/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/ |
H A D | pmksa_cache.c | 114 * @pmk_len: PMK length in bytes, usually PMK_LEN (32) 131 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, in pmksa_cache_add() argument 139 if (pmk_len > PMK_LEN_MAX) in pmksa_cache_add() 148 os_memcpy(entry->pmk, pmk, pmk_len); in pmksa_cache_add() 149 entry->pmk_len = pmk_len; in pmksa_cache_add() 157 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_add() 186 if (pos->pmk_len == entry->pmk_len && in pmksa_cache_add_entry() 188 entry->pmk_len) in pmksa_cache_add_entry() 283 pmksa_cache_flush(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *pmk, size_t pmk_len) pmksa_cache_flush() argument [all...] |
H A D | pmksa_cache.h | 19 size_t pmk_len; member 69 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 86 const u8 *pmk, size_t pmk_len); 135 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, in pmksa_cache_add() argument 159 const u8 *pmk, size_t pmk_len) in pmksa_cache_flush() 157 pmksa_cache_flush(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *pmk, size_t pmk_len) pmksa_cache_flush() argument
|
H A D | preauth.c | 81 int res, pmk_len; in rsn_preauth_eapol_cb() local 82 pmk_len = PMK_LEN; in rsn_preauth_eapol_cb() 90 pmk_len = 16; in rsn_preauth_eapol_cb() 94 pmk, pmk_len); in rsn_preauth_eapol_cb() 95 sm->pmk_len = pmk_len; in rsn_preauth_eapol_cb() 96 pmksa_cache_add(sm->pmksa, pmk, pmk_len, NULL, in rsn_preauth_eapol_cb() 346 NULL, p->pmk, p->pmk_len); in rsn_preauth_candidate_process()
|
H A D | wpa.c | 55 size_t mic_len = wpa_mic_len(sm->key_mgmt, sm->pmk_len); in wpa_eapol_key_send() 202 mic_len = wpa_mic_len(sm->key_mgmt, sm->pmk_len); in wpa_sm_key_request() 252 if (wpa_sm_key_mgmt_set_pmk(sm, sm->pmk, sm->pmk_len)) in wpa_supplicant_key_mgmt_set_pmk() 289 sm->pmk, sm->pmk_len); in wpa_supplicant_get_pmk() 295 sm->pmk_len == PMK_LEN) { in wpa_supplicant_get_pmk() 301 os_memcpy(sm->xxkey, sm->pmk, sm->pmk_len); in wpa_supplicant_get_pmk() 302 sm->xxkey_len = sm->pmk_len; in wpa_supplicant_get_pmk() 307 int res, pmk_len; in wpa_supplicant_get_pmk() local 313 pmk_len = PMK_LEN_SUITE_B_192; in wpa_supplicant_get_pmk() 315 pmk_len in wpa_supplicant_get_pmk() 2831 wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *bssid) wpa_sm_set_pmk() argument 3350 wpa_sm_pmksa_cache_add(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *bssid, const u8 *fils_cache_id) wpa_sm_pmksa_cache_add() argument [all...] |
H A D | wpa.h | 44 const u8 *pmk, size_t pmk_len); 83 int (*key_mgmt_set_pmk)(void *ctx, const u8 *pmk, size_t pmk_len); 124 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, 163 void wpa_sm_pmksa_cache_add(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, 203 size_t pmk_len, const u8 *pmkid, in wpa_sm_set_pmk() 202 wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *bssid) wpa_sm_set_pmk() argument
|
H A D | wpa_i.h | 22 size_t pmk_len; member 250 size_t pmk_len) in wpa_sm_add_pmkid() 254 cache_id, pmk, pmk_len); in wpa_sm_add_pmkid() 389 const u8 *pmk, size_t pmk_len) in wpa_sm_key_mgmt_set_pmk() 393 return sm->ctx->key_mgmt_set_pmk(sm->ctx->ctx, pmk, pmk_len); in wpa_sm_key_mgmt_set_pmk() 247 wpa_sm_add_pmkid(struct wpa_sm *sm, void *network_ctx, const u8 *bssid, const u8 *pmkid, const u8 *cache_id, const u8 *pmk, size_t pmk_len) wpa_sm_add_pmkid() argument 388 wpa_sm_key_mgmt_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len) wpa_sm_key_mgmt_set_pmk() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/ |
H A D | pmksa_cache.c | 156 * @pmk_len: PMK length in bytes, usually PMK_LEN (32) 173 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, in pmksa_cache_add() argument 181 if (pmk_len > PMK_LEN_MAX) in pmksa_cache_add() 190 os_memcpy(entry->pmk, pmk, pmk_len); in pmksa_cache_add() 191 entry->pmk_len = pmk_len; in pmksa_cache_add() 199 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_add() 228 if (pos->pmk_len == entry->pmk_len && in pmksa_cache_add_entry() 230 entry->pmk_len) in pmksa_cache_add_entry() 331 pmksa_cache_flush(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *pmk, size_t pmk_len, bool external_only) pmksa_cache_flush() argument [all...] |
H A D | pmksa_cache.h | 19 size_t pmk_len; member 73 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 90 const u8 *pmk, size_t pmk_len, bool external_only); 142 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, in pmksa_cache_add() argument 166 const u8 *pmk, size_t pmk_len, in pmksa_cache_flush() 164 pmksa_cache_flush(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *pmk, size_t pmk_len, bool external_only) pmksa_cache_flush() argument
|
H A D | preauth.c | 90 int res, pmk_len; in rsn_preauth_eapol_cb() local 91 pmk_len = PMK_LEN; in rsn_preauth_eapol_cb() 99 pmk_len = 16; in rsn_preauth_eapol_cb() 103 pmk, pmk_len); in rsn_preauth_eapol_cb() 104 sm->pmk_len = pmk_len; in rsn_preauth_eapol_cb() 105 pmksa_cache_add(sm->pmksa, pmk, pmk_len, NULL, in rsn_preauth_eapol_cb() 366 NULL, p->pmk, p->pmk_len, 0, 0, in rsn_preauth_candidate_process()
|
H A D | wpa_i.h | 27 size_t pmk_len; member 313 size_t pmk_len, u32 pmk_lifetime, in wpa_sm_add_pmkid() 318 cache_id, pmk, pmk_len, pmk_lifetime, in wpa_sm_add_pmkid() 459 const u8 *pmk, size_t pmk_len) in wpa_sm_key_mgmt_set_pmk() 463 return sm->ctx->key_mgmt_set_pmk(sm->ctx->ctx, pmk, pmk_len); in wpa_sm_key_mgmt_set_pmk() 310 wpa_sm_add_pmkid(struct wpa_sm *sm, void *network_ctx, const u8 *bssid, const u8 *pmkid, const u8 *cache_id, const u8 *pmk, size_t pmk_len, u32 pmk_lifetime, u8 pmk_reauth_threshold, int akmp) wpa_sm_add_pmkid() argument 458 wpa_sm_key_mgmt_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len) wpa_sm_key_mgmt_set_pmk() argument
|
H A D | wpa.c | 102 size_t mic_len = wpa_mic_len(sm->key_mgmt, sm->pmk_len); in wpa_eapol_key_send() 260 mic_len = wpa_mic_len(sm->key_mgmt, sm->pmk_len); in wpa_sm_key_request() 310 if (wpa_sm_key_mgmt_set_pmk(sm, sm->pmk, sm->pmk_len)) in wpa_supplicant_key_mgmt_set_pmk() 347 sm->pmk, sm->pmk_len); in wpa_supplicant_get_pmk() 353 sm->pmk_len == PMK_LEN) { in wpa_supplicant_get_pmk() 359 os_memcpy(sm->xxkey, sm->pmk, sm->pmk_len); in wpa_supplicant_get_pmk() 360 sm->xxkey_len = sm->pmk_len; in wpa_supplicant_get_pmk() 365 int res, pmk_len; in wpa_supplicant_get_pmk() local 371 pmk_len = PMK_LEN_SUITE_B_192; in wpa_supplicant_get_pmk() 373 pmk_len in wpa_supplicant_get_pmk() [all...] |
H A D | wpa.h | 49 const u8 *pmk, size_t pmk_len, u32 pmk_lifetime, 92 int (*key_mgmt_set_pmk)(void *ctx, const u8 *pmk, size_t pmk_len); 172 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, 221 void wpa_sm_pmksa_cache_add(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, 271 size_t pmk_len, const u8 *pmkid, in wpa_sm_set_pmk() 603 void wpa_pasn_pmksa_cache_add(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, 270 wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *bssid) wpa_sm_set_pmk() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/ |
