Home
last modified time | relevance | path

Searched refs:pmk (Results 1 – 25 of 37) sorted by relevance

12

/external/wpa_supplicant_8/src/rsn_supp/
Dpmksa_cache.c131 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, in pmksa_cache_add() argument
148 os_memcpy(entry->pmk, pmk, pmk_len); in pmksa_cache_add()
157 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_add()
187 os_memcmp_const(pos->pmk, entry->pmk, in pmksa_cache_add_entry()
215 pos->pmk, pos->pmk_len); in pmksa_cache_add_entry()
269 entry->pmk, entry->pmk_len); in pmksa_cache_add_entry()
283 const u8 *pmk, size_t pmk_len) in pmksa_cache_flush() argument
292 (pmk == NULL || in pmksa_cache_flush()
294 os_memcmp(pmk, entry->pmk, pmk_len) == 0))) { in pmksa_cache_flush()
371 new_entry = pmksa_cache_add(pmksa, old_entry->pmk, old_entry->pmk_len, in pmksa_cache_clone_entry()
Dpmksa_cache.h18 u8 pmk[PMK_LEN_MAX]; member
68 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
84 const u8 *pmk, size_t pmk_len);
133 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, in pmksa_cache_add() argument
156 const u8 *pmk, size_t pmk_len) in pmksa_cache_flush() argument
Dpreauth.c78 u8 pmk[PMK_LEN]; in rsn_preauth_eapol_cb() local
83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); in rsn_preauth_eapol_cb()
89 res = eapol_sm_get_key(eapol, pmk, 16); in rsn_preauth_eapol_cb()
94 pmk, pmk_len); in rsn_preauth_eapol_cb()
96 pmksa_cache_add(sm->pmksa, pmk, pmk_len, NULL, in rsn_preauth_eapol_cb()
346 NULL, p->pmk, p->pmk_len); in rsn_preauth_candidate_process()
Dwpa_i.h21 u8 pmk[PMK_LEN_MAX]; member
240 const u8 *cache_id, const u8 *pmk, in wpa_sm_add_pmkid() argument
245 cache_id, pmk, pmk_len); in wpa_sm_add_pmkid()
380 const u8 *pmk, size_t pmk_len) in wpa_sm_key_mgmt_set_pmk() argument
384 return sm->ctx->key_mgmt_set_pmk(sm->ctx->ctx, pmk, pmk_len); in wpa_sm_key_mgmt_set_pmk()
Dwpa.c251 if (wpa_sm_key_mgmt_set_pmk(sm, sm->pmk, sm->pmk_len)) in wpa_supplicant_key_mgmt_set_pmk()
288 sm->pmk, sm->pmk_len); in wpa_supplicant_get_pmk()
300 res = eapol_sm_get_key(sm->eapol, sm->pmk, pmk_len); in wpa_supplicant_get_pmk()
307 res = eapol_sm_get_key(sm->eapol, sm->pmk, 16); in wpa_supplicant_get_pmk()
331 "machines", sm->pmk, pmk_len); in wpa_supplicant_get_pmk()
338 sm->pmk, pmk_len, NULL, in wpa_supplicant_get_pmk()
522 return wpa_pmk_to_ptk(sm->pmk, sm->pmk_len, "Pairwise key expansion", in wpa_derive_ptk()
1449 sa = pmksa_cache_add(sm->pmksa, sm->pmk, sm->pmk_len, NULL, in wpa_supplicant_process_3_of_4()
2422 os_memcmp(sm->pmk, entry->pmk, sm->pmk_len) == 0)) { in wpa_sm_pmksa_free_cb()
2430 os_memset(sm->pmk, 0, sizeof(sm->pmk)); in wpa_sm_pmksa_free_cb()
[all …]
Dwpa.h43 const u8 *pmk, size_t pmk_len);
82 int (*key_mgmt_set_pmk)(void *ctx, const u8 *pmk, size_t pmk_len);
121 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len,
159 void wpa_sm_pmksa_cache_add(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len,
198 static inline void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, in wpa_sm_set_pmk() argument
/external/syslinux/gpxe/src/net/80211/
Dwpa_psk.c51 u8 pmk[WPA_PMK_LEN]; in wpa_psk_start() local
66 4096, pmk, WPA_PMK_LEN ); in wpa_psk_start()
70 DBGC_HD ( ctx, pmk, WPA_PMK_LEN ); in wpa_psk_start()
72 return wpa_start ( dev, ctx, pmk, WPA_PMK_LEN ); in wpa_psk_start()
Dwpa.c214 const void *pmk, size_t pmk_len ) in wpa_start() argument
225 memcpy ( ctx->pmk, pmk, ctx->pmk_len = pmk_len ); in wpa_start()
282 u8 pmk[ctx->pmk_len]; in wpa_check_pmkid() local
