/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/ |
H A D | pmksa_cache.c | 113 * @pmk: The new pairwise master key 131 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, in pmksa_cache_add() argument 148 os_memcpy(entry->pmk, pmk, pmk_len); in pmksa_cache_add() 157 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_add() 187 os_memcmp_const(pos->pmk, entry->pmk, in pmksa_cache_add_entry() 215 pos->pmk, pos->pmk_len); in pmksa_cache_add_entry() 270 entry->pmk, entry->pmk_len); in pmksa_cache_add_entry() 280 * @pmk 283 pmksa_cache_flush(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *pmk, size_t pmk_len) pmksa_cache_flush() argument [all...] |
H A D | pmksa_cache.h | 18 u8 pmk[PMK_LEN_MAX]; member 69 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 86 const u8 *pmk, size_t pmk_len); 135 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, in pmksa_cache_add() argument 159 const u8 *pmk, size_t pmk_len) in pmksa_cache_flush() 157 pmksa_cache_flush(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *pmk, size_t pmk_len) pmksa_cache_flush() argument
|
H A D | preauth.c | 78 u8 pmk[PMK_LEN]; in rsn_preauth_eapol_cb() local 83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); in rsn_preauth_eapol_cb() 89 res = eapol_sm_get_key(eapol, pmk, 16); in rsn_preauth_eapol_cb() 94 pmk, pmk_len); in rsn_preauth_eapol_cb() 96 pmksa_cache_add(sm->pmksa, pmk, pmk_len, NULL, in rsn_preauth_eapol_cb() 346 NULL, p->pmk, p->pmk_len); in rsn_preauth_candidate_process()
|
H A D | wpa.h | 44 const u8 *pmk, size_t pmk_len); 83 int (*key_mgmt_set_pmk)(void *ctx, const u8 *pmk, size_t pmk_len); 124 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, 163 void wpa_sm_pmksa_cache_add(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, 202 static inline void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, in wpa_sm_set_pmk() argument
|
H A D | wpa_i.h | 21 u8 pmk[PMK_LEN_MAX]; member 249 const u8 *cache_id, const u8 *pmk, in wpa_sm_add_pmkid() 254 cache_id, pmk, pmk_len); in wpa_sm_add_pmkid() 389 const u8 *pmk, size_t pmk_len) in wpa_sm_key_mgmt_set_pmk() 393 return sm->ctx->key_mgmt_set_pmk(sm->ctx->ctx, pmk, pmk_len); in wpa_sm_key_mgmt_set_pmk() 247 wpa_sm_add_pmkid(struct wpa_sm *sm, void *network_ctx, const u8 *bssid, const u8 *pmkid, const u8 *cache_id, const u8 *pmk, size_t pmk_len) wpa_sm_add_pmkid() argument 388 wpa_sm_key_mgmt_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len) wpa_sm_key_mgmt_set_pmk() argument
|
H A D | wpa.c | 252 if (wpa_sm_key_mgmt_set_pmk(sm, sm->pmk, sm->pmk_len)) in wpa_supplicant_key_mgmt_set_pmk() 289 sm->pmk, sm->pmk_len); in wpa_supplicant_get_pmk() 301 os_memcpy(sm->xxkey, sm->pmk, sm->pmk_len); in wpa_supplicant_get_pmk() 316 res = eapol_sm_get_key(sm->eapol, sm->pmk, pmk_len); in wpa_supplicant_get_pmk() 323 res = eapol_sm_get_key(sm->eapol, sm->pmk, 16); in wpa_supplicant_get_pmk() 372 "machines", sm->pmk, pmk_len); in wpa_supplicant_get_pmk() 379 sm->pmk, pmk_len, NULL, in wpa_supplicant_get_pmk() 578 return wpa_pmk_to_ptk(sm->pmk, sm->pmk_len, "Pairwise key expansion", in wpa_derive_ptk() 1583 sa = pmksa_cache_add(sm->pmksa, sm->pmk, sm->pmk_len, NULL, in wpa_supplicant_process_3_of_4() 2618 os_memcmp(sm->pmk, entr in wpa_sm_pmksa_free_cb() 2831 wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *bssid) wpa_sm_set_pmk() argument 3350 wpa_sm_pmksa_cache_add(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *bssid, const u8 *fils_cache_id) wpa_sm_pmksa_cache_add() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/ |
H A D | pmksa_cache.h | 18 u8 pmk[PMK_LEN_MAX]; member 73 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 90 const u8 *pmk, size_t pmk_len, bool external_only); 142 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, in pmksa_cache_add() argument 166 const u8 *pmk, size_t pmk_len, in pmksa_cache_flush() 164 pmksa_cache_flush(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *pmk, size_t pmk_len, bool external_only) pmksa_cache_flush() argument
|
H A D | pmksa_cache.c | 155 * @pmk: The new pairwise master key 173 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, in pmksa_cache_add() argument 190 os_memcpy(entry->pmk, pmk, pmk_len); in pmksa_cache_add() 199 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_add() 229 os_memcmp_const(pos->pmk, entry->pmk, in pmksa_cache_add_entry() 257 pos->pmk, pos->pmk_len, in pmksa_cache_add_entry() 313 entry->pmk, entry->pmk_len, in pmksa_cache_add_entry() 326 * @pmk 331 pmksa_cache_flush(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *pmk, size_t pmk_len, bool external_only) pmksa_cache_flush() argument [all...] |
H A D | preauth.c | 87 u8 pmk[PMK_LEN]; in rsn_preauth_eapol_cb() local 92 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); in rsn_preauth_eapol_cb() 98 res = eapol_sm_get_key(eapol, pmk, 16); in rsn_preauth_eapol_cb() 103 pmk, pmk_len); in rsn_preauth_eapol_cb() 105 pmksa_cache_add(sm->pmksa, pmk, pmk_len, NULL, in rsn_preauth_eapol_cb() 366 NULL, p->pmk, p->pmk_len, 0, 0, in rsn_preauth_candidate_process()
|
H A D | wpa_i.h | 26 u8 pmk[PMK_LEN_MAX]; member 312 const u8 *cache_id, const u8 *pmk, in wpa_sm_add_pmkid() 318 cache_id, pmk, pmk_len, pmk_lifetime, in wpa_sm_add_pmkid() 459 const u8 *pmk, size_t pmk_len) in wpa_sm_key_mgmt_set_pmk() 463 return sm->ctx->key_mgmt_set_pmk(sm->ctx->ctx, pmk, pmk_len); in wpa_sm_key_mgmt_set_pmk() 310 wpa_sm_add_pmkid(struct wpa_sm *sm, void *network_ctx, const u8 *bssid, const u8 *pmkid, const u8 *cache_id, const u8 *pmk, size_t pmk_len, u32 pmk_lifetime, u8 pmk_reauth_threshold, int akmp) wpa_sm_add_pmkid() argument 458 wpa_sm_key_mgmt_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len) wpa_sm_key_mgmt_set_pmk() argument
|
H A D | wpa.h | 49 const u8 *pmk, size_t pmk_len, u32 pmk_lifetime, 92 int (*key_mgmt_set_pmk)(void *ctx, const u8 *pmk, size_t pmk_len); 172 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, 221 void wpa_sm_pmksa_cache_add(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, 270 static inline void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, in wpa_sm_set_pmk() argument 603 void wpa_pasn_pmksa_cache_add(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | pmksa_cache_auth.h | 20 u8 pmk[PMK_LEN_MAX]; member 52 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 57 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid,
|
H A D | pmksa_cache_auth.c | 261 * @pmk: The new pairwise master key 280 const u8 *pmk, size_t pmk_len, const u8 *pmkid, in pmksa_cache_auth_add() 287 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len, in pmksa_cache_auth_add() 300 * @pmk: The new pairwise master key 315 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid, in pmksa_cache_auth_create_entry() argument 332 os_memcpy(entry->pmk, pmk, pmk_len); in pmksa_cache_auth_create_entry() 341 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_auth_create_entry() 404 os_memcpy(entry->pmk, old_entry->pmk, old_entr in pmksa_cache_add_okc() 279 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) pmksa_cache_auth_add() argument [all...] |
H A D | wpa_auth.h | 415 int wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk, 419 const u8 *pmk, size_t len, const u8 *sta_addr, 423 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 427 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 437 wpa_auth_pmksa_create_entry(const u8 *aa, const u8 *spa, const u8 *pmk, 451 u8 *pmkid, u8 *pmk); 506 int fils_auth_pmk_to_ptk(struct wpa_state_machine *sm, const u8 *pmk, 534 void wpa_auth_add_fils_pmk_pmkid(struct wpa_state_machine *sm, const u8 *pmk,
|
H A D | wpa_auth.c | 67 const u8 *pmk, unsigned int pmk_len, 961 const u8 *pmk = NULL; in wpa_try_alt_snonce() local 969 pmk = wpa_auth_get_psk(sm->wpa_auth, sm->addr, in wpa_try_alt_snonce() 970 sm->p2p_dev_addr, pmk, &pmk_len, in wpa_try_alt_snonce() 972 if (!pmk) in wpa_try_alt_snonce() 976 os_memcpy(sm->xxkey, pmk, pmk_len); in wpa_try_alt_snonce() 981 pmk = sm->PMK; in wpa_try_alt_snonce() 985 if (wpa_derive_ptk(sm, sm->alt_SNonce, pmk, pmk_len, &PTK, 0) < in wpa_try_alt_snonce() 991 if (sm->PMK != pmk) { in wpa_try_alt_snonce() 992 os_memcpy(sm->PMK, pmk, pmk_le in wpa_try_alt_snonce() 2323 wpa_derive_ptk(struct wpa_state_machine *sm, const u8 *snonce, const u8 *pmk, unsigned int pmk_len, struct wpa_ptk *ptk, int force_sha256) wpa_derive_ptk() argument 2374 fils_auth_pmk_to_ptk(struct wpa_state_machine *sm, const u8 *pmk, size_t pmk_len, const u8 *snonce, const u8 *anonce, const u8 *dhss, size_t dhss_len, struct wpabuf *g_sta, struct wpabuf *g_ap) fils_auth_pmk_to_ptk() argument 2963 const u8 *pmk = NULL; SM_STATE() local 4798 wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk, unsigned int pmk_len, int session_timeout, struct eapol_state_machine *eapol) wpa_auth_pmksa_add() argument 4833 wpa_auth_pmksa_add_preauth(struct wpa_authenticator *wpa_auth, const u8 *pmk, size_t len, const u8 *sta_addr, int session_timeout, struct eapol_state_machine *eapol) wpa_auth_pmksa_add_preauth() argument 4853 wpa_auth_pmksa_add_sae(struct wpa_authenticator *wpa_auth, const u8 *addr, const u8 *pmk, size_t pmk_len, const u8 *pmkid, int akmp) wpa_auth_pmksa_add_sae() argument 4878 wpa_auth_pmksa_add2(struct wpa_authenticator *wpa_auth, const u8 *addr, const u8 *pmk, size_t pmk_len, const u8 *pmkid, int session_timeout, int akmp) wpa_auth_pmksa_add2() argument 4941 wpa_auth_pmksa_create_entry(const u8 *aa, const u8 *spa, const u8 *pmk, size_t pmk_len, int akmp, const u8 *pmkid, int expiration) wpa_auth_pmksa_create_entry() argument 4990 wpa_auth_pmksa_set_to_sm(struct rsn_pmksa_cache_entry *pmksa, struct wpa_state_machine *sm, struct wpa_authenticator *wpa_auth, u8 *pmkid, u8 *pmk) wpa_auth_pmksa_set_to_sm() argument 5362 wpa_auth_add_fils_pmk_pmkid(struct wpa_state_machine *sm, const u8 *pmk, size_t pmk_len, const u8 *pmkid) wpa_auth_add_fils_pmk_pmkid() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | pmksa_cache_auth.h | 20 u8 pmk[PMK_LEN_MAX]; member 52 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 57 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid,
|
H A D | pmksa_cache_auth.c | 261 * @pmk: The new pairwise master key 280 const u8 *pmk, size_t pmk_len, const u8 *pmkid, in pmksa_cache_auth_add() 287 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len, in pmksa_cache_auth_add() 300 * @pmk: The new pairwise master key 315 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid, in pmksa_cache_auth_create_entry() argument 332 os_memcpy(entry->pmk, pmk, pmk_len); in pmksa_cache_auth_create_entry() 341 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_auth_create_entry() 404 os_memcpy(entry->pmk, old_entry->pmk, old_entr in pmksa_cache_add_okc() 279 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) pmksa_cache_auth_add() argument [all...] |
H A D | wpa_auth.h | 366 int wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk, 370 const u8 *pmk, size_t len, const u8 *sta_addr, 374 const u8 *pmk, const u8 *pmkid); 377 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 387 wpa_auth_pmksa_create_entry(const u8 *aa, const u8 *spa, const u8 *pmk, 400 u8 *pmkid, u8 *pmk); 445 int fils_auth_pmk_to_ptk(struct wpa_state_machine *sm, const u8 *pmk, 473 void wpa_auth_add_fils_pmk_pmkid(struct wpa_state_machine *sm, const u8 *pmk,
|
H A D | wpa_auth.c | 58 const u8 *pmk, unsigned int pmk_len, 885 const u8 *pmk = NULL; in wpa_try_alt_snonce() local 893 pmk = wpa_auth_get_psk(sm->wpa_auth, sm->addr, in wpa_try_alt_snonce() 894 sm->p2p_dev_addr, pmk, &pmk_len, in wpa_try_alt_snonce() 896 if (pmk == NULL) in wpa_try_alt_snonce() 900 os_memcpy(sm->xxkey, pmk, pmk_len); in wpa_try_alt_snonce() 905 pmk = sm->PMK; in wpa_try_alt_snonce() 909 if (wpa_derive_ptk(sm, sm->alt_SNonce, pmk, pmk_len, &PTK) < 0) in wpa_try_alt_snonce() 914 if (sm->PMK != pmk) { in wpa_try_alt_snonce() 915 os_memcpy(sm->PMK, pmk, pmk_le in wpa_try_alt_snonce() 2218 wpa_derive_ptk(struct wpa_state_machine *sm, const u8 *snonce, const u8 *pmk, unsigned int pmk_len, struct wpa_ptk *ptk) wpa_derive_ptk() argument 2257 fils_auth_pmk_to_ptk(struct wpa_state_machine *sm, const u8 *pmk, size_t pmk_len, const u8 *snonce, const u8 *anonce, const u8 *dhss, size_t dhss_len, struct wpabuf *g_sta, struct wpabuf *g_ap) fils_auth_pmk_to_ptk() argument 2821 const u8 *pmk = NULL; SM_STATE() local 4371 wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk, unsigned int pmk_len, int session_timeout, struct eapol_state_machine *eapol) wpa_auth_pmksa_add() argument 4406 wpa_auth_pmksa_add_preauth(struct wpa_authenticator *wpa_auth, const u8 *pmk, size_t len, const u8 *sta_addr, int session_timeout, struct eapol_state_machine *eapol) wpa_auth_pmksa_add_preauth() argument 4426 wpa_auth_pmksa_add_sae(struct wpa_authenticator *wpa_auth, const u8 *addr, const u8 *pmk, const u8 *pmkid) wpa_auth_pmksa_add_sae() argument 4450 wpa_auth_pmksa_add2(struct wpa_authenticator *wpa_auth, const u8 *addr, const u8 *pmk, size_t pmk_len, const u8 *pmkid, int session_timeout, int akmp) wpa_auth_pmksa_add2() argument 4513 wpa_auth_pmksa_create_entry(const u8 *aa, const u8 *spa, const u8 *pmk, const u8 *pmkid, int expiration) wpa_auth_pmksa_create_entry() argument 4561 wpa_auth_pmksa_set_to_sm(struct rsn_pmksa_cache_entry *pmksa, struct wpa_state_machine *sm, struct wpa_authenticator *wpa_auth, u8 *pmkid, u8 *pmk) wpa_auth_pmksa_set_to_sm() argument 4932 wpa_auth_add_fils_pmk_pmkid(struct wpa_state_machine *sm, const u8 *pmk, size_t pmk_len, const u8 *pmkid) wpa_auth_add_fils_pmk_pmkid() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/ |
H A D | wpa_common.c | 328 * @pmk: Pairwise master key 349 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, in wpa_pmk_to_ptk() argument 406 if (sha384_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk() 415 if (sha256_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk() 424 if (sha256_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk() 429 if (sha384_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk() 434 if (sha512_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk() 444 if (sha1_prf(pmk, pmk_len, label, data, data_len, tmp, in wpa_pmk_to_ptk() 455 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len); in wpa_pmk_to_ptk() 479 size_t dh_ss_len, u8 *pmk, size_ in fils_rmsk_to_pmk() 477 fils_rmsk_to_pmk(int akmp, const u8 *rmsk, size_t rmsk_len, const u8 *snonce, const u8 *anonce, const u8 *dh_ss, size_t dh_ss_len, u8 *pmk, size_t *pmk_len) fils_rmsk_to_pmk() argument 551 fils_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const u8 *spa, const u8 *aa, const u8 *snonce, const u8 *anonce, const u8 *dhss, size_t dhss_len, struct wpa_ptk *ptk, u8 *ick, size_t *ick_len, int akmp, int cipher, u8 *fils_ft, size_t *fils_ft_len) fils_pmk_to_ptk() argument 1837 rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa, u8 *pmkid, int akmp) rsn_pmkid() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | wpa_common.c | 362 * @pmk: Pairwise master key 384 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, in wpa_pmk_to_ptk() argument 458 if (sha384_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk() 466 if (sha256_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk() 473 if (sha256_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk() 478 if (sha384_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk() 483 if (sha512_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk() 494 if (sha256_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk() 499 if (sha384_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk() 504 if (sha512_prf(pmk, pmk_le in wpa_pmk_to_ptk() 583 fils_rmsk_to_pmk(int akmp, const u8 *rmsk, size_t rmsk_len, const u8 *snonce, const u8 *anonce, const u8 *dh_ss, size_t dh_ss_len, u8 *pmk, size_t *pmk_len) fils_rmsk_to_pmk() argument 657 fils_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const u8 *spa, const u8 *aa, const u8 *snonce, const u8 *anonce, const u8 *dhss, size_t dhss_len, struct wpa_ptk *ptk, u8 *ick, size_t *ick_len, int akmp, int cipher, u8 *fils_ft, size_t *fils_ft_len, size_t kdk_len) fils_pmk_to_ptk() argument 1275 pasn_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const u8 *spa, const u8 *bssid, const u8 *dhss, size_t dhss_len, struct wpa_ptk *ptk, int akmp, int cipher, size_t kdk_len) pasn_pmk_to_ptk() argument 2262 rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa, u8 *pmkid, int akmp) rsn_pmkid() argument [all...] |
H A D | common_module_tests.c | 313 const u8 pmk[] = { in sae_tests() local 444 if (os_memcmp(pmk, sae.pmk, SAE_PMK_LEN) != 0) { in sae_tests() 616 const u8 pmk[] = { in pasn_test_pasn_auth() local 654 ret = pasn_pmk_to_ptk(pmk, sizeof(pmk), in pasn_test_pasn_auth() 688 const u8 pmk[] = { in pasn_test_no_pasn_auth() local 733 ret = wpa_pmk_to_ptk(pmk, sizeof(pmk), in pasn_test_no_pasn_auth()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | wpas_glue.c | 280 u8 pmk[PMK_LEN]; in wpa_supplicant_eapol_cb() local 320 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN); in wpa_supplicant_eapol_cb() 327 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); in wpa_supplicant_eapol_cb() 333 res = eapol_sm_get_key(eapol, pmk, 16); in wpa_supplicant_eapol_cb() 345 "handshake", pmk, pmk_len); in wpa_supplicant_eapol_cb() 347 if (wpa_drv_set_key(wpa_s, WPA_ALG_PMK, NULL, 0, 0, NULL, 0, pmk, in wpa_supplicant_eapol_cb() 550 const u8 *pmk, size_t pmk_len) in wpa_supplicant_add_pmkid() 570 params.pmk = pmk; in wpa_supplicant_add_pmkid() 1156 static int wpa_supplicant_key_mgmt_set_pmk(void *ctx, const u8 *pmk, in wpa_supplicant_key_mgmt_set_pmk() argument 547 wpa_supplicant_add_pmkid(void *_wpa_s, void *network_ctx, const u8 *bssid, const u8 *pmkid, const u8 *fils_cache_id, const u8 *pmk, size_t pmk_len) wpa_supplicant_add_pmkid() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | wpas_glue.c | 297 u8 pmk[PMK_LEN]; in wpa_supplicant_eapol_cb() local 337 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN); in wpa_supplicant_eapol_cb() 344 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); in wpa_supplicant_eapol_cb() 350 res = eapol_sm_get_key(eapol, pmk, 16); in wpa_supplicant_eapol_cb() 362 "handshake", pmk, pmk_len); in wpa_supplicant_eapol_cb() 368 0, NULL, 0, 0, NULL, 0, pmk, in wpa_supplicant_eapol_cb() 598 const u8 *pmk, size_t pmk_len, in wpa_supplicant_add_pmkid() 633 params.pmk = pmk; in wpa_supplicant_add_pmkid() 1251 static int wpa_supplicant_key_mgmt_set_pmk(void *ctx, const u8 *pmk, in wpa_supplicant_key_mgmt_set_pmk() argument 595 wpa_supplicant_add_pmkid(void *_wpa_s, void *network_ctx, const u8 *bssid, const u8 *pmkid, const u8 *fils_cache_id, const u8 *pmk, size_t pmk_len, u32 pmk_lifetime, u8 pmk_reauth_threshold, int akmp) wpa_supplicant_add_pmkid() argument [all...] |
H A D | pasn_supplicant.c | 573 pasn->pmk, &pasn->pmk_len); in wpas_pasn_wd_fils_rx() 587 wpa_pasn_pmksa_cache_add(wpa_s->wpa, pasn->pmk, in wpas_pasn_wd_fils_rx() 880 forced_memzero(pasn->pmk, sizeof(pasn->pmk)); in wpas_pasn_reset() 916 os_memset(pasn->pmk, 0, sizeof(pasn->pmk)); in wpas_pasn_set_pmk() 923 os_memcpy(pasn->pmk, pasn_default_pmk, in wpas_pasn_set_pmk() 932 os_memcpy(pasn->pmk, pasn->pmk_r1, pasn->pmk_r1_len); in wpas_pasn_set_pmk() 951 os_memcpy(pasn->pmk, pmksa->pmk, pmks in wpas_pasn_set_pmk() [all...] |