• Home
  • Raw
  • Download

Lines Matching refs:pmkid

274 				  const u8 *pmkid)  in wpa_supplicant_get_pmk()  argument
278 if (pmkid && !sm->cur_pmksa) { in wpa_supplicant_get_pmk()
283 sm->cur_pmksa = pmksa_cache_get(sm->pmksa, src_addr, pmkid, in wpa_supplicant_get_pmk()
295 if (pmkid && sm->cur_pmksa && in wpa_supplicant_get_pmk()
296 os_memcmp_const(pmkid, sm->cur_pmksa->pmkid, PMKID_LEN) == 0) { in wpa_supplicant_get_pmk()
297 wpa_hexdump(MSG_DEBUG, "RSN: matched PMKID", pmkid, PMKID_LEN); in wpa_supplicant_get_pmk()
397 if (!sm->cur_pmksa && pmkid && in wpa_supplicant_get_pmk()
398 pmksa_cache_get(sm->pmksa, src_addr, pmkid, NULL, in wpa_supplicant_get_pmk()
404 } else if (sa && !sm->cur_pmksa && pmkid) { in wpa_supplicant_get_pmk()
706 if (ie.pmkid) { in wpa_supplicant_process_1_of_4()
708 "Authenticator", ie.pmkid, PMKID_LEN); in wpa_supplicant_process_1_of_4()
712 res = wpa_supplicant_get_pmk(sm, src_addr, ie.pmkid); in wpa_supplicant_process_1_of_4()
1467 rsn.num_pmkid != 1 || rsn.pmkid == NULL) { in ft_validate_rsnie()
1473 if (os_memcmp_const(rsn.pmkid, sm->pmk_r1_name, WPA_PMK_NAME_LEN) != 0) in ft_validate_rsnie()
1479 rsn.pmkid, WPA_PMK_NAME_LEN); in ft_validate_rsnie()
2789 sm->cur_pmksa->pmkid, PMKID_LEN); in wpa_sm_get_mib()
3095 const u8 *pmkid, const u8 *bssid) in wpa_sm_set_pmk() argument
3112 pmksa_cache_add(sm->pmksa, pmk, pmk_len, pmkid, NULL, 0, in wpa_sm_set_pmk()
3786 const u8 *pmkid, const u8 *bssid, in wpa_sm_pmksa_cache_add() argument
3789 sm->cur_pmksa = pmksa_cache_add(sm->pmksa, pmk, pmk_len, pmkid, NULL, 0, in wpa_sm_pmksa_cache_add()
3804 const u8 *pmkid, in wpa_sm_pmksa_cache_get() argument
3808 return pmksa_cache_get(sm->pmksa, aa, pmkid, network_ctx, akmp); in wpa_sm_pmksa_cache_get()
4317 if (rsn.pmkid && rsn.num_pmkid > 0) { in fils_process_auth()
4319 rsn.pmkid, rsn.num_pmkid * PMKID_LEN); in fils_process_auth()
4325 wpa_hexdump(MSG_DEBUG, "FILS: PMKID", rsn.pmkid, PMKID_LEN); in fils_process_auth()
4326 if (os_memcmp(sm->cur_pmksa->pmkid, rsn.pmkid, PMKID_LEN) != 0) in fils_process_auth()
4330 sm->cur_pmksa->pmkid, PMKID_LEN); in fils_process_auth()
4908 !rsn.pmkid || rsn.num_pmkid != 1 || in fils_process_assoc_resp()
4909 os_memcmp(rsn.pmkid, sm->pmk_r1_name, in fils_process_assoc_resp()
5086 u8 prk[SHA512_MAC_LEN], pmkid[SHA512_MAC_LEN]; in owe_process_assoc_resp() local
5104 data.num_pmkid == 1 && data.pmkid && in owe_process_assoc_resp()
5105 os_memcmp(sm->cur_pmksa->pmkid, data.pmkid, PMKID_LEN) == 0) { in owe_process_assoc_resp()
5163 res = sha256_vector(2, addr, len, pmkid); in owe_process_assoc_resp()
5166 res = sha384_vector(2, addr, len, pmkid); in owe_process_assoc_resp()
5169 res = sha512_vector(2, addr, len, pmkid); in owe_process_assoc_resp()
5228 wpa_hexdump(MSG_DEBUG, "OWE: PMKID", pmkid, PMKID_LEN); in owe_process_assoc_resp()
5229 pmksa_cache_add(sm->pmksa, sm->pmk, sm->pmk_len, pmkid, NULL, 0, in owe_process_assoc_resp()
5263 const u8 *pmkid, const u8 *bssid, int key_mgmt) in wpa_pasn_pmksa_cache_add() argument
5265 sm->cur_pmksa = pmksa_cache_add(sm->pmksa, pmk, pmk_len, pmkid, NULL, 0, in wpa_pasn_pmksa_cache_add()