| /src/external/bsd/wpa/dist/src/ap/ |
| pmksa_cache_auth.h | 19 u8 pmkid[PMKID_LEN]; member in struct:rsn_pmksa_cache_entry 50 const u8 *spa, const u8 *pmkid); 53 const u8 *pmkid); 56 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 61 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid, 70 const u8 *aa, const u8 *pmkid);
|
| pmksa_cache_auth.c | 26 #define PMKID_HASH(pmkid) (unsigned int) ((pmkid)[0] & 0x7f) 27 struct rsn_pmksa_cache_entry *pmkid[PMKID_HASH_SIZE]; member in struct:rsn_pmksa_cache 64 hash = PMKID_HASH(entry->pmkid); 65 pos = pmksa->pmkid[hash]; 72 pmksa->pmkid[hash] = entry->hnext; 248 hash = PMKID_HASH(entry->pmkid); 249 entry->hnext = pmksa->pmkid[hash]; 250 pmksa->pmkid[hash] = entry; 257 wpa_hexdump(MSG_DEBUG, "RSN: added PMKID", entry->pmkid, PMKID_LEN) [all...] |
| wpa_auth_ie.c | 123 const u8 *pmkid) 337 if (pmkid) { 340 /* PMKID Count */ 343 os_memcpy(pos, pmkid, PMKID_LEN); 351 if (pmkid == NULL) { 352 /* PMKID Count */ 386 int pmkid_count_set = pmkid != NULL; 389 /* PMKID Count */ 597 const u8 *pmkid; member in struct:wpa_auth_okc_iter_data 605 data->pmkid); 626 const u8 *pmkid = NULL; local [all...] |
| ctrl_iface_ap.c | 1172 u8 pmkid[PMKID_LEN]; local 1180 * <STA addr> <PMKID> <PMK> <expiration in seconds> <akmp> 1191 if (hexstr2bin(pos, pmkid, PMKID_LEN) < 0) 1213 pmkid, expiration, akmp, NULL); 1230 u8 pmkid[PMKID_LEN]; local 1237 * <BSSID> <PMKID> <PMK> <expiration in seconds> 1248 if (hexstr2bin(pos, pmkid, PMKID_LEN) < 0) 1268 WPA_KEY_MGMT_SAE, pmkid, expiration);
|
| wpa_auth_i.h | 62 u8 pmkid[PMKID_LEN]; /* valid if pmkid_set == 1 */ member in struct:wpa_state_machine 305 const u8 *pmkid);
|
| ieee802_11.c | 924 params.pmkid = sta->sae->pmkid; 975 sta->sae->pmkid, sta->sae->akmp); 1957 /* PMKID List */ 1958 if (rsn.pmkid && rsn.num_pmkid > 0) { 1960 const u8 *pmkid; local 1962 wpa_hexdump(MSG_DEBUG, "FILS: PMKID List", 1963 rsn.pmkid, rsn.num_pmkid * PMKID_LEN); 1965 pmkid = rsn.pmkid; 3615 u8 prk[SHA512_MAC_LEN], pmkid[SHA512_MAC_LEN]; local [all...] |
| wpa_auth.c | 1173 ie.num_pmkid < 1 || !ie.pmkid) { 1184 * case where it is the only listed PMKID. */ 1188 const u8 *pmkid = ie.pmkid + i * PMKID_LEN; local 1190 if (os_memcmp_const(pmkid, sm->pmk_r1_name, 1193 "FT: RSNE[PMKID[%u]] from supplicant matches PMKR1Name", 1198 if (os_memcmp(pmkid, 1199 assoc_ie.pmkid + j * PMKID_LEN, 1206 "FT: RSNE[PMKID[%u]] from supplicant is neither PMKR1Name nor included in AssocReq", 1212 "FT: RSNE[PMKID[%u]] from supplicant is not PMKR1Name, but matches a PMKID in AssocReq" 2706 u8 *pmkid = NULL; local 6737 const u8 *pmkid; member in struct:wpa_auth_fils_iter_data [all...] |
| /src/external/bsd/wpa/dist/src/drivers/ |
| driver_ndis.h | 23 u8 pmkid[16]; member in struct:ndis_pmkid_entry 46 struct ndis_pmkid_entry *pmkid; member in struct:wpa_driver_ndis_data
|
| driver_ndis.c | 251 NDIS_802_11_PMKID_VALUE PMKID; 326 NDIS_802_11_PMKID_VALUE PMKID; 1208 entry = drv->pmkid; 1222 entry = drv->pmkid; 1225 os_memcpy(&p->BSSIDInfo[i].PMKID, entry->pmkid, 16); 1241 const u8 *pmkid = params->pmkid; local 1243 if (!bssid || !pmkid) 1249 entry = drv->pmkid; 1286 const u8 *pmkid = params->pmkid; local 1316 struct ndis_pmkid_entry *pmkid, *prev; local 1574 NDIS_802_11_PMKID_CANDIDATE_LIST *pmkid; local [all...] |
