/external/wpa_supplicant_8/src/rsn_supp/ |
D | pmksa_cache.c | 124 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, in pmksa_cache_add() argument 130 if (pmk_len > PMK_LEN) in pmksa_cache_add() 136 os_memcpy(entry->pmk, pmk, pmk_len); in pmksa_cache_add() 137 entry->pmk_len = pmk_len; in pmksa_cache_add() 138 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, in pmksa_cache_add() 154 if (pos->pmk_len == pmk_len && in pmksa_cache_add() 155 os_memcmp(pos->pmk, pmk, pmk_len) == 0 && in pmksa_cache_add() 182 pos->pmk_len); in pmksa_cache_add() 248 const u8 *pmk, size_t pmk_len) in pmksa_cache_flush() argument 258 (pmk_len == entry->pmk_len && in pmksa_cache_flush() [all …]
|
D | pmksa_cache.h | 19 size_t pmk_len; member 59 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 70 const u8 *pmk, size_t pmk_len); 106 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, in pmksa_cache_add() argument 126 const u8 *pmk, size_t pmk_len) in pmksa_cache_flush() argument
|
D | preauth.c | 80 int res, pmk_len; in rsn_preauth_eapol_cb() local 81 pmk_len = PMK_LEN; in rsn_preauth_eapol_cb() 89 pmk_len = 16; in rsn_preauth_eapol_cb() 93 pmk, pmk_len); in rsn_preauth_eapol_cb() 94 sm->pmk_len = pmk_len; in rsn_preauth_eapol_cb() 95 pmksa_cache_add(sm->pmksa, pmk, pmk_len, in rsn_preauth_eapol_cb()
|
D | wpa.c | 165 sm->pmk, sm->pmk_len); in wpa_supplicant_get_pmk() 171 int res, pmk_len; in wpa_supplicant_get_pmk() local 172 pmk_len = PMK_LEN; in wpa_supplicant_get_pmk() 180 pmk_len = 16; in wpa_supplicant_get_pmk() 195 "machines", sm->pmk, pmk_len); in wpa_supplicant_get_pmk() 196 sm->pmk_len = pmk_len; in wpa_supplicant_get_pmk() 200 sm->pmk, pmk_len, in wpa_supplicant_get_pmk() 365 wpa_pmk_to_ptk(sm->pmk, sm->pmk_len, "Pairwise key expansion", in wpa_derive_ptk() 1957 (sm->pmk_len == entry->pmk_len && in wpa_sm_pmksa_free_cb() 1958 os_memcmp(sm->pmk, entry->pmk, sm->pmk_len) == 0)) { in wpa_sm_pmksa_free_cb() [all …]
|
D | wpa.h | 103 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len); 165 size_t pmk_len) in wpa_sm_set_pmk() argument
|
D | wpa_i.h | 23 size_t pmk_len; member
|
/external/wpa_supplicant_8/src/ap/ |
D | pmksa_cache_auth.c | 239 const u8 *pmk, size_t pmk_len, in pmksa_cache_auth_add() argument 246 if (pmk_len > PMK_LEN) in pmksa_cache_auth_add() 252 os_memcpy(entry->pmk, pmk, pmk_len); in pmksa_cache_auth_add() 253 entry->pmk_len = pmk_len; in pmksa_cache_auth_add() 254 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, in pmksa_cache_auth_add() 297 os_memcpy(entry->pmk, old_entry->pmk, old_entry->pmk_len); in pmksa_cache_add_okc() 298 entry->pmk_len = old_entry->pmk_len; in pmksa_cache_add_okc() 401 rsn_pmkid(entry->pmk, entry->pmk_len, aa, spa, new_pmkid, in pmksa_cache_get_okc()
|
D | pmksa_cache_auth.h | 21 size_t pmk_len; member 49 const u8 *pmk, size_t pmk_len,
|
/external/wpa_supplicant_8/src/common/ |
D | wpa_common.c | 89 void wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, in wpa_pmk_to_ptk() argument 116 sha256_prf(pmk, pmk_len, label, data, sizeof(data), in wpa_pmk_to_ptk() 120 sha1_prf(pmk, pmk_len, label, data, sizeof(data), ptk, in wpa_pmk_to_ptk() 127 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len); in wpa_pmk_to_ptk() 871 void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa, in rsn_pmkid() argument 885 hmac_sha256_vector(pmk, pmk_len, 3, addr, len, hash); in rsn_pmkid() 888 hmac_sha1_vector(pmk, pmk_len, 3, addr, len, hash); in rsn_pmkid()
|
D | wpa_common.h | 316 void wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, 359 void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa,
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | wpas_glue.c | 223 int res, pmk_len; in wpa_supplicant_eapol_cb() local 250 pmk_len = PMK_LEN; in wpa_supplicant_eapol_cb() 272 pmk_len = 16; in wpa_supplicant_eapol_cb() 283 "handshake", pmk, pmk_len); in wpa_supplicant_eapol_cb() 286 pmk_len)) { in wpa_supplicant_eapol_cb()
|