290 memcpy ( pmk, ctx->pmk, ctx->pmk_len ); in wpa_check_pmkid()
297 hmac_init ( &sha1_algorithm, sha1_ctx, pmk, &pmk_len ); in wpa_check_pmkid()
300 hmac_final ( &sha1_algorithm, sha1_ctx, pmk, &pmk_len, my_pmkid ); in wpa_check_pmkid()
348 prf_sha1 ( ctx->pmk, ctx->pmk_len, in wpa_derive_ptk()
/external/wpa_supplicant_8/src/ap/
Dpmksa_cache_auth.c280 const u8 *pmk, size_t pmk_len, const u8 *pmkid, in pmksa_cache_auth_add() argument
287 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len, in pmksa_cache_auth_add()
315 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid, in pmksa_cache_auth_create_entry() argument
332 os_memcpy(entry->pmk, pmk, pmk_len); in pmksa_cache_auth_create_entry()
341 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_auth_create_entry()
404 os_memcpy(entry->pmk, old_entry->pmk, old_entry->pmk_len); in pmksa_cache_add_okc()
519 rsn_pmkid(entry->pmk, entry->pmk_len, aa, spa, new_pmkid, in pmksa_cache_get_okc()
715 pos += wpa_snprintf_hex(pos, end - pos, entry->pmk, in pmksa_cache_auth_list_mesh()
Dpmksa_cache_auth.h20 u8 pmk[PMK_LEN_MAX]; member
52 const u8 *pmk, size_t pmk_len, const u8 *pmkid,
57 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid,
Dwpa_auth.h325 int wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk,
329 const u8 *pmk, size_t len, const u8 *sta_addr,
333 const u8 *pmk, const u8 *pmkid);
335 const u8 *pmk, size_t pmk_len, const u8 *pmkid,
345 wpa_auth_pmksa_create_entry(const u8 *aa, const u8 *spa, const u8 *pmk,
358 u8 *pmkid, u8 *pmk);
403 int fils_auth_pmk_to_ptk(struct wpa_state_machine *sm, const u8 *pmk,
Dwpa_auth.c55 const u8 *pmk, unsigned int pmk_len,
851 const u8 *pmk = NULL; in wpa_try_alt_snonce() local
858 pmk = wpa_auth_get_psk(sm->wpa_auth, sm->addr, in wpa_try_alt_snonce()
859 sm->p2p_dev_addr, pmk, &pmk_len); in wpa_try_alt_snonce()
860 if (pmk == NULL) in wpa_try_alt_snonce()
863 pmk = sm->PMK; in wpa_try_alt_snonce()
867 if (wpa_derive_ptk(sm, sm->alt_SNonce, pmk, pmk_len, &PTK) < 0) in wpa_try_alt_snonce()
1935 os_memcpy(sm->PMK, sm->pmksa->pmk, sm->pmksa->pmk_len); in SM_STATE()
2010 os_memcpy(sm->PMK, sm->pmksa->pmk, sm->pmksa->pmk_len); in SM_STATE()
2074 const u8 *pmk, unsigned int pmk_len, in wpa_derive_ptk() argument
[all …]
Dctrl_iface_ap.c717 u8 pmk[PMK_LEN_MAX]; in hostapd_ctrl_iface_pmksa_add() local
748 hexstr2bin(pos, pmk, pmk_len) < 0) in hostapd_ctrl_iface_pmksa_add()
756 return wpa_auth_pmksa_add2(hapd->wpa_auth, spa, pmk, pmk_len, in hostapd_ctrl_iface_pmksa_add()
775 u8 pmk[PMK_LEN_MAX]; in hostapd_ctrl_iface_pmksa_create_entry() local
800 if (hexstr2bin(pos, pmk, PMK_LEN) < 0) in hostapd_ctrl_iface_pmksa_create_entry()
811 return wpa_auth_pmksa_create_entry(aa, spa, pmk, pmkid, expiration); in hostapd_ctrl_iface_pmksa_create_entry()
Dwpa_auth_i.h282 int wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, const u8 *pmk,
/external/wpa_supplicant_8/src/common/
Dwpa_common.c241 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, in wpa_pmk_to_ptk() argument
281 if (sha384_prf(pmk, pmk_len, label, data, sizeof(data), in wpa_pmk_to_ptk()
290 if (sha256_prf(pmk, pmk_len, label, data, sizeof(data), in wpa_pmk_to_ptk()
299 if (sha256_prf(pmk, pmk_len, label, data, sizeof(data), in wpa_pmk_to_ptk()
304 if (sha384_prf(pmk, pmk_len, label, data, sizeof(data), in wpa_pmk_to_ptk()
309 if (sha512_prf(pmk, pmk_len, label, data, sizeof(data), in wpa_pmk_to_ptk()
319 if (sha1_prf(pmk, pmk_len, label, data, sizeof(data), tmp, in wpa_pmk_to_ptk()
328 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len); in wpa_pmk_to_ptk()
