Home
last modified time | relevance | path

Searched refs:pmk (Results 1 – 25 of 75) sorted by relevance

123

/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/
Dpmksa_cache.c131 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, in pmksa_cache_add() argument
148 os_memcpy(entry->pmk, pmk, pmk_len); in pmksa_cache_add()
157 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_add()
187 os_memcmp_const(pos->pmk, entry->pmk, in pmksa_cache_add_entry()
215 pos->pmk, pos->pmk_len); in pmksa_cache_add_entry()
270 entry->pmk, entry->pmk_len); in pmksa_cache_add_entry()
284 const u8 *pmk, size_t pmk_len) in pmksa_cache_flush() argument
293 (pmk == NULL || in pmksa_cache_flush()
295 os_memcmp(pmk, entry->pmk, pmk_len) == 0))) { in pmksa_cache_flush()
375 new_entry = pmksa_cache_add(pmksa, old_entry->pmk, old_entry->pmk_len, in pmksa_cache_clone_entry()
Dpmksa_cache.h18 u8 pmk[PMK_LEN_MAX]; member
69 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
86 const u8 *pmk, size_t pmk_len);
135 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, in pmksa_cache_add() argument
159 const u8 *pmk, size_t pmk_len) in pmksa_cache_flush() argument
Dpreauth.c78 u8 pmk[PMK_LEN]; in rsn_preauth_eapol_cb() local
83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); in rsn_preauth_eapol_cb()
89 res = eapol_sm_get_key(eapol, pmk, 16); in rsn_preauth_eapol_cb()
94 pmk, pmk_len); in rsn_preauth_eapol_cb()
96 pmksa_cache_add(sm->pmksa, pmk, pmk_len, NULL, in rsn_preauth_eapol_cb()
346 NULL, p->pmk, p->pmk_len); in rsn_preauth_candidate_process()
Dwpa_i.h21 u8 pmk[PMK_LEN_MAX]; member
249 const u8 *cache_id, const u8 *pmk, in wpa_sm_add_pmkid() argument
254 cache_id, pmk, pmk_len); in wpa_sm_add_pmkid()
389 const u8 *pmk, size_t pmk_len) in wpa_sm_key_mgmt_set_pmk() argument
393 return sm->ctx->key_mgmt_set_pmk(sm->ctx->ctx, pmk, pmk_len); in wpa_sm_key_mgmt_set_pmk()
Dwpa.c252 if (wpa_sm_key_mgmt_set_pmk(sm, sm->pmk, sm->pmk_len)) in wpa_supplicant_key_mgmt_set_pmk()
289 sm->pmk, sm->pmk_len); in wpa_supplicant_get_pmk()
301 os_memcpy(sm->xxkey, sm->pmk, sm->pmk_len); in wpa_supplicant_get_pmk()
316 res = eapol_sm_get_key(sm->eapol, sm->pmk, pmk_len); in wpa_supplicant_get_pmk()
323 res = eapol_sm_get_key(sm->eapol, sm->pmk, 16); in wpa_supplicant_get_pmk()
372 "machines", sm->pmk, pmk_len); in wpa_supplicant_get_pmk()
379 sm->pmk, pmk_len, NULL, in wpa_supplicant_get_pmk()
578 return wpa_pmk_to_ptk(sm->pmk, sm->pmk_len, "Pairwise key expansion", in wpa_derive_ptk()
1583 sa = pmksa_cache_add(sm->pmksa, sm->pmk, sm->pmk_len, NULL, in wpa_supplicant_process_3_of_4()
2618 os_memcmp(sm->pmk, entry->pmk, sm->pmk_len) == 0)) { in wpa_sm_pmksa_free_cb()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/
Dpmksa_cache.h18 u8 pmk[PMK_LEN_MAX]; member
73 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
90 const u8 *pmk, size_t pmk_len, bool external_only);
142 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, in pmksa_cache_add() argument
166 const u8 *pmk, size_t pmk_len, in pmksa_cache_flush() argument
Dpmksa_cache.c173 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, in pmksa_cache_add() argument
190 os_memcpy(entry->pmk, pmk, pmk_len); in pmksa_cache_add()
199 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_add()
229 os_memcmp_const(pos->pmk, entry->pmk, in pmksa_cache_add_entry()
257 pos->pmk, pos->pmk_len, in pmksa_cache_add_entry()
313 entry->pmk, entry->pmk_len, in pmksa_cache_add_entry()
332 const u8 *pmk, size_t pmk_len, bool external_only) in pmksa_cache_flush() argument
341 (pmk == NULL || in pmksa_cache_flush()
343 os_memcmp(pmk, entry->pmk, pmk_len) == 0)) && in pmksa_cache_flush()
429 new_entry = pmksa_cache_add(pmksa, old_entry->pmk, old_entry->pmk_len, in pmksa_cache_clone_entry()
[all …]
Dpreauth.c87 u8 pmk[PMK_LEN]; in rsn_preauth_eapol_cb() local
92 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); in rsn_preauth_eapol_cb()
98 res = eapol_sm_get_key(eapol, pmk, 16); in rsn_preauth_eapol_cb()
103 pmk, pmk_len); in rsn_preauth_eapol_cb()
105 pmksa_cache_add(sm->pmksa, pmk, pmk_len, NULL, in rsn_preauth_eapol_cb()
366 NULL, p->pmk, p->pmk_len, 0, 0, in rsn_preauth_candidate_process()
Dwpa.h45 const u8 *pmk, size_t pmk_len, u32 pmk_lifetime,
88 int (*key_mgmt_set_pmk)(void *ctx, const u8 *pmk, size_t pmk_len);
147 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len,
196 void wpa_sm_pmksa_cache_add(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len,
243 static inline void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, in wpa_sm_set_pmk() argument
570 void wpa_pasn_pmksa_cache_add(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len,
Dwpa.c267 if (wpa_sm_key_mgmt_set_pmk(sm, sm->pmk, sm->pmk_len)) in wpa_supplicant_key_mgmt_set_pmk()
304 sm->pmk, sm->pmk_len); in wpa_supplicant_get_pmk()
316 os_memcpy(sm->xxkey, sm->pmk, sm->pmk_len); in wpa_supplicant_get_pmk()
331 res = eapol_sm_get_key(sm->eapol, sm->pmk, pmk_len); in wpa_supplicant_get_pmk()
338 res = eapol_sm_get_key(sm->eapol, sm->pmk, 16); in wpa_supplicant_get_pmk()
387 "machines", sm->pmk, pmk_len); in wpa_supplicant_get_pmk()
394 sm->pmk, pmk_len, NULL, in wpa_supplicant_get_pmk()
623 return wpa_pmk_to_ptk(sm->pmk, sm->pmk_len, "Pairwise key expansion", in wpa_derive_ptk()
1870 sa = pmksa_cache_add(sm->pmksa, sm->pmk, sm->pmk_len, NULL, in wpa_supplicant_process_3_of_4()
2936 os_memcmp(sm->pmk, entry->pmk, sm->pmk_len) == 0)) { in wpa_sm_pmksa_free_cb()
[all …]
Dwpa_i.h26 u8 pmk[PMK_LEN_MAX]; member
302 const u8 *cache_id, const u8 *pmk, in wpa_sm_add_pmkid() argument
308 cache_id, pmk, pmk_len, pmk_lifetime, in wpa_sm_add_pmkid()
449 const u8 *pmk, size_t pmk_len) in wpa_sm_key_mgmt_set_pmk() argument
453 return sm->ctx->key_mgmt_set_pmk(sm->ctx->ctx, pmk, pmk_len); in wpa_sm_key_mgmt_set_pmk()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/
Dcommon_module_tests.c313 const u8 pmk[] = { in sae_tests() local
440 if (os_memcmp(pmk, sae.pmk, SAE_PMK_LEN) != 0) { in sae_tests()
612 const u8 pmk[] = { in pasn_test_pasn_auth() local
650 ret = pasn_pmk_to_ptk(pmk, sizeof(pmk), in pasn_test_pasn_auth()
684 const u8 pmk[] = { in pasn_test_no_pasn_auth() local
729 ret = wpa_pmk_to_ptk(pmk, sizeof(pmk), in pasn_test_no_pasn_auth()
Dwpa_common.c348 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, in wpa_pmk_to_ptk() argument
422 if (sha384_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk()
430 if (sha256_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk()
437 if (sha256_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk()
442 if (sha384_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk()
447 if (sha512_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk()
458 if (sha256_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk()
463 if (sha384_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk()
468 if (sha512_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk()
478 if (sha1_prf(pmk, pmk_len, label, data, data_len, tmp, in wpa_pmk_to_ptk()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
Dpmksa_cache_auth.c280 const u8 *pmk, size_t pmk_len, const u8 *pmkid, in pmksa_cache_auth_add() argument
287 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len, in pmksa_cache_auth_add()
315 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid, in pmksa_cache_auth_create_entry() argument
332 os_memcpy(entry->pmk, pmk, pmk_len); in pmksa_cache_auth_create_entry()
341 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_auth_create_entry()
404 os_memcpy(entry->pmk, old_entry->pmk, old_entry->pmk_len); in pmksa_cache_add_okc()
519 rsn_pmkid(entry->pmk, entry->pmk_len, aa, spa, new_pmkid, in pmksa_cache_get_okc()
715 pos += wpa_snprintf_hex(pos, end - pos, entry->pmk, in pmksa_cache_auth_list_mesh()
Dpmksa_cache_auth.h20 u8 pmk[PMK_LEN_MAX]; member
52 const u8 *pmk, size_t pmk_len, const u8 *pmkid,
57 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid,
Dwpa_auth.h366 int wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk,
370 const u8 *pmk, size_t len, const u8 *sta_addr,
374 const u8 *pmk, const u8 *pmkid);
377 const u8 *pmk, size_t pmk_len, const u8 *pmkid,
387 wpa_auth_pmksa_create_entry(const u8 *aa, const u8 *spa, const u8 *pmk,
400 u8 *pmkid, u8 *pmk);
445 int fils_auth_pmk_to_ptk(struct wpa_state_machine *sm, const u8 *pmk,
473 void wpa_auth_add_fils_pmk_pmkid(struct wpa_state_machine *sm, const u8 *pmk,
Dwpa_auth.c58 const u8 *pmk, unsigned int pmk_len,
885 const u8 *pmk = NULL; in wpa_try_alt_snonce() local
893 pmk = wpa_auth_get_psk(sm->wpa_auth, sm->addr, in wpa_try_alt_snonce()
894 sm->p2p_dev_addr, pmk, &pmk_len, in wpa_try_alt_snonce()
896 if (pmk == NULL) in wpa_try_alt_snonce()
900 os_memcpy(sm->xxkey, pmk, pmk_len); in wpa_try_alt_snonce()
905 pmk = sm->PMK; in wpa_try_alt_snonce()
909 if (wpa_derive_ptk(sm, sm->alt_SNonce, pmk, pmk_len, &PTK) < 0) in wpa_try_alt_snonce()
914 if (sm->PMK != pmk) { in wpa_try_alt_snonce()
915 os_memcpy(sm->PMK, pmk, pmk_len); in wpa_try_alt_snonce()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
Dpmksa_cache_auth.c280 const u8 *pmk, size_t pmk_len, const u8 *pmkid, in pmksa_cache_auth_add() argument
287 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len, in pmksa_cache_auth_add()
315 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid, in pmksa_cache_auth_create_entry() argument
332 os_memcpy(entry->pmk, pmk, pmk_len); in pmksa_cache_auth_create_entry()
341 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_auth_create_entry()
404 os_memcpy(entry->pmk, old_entry->pmk, old_entry->pmk_len); in pmksa_cache_add_okc()
525 rsn_pmkid(entry->pmk, entry->pmk_len, aa, spa, new_pmkid, in pmksa_cache_get_okc()
721 pos += wpa_snprintf_hex(pos, end - pos, entry->pmk, in pmksa_cache_auth_list_mesh()
Dpmksa_cache_auth.h20 u8 pmk[PMK_LEN_MAX]; member
52 const u8 *pmk, size_t pmk_len, const u8 *pmkid,
57 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid,
Dwpa_auth.h415 int wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk,
419 const u8 *pmk, size_t len, const u8 *sta_addr,
423 const u8 *pmk, const u8 *pmkid);
426 const u8 *pmk, size_t pmk_len, const u8 *pmkid,
436 wpa_auth_pmksa_create_entry(const u8 *aa, const u8 *spa, const u8 *pmk,
449 u8 *pmkid, u8 *pmk);
504 int fils_auth_pmk_to_ptk(struct wpa_state_machine *sm, const u8 *pmk,
532 void wpa_auth_add_fils_pmk_pmkid(struct wpa_state_machine *sm, const u8 *pmk,
Dwpa_auth.c63 const u8 *pmk, unsigned int pmk_len,
951 const u8 *pmk = NULL; in wpa_try_alt_snonce() local
959 pmk = wpa_auth_get_psk(sm->wpa_auth, sm->addr, in wpa_try_alt_snonce()
960 sm->p2p_dev_addr, pmk, &pmk_len, in wpa_try_alt_snonce()
962 if (!pmk) in wpa_try_alt_snonce()
