Home
last modified time | relevance | path

Searched refs:PMK_LEN (Results 1 – 25 of 54) sorted by relevance

123

/external/wpa_supplicant_8/src/ap/
Dpeerkey_auth.c163 2 + RSN_SELECTOR_LEN + PMK_LEN + WPA_NONCE_LEN + in wpa_send_smk_m4()
178 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN, in wpa_send_smk_m4()
217 2 + RSN_SELECTOR_LEN + PMK_LEN + WPA_NONCE_LEN + in wpa_send_smk_m5()
235 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN, in wpa_send_smk_m5()
292 if (random_get_bytes(smk, PMK_LEN)) { in wpa_smk_m3()
308 sha256_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf), in wpa_smk_m3()
309 smk, PMK_LEN); in wpa_smk_m3()
311 sha1_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf), in wpa_smk_m3()
312 smk, PMK_LEN); in wpa_smk_m3()
315 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", smk, PMK_LEN); in wpa_smk_m3()
Dwpa_auth_ft.c126 u8 pmk_r0[PMK_LEN];
136 u8 pmk_r1[PMK_LEN];
167 os_memset(r0prev->pmk_r0, 0, PMK_LEN); in wpa_ft_pmk_cache_deinit()
175 os_memset(r1prev->pmk_r1, 0, PMK_LEN); in wpa_ft_pmk_cache_deinit()
196 os_memcpy(r0->pmk_r0, pmk_r0, PMK_LEN); in wpa_ft_store_pmk_r0()
220 os_memcpy(pmk_r0, r0->pmk_r0, PMK_LEN); in wpa_ft_fetch_pmk_r0()
246 os_memcpy(r1->pmk_r1, pmk_r1, PMK_LEN); in wpa_ft_store_pmk_r1()
270 os_memcpy(pmk_r1, r1->pmk_r1, PMK_LEN); in wpa_ft_fetch_pmk_r1()
333 u8 pmk_r0[PMK_LEN], pmk_r0_name[WPA_PMK_NAME_LEN]; in wpa_auth_derive_ptk_ft()
334 u8 pmk_r1[PMK_LEN]; in wpa_auth_derive_ptk_ft()
[all …]
Dieee802_11_auth.c39 u8 psk[PMK_LEN];
91 os_memcpy(psk, entry->psk, PMK_LEN); in hostapd_acl_cache_get()
233 os_memset(psk, 0, PMK_LEN); in hostapd_allowed_address()
488 cache->psk, PMK_LEN); in hostapd_acl_recv_radius()
Dwpa_auth_i.h60 u8 PMK[PMK_LEN];
110 u8 xxkey[PMK_LEN]; /* PSK or the second 256 bits of MSK */
Dpreauth_auth.c205 if (len > PMK_LEN) in rsn_preauth_finished()
206 len = PMK_LEN; in rsn_preauth_finished()
Dap_config.c240 if (len == 64 && hexstr2bin(pos, psk->psk, PMK_LEN) == 0) in hostapd_config_read_wpa_psk()
244 4096, psk->psk, PMK_LEN); in hostapd_config_read_wpa_psk()
279 4096, ssid->wpa_psk->psk, PMK_LEN); in hostapd_derive_psk()
281 ssid->wpa_psk->psk, PMK_LEN); in hostapd_derive_psk()
Dpmksa_cache_auth.h20 u8 pmk[PMK_LEN];
Dap_config.h93 #define PMK_LEN 32 macro
97 u8 psk[PMK_LEN];
Dwpa_auth.c1659 u8 msk[2 * PMK_LEN]; in SM_STATE()
1660 size_t len = 2 * PMK_LEN; in SM_STATE()
1668 os_memcpy(sm->PMK, sm->pmksa->pmk, PMK_LEN); in SM_STATE()
1672 os_memcpy(sm->PMK, msk, PMK_LEN); in SM_STATE()
1674 if (len >= 2 * PMK_LEN) { in SM_STATE()
1675 os_memcpy(sm->xxkey, msk + PMK_LEN, PMK_LEN); in SM_STATE()
1676 sm->xxkey_len = PMK_LEN; in SM_STATE()
1702 os_memcpy(sm->PMK, psk, PMK_LEN); in SM_STATE()
1704 os_memcpy(sm->xxkey, psk, PMK_LEN); in SM_STATE()
