/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
D | wps_hostapd.c | 115 if (psk_len != PMK_LEN) { in hostapd_wps_new_psk_cb() 127 os_memcpy(p->psk, psk, PMK_LEN); in hostapd_wps_new_psk_cb() 140 char hex[PMK_LEN * 2 + 1]; in hostapd_wps_new_psk_cb() 409 cred->key_len != 2 * PMK_LEN) { in hapd_wps_reconfig_in_memory() 430 bss->ssid.wpa_psk->psk, PMK_LEN) == 0) { in hapd_wps_reconfig_in_memory() 513 (cred->key_len < 8 || cred->key_len > 2 * PMK_LEN)) { in hapd_wps_cred_cb() 608 cred->key_len != 2 * PMK_LEN) { in hapd_wps_cred_cb() 1230 wps->network_key = os_malloc(2 * PMK_LEN + 1); in hostapd_init_wps() 1233 wpa_snprintf_hex((char *) wps->network_key, 2 * PMK_LEN + 1, in hostapd_init_wps() 1234 conf->ssid.wpa_psk->psk, PMK_LEN); in hostapd_init_wps() [all …]
|
D | preauth_auth.c | 205 if (len > PMK_LEN) in rsn_preauth_finished() 206 len = PMK_LEN; in rsn_preauth_finished()
|
D | wpa_auth.c | 2095 u8 msk[2 * PMK_LEN]; in SM_STATE() 2096 size_t len = 2 * PMK_LEN; in SM_STATE() 2120 pmk_len = PMK_LEN; in SM_STATE() 2134 if (len >= 2 * PMK_LEN) { in SM_STATE() 2139 os_memcpy(sm->xxkey, msk + PMK_LEN, PMK_LEN); in SM_STATE() 2140 sm->xxkey_len = PMK_LEN; in SM_STATE() 2177 os_memcpy(sm->xxkey, psk, PMK_LEN); in SM_STATE() 2178 sm->xxkey_len = PMK_LEN; in SM_STATE() 3222 os_memcpy(sm->PMK, pmk, PMK_LEN); in SM_STATE() 3223 sm->pmk_len = PMK_LEN; in SM_STATE() [all …]
|
D | ap_config.h | 146 #define PMK_LEN 32 macro 153 u8 psk[PMK_LEN]; 163 u8 psk[PMK_LEN];
|
D | ap_config.c | 412 if (len == 2 * PMK_LEN && in hostapd_config_read_wpa_psk() 413 hexstr2bin(pos, psk->psk, PMK_LEN) == 0) in hostapd_config_read_wpa_psk() 417 4096, psk->psk, PMK_LEN) == 0) in hostapd_config_read_wpa_psk() 466 4096, ssid->wpa_psk->psk, PMK_LEN); in hostapd_derive_psk() 468 ssid->wpa_psk->psk, PMK_LEN); in hostapd_derive_psk()
|
D | wpa_auth_ft.c | 2061 SHA384_MAC_LEN : PMK_LEN; in wpa_ft_store_pmk_fils() 2085 SHA384_MAC_LEN : PMK_LEN; in wpa_auth_derive_ptk_ft() 2868 u8 pmk_r0[PMK_LEN], pmk_r0_name[WPA_PMK_NAME_LEN]; in wpa_ft_psk_pmk_r1() 2869 u8 pmk_r1[PMK_LEN], pmk_r1_name[WPA_PMK_NAME_LEN]; in wpa_ft_psk_pmk_r1() 2887 if (wpa_derive_pmk_r0(pmk, PMK_LEN, ssid, ssid_len, mdid, r0kh, in wpa_ft_psk_pmk_r1() 2890 wpa_derive_pmk_r1(pmk_r0, PMK_LEN, pmk_r0_name, r1kh, in wpa_ft_psk_pmk_r1() 2899 os_memcpy(out_pmk_r1, pmk_r1, PMK_LEN); in wpa_ft_psk_pmk_r1() 2902 os_memcpy(sm->PMK, pmk, PMK_LEN); in wpa_ft_psk_pmk_r1() 2903 sm->pmk_len = PMK_LEN; in wpa_ft_psk_pmk_r1() 3085 pmk_r1_len = use_sha384 ? SHA384_MAC_LEN : PMK_LEN; in wpa_ft_process_auth_req() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
D | wps_hostapd.c | 115 if (psk_len != PMK_LEN) { in hostapd_wps_new_psk_cb() 127 os_memcpy(p->psk, psk, PMK_LEN); in hostapd_wps_new_psk_cb() 139 char hex[PMK_LEN * 2 + 1]; in hostapd_wps_new_psk_cb() 359 cred->key_len != 2 * PMK_LEN) { in hapd_wps_reconfig_in_memory() 382 bss->ssid.wpa_psk->psk, PMK_LEN) == 0) { in hapd_wps_reconfig_in_memory() 465 (cred->key_len < 8 || cred->key_len > 2 * PMK_LEN)) { in hapd_wps_cred_cb() 554 cred->key_len != 2 * PMK_LEN) { in hapd_wps_cred_cb() 1145 wps->network_key = os_malloc(2 * PMK_LEN + 1); in hostapd_init_wps() 1148 wpa_snprintf_hex((char *) wps->network_key, 2 * PMK_LEN + 1, in hostapd_init_wps() 1149 conf->ssid.wpa_psk->psk, PMK_LEN); in hostapd_init_wps() [all …]
|
D | preauth_auth.c | 205 if (len > PMK_LEN) in rsn_preauth_finished() 206 len = PMK_LEN; in rsn_preauth_finished()
|
D | wpa_auth.c | 2006 u8 msk[2 * PMK_LEN]; in SM_STATE() 2007 size_t len = 2 * PMK_LEN; in SM_STATE() 2031 pmk_len = PMK_LEN; in SM_STATE() 2045 if (len >= 2 * PMK_LEN) { in SM_STATE() 2050 os_memcpy(sm->xxkey, msk + PMK_LEN, PMK_LEN); in SM_STATE() 2051 sm->xxkey_len = PMK_LEN; in SM_STATE() 2088 os_memcpy(sm->xxkey, psk, PMK_LEN); in SM_STATE() 2089 sm->xxkey_len = PMK_LEN; in SM_STATE() 2284 size_t pmk_r0_len = use_sha384 ? SHA384_MAC_LEN : PMK_LEN; in fils_auth_pmk_to_ptk() 3038 os_memcpy(sm->PMK, pmk, PMK_LEN); in SM_STATE() [all …]
|
D | ap_config.h | 137 #define PMK_LEN 32 macro 144 u8 psk[PMK_LEN]; 153 u8 psk[PMK_LEN];
|
D | ap_config.c | 378 if (len == 64 && hexstr2bin(pos, psk->psk, PMK_LEN) == 0) in hostapd_config_read_wpa_psk() 382 4096, psk->psk, PMK_LEN); in hostapd_config_read_wpa_psk() 429 4096, ssid->wpa_psk->psk, PMK_LEN); in hostapd_derive_psk() 431 ssid->wpa_psk->psk, PMK_LEN); in hostapd_derive_psk()
|
D | wpa_auth_ft.c | 2058 SHA384_MAC_LEN : PMK_LEN; in wpa_ft_store_pmk_fils() 2082 SHA384_MAC_LEN : PMK_LEN; in wpa_auth_derive_ptk_ft() 2675 u8 pmk_r0[PMK_LEN], pmk_r0_name[WPA_PMK_NAME_LEN]; in wpa_ft_psk_pmk_r1() 2676 u8 pmk_r1[PMK_LEN], pmk_r1_name[WPA_PMK_NAME_LEN]; in wpa_ft_psk_pmk_r1() 2694 if (wpa_derive_pmk_r0(pmk, PMK_LEN, ssid, ssid_len, mdid, r0kh, in wpa_ft_psk_pmk_r1() 2697 wpa_derive_pmk_r1(pmk_r0, PMK_LEN, pmk_r0_name, r1kh, in wpa_ft_psk_pmk_r1() 2706 os_memcpy(out_pmk_r1, pmk_r1, PMK_LEN); in wpa_ft_psk_pmk_r1() 2709 os_memcpy(sm->PMK, pmk, PMK_LEN); in wpa_ft_psk_pmk_r1() 2710 sm->pmk_len = PMK_LEN; in wpa_ft_psk_pmk_r1() 2894 pmk_r1_len = use_sha384 ? SHA384_MAC_LEN : PMK_LEN; in wpa_ft_process_auth_req() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
D | wpas_glue.c | 280 u8 pmk[PMK_LEN]; in wpa_supplicant_eapol_cb() 312 pmk_len = PMK_LEN; in wpa_supplicant_eapol_cb() 315 u8 buf[2 * PMK_LEN]; in wpa_supplicant_eapol_cb() 318 res = eapol_sm_get_key(eapol, buf, 2 * PMK_LEN); in wpa_supplicant_eapol_cb() 320 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN); in wpa_supplicant_eapol_cb() 327 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); in wpa_supplicant_eapol_cb()
|
D | eapol_test.c | 62 u8 authenticator_pmk[PMK_LEN]; 363 u8 pmk[PMK_LEN]; in eapol_test_compare_pmk() 368 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { in eapol_test_compare_pmk() 369 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); in eapol_test_compare_pmk() 370 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) { in eapol_test_compare_pmk() 373 e->authenticator_pmk, PMK_LEN); in eapol_test_compare_pmk() 867 keys->recv_len > PMK_LEN ? PMK_LEN : in ieee802_1x_get_keys()
|
D | ibss_rsn.h | 50 u8 psk[PMK_LEN];
|
D | ibss_rsn.c | 234 wpa_sm_set_pmk(peer->supp, psk, PMK_LEN, NULL, NULL); in ibss_rsn_supp_init() 268 *psk_len = PMK_LEN; in auth_get_psk() 834 os_memcpy(ibss_rsn->psk, psk, PMK_LEN); in ibss_rsn_set_psk()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
D | eapol_test.c | 62 u8 authenticator_pmk[PMK_LEN]; 363 u8 pmk[PMK_LEN]; in eapol_test_compare_pmk() 368 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { in eapol_test_compare_pmk() 369 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); in eapol_test_compare_pmk() 370 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) { in eapol_test_compare_pmk() 373 e->authenticator_pmk, PMK_LEN); in eapol_test_compare_pmk() 865 keys->recv_len > PMK_LEN ? PMK_LEN : in ieee802_1x_get_keys()
|
D | wpas_glue.c | 293 u8 pmk[PMK_LEN]; in wpa_supplicant_eapol_cb() 325 pmk_len = PMK_LEN; in wpa_supplicant_eapol_cb() 328 u8 buf[2 * PMK_LEN]; in wpa_supplicant_eapol_cb() 331 res = eapol_sm_get_key(eapol, buf, 2 * PMK_LEN); in wpa_supplicant_eapol_cb() 333 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN); in wpa_supplicant_eapol_cb() 340 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); in wpa_supplicant_eapol_cb()
|
D | ibss_rsn.h | 50 u8 psk[PMK_LEN];
|
D | ibss_rsn.c | 248 wpa_sm_set_pmk(peer->supp, psk, PMK_LEN, NULL, NULL); in ibss_rsn_supp_init() 282 *psk_len = PMK_LEN; in auth_get_psk() 849 os_memcpy(ibss_rsn->psk, psk, PMK_LEN); in ibss_rsn_set_psk()
|
D | pasn_supplicant.c | 554 if (ret == PMK_LEN) { in wpas_pasn_wd_fils_rx() 555 rmsk_len = PMK_LEN; in wpas_pasn_wd_fils_rx() 964 pasn->pmk_len = PMK_LEN; in wpas_pasn_set_pmk() 965 os_memcpy(pasn->pmk, pasn->sae.pmk, PMK_LEN); in wpas_pasn_set_pmk()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/ |
D | preauth.c | 87 u8 pmk[PMK_LEN]; in rsn_preauth_eapol_cb() 91 pmk_len = PMK_LEN; in rsn_preauth_eapol_cb() 92 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); in rsn_preauth_eapol_cb()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/ |
D | preauth.c | 78 u8 pmk[PMK_LEN]; in rsn_preauth_eapol_cb() 82 pmk_len = PMK_LEN; in rsn_preauth_eapol_cb() 83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); in rsn_preauth_eapol_cb()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/ |
D | wpa_common.c | 1573 if (xxkey_len != PMK_LEN) { in wpa_derive_pmk_r0() 1576 (int) xxkey_len, PMK_LEN); in wpa_derive_pmk_r0() 1674 if (pmk_r0_len == PMK_LEN && in wpa_derive_pmk_r1() 1678 if (pmk_r0_len != SHA384_MAC_LEN && pmk_r0_len != PMK_LEN) { in wpa_derive_pmk_r1() 1731 ptk->kck_len = wpa_kck_len(akmp, PMK_LEN); in wpa_pmk_r1_to_ptk() 1733 ptk->kek_len = wpa_kek_len(akmp, PMK_LEN); in wpa_pmk_r1_to_ptk() 1753 if (pmk_r1_len != PMK_LEN) { in wpa_pmk_r1_to_ptk() 1756 (int) pmk_r1_len, PMK_LEN); in wpa_pmk_r1_to_ptk()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
D | wpa_common.c | 1916 if (xxkey_len != PMK_LEN) { in wpa_derive_pmk_r0() 1919 (int) xxkey_len, PMK_LEN); in wpa_derive_pmk_r0() 2019 if (pmk_r0_len == PMK_LEN && in wpa_derive_pmk_r1() 2023 if (pmk_r0_len != SHA384_MAC_LEN && pmk_r0_len != PMK_LEN) { in wpa_derive_pmk_r1() 2085 ptk->kck_len = wpa_kck_len(akmp, PMK_LEN); in wpa_pmk_r1_to_ptk() 2087 ptk->kek_len = wpa_kek_len(akmp, PMK_LEN); in wpa_pmk_r1_to_ptk() 2108 if (pmk_r1_len != PMK_LEN) { in wpa_pmk_r1_to_ptk() 2111 (int) pmk_r1_len, PMK_LEN); in wpa_pmk_r1_to_ptk()
|