliseconds