Searched refs:PMK (Results 1 - 15 of 15) sorted by relevance

/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/supp/include/
H A Dwlc_wpa.h146 uint8 PMK[PMK_LEN]; member in struct:_sup_pmkid
150 #define SUP_MAXPMKID 16 /* Supplementary Max PMK ID */
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant-0.7.3/src/ap/
H A Dwpa_auth_i.h66 u8 PMK[PMK_LEN]; member in struct:wpa_state_machine
H A Dwpa_auth.c386 wpa_printf(MSG_ERROR, "FT PMK cache initialization failed.");
1438 wpa_printf(MSG_DEBUG, "WPA: PMK from PMKSA cache");
1439 os_memcpy(sm->PMK, sm->pmksa->pmk, PMK_LEN);
1441 wpa_printf(MSG_DEBUG, "WPA: PMK from EAPOL state machine "
1443 os_memcpy(sm->PMK, msk, PMK_LEN);
1451 wpa_printf(MSG_DEBUG, "WPA: Could not get PMK");
1459 * state and takes PMK from the previously used AAA Key. This will
1460 * eventually fail in 4-Way Handshake because Supplicant uses PMK
1473 os_memcpy(sm->PMK, psk, PMK_LEN);
1520 rsn_pmkid(sm->PMK, PMK_LE
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant-0.7.3/src/ap/
H A Dwpa_auth_i.h66 u8 PMK[PMK_LEN]; member in struct:wpa_state_machine
H A Dwpa_auth.c386 wpa_printf(MSG_ERROR, "FT PMK cache initialization failed.");
1438 wpa_printf(MSG_DEBUG, "WPA: PMK from PMKSA cache");
1439 os_memcