/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
D | pmksa_cache.c | 52 static void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, in rsn_pmkid() argument 66 hmac_sha256_vector(pmk, pmk_len, 3, addr, len, hash); in rsn_pmkid() 69 hmac_sha1_vector(pmk, pmk_len, 3, addr, len, hash); in rsn_pmkid() 164 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, in pmksa_cache_add() argument 176 os_memcpy(entry->pmk, pmk, pmk_len); in pmksa_cache_add() 178 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, in pmksa_cache_add() 195 os_memcmp(pos->pmk, pmk, pmk_len) == 0 && in pmksa_cache_add() 334 new_entry = pmksa_cache_add(pmksa, old_entry->pmk, old_entry->pmk_len, in pmksa_cache_clone_entry()
|
D | pmksa_cache.h | 24 u8 pmk[PMK_LEN]; member 58 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 102 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, in pmksa_cache_add() argument
|
D | preauth.c | 87 u8 pmk[PMK_LEN]; in rsn_preauth_eapol_cb() local 92 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); in rsn_preauth_eapol_cb() 98 res = eapol_sm_get_key(eapol, pmk, 16); in rsn_preauth_eapol_cb() 103 pmk, pmk_len); in rsn_preauth_eapol_cb() 105 pmksa_cache_add(sm->pmksa, pmk, pmk_len, in rsn_preauth_eapol_cb()
|
D | wpa.c | 218 sm->pmk, sm->pmk_len); in wpa_supplicant_get_pmk() 226 res = eapol_sm_get_key(sm->eapol, sm->pmk, PMK_LEN); in wpa_supplicant_get_pmk() 232 res = eapol_sm_get_key(sm->eapol, sm->pmk, 16); in wpa_supplicant_get_pmk() 247 "machines", sm->pmk, pmk_len); in wpa_supplicant_get_pmk() 249 pmksa_cache_add(sm->pmksa, sm->pmk, pmk_len, src_addr, in wpa_supplicant_get_pmk() 368 wpa_pmk_to_ptk(sm->pmk, sm->pmk_len, "Pairwise key expansion", in wpa_derive_ptk() 1833 os_memcmp(sm->pmk, entry->pmk, sm->pmk_len) == 0)) { in wpa_sm_pmksa_free_cb() 1845 os_memset(sm->pmk, 0, sizeof(sm->pmk)); in wpa_sm_pmksa_free_cb() 1974 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len) in wpa_sm_set_pmk() argument 1980 os_memcpy(sm->pmk, pmk, pmk_len); in wpa_sm_set_pmk() [all …]
|
D | wpa.h | 97 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len); 150 static inline void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, in wpa_sm_set_pmk() argument
|
D | wpa_i.h | 26 u8 pmk[PMK_LEN]; member
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | pmksa_cache.h | 18 u8 pmk[PMK_LEN]; member 53 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 99 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, in pmksa_cache_add() argument
|
D | pmksa_cache.c | 124 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, in pmksa_cache_add() argument 136 os_memcpy(entry->pmk, pmk, pmk_len); in pmksa_cache_add() 138 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, in pmksa_cache_add() 155 os_memcmp(pos->pmk, pmk, pmk_len) == 0 && in pmksa_cache_add() 321 new_entry = pmksa_cache_add(pmksa, old_entry->pmk, old_entry->pmk_len, in pmksa_cache_clone_entry()
|
D | preauth.c | 77 u8 pmk[PMK_LEN]; in rsn_preauth_eapol_cb() local 82 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); in rsn_preauth_eapol_cb() 88 res = eapol_sm_get_key(eapol, pmk, 16); in rsn_preauth_eapol_cb() 93 pmk, pmk_len); in rsn_preauth_eapol_cb() 95 pmksa_cache_add(sm->pmksa, pmk, pmk_len, in rsn_preauth_eapol_cb()
|
D | wpa.c | 165 sm->pmk, sm->pmk_len); in wpa_supplicant_get_pmk() 173 res = eapol_sm_get_key(sm->eapol, sm->pmk, PMK_LEN); in wpa_supplicant_get_pmk() 179 res = eapol_sm_get_key(sm->eapol, sm->pmk, 16); in wpa_supplicant_get_pmk() 194 "machines", sm->pmk, pmk_len); in wpa_supplicant_get_pmk() 198 pmksa_cache_add(sm->pmksa, sm->pmk, pmk_len, in wpa_supplicant_get_pmk() 359 wpa_pmk_to_ptk(sm->pmk, sm->pmk_len, "Pairwise key expansion", in wpa_derive_ptk() 2010 os_memcmp(sm->pmk, entry->pmk, sm->pmk_len) == 0)) { in wpa_sm_pmksa_free_cb() 2023 os_memset(sm->pmk, 0, sizeof(sm->pmk)); in wpa_sm_pmksa_free_cb() 2169 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len) in wpa_sm_set_pmk() argument 2175 os_memcpy(sm->pmk, pmk, pmk_len); in wpa_sm_set_pmk() [all …]
|
D | wpa.h | 99 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len); 159 static inline void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, in wpa_sm_set_pmk() argument
|
/external/wpa_supplicant_8/src/ap/ |
D | pmksa_cache_auth.c | 230 const u8 *pmk, size_t pmk_len, in pmksa_cache_auth_add() argument 243 os_memcpy(entry->pmk, pmk, pmk_len); in pmksa_cache_auth_add() 245 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, in pmksa_cache_auth_add() 288 os_memcpy(entry->pmk, old_entry->pmk, old_entry->pmk_len); in pmksa_cache_add_okc() 390 rsn_pmkid(entry->pmk, entry->pmk_len, aa, spa, new_pmkid, in pmksa_cache_get_okc()
