/external/wpa_supplicant_8/src/rsn_supp/ |
D | pmksa_cache.h | 18 u8 pmk[PMK_LEN_MAX]; member 70 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 87 const u8 *pmk, size_t pmk_len); 136 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, in pmksa_cache_add() argument 160 const u8 *pmk, size_t pmk_len) in pmksa_cache_flush() argument
|
D | pmksa_cache.c | 133 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, in pmksa_cache_add() argument 150 os_memcpy(entry->pmk, pmk, pmk_len); in pmksa_cache_add() 159 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_add() 189 os_memcmp_const(pos->pmk, entry->pmk, in pmksa_cache_add_entry() 217 pos->pmk, pos->pmk_len); in pmksa_cache_add_entry() 273 entry->pmk, entry->pmk_len, in pmksa_cache_add_entry() 289 const u8 *pmk, size_t pmk_len) in pmksa_cache_flush() argument 298 (pmk == NULL || in pmksa_cache_flush() 300 os_memcmp(pmk, entry->pmk, pmk_len) == 0))) { in pmksa_cache_flush() 383 new_entry = pmksa_cache_add(pmksa, old_entry->pmk, old_entry->pmk_len, in pmksa_cache_clone_entry()
|
D | preauth.c | 87 u8 pmk[PMK_LEN]; in rsn_preauth_eapol_cb() local 92 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); in rsn_preauth_eapol_cb() 98 res = eapol_sm_get_key(eapol, pmk, 16); in rsn_preauth_eapol_cb() 103 pmk, pmk_len); in rsn_preauth_eapol_cb() 105 pmksa_cache_add(sm->pmksa, pmk, pmk_len, NULL, in rsn_preauth_eapol_cb() 352 NULL, p->pmk, p->pmk_len, 0, 0); in rsn_preauth_candidate_process()
|
D | wpa_i.h | 21 u8 pmk[PMK_LEN_MAX]; member 268 const u8 *cache_id, const u8 *pmk, in wpa_sm_add_pmkid() argument 274 cache_id, pmk, pmk_len, pmk_lifetime, in wpa_sm_add_pmkid() 410 const u8 *pmk, size_t pmk_len) in wpa_sm_key_mgmt_set_pmk() argument 414 return sm->ctx->key_mgmt_set_pmk(sm->ctx->ctx, pmk, pmk_len); in wpa_sm_key_mgmt_set_pmk()
|
D | wpa.c | 261 if (wpa_sm_key_mgmt_set_pmk(sm, sm->pmk, sm->pmk_len)) in wpa_supplicant_key_mgmt_set_pmk() 298 sm->pmk, sm->pmk_len); in wpa_supplicant_get_pmk() 310 os_memcpy(sm->xxkey, sm->pmk, sm->pmk_len); in wpa_supplicant_get_pmk() 325 res = eapol_sm_get_key(sm->eapol, sm->pmk, pmk_len); in wpa_supplicant_get_pmk() 332 res = eapol_sm_get_key(sm->eapol, sm->pmk, 16); in wpa_supplicant_get_pmk() 381 "machines", sm->pmk, pmk_len); in wpa_supplicant_get_pmk() 388 sm->pmk, pmk_len, NULL, in wpa_supplicant_get_pmk() 605 return wpa_pmk_to_ptk(sm->pmk, sm->pmk_len, "Pairwise key expansion", in wpa_derive_ptk() 1803 sa = pmksa_cache_add(sm->pmksa, sm->pmk, sm->pmk_len, NULL, in wpa_supplicant_process_3_of_4() 2831 os_memcmp(sm->pmk, entry->pmk, sm->pmk_len) == 0)) { in wpa_sm_pmksa_free_cb() [all …]
|
D | wpa.h | 45 const u8 *pmk, size_t pmk_len, u32 pmk_lifetime, 85 int (*key_mgmt_set_pmk)(void *ctx, const u8 *pmk, size_t pmk_len); 136 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, 181 void wpa_sm_pmksa_cache_add(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, 221 static inline void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, in wpa_sm_set_pmk() argument
|
/external/wpa_supplicant_8/src/ap/ |
D | pmksa_cache_auth.c | 280 const u8 *pmk, size_t pmk_len, const u8 *pmkid, in pmksa_cache_auth_add() argument 287 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len, in pmksa_cache_auth_add() 315 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid, in pmksa_cache_auth_create_entry() argument 332 os_memcpy(entry->pmk, pmk, pmk_len); in pmksa_cache_auth_create_entry() 341 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_auth_create_entry() 404 os_memcpy(entry->pmk, old_entry->pmk, old_entry->pmk_len); in pmksa_cache_add_okc() 524 rsn_pmkid(entry->pmk, entry->pmk_len, aa, spa, new_pmkid, in pmksa_cache_get_okc() 720 pos += wpa_snprintf_hex(pos, end - pos, entry->pmk, in pmksa_cache_auth_list_mesh()
|
D | pmksa_cache_auth.h | 20 u8 pmk[PMK_LEN_MAX]; member 52 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 57 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid,
|
D | wpa_auth.h | 395 int wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk, 399 const u8 *pmk, size_t len, const u8 *sta_addr, 403 const u8 *pmk, const u8 *pmkid); 406 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 416 wpa_auth_pmksa_create_entry(const u8 *aa, const u8 *spa, const u8 *pmk, 429 u8 *pmkid, u8 *pmk); 476 int fils_auth_pmk_to_ptk(struct wpa_state_machine *sm, const u8 *pmk, 504 void wpa_auth_add_fils_pmk_pmkid(struct wpa_state_machine *sm, const u8 *pmk,
|
D | wpa_auth.c | 59 const u8 *pmk, unsigned int pmk_len, 920 const u8 *pmk = NULL; in wpa_try_alt_snonce() local 928 pmk = wpa_auth_get_psk(sm->wpa_auth, sm->addr, in wpa_try_alt_snonce() 929 sm->p2p_dev_addr, pmk, &pmk_len, in wpa_try_alt_snonce() 931 if (!pmk) in wpa_try_alt_snonce() 935 os_memcpy(sm->xxkey, pmk, pmk_len); in wpa_try_alt_snonce() 940 pmk = sm->PMK; in wpa_try_alt_snonce() 944 if (wpa_derive_ptk(sm, sm->alt_SNonce, pmk, pmk_len, &PTK, 0) < in wpa_try_alt_snonce() 950 if (sm->PMK != pmk) { in wpa_try_alt_snonce() 951 os_memcpy(sm->PMK, pmk, pmk_len); in wpa_try_alt_snonce() [all …]
|
D | ctrl_iface_ap.c | 941 u8 pmk[PMK_LEN_MAX]; in hostapd_ctrl_iface_pmksa_add() local 972 hexstr2bin(pos, pmk, pmk_len) < 0) in hostapd_ctrl_iface_pmksa_add() 980 return wpa_auth_pmksa_add2(hapd->wpa_auth, spa, pmk, pmk_len, in hostapd_ctrl_iface_pmksa_add() 999 u8 pmk[PMK_LEN_MAX]; in hostapd_ctrl_iface_pmksa_create_entry() local 1024 if (hexstr2bin(pos, pmk, PMK_LEN) < 0) in hostapd_ctrl_iface_pmksa_create_entry() 1035 return wpa_auth_pmksa_create_entry(aa, spa, pmk, pmkid, expiration); in hostapd_ctrl_iface_pmksa_create_entry()
|
D | sta_info.c | 1207 const u8 *pmk; in ap_sta_wpa_get_keyid() local 1212 pmk = wpa_auth_get_pmk(sta->wpa_sm, &pmk_len); in ap_sta_wpa_get_keyid() 1213 if (!pmk || pmk_len != PMK_LEN) in ap_sta_wpa_get_keyid() 1217 if (os_memcmp(pmk, psk->psk, PMK_LEN) == 0) in ap_sta_wpa_get_keyid()
|
/external/sl4a/Common/src/com/googlecode/android_scripting/facade/wifi/ |
D | WifiAwareManagerFacade.java | 126 if (ns.pmk != null) { in getJsonString() 127 j.put(NS_KEY_PMK, Base64.encodeToString(ns.pmk, Base64.DEFAULT)); in getJsonString() 149 byte[] pmk = null; in getNetworkSpecifier() 172 pmk = Base64.decode(j.getString(NS_KEY_PMK), Base64.DEFAULT); in getNetworkSpecifier() 184 return new WifiAwareNetworkSpecifier(type, role, clientId, sessionId, peerId, peerMac, pmk, in getNetworkSpecifier() 584 @RpcOptional String pmk, in wifiAwareCreateNetworkSpecifier() argument 602 if (!TextUtils.isEmpty(pmk)) { in wifiAwareCreateNetworkSpecifier() 603 pmkDecoded = Base64.decode(pmk, Base64.DEFAULT); in wifiAwareCreateNetworkSpecifier() 639 @RpcOptional String pmk) throws JSONException { in wifiAwareCreateNetworkSpecifierOob() argument 654 if (!TextUtils.isEmpty(pmk)) { in wifiAwareCreateNetworkSpecifierOob() [all …]
|
/external/wpa_supplicant_8/src/common/ |
D | wpa_common.c | 347 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, in wpa_pmk_to_ptk() argument 412 if (sha384_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk() 420 if (sha256_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk() 427 if (sha256_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk() 432 if (sha384_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk() 437 if (sha512_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk() 448 if (sha256_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk() 453 if (sha384_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk() 458 if (sha512_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk() 468 if (sha1_prf(pmk, pmk_len, label, data, data_len, tmp, in wpa_pmk_to_ptk() [all …]