| driver.h | 2874 const u8 *pmkid; member in struct:wpa_pmkid_params 2905 * @pmkid: Generated PMKID as part of external auth exchange (e.g., SAE). 2918 const u8 *pmkid; member in struct:external_auth 3202 * parameters are either a set of bssid, pmkid, and pmk; or a set of 3203 * ssid, fils_cache_id, pmkid, and pmk. 3222 * bssid and pmkid; or a set of ssid, fils_cache_id, and pmkid. 6096 * fils_pmkid - PMKID used or generated in FILS authentication 6197 /** BSSID of the PMKID candidate * [all...] |
| /src/external/bsd/wpa/dist/src/rsn_supp/ |
| pmksa_cache.h | 17 u8 pmkid[PMKID_LEN]; member in struct:rsn_pmksa_cache_entry 78 const u8 *pmkid, 85 const u8 *pmkid, const u8 *kck, size_t kck_len, 93 int pmksa_cache_set_current(struct wpa_sm *sm, const u8 *pmkid,
|
| pmksa_cache.c | 51 entry->pmkid, 147 entry->aa, entry->pmkid, NULL); 216 * @pmkid: Calculated PMKID 228 * this entry will be replaced with the new entry. PMKID will be calculated 229 * based on the PMK and the driver interface is notified of the new PMKID. 233 const u8 *pmkid, const u8 *kck, size_t kck_len, 259 if (pmkid) 260 os_memcpy(entry->pmkid, pmkid, PMKID_LEN) 508 const u8 *pmkid = NULL; local [all...] |
| wpa.c | 313 const u8 *pmkid) 317 if (pmkid && !sm->cur_pmksa) { 323 sm->own_addr, pmkid, 327 "RSN: found matching PMKID from PMKSA cache"); 330 "RSN: no matching PMKID found"); 335 if (pmkid && sm->cur_pmksa && 336 os_memcmp_const(pmkid, sm->cur_pmksa->pmkid, PMKID_LEN) == 0) { 337 wpa_hexdump(MSG_DEBUG, "RSN: matched PMKID", pmkid, PMKID_LEN) 6495 u8 prk[SHA512_MAC_LEN], pmkid[SHA512_MAC_LEN]; local [all...] |
| /src/external/bsd/wpa/dist/src/pasn/ |
| pasn_initiator.c | 259 * Calculate pending PMKID here so that we do not need to maintain a 266 wpa_printf(MSG_DEBUG, "PASN: FILS: Failed to get ERP PMKID"); 372 "PASN: FILS: Not expecting PMKID in RSNE"); 433 wpa_hexdump(MSG_DEBUG, "PASN: FILS: PMKID", pasn->fils.erp_pmkid, 526 const u8 *pmkid; local 553 pmkid = NULL; 556 pmkid = pasn->pmk_r1_name; 566 pmkid = pasn->custom_pmkid; 568 pmkid = pmksa->pmkid; 795 const u8 *pmkid = NULL; local [all...] |
| pasn_responder.c | 169 pasn->sae.pmkid, NULL, 0, pasn->own_addr, 438 const u8 *pmkid = NULL; local 453 pmkid = pasn->custom_pmkid; 455 pmkid = pmksa->pmkid; 458 wpa_printf(MSG_DEBUG, "PASN: Use SAE PMKID"); 459 pmkid = pasn->sae.pmkid; 464 wpa_printf(MSG_DEBUG, "PASN: Use FILS ERP PMKID"); 465 pmkid = pasn->fils.erp_pmkid 848 const u8 *pmkid = NULL; local [all...] |
| /src/external/bsd/wpa/dist/src/common/ |
| common_module_tests.c | 319 const u8 pmkid[] = { local 445 if (os_memcmp(pmkid, sae.pmkid, SAE_PMKID_LEN) != 0) { 446 wpa_printf(MSG_ERROR, "SAE: Mismatch in PMKID");
|
| sae.h | 115 u8 pmkid[SAE_PMKID_LEN]; member in struct:sae_data
|
| dpp.h | 419 u8 pmkid[PMKID_LEN]; member in struct:dpp_introduction
|
| wpa_common.h | 313 /* 1/4: PMKID 332 * PMKID Count (2 octets) (default: 0) 333 * PMKID List (16 * n octets) 474 u8 *pmkid); 525 const u8 *pmkid; member in struct:wpa_ie_data 537 u8 *pmkid, int akmp); 540 const u8 *spa, u8 *pmkid); 543 const u8 *spa, u8 *pmkid) 550 const u8 *spa, u8 *pmkid); 553 const u8 *aa, const u8 *spa, u8 *pmkid) 657 const u8 *pmkid; member in struct:wpa_eapol_ie_parse [all...] |