Home
last modified time | relevance | path

Searched refs:pmk (Results 1 – 24 of 24) sorted by relevance

/external/wpa_supplicant_8/src/rsn_supp/
Dpmksa_cache.h18 u8 pmk[PMK_LEN_MAX]; member
59 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
71 const u8 *pmk, size_t pmk_len);
107 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, in pmksa_cache_add() argument
128 const u8 *pmk, size_t pmk_len) in pmksa_cache_flush() argument
Dpmksa_cache.c127 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, in pmksa_cache_add() argument
143 os_memcpy(entry->pmk, pmk, pmk_len); in pmksa_cache_add()
152 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, in pmksa_cache_add()
169 os_memcmp_const(pos->pmk, pmk, pmk_len) == 0 && in pmksa_cache_add()
195 pmksa_cache_flush(pmksa, network_ctx, pos->pmk, in pmksa_cache_add()
262 const u8 *pmk, size_t pmk_len) in pmksa_cache_flush() argument
271 (pmk == NULL || in pmksa_cache_flush()
273 os_memcmp(pmk, entry->pmk, pmk_len) == 0))) { in pmksa_cache_flush()
349 new_entry = pmksa_cache_add(pmksa, old_entry->pmk, old_entry->pmk_len, in pmksa_cache_clone_entry()
Dpreauth.c78 u8 pmk[PMK_LEN]; in rsn_preauth_eapol_cb() local
83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); in rsn_preauth_eapol_cb()
89 res = eapol_sm_get_key(eapol, pmk, 16); in rsn_preauth_eapol_cb()
94 pmk, pmk_len); in rsn_preauth_eapol_cb()
96 pmksa_cache_add(sm->pmksa, pmk, pmk_len, NULL, in rsn_preauth_eapol_cb()
Dwpa.c172 if (wpa_sm_key_mgmt_set_pmk(sm, sm->pmk, sm->pmk_len)) in wpa_supplicant_key_mgmt_set_pmk()
209 sm->pmk, sm->pmk_len); in wpa_supplicant_get_pmk()
221 res = eapol_sm_get_key(sm->eapol, sm->pmk, pmk_len); in wpa_supplicant_get_pmk()
228 res = eapol_sm_get_key(sm->eapol, sm->pmk, 16); in wpa_supplicant_get_pmk()
245 "machines", sm->pmk, pmk_len); in wpa_supplicant_get_pmk()
252 sm->pmk, pmk_len, NULL, in wpa_supplicant_get_pmk()
437 return wpa_pmk_to_ptk(sm->pmk, sm->pmk_len, "Pairwise key expansion", in wpa_derive_ptk()
1300 sa = pmksa_cache_add(sm->pmksa, sm->pmk, sm->pmk_len, NULL, in wpa_supplicant_process_3_of_4()
2224 os_memcmp(sm->pmk, entry->pmk, sm->pmk_len) == 0)) { in wpa_sm_pmksa_free_cb()
2232 os_memset(sm->pmk, 0, sizeof(sm->pmk)); in wpa_sm_pmksa_free_cb()
[all …]
Dwpa_i.h22 u8 pmk[PMK_LEN_MAX]; member
349 const u8 *pmk, size_t pmk_len) in wpa_sm_key_mgmt_set_pmk() argument
353 return sm->ctx->key_mgmt_set_pmk(sm->ctx->ctx, pmk, pmk_len); in wpa_sm_key_mgmt_set_pmk()
Dwpa.h79 int (*key_mgmt_set_pmk)(void *ctx, const u8 *pmk, size_t pmk_len);
116 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len,
183 static inline void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, in wpa_sm_set_pmk() argument
/external/wpa_supplicant_8/src/ap/
Dpmksa_cache_auth.c280 const u8 *pmk, size_t pmk_len, const u8 *pmkid, in pmksa_cache_auth_add() argument
297 os_memcpy(entry->pmk, pmk, pmk_len); in pmksa_cache_auth_add()
306 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, in pmksa_cache_auth_add()
349 os_memcpy(entry->pmk, old_entry->pmk, old_entry->pmk_len); in pmksa_cache_add_okc()
464 rsn_pmkid(entry->pmk, entry->pmk_len, aa, spa, new_pmkid, in pmksa_cache_get_okc()
Dpmksa_cache_auth.h20 u8 pmk[PMK_LEN_MAX]; member
51 const u8 *pmk, size_t pmk_len, const u8 *pmkid,
Dwpa_auth.c47 const u8 *pmk, unsigned int pmk_len,
830 const u8 *pmk = NULL; in wpa_try_alt_snonce() local
835 pmk = wpa_auth_get_psk(sm->wpa_auth, sm->addr, in wpa_try_alt_snonce()
836 sm->p2p_dev_addr, pmk); in wpa_try_alt_snonce()
837 if (pmk == NULL) in wpa_try_alt_snonce()
841 pmk = sm->PMK; in wpa_try_alt_snonce()
845 wpa_derive_ptk(sm, sm->alt_SNonce, pmk, pmk_len, &PTK); in wpa_try_alt_snonce()
1912 os_memcpy(sm->PMK, sm->pmksa->pmk, sm->pmksa->pmk_len); in SM_STATE()