H A D | wpa_common.c | 24 static unsigned int wpa_kck_len(int akmp, size_t pmk_len) in wpa_kck_len() argument 36 return pmk_len / 2; in wpa_kck_len() 38 return pmk_len / 2; in wpa_kck_len() 60 static unsigned int wpa_kek_len(int akmp, size_t pmk_len) in wpa_kek_len() argument 72 return pmk_len <= 32 ? 16 : 32; in wpa_kek_len() 74 return pmk_len <= 32 ? 16 : 32; in wpa_kek_len() 96 unsigned int wpa_mic_len(int akmp, size_t pmk_len) in wpa_mic_len() argument 108 return pmk_len / 2; in wpa_mic_len() 110 return pmk_len / 2; in wpa_mic_len() 329 * @pmk_len 349 wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, const u8 *addr1, const u8 *addr2, const u8 *nonce1, const u8 *nonce2, struct wpa_ptk *ptk, int akmp, int cipher, const u8 *z, size_t z_len) wpa_pmk_to_ptk() argument 477 fils_rmsk_to_pmk(int akmp, const u8 *rmsk, size_t rmsk_len, const u8 *snonce, const u8 *anonce, const u8 *dh_ss, size_t dh_ss_len, u8 *pmk, size_t *pmk_len) fils_rmsk_to_pmk() argument 551 fils_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const u8 *spa, const u8 *aa, const u8 *snonce, const u8 *anonce, const u8 *dhss, size_t dhss_len, struct wpa_ptk *ptk, u8 *ick, size_t *ick_len, int akmp, int cipher, u8 *fils_ft, size_t *fils_ft_len) fils_pmk_to_ptk() argument 1837 rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa, u8 *pmkid, int akmp) rsn_pmkid() argument [all...] |
H A D | wpa_common.h | 347 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, 354 size_t dh_ss_len, u8 *pmk, size_t *pmk_len); 357 int fils_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const u8 *spa, const u8 *aa, 413 void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa, 488 unsigned int wpa_mic_len(int akmp, size_t pmk_len);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | wpa_common.c | 28 static unsigned int wpa_kck_len(int akmp, size_t pmk_len) in wpa_kck_len() argument 40 return pmk_len / 2; in wpa_kck_len() 42 return pmk_len / 2; in wpa_kck_len() 44 return pmk_len / 2; in wpa_kck_len() 66 static unsigned int wpa_kek_len(int akmp, size_t pmk_len) in wpa_kek_len() argument 78 return pmk_len <= 32 ? 16 : 32; in wpa_kek_len() 80 return pmk_len <= 32 ? 16 : 32; in wpa_kek_len() 82 return pmk_len <= 32 ? 16 : 32; in wpa_kek_len() 104 unsigned int wpa_mic_len(int akmp, size_t pmk_len) in wpa_mic_len() argument 116 return pmk_len / in wpa_mic_len() 384 wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, const u8 *addr1, const u8 *addr2, const u8 *nonce1, const u8 *nonce2, struct wpa_ptk *ptk, int akmp, int cipher, const u8 *z, size_t z_len, size_t kdk_len) wpa_pmk_to_ptk() argument 583 fils_rmsk_to_pmk(int akmp, const u8 *rmsk, size_t rmsk_len, const u8 *snonce, const u8 *anonce, const u8 *dh_ss, size_t dh_ss_len, u8 *pmk, size_t *pmk_len) fils_rmsk_to_pmk() argument 657 fils_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const u8 *spa, const u8 *aa, const u8 *snonce, const u8 *anonce, const u8 *dhss, size_t dhss_len, struct wpa_ptk *ptk, u8 *ick, size_t *ick_len, int akmp, int cipher, u8 *fils_ft, size_t *fils_ft_len, size_t kdk_len) fils_pmk_to_ptk() argument 1275 pasn_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const u8 *spa, const u8 *bssid, const u8 *dhss, size_t dhss_len, struct wpa_ptk *ptk, int akmp, int cipher, size_t kdk_len) pasn_pmk_to_ptk() argument 2262 rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa, u8 *pmkid, int akmp) rsn_pmkid() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | pmksa_cache_auth.c | 262 * @pmk_len: PMK length in bytes, usually PMK_LEN (32) 280 const u8 *pmk, size_t pmk_len, const u8 *pmkid, in pmksa_cache_auth_add() 287 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len, in pmksa_cache_auth_add() 301 * @pmk_len: PMK length in bytes, usually PMK_LEN (32) 315 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid, in pmksa_cache_auth_create_entry() argument 323 if (pmk_len > PMK_LEN_MAX) in pmksa_cache_auth_create_entry() 332 os_memcpy(entry->pmk, pmk, pmk_len); in pmksa_cache_auth_create_entry() 333 entry->pmk_len = pmk_len; in pmksa_cache_auth_create_entry() 341 rsn_pmkid(pmk, pmk_len, a in pmksa_cache_auth_create_entry() 279 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) pmksa_cache_auth_add() argument [all...] |