348 size_t dh_ss_len, u8 *pmk, size_t *pmk_len) in fils_rmsk_to_pmk() argument
383 addr, len, pmk); in fils_rmsk_to_pmk()
[all …]
Dwpa_common.h333 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label,
339 size_t dh_ss_len, u8 *pmk, size_t *pmk_len);
342 int fils_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const u8 *spa, const u8 *aa,
393 void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa,
Dsae.h47 u8 pmk[SAE_PMK_LEN]; member
Ddpp.h202 u8 pmk[PMK_LEN_MAX]; member
/external/sl4a/Common/src/com/googlecode/android_scripting/facade/wifi/
DWifiAwareManagerFacade.java125 if (ns.pmk != null) { in getJsonString()
126 j.put(NS_KEY_PMK, Base64.encodeToString(ns.pmk, Base64.DEFAULT)); in getJsonString()
142 byte[] pmk = null; in getNetworkSpecifier()
164 pmk = Base64.decode(j.getString(NS_KEY_PMK), Base64.DEFAULT); in getNetworkSpecifier()
170 return new WifiAwareNetworkSpecifier(type, role, clientId, sessionId, peerId, peerMac, pmk, in getNetworkSpecifier()
570 @RpcOptional String pmk) in wifiAwareCreateNetworkSpecifier() argument
586 if (!TextUtils.isEmpty(pmk)) { in wifiAwareCreateNetworkSpecifier()
587 pmkDecoded = Base64.decode(pmk, Base64.DEFAULT); in wifiAwareCreateNetworkSpecifier()
622 @RpcOptional String pmk) throws JSONException { in wifiAwareCreateNetworkSpecifierOob() argument
637 if (!TextUtils.isEmpty(pmk)) { in wifiAwareCreateNetworkSpecifierOob()
[all …]
/external/wpa_supplicant_8/wpa_supplicant/
Dwpas_glue.c276 u8 pmk[PMK_LEN]; in wpa_supplicant_eapol_cb() local
316 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN); in wpa_supplicant_eapol_cb()
323 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); in wpa_supplicant_eapol_cb()
329 res = eapol_sm_get_key(eapol, pmk, 16); in wpa_supplicant_eapol_cb()
341 "handshake", pmk, pmk_len); in wpa_supplicant_eapol_cb()
343 if (wpa_drv_set_key(wpa_s, WPA_ALG_PMK, NULL, 0, 0, NULL, 0, pmk, in wpa_supplicant_eapol_cb()
546 const u8 *pmk, size_t pmk_len) in wpa_supplicant_add_pmkid() argument
566 params.pmk = pmk; in wpa_supplicant_add_pmkid()
1153 static int wpa_supplicant_key_mgmt_set_pmk(void *ctx, const u8 *pmk, in wpa_supplicant_key_mgmt_set_pmk() argument
1161 NULL, 0, pmk, pmk_len); in wpa_supplicant_key_mgmt_set_pmk()
Dmesh_rsn.c93 return sta->sae->pmk; in auth_get_psk()
379 sta->sae->pmkid, sta->sae->pmk); in mesh_rsn_auth_sae_sta()
438 sha256_prf(sta->sae->pmk, sizeof(sta->sae->pmk), "AEK Derivation", in mesh_rsn_derive_aek()
499 sha256_prf(sta->sae->pmk, SAE_PMK_LEN, in mesh_rsn_derive_mtk()
Deapol_test.c362 u8 pmk[PMK_LEN]; in eapol_test_compare_pmk() local
367 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { in eapol_test_compare_pmk()
368 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); in eapol_test_compare_pmk()
369 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) { in eapol_test_compare_pmk()
376 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) { in eapol_test_compare_pmk()
377 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16); in eapol_test_compare_pmk()
378 if (os_memcmp(pmk, e->authenticator_pmk, 16) != 0) { in eapol_test_compare_pmk()
Dpreauth_test.c149 const u8 *pmk, size_t pmk_len) in wpa_supplicant_add_pmkid() argument
/external/syslinux/gpxe/src/include/gpxe/
Dwpa.h302 u8 pmk[WPA_PMK_LEN]; member
500 const void *pmk, size_t pmk_len );
/external/scapy/scapy/modules/krack/
Dautomaton.py155 self.pmk = PBKDF2HMAC(
167 pmk = self.pmk
174 self.ptk = customPRF512(pmk, amac, smac, anonce, snonce)

12