2031 const u8 *pmk, unsigned int pmk_len, in wpa_derive_ptk() argument
2036 return wpa_auth_derive_ptk_ft(sm, pmk, ptk); in wpa_derive_ptk()
[all …]
Dwpa_auth.h290 int wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk,
294 const u8 *pmk, size_t len, const u8 *sta_addr,
298 const u8 *pmk, const u8 *pmkid);
309 u8 *pmkid, u8 *pmk);
Dwpa_auth_i.h254 int wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, const u8 *pmk,
Dwpa_auth_glue.c236 return sta->sae->pmk; in hostapd_wpa_auth_get_psk()
Dwpa_auth_ft.c364 int wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, const u8 *pmk, in wpa_auth_derive_ptk_ft() argument
Dieee802_11.c565 sta->sae->pmk, sta->sae->pmkid); in sae_accept_sta()
/external/wpa_supplicant_8/wpa_supplicant/
Dmesh_rsn.c90 return sta->sae->pmk; in auth_get_psk()
323 sta->sae->pmkid, sta->sae->pmk); in mesh_rsn_auth_sae_sta()
374 sha256_prf(sta->sae->pmk, sizeof(sta->sae->pmk), "AEK Derivation", in mesh_rsn_derive_aek()
429 sha256_prf(sta->sae->pmk, sizeof(sta->sae->pmk), in mesh_rsn_derive_mtk()
Dwpas_glue.c273 u8 pmk[PMK_LEN]; in wpa_supplicant_eapol_cb() local
313 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN); in wpa_supplicant_eapol_cb()
320 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); in wpa_supplicant_eapol_cb()
326 res = eapol_sm_get_key(eapol, pmk, 16); in wpa_supplicant_eapol_cb()
338 "handshake", pmk, pmk_len); in wpa_supplicant_eapol_cb()
340 if (wpa_drv_set_key(wpa_s, WPA_ALG_PMK, NULL, 0, 0, NULL, 0, pmk, in wpa_supplicant_eapol_cb()
1026 static int wpa_supplicant_key_mgmt_set_pmk(void *ctx, const u8 *pmk, in wpa_supplicant_key_mgmt_set_pmk() argument
1034 NULL, 0, pmk, pmk_len); in wpa_supplicant_key_mgmt_set_pmk()
Deapol_test.c362 u8 pmk[PMK_LEN]; in eapol_test_compare_pmk() local
367 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { in eapol_test_compare_pmk()
368 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); in eapol_test_compare_pmk()
369 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) { in eapol_test_compare_pmk()
376 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) { in eapol_test_compare_pmk()
377 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16); in eapol_test_compare_pmk()
378 if (os_memcmp(pmk, e->authenticator_pmk, 16) != 0) { in eapol_test_compare_pmk()
Dsme.c848 wpa_sm_set_pmk(wpa_s->wpa, wpa_s->sme.sae.pmk, PMK_LEN, in sme_event_auth()
/external/wpa_supplicant_8/src/common/
Dwpa_common.c141 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, in wpa_pmk_to_ptk() argument
175 sha384_prf(pmk, pmk_len, label, data, sizeof(data), in wpa_pmk_to_ptk()
181 sha256_prf(pmk, pmk_len, label, data, sizeof(data), in wpa_pmk_to_ptk()
185 sha1_prf(pmk, pmk_len, label, data, sizeof(data), tmp, ptk_len); in wpa_pmk_to_ptk()
191 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len); in wpa_pmk_to_ptk()
1044 void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa, in rsn_pmkid() argument
1058 hmac_sha256_vector(pmk, pmk_len, 3, addr, len, hash); in rsn_pmkid()
1061 hmac_sha1_vector(pmk, pmk_len, 3, addr, len, hash); in rsn_pmkid()
Dsae.h47 u8 pmk[SAE_PMK_LEN]; member
Dwpa_common.h339 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label,
383 void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa,
Dsae.c819 os_memcpy(sae->pmk, keys + SAE_KCK_LEN, SAE_PMK_LEN); in sae_derive_keys()
823 wpa_hexdump_key(MSG_DEBUG, "SAE: PMK", sae->pmk, SAE_PMK_LEN); in sae_derive_keys()
/external/svox/pico_resources/tools/LingwareBuilding/PicoLingware_source_files/pkb/en-GB/
Den-GB_kh0_kpdf_mgc.pkb1206 …Ogen������}�M?W�� ��E�F}��G�����m�M�B�M� �n���� ������,�c� pmk|����������j����w��f…
/external/chromium-trace/catapult/tracing/test_data/
Dddms_calculator_start.trace55844 ���pmk�x���
143263 ���pmk�{� ��
156443 �@�pmk �k� ��