H A D | wpa_auth.c | 50 static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK, 67 const u8 *pmk, unsigned int pmk_len, 962 size_t pmk_len; in wpa_try_alt_snonce() local 970 sm->p2p_dev_addr, pmk, &pmk_len, in wpa_try_alt_snonce() 976 os_memcpy(sm->xxkey, pmk, pmk_len); in wpa_try_alt_snonce() 977 sm->xxkey_len = pmk_len; in wpa_try_alt_snonce() 982 pmk_len = sm->pmk_len; in wpa_try_alt_snonce() 985 if (wpa_derive_ptk(sm, sm->alt_SNonce, pmk, pmk_len, &PTK, 0) < in wpa_try_alt_snonce() 989 if (wpa_verify_key_mic(sm->wpa_key_mgmt, pmk_len, in wpa_try_alt_snonce() 1770 wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK, u8 *data, size_t data_len) wpa_verify_key_mic() argument 2130 unsigned int pmk_len; SM_STATE() local 2323 wpa_derive_ptk(struct wpa_state_machine *sm, const u8 *snonce, const u8 *pmk, unsigned int pmk_len, struct wpa_ptk *ptk, int force_sha256) wpa_derive_ptk() argument 2374 fils_auth_pmk_to_ptk(struct wpa_state_machine *sm, const u8 *pmk, size_t pmk_len, const u8 *snonce, const u8 *anonce, const u8 *dhss, size_t dhss_len, struct wpabuf *g_sta, struct wpabuf *g_ap) fils_auth_pmk_to_ptk() argument 2964 size_t pmk_len; SM_STATE() local 4798 wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk, unsigned int pmk_len, int session_timeout, struct eapol_state_machine *eapol) wpa_auth_pmksa_add() argument 4853 wpa_auth_pmksa_add_sae(struct wpa_authenticator *wpa_auth, const u8 *addr, const u8 *pmk, size_t pmk_len, const u8 *pmkid, int akmp) wpa_auth_pmksa_add_sae() argument 4878 wpa_auth_pmksa_add2(struct wpa_authenticator *wpa_auth, const u8 *addr, const u8 *pmk, size_t pmk_len, const u8 *pmkid, int session_timeout, int akmp) wpa_auth_pmksa_add2() argument 4941 wpa_auth_pmksa_create_entry(const u8 *aa, const u8 *spa, const u8 *pmk, size_t pmk_len, int akmp, const u8 *pmkid, int expiration) wpa_auth_pmksa_create_entry() argument 5362 wpa_auth_add_fils_pmk_pmkid(struct wpa_state_machine *sm, const u8 *pmk, size_t pmk_len, const u8 *pmkid) wpa_auth_add_fils_pmk_pmkid() argument [all...] |
H A D | pmksa_cache_auth.h | 21 size_t pmk_len; member 52 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 57 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid,
|
H A D | wpa_auth.h | 416 unsigned int pmk_len, 423 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 427 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 438 size_t pmk_len, int akmp, 507 size_t pmk_len, const u8 *snonce, const u8 *anonce, 535 size_t pmk_len, const u8 *pmkid);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | pmksa_cache_auth.c | 262 * @pmk_len: PMK length in bytes, usually PMK_LEN (32) 280 const u8 *pmk, size_t pmk_len, const u8 *pmkid, in pmksa_cache_auth_add() 287 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len, in pmksa_cache_auth_add() 301 * @pmk_len: PMK length in bytes, usually PMK_LEN (32) 315 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid, in pmksa_cache_auth_create_entry() argument 323 if (pmk_len > PMK_LEN_MAX) in pmksa_cache_auth_create_entry() 332 os_memcpy(entry->pmk, pmk, pmk_len); in pmksa_cache_auth_create_entry() 333 entry->pmk_len = pmk_len; in pmksa_cache_auth_create_entry() 341 rsn_pmkid(pmk, pmk_len, a in pmksa_cache_auth_create_entry() 279 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) pmksa_cache_auth_add() argument [all...] |