|
D | common_module_tests.c | 317 const u8 pmk[] = { in sae_tests() local 458 if (os_memcmp(pmk, sae.pmk, SAE_PMK_LEN) != 0) { in sae_tests()
|
D | wpa_common.h | 377 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, 384 size_t dh_ss_len, u8 *pmk, size_t *pmk_len); 387 int fils_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const u8 *spa, const u8 *aa, 445 void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa,
|
D | sae.h | 70 u8 pmk[SAE_PMK_LEN]; member
|
D | dpp_i.h | 111 int dpp_derive_pmk(const u8 *Nx, size_t Nx_len, u8 *pmk, unsigned int hash_len);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | wpas_glue.c | 288 u8 pmk[PMK_LEN]; in wpa_supplicant_eapol_cb() local 328 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN); in wpa_supplicant_eapol_cb() 335 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); in wpa_supplicant_eapol_cb() 341 res = eapol_sm_get_key(eapol, pmk, 16); in wpa_supplicant_eapol_cb() 353 "handshake", pmk, pmk_len); in wpa_supplicant_eapol_cb() 355 if (wpa_drv_set_key(wpa_s, 0, NULL, 0, 0, NULL, 0, pmk, in wpa_supplicant_eapol_cb() 577 const u8 *pmk, size_t pmk_len, in wpa_supplicant_add_pmkid() argument 598 params.pmk = pmk; in wpa_supplicant_add_pmkid() 1204 static int wpa_supplicant_key_mgmt_set_pmk(void *ctx, const u8 *pmk, in wpa_supplicant_key_mgmt_set_pmk() argument 1212 NULL, 0, pmk, pmk_len, KEY_FLAG_PMK); in wpa_supplicant_key_mgmt_set_pmk()
|
D | mesh_rsn.c | 95 return sta->sae->pmk; in auth_get_psk() 388 sta->sae->pmkid, sta->sae->pmk); in mesh_rsn_auth_sae_sta() 447 sha256_prf(sta->sae->pmk, sizeof(sta->sae->pmk), "AEK Derivation", in mesh_rsn_derive_aek() 508 sha256_prf(sta->sae->pmk, SAE_PMK_LEN, in mesh_rsn_derive_mtk()
|
D | eapol_test.c | 363 u8 pmk[PMK_LEN]; in eapol_test_compare_pmk() local 368 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { in eapol_test_compare_pmk() 369 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); in eapol_test_compare_pmk() 370 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) { in eapol_test_compare_pmk() 377 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) { in eapol_test_compare_pmk() 378 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16); in eapol_test_compare_pmk() 379 if (os_memcmp(pmk, e->authenticator_pmk, 16) != 0) { in eapol_test_compare_pmk()
|
D | preauth_test.c | 156 const u8 *pmk, size_t pmk_len, in wpa_supplicant_add_pmkid() argument
|
/external/wpa_supplicant_8/wpa_supplicant/hidl/1.3/ |
D | misc_utils.h | 71 ss.write((char *) pmksa_entry->pmk, pmksa_entry->pmk_len); in serializePmkCacheEntry() 90 ss.read((char *) pmksa_entry->pmk, pmksa_entry->pmk_len); in deserializePmkCacheEntry()
|
/external/scapy/scapy/modules/krack/ |
D | automaton.py | 155 self.pmk = PBKDF2HMAC( 167 pmk = self.pmk 174 self.ptk = customPRF512(pmk, amac, smac, anonce, snonce)
|
/external/wpa_supplicant_8/hostapd/ |
D | ctrl_iface.c | 1552 const u8 *pmk; in hostapd_ctrl_iface_kick_mismatch_psk_sta_iter() local 1559 pmk = wpa_auth_get_pmk(sta->wpa_sm, &pmk_len); in hostapd_ctrl_iface_kick_mismatch_psk_sta_iter() 1561 for (psk = hapd->conf->ssid.wpa_psk; pmk && psk; psk = psk->next) { in hostapd_ctrl_iface_kick_mismatch_psk_sta_iter() 1563 os_memcmp(psk->psk, pmk, pmk_len) == 0; in hostapd_ctrl_iface_kick_mismatch_psk_sta_iter() 2445 const u8 *pmk; in hostapd_ctrl_get_pmk() local 2457 pmk = wpa_auth_get_pmk(sta->wpa_sm, &pmk_len); in hostapd_ctrl_get_pmk() 2458 if (!pmk) { in hostapd_ctrl_get_pmk() 2464 return wpa_snprintf_hex(buf, buflen, pmk, pmk_len); in hostapd_ctrl_get_pmk()
|