966 os_memcpy(sm->xxkey, pmk, pmk_len); in wpa_try_alt_snonce()
971 pmk = sm->PMK; in wpa_try_alt_snonce()
975 if (wpa_derive_ptk(sm, sm->alt_SNonce, pmk, pmk_len, &PTK, 0) < in wpa_try_alt_snonce()
981 if (sm->PMK != pmk) { in wpa_try_alt_snonce()
982 os_memcpy(sm->PMK, pmk, pmk_len); in wpa_try_alt_snonce()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
Dwpas_glue.c280 u8 pmk[PMK_LEN]; in wpa_supplicant_eapol_cb() local
320 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN); in wpa_supplicant_eapol_cb()
327 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); in wpa_supplicant_eapol_cb()
333 res = eapol_sm_get_key(eapol, pmk, 16); in wpa_supplicant_eapol_cb()
345 "handshake", pmk, pmk_len); in wpa_supplicant_eapol_cb()
347 if (wpa_drv_set_key(wpa_s, WPA_ALG_PMK, NULL, 0, 0, NULL, 0, pmk, in wpa_supplicant_eapol_cb()
550 const u8 *pmk, size_t pmk_len) in wpa_supplicant_add_pmkid() argument
570 params.pmk = pmk; in wpa_supplicant_add_pmkid()
1156 static int wpa_supplicant_key_mgmt_set_pmk(void *ctx, const u8 *pmk, in wpa_supplicant_key_mgmt_set_pmk() argument
1164 NULL, 0, pmk, pmk_len); in wpa_supplicant_key_mgmt_set_pmk()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/
Dwpa_common.c349 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, in wpa_pmk_to_ptk() argument
406 if (sha384_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk()
415 if (sha256_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk()
424 if (sha256_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk()
429 if (sha384_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk()
434 if (sha512_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk()
444 if (sha1_prf(pmk, pmk_len, label, data, data_len, tmp, in wpa_pmk_to_ptk()
455 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len); in wpa_pmk_to_ptk()
479 size_t dh_ss_len, u8 *pmk, size_t *pmk_len) in fils_rmsk_to_pmk() argument
514 addr, len, pmk); in fils_rmsk_to_pmk()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
Dpasn_supplicant.c566 pasn->pmk, &pasn->pmk_len); in wpas_pasn_wd_fils_rx()
580 wpa_pasn_pmksa_cache_add(wpa_s->wpa, pasn->pmk, in wpas_pasn_wd_fils_rx()
873 forced_memzero(pasn->pmk, sizeof(pasn->pmk)); in wpas_pasn_reset()
909 os_memset(pasn->pmk, 0, sizeof(pasn->pmk)); in wpas_pasn_set_pmk()
916 os_memcpy(pasn->pmk, pasn_default_pmk, in wpas_pasn_set_pmk()
925 os_memcpy(pasn->pmk, pasn->pmk_r1, pasn->pmk_r1_len); in wpas_pasn_set_pmk()
944 os_memcpy(pasn->pmk, pmksa->pmk, pmksa->pmk_len); in wpas_pasn_set_pmk()
965 os_memcpy(pasn->pmk, pasn->sae.pmk, PMK_LEN); in wpas_pasn_set_pmk()
967 wpa_pasn_pmksa_cache_add(wpa_s->wpa, pasn->pmk, in wpas_pasn_set_pmk()
1519 ret = pasn_pmk_to_ptk(pasn->pmk, pasn->pmk_len, in wpas_pasn_auth_rx()
Dwpas_glue.c293 u8 pmk[PMK_LEN]; in wpa_supplicant_eapol_cb() local
333 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN); in wpa_supplicant_eapol_cb()
340 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); in wpa_supplicant_eapol_cb()
346 res = eapol_sm_get_key(eapol, pmk, 16); in wpa_supplicant_eapol_cb()
358 "handshake", pmk, pmk_len); in wpa_supplicant_eapol_cb()
360 if (wpa_drv_set_key(wpa_s, 0, NULL, 0, 0, NULL, 0, pmk, in wpa_supplicant_eapol_cb()
582 const u8 *pmk, size_t pmk_len, in wpa_supplicant_add_pmkid() argument
617 params.pmk = pmk; in wpa_supplicant_add_pmkid()
1229 static int wpa_supplicant_key_mgmt_set_pmk(void *ctx, const u8 *pmk, in wpa_supplicant_key_mgmt_set_pmk() argument
1237 NULL, 0, pmk, pmk_len, KEY_FLAG_PMK); in wpa_supplicant_key_mgmt_set_pmk()

123