|
D | pmksa_cache_auth.h | 20 u8 pmk[PMK_LEN]; member 48 const u8 *pmk, size_t pmk_len,
|
D | wpa_auth.c | 1668 os_memcpy(sm->PMK, sm->pmksa->pmk, PMK_LEN); in SM_STATE() 1760 static int wpa_derive_ptk(struct wpa_state_machine *sm, const u8 *pmk, in wpa_derive_ptk() argument 1766 return wpa_auth_derive_ptk_ft(sm, pmk, ptk, ptk_len); in wpa_derive_ptk() 1769 wpa_pmk_to_ptk(pmk, PMK_LEN, "Pairwise key expansion", in wpa_derive_ptk() 1782 const u8 *pmk = NULL; in SM_STATE() local 1793 pmk = wpa_auth_get_psk(sm->wpa_auth, sm->addr, pmk); in SM_STATE() 1794 if (pmk == NULL) in SM_STATE() 1797 pmk = sm->PMK; in SM_STATE() 1799 wpa_derive_ptk(sm, pmk, &PTK); in SM_STATE() 1845 os_memcpy(sm->PMK, pmk, PMK_LEN); in SM_STATE() [all …]
|
D | wpa_auth.h | 253 int wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk, 256 const u8 *pmk, size_t len, const u8 *sta_addr,
|
D | wpa_auth_i.h | 224 int wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, const u8 *pmk,
|
/external/webkit/Source/JavaScriptCore/ |
D | AUTHORS | 2 Peter Kelly (pmk@post.com)
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | wpas_glue.c | 224 u8 pmk[PMK_LEN]; in wpa_supplicant_eapol_cb() local 258 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN); in wpa_supplicant_eapol_cb() 265 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); in wpa_supplicant_eapol_cb() 271 res = eapol_sm_get_key(eapol, pmk, 16); in wpa_supplicant_eapol_cb() 283 "handshake", pmk, pmk_len); in wpa_supplicant_eapol_cb() 285 if (wpa_drv_set_key(wpa_s, WPA_ALG_PMK, NULL, 0, 0, NULL, 0, pmk, in wpa_supplicant_eapol_cb()
|
D | eapol_test.c | 335 u8 pmk[PMK_LEN]; in eapol_test_compare_pmk() local 338 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { in eapol_test_compare_pmk() 339 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); in eapol_test_compare_pmk() 340 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) { in eapol_test_compare_pmk() 347 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) { in eapol_test_compare_pmk() 348 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16); in eapol_test_compare_pmk() 349 if (os_memcmp(pmk, e->authenticator_pmk, 16) != 0) { in eapol_test_compare_pmk()
|
/external/wpa_supplicant_8/src/common/ |
D | wpa_common.c | 87 void wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, in wpa_pmk_to_ptk() argument 114 sha256_prf(pmk, pmk_len, label, data, sizeof(data), in wpa_pmk_to_ptk() 118 sha1_prf(pmk, pmk_len, label, data, sizeof(data), ptk, in wpa_pmk_to_ptk() 125 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len); in wpa_pmk_to_ptk() 867 void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa, in rsn_pmkid() argument 881 hmac_sha256_vector(pmk, pmk_len, 3, addr, len, hash); in rsn_pmkid() 884 hmac_sha1_vector(pmk, pmk_len, 3, addr, len, hash); in rsn_pmkid()
|
D | wpa_common.h | 302 void wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, 345 void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa,
|
/external/wpa_supplicant_6/wpa_supplicant/src/common/ |
D | wpa_common.c | 93 void wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, in wpa_pmk_to_ptk() argument 120 sha256_prf(pmk, pmk_len, label, data, sizeof(data), in wpa_pmk_to_ptk() 124 sha1_prf(pmk, pmk_len, label, data, sizeof(data), ptk, in wpa_pmk_to_ptk() 129 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len); in wpa_pmk_to_ptk()
|
D | wpa_common.h | 294 void wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label,
|
/external/wpa_supplicant_6/wpa_supplicant/ |
D | wpas_glue.c | 227 u8 pmk[PMK_LEN]; in wpa_supplicant_eapol_cb() local 254 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); in wpa_supplicant_eapol_cb() 260 res = eapol_sm_get_key(eapol, pmk, 16); in wpa_supplicant_eapol_cb() 270 if (wpa_drv_set_key(wpa_s, WPA_ALG_PMK, NULL, 0, 0, NULL, 0, pmk, in wpa_supplicant_eapol_cb()
|
D | eapol_test.c | 337 u8 pmk[PMK_LEN]; in eapol_test_compare_pmk() local 340 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { in eapol_test_compare_pmk() 341 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); in eapol_test_compare_pmk() 342 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) { in eapol_test_compare_pmk() 349 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) { in eapol_test_compare_pmk() 350 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16); in eapol_test_compare_pmk() 351 if (os_memcmp(pmk, e->authenticator_pmk, 16) != 0) { in eapol_test_compare_pmk()
|