Searched refs:PMK (Results 1 - 6 of 6) sorted by relevance
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | wpa_auth.c | 546 wpa_printf(MSG_ERROR, "FT PMK cache initialization failed."); in wpa_init() 981 pmk = sm->PMK; in wpa_try_alt_snonce() 991 if (sm->PMK != pmk) { in wpa_try_alt_snonce() 992 os_memcpy(sm->PMK, pmk, pmk_len); in wpa_try_alt_snonce() 1849 os_memset(sm->PMK, 0, sizeof(sm->PMK)); in wpa_auth_sm_event() 2118 wpa_printf(MSG_DEBUG, "WPA: PMK from PMKSA cache"); in SM_STATE() 2119 os_memcpy(sm->PMK, sm->pmksa->pmk, sm->pmksa->pmk_len); in SM_STATE() 2137 "WPA: PMK from EAPOL state machine (MSK len=%zu PMK le in SM_STATE() [all...] |
H A D | wpa_auth_i.h | 60 u8 PMK[PMK_LEN_MAX]; member
|
H A D | wpa_auth_ft.c | 2010 wpa_printf(MSG_DEBUG, "FT: Send PMK-R1 pull request from " MACSTR_SEC in wpa_ft_pull_pmk_r1() 2857 /* Derive PMK-R1 from PSK, check all available PSK */ 2898 "FT: Found PSK to generate PMK-R1 locally"); in wpa_ft_psk_pmk_r1() 2902 os_memcpy(sm->PMK, pmk, PMK_LEN); in wpa_ft_psk_pmk_r1() 2930 "FT: Did not find PSK to generate PMK-R1 locally"); in wpa_ft_psk_pmk_r1() 3151 "FT: Generated PMK-R1 for FT-PSK locally"); in wpa_ft_process_auth_req() 3157 "FT: No PMK-R1 available in local cache for the requested PMKR1Name"); in wpa_ft_process_auth_req() 3166 "FT: Generated PMK-R1 based on local PMK-R0"); in wpa_ft_process_auth_req() 3172 "FT: Did not have matching PMK in wpa_ft_process_auth_req() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | wpa_auth.c | 489 wpa_printf(MSG_ERROR, "FT PMK cache initialization failed."); in wpa_init() 905 pmk = sm->PMK; in wpa_try_alt_snonce() 914 if (sm->PMK != pmk) { in wpa_try_alt_snonce() 915 os_memcpy(sm->PMK, pmk, pmk_len); in wpa_try_alt_snonce() 1759 os_memset(sm->PMK, 0, sizeof(sm->PMK)); in wpa_auth_sm_event() 2014 wpa_printf(MSG_DEBUG, "WPA: PMK from PMKSA cache"); in SM_STATE() 2015 os_memcpy(sm->PMK, sm->pmksa->pmk, sm->pmksa->pmk_len); in SM_STATE() 2032 wpa_printf(MSG_DEBUG, "WPA: PMK from EAPOL state machine " in SM_STATE() 2033 "(MSK len=%lu PMK le in SM_STATE() [all...] |
H A D | wpa_auth_i.h | 60 u8 PMK[PMK_LEN_MAX]; member
|
H A D | wpa_auth_ft.c | 2000 wpa_printf(MSG_DEBUG, "FT: Send PMK-R1 pull request to remote R0KH " in wpa_ft_pull_pmk_r1() 2129 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R0", pmk_r0, pmk_r0_len); in wpa_auth_derive_ptk_ft() 2141 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", pmk_r1, pmk_r1_len); in wpa_auth_derive_ptk_ft() 2664 /* Derive PMK-R1 from PSK, check all available PSK */ 2705 "FT: Found PSK to generate PMK-R1 locally"); in wpa_ft_psk_pmk_r1() 2709 os_memcpy(sm->PMK, pmk, PMK_LEN); in wpa_ft_psk_pmk_r1() 2737 "FT: Did not find PSK to generate PMK-R1 locally"); in wpa_ft_psk_pmk_r1() 2821 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", out_pmk_r1, r0->pmk_r0_len); in wpa_ft_local_derive_pmk_r1() 2962 "FT: Generated PMK-R1 for FT-PSK locally"); in wpa_ft_process_auth_req() 2968 "FT: No PMK in wpa_ft_process_auth_req() [all...] |
Completed in 18 milliseconds