1705 sm->xxkey_len = PMK_LEN; in SM_STATE()
[all …]
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
Dwpa_i.h26 u8 pmk[PMK_LEN];
95 u8 xxkey[PMK_LEN]; /* PSK or the second 256 bits of MSK */
97 u8 pmk_r0[PMK_LEN];
99 u8 pmk_r1[PMK_LEN];
Dpeerkey.c325 hmac_sha256_vector(smk, PMK_LEN, 5, addr, len, hash); in rsn_smkid()
328 hmac_sha1_vector(smk, PMK_LEN, 5, addr, len, hash); in rsn_smkid()
451 if (os_memcmp(kde->smk + PMK_LEN, peerkey->pnonce, WPA_NONCE_LEN) != 0) in wpa_supplicant_process_smk_m4()
493 if (os_memcmp(kde->smk + PMK_LEN, peerkey->inonce, WPA_NONCE_LEN) != 0) in wpa_supplicant_process_smk_m5()
548 kde.smk == NULL || kde.smk_len < PMK_LEN + WPA_NONCE_LEN || in wpa_supplicant_process_smk_m45()
578 os_memcpy(peerkey->smk, kde.smk, PMK_LEN); in wpa_supplicant_process_smk_m45()
580 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", peerkey->smk, PMK_LEN); in wpa_supplicant_process_smk_m45()
709 wpa_pmk_to_ptk(peerkey->smk, PMK_LEN, "Peer key expansion", in wpa_supplicant_process_stk_1_of_4()
942 wpa_pmk_to_ptk(peerkey->smk, PMK_LEN, "Peer key expansion", in peerkey_verify_eapol_key_mic()
Dpreauth.c87 u8 pmk[PMK_LEN]; in rsn_preauth_eapol_cb()
91 pmk_len = PMK_LEN; in rsn_preauth_eapol_cb()
92 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); in rsn_preauth_eapol_cb()
/external/wpa_supplicant_8/wpa_supplicant/
Dwpas_glue.c224 u8 pmk[PMK_LEN]; in wpa_supplicant_eapol_cb()
250 pmk_len = PMK_LEN; in wpa_supplicant_eapol_cb()
253 u8 buf[2 * PMK_LEN]; in wpa_supplicant_eapol_cb()
256 res = eapol_sm_get_key(eapol, buf, 2 * PMK_LEN); in wpa_supplicant_eapol_cb()
258 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN); in wpa_supplicant_eapol_cb()
265 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); in wpa_supplicant_eapol_cb()
Deapol_test.c62 u8 authenticator_pmk[PMK_LEN];
335 u8 pmk[PMK_LEN]; in eapol_test_compare_pmk()
338 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { in eapol_test_compare_pmk()
339 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); in eapol_test_compare_pmk()
340 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) { in eapol_test_compare_pmk()
343 e->authenticator_pmk, PMK_LEN); in eapol_test_compare_pmk()
685 keys->recv_len > PMK_LEN ? PMK_LEN : in ieee802_1x_get_keys()
Dibss_rsn.h32 u8 psk[PMK_LEN];
/external/wpa_supplicant_6/wpa_supplicant/src/common/
Dwpa_common.c448 os_memcpy(pmk_r0, r0_key_data, PMK_LEN); in wpa_derive_pmk_r0()
455 addr[1] = r0_key_data + PMK_LEN; in wpa_derive_pmk_r0()
512 sha256_prf(pmk_r0, PMK_LEN, "FT-R1", buf, pos - buf, pmk_r1, PMK_LEN); in wpa_derive_pmk_r1()
547 sha256_prf(pmk_r1, PMK_LEN, "FT-PTK", buf, pos - buf, ptk, ptk_len); in wpa_pmk_r1_to_ptk()
/external/wpa_supplicant_8/src/rsn_supp/