H A D | wpa_auth.c | 41 static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK, 58 const u8 *pmk, unsigned int pmk_len, 886 size_t pmk_len; in wpa_try_alt_snonce() local 894 sm->p2p_dev_addr, pmk, &pmk_len, in wpa_try_alt_snonce() 900 os_memcpy(sm->xxkey, pmk, pmk_len); in wpa_try_alt_snonce() 901 sm->xxkey_len = pmk_len; in wpa_try_alt_snonce() 906 pmk_len = sm->pmk_len; in wpa_try_alt_snonce() 909 if (wpa_derive_ptk(sm, sm->alt_SNonce, pmk, pmk_len, &PTK) < 0) in wpa_try_alt_snonce() 912 if (wpa_verify_key_mic(sm->wpa_key_mgmt, pmk_len, in wpa_try_alt_snonce() 1688 wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK, u8 *data, size_t data_len) wpa_verify_key_mic() argument 2026 unsigned int pmk_len; SM_STATE() local 2218 wpa_derive_ptk(struct wpa_state_machine *sm, const u8 *snonce, const u8 *pmk, unsigned int pmk_len, struct wpa_ptk *ptk) wpa_derive_ptk() argument 2257 fils_auth_pmk_to_ptk(struct wpa_state_machine *sm, const u8 *pmk, size_t pmk_len, const u8 *snonce, const u8 *anonce, const u8 *dhss, size_t dhss_len, struct wpabuf *g_sta, struct wpabuf *g_ap) fils_auth_pmk_to_ptk() argument 2822 size_t pmk_len; SM_STATE() local 4371 wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk, unsigned int pmk_len, int session_timeout, struct eapol_state_machine *eapol) wpa_auth_pmksa_add() argument 4450 wpa_auth_pmksa_add2(struct wpa_authenticator *wpa_auth, const u8 *addr, const u8 *pmk, size_t pmk_len, const u8 *pmkid, int session_timeout, int akmp) wpa_auth_pmksa_add2() argument 4932 wpa_auth_add_fils_pmk_pmkid(struct wpa_state_machine *sm, const u8 *pmk, size_t pmk_len, const u8 *pmkid) wpa_auth_add_fils_pmk_pmkid() argument [all...] |
H A D | pmksa_cache_auth.h | 21 size_t pmk_len; member 52 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 57 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid,
|
H A D | wpa_auth.h | 367 unsigned int pmk_len, 377 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 446 size_t pmk_len, const u8 *snonce, const u8 *anonce, 474 size_t pmk_len, const u8 *pmkid);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | wpas_glue.c | 279 int res, pmk_len; in wpa_supplicant_eapol_cb() local 312 pmk_len = PMK_LEN; in wpa_supplicant_eapol_cb() 334 pmk_len = 16; in wpa_supplicant_eapol_cb() 345 "handshake", pmk, pmk_len); in wpa_supplicant_eapol_cb() 348 pmk_len)) { in wpa_supplicant_eapol_cb() 550 const u8 *pmk, size_t pmk_len) in wpa_supplicant_add_pmkid() 571 params.pmk_len = pmk_len; in wpa_supplicant_add_pmkid() 1157 size_t pmk_len) in wpa_supplicant_key_mgmt_set_pmk() 1164 NULL, 0, pmk, pmk_len); in wpa_supplicant_key_mgmt_set_pmk() 547 wpa_supplicant_add_pmkid(void *_wpa_s, void *network_ctx, const u8 *bssid, const u8 *pmkid, const u8 *fils_cache_id, const u8 *pmk, size_t pmk_len) wpa_supplicant_add_pmkid() argument 1156 wpa_supplicant_key_mgmt_set_pmk(void *ctx, const u8 *pmk, size_t pmk_len) wpa_supplicant_key_mgmt_set_pmk() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | wpas_glue.c | 296 int res, pmk_len; in wpa_supplicant_eapol_cb() local 329 pmk_len = PMK_LEN; in wpa_supplicant_eapol_cb() 351 pmk_len = 16; in wpa_supplicant_eapol_cb() 362 "handshake", pmk, pmk_len); in wpa_supplicant_eapol_cb() 369 pmk_len, KEY_FLAG_PMK)) { in wpa_supplicant_eapol_cb() 598 const u8 *pmk, size_t pmk_len, in wpa_supplicant_add_pmkid() 634 params.pmk_len = pmk_len; in wpa_supplicant_add_pmkid() 1252 size_t pmk_len) in wpa_supplicant_key_mgmt_set_pmk() 1263 NULL, 0, pmk, pmk_len, KEY_FLAG_PM in wpa_supplicant_key_mgmt_set_pmk() 595 wpa_supplicant_add_pmkid(void *_wpa_s, void *network_ctx, const u8 *bssid, const u8 *pmkid, const u8 *fils_cache_id, const u8 *pmk, size_t pmk_len, u32 pmk_lifetime, u8 pmk_reauth_threshold, int akmp) wpa_supplicant_add_pmkid() argument 1251 wpa_supplicant_key_mgmt_set_pmk(void *ctx, const u8 *pmk, size_t pmk_len) wpa_supplicant_key_mgmt_set_pmk() argument [all...] |