Dwpa_i.h22 u8 pmk[PMK_LEN];
107 u8 xxkey[PMK_LEN]; /* PSK or the second 256 bits of MSK */
109 u8 pmk_r0[PMK_LEN];
111 u8 pmk_r1[PMK_LEN];
Dpeerkey.c320 hmac_sha256_vector(smk, PMK_LEN, 5, addr, len, hash); in rsn_smkid()
323 hmac_sha1_vector(smk, PMK_LEN, 5, addr, len, hash); in rsn_smkid()
446 if (os_memcmp(kde->smk + PMK_LEN, peerkey->pnonce, WPA_NONCE_LEN) != 0) in wpa_supplicant_process_smk_m4()
488 if (os_memcmp(kde->smk + PMK_LEN, peerkey->inonce, WPA_NONCE_LEN) != 0) in wpa_supplicant_process_smk_m5()
543 kde.smk == NULL || kde.smk_len < PMK_LEN + WPA_NONCE_LEN || in wpa_supplicant_process_smk_m45()
573 os_memcpy(peerkey->smk, kde.smk, PMK_LEN); in wpa_supplicant_process_smk_m45()
575 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", peerkey->smk, PMK_LEN); in wpa_supplicant_process_smk_m45()
706 wpa_pmk_to_ptk(peerkey->smk, PMK_LEN, "Peer key expansion", in wpa_supplicant_process_stk_1_of_4()
939 wpa_pmk_to_ptk(peerkey->smk, PMK_LEN, "Peer key expansion", in peerkey_verify_eapol_key_mic()
Dpreauth.c77 u8 pmk[PMK_LEN]; in rsn_preauth_eapol_cb()
81 pmk_len = PMK_LEN; in rsn_preauth_eapol_cb()
82 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); in rsn_preauth_eapol_cb()
Dpeerkey.h23 u8 smk[PMK_LEN];
/external/wpa_supplicant_6/wpa_supplicant/
Deapol_test.c65 u8 authenticator_pmk[PMK_LEN];
337 u8 pmk[PMK_LEN]; in eapol_test_compare_pmk()
340 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { in eapol_test_compare_pmk()
341 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); in eapol_test_compare_pmk()
342 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) { in eapol_test_compare_pmk()
345 e->authenticator_pmk, PMK_LEN); in eapol_test_compare_pmk()
642 keys->recv_len > PMK_LEN ? PMK_LEN : in ieee802_1x_get_keys()
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/
Ddriver_ps3.c40 iwr.u.data.length = PMK_LEN * 2 + 1; in wpa_driver_ps3_set_wpa_key()
45 for (i = 0; i < PMK_LEN; i++) { in wpa_driver_ps3_set_wpa_key()
/external/wpa_supplicant_6/wpa_supplicant/tests/
Dtest_wpa.c33 u8 psk[PMK_LEN];
219 wpa_sm_set_pmk(wpa->supp, wpa->psk, PMK_LEN); in supp_init()
364 os_memset(wpa.psk, 0x44, PMK_LEN); in main()
/external/wpa_supplicant_8/wpa_supplicant/tests/
Dtest_wpa.c27 u8 psk[PMK_LEN];
198 wpa_sm_set_pmk(wpa->supp, wpa->psk, PMK_LEN); in supp_init()
343 os_memset(wpa.psk, 0x44, PMK_LEN); in main()
/external/wpa_supplicant_8/src/common/
Dwpa_common.c730 os_memcpy(pmk_r0, r0_key_data, PMK_LEN); in wpa_derive_pmk_r0()
737 addr[1] = r0_key_data + PMK_LEN; in wpa_derive_pmk_r0()
794 sha256_prf(pmk_r0, PMK_LEN, "FT-R1", buf, pos - buf, pmk_r1, PMK_LEN); in wpa_derive_pmk_r1()
829 sha256_prf(pmk_r1, PMK_LEN, "FT-PTK", buf, pos - buf, ptk, ptk_len); in wpa_pmk_r1_to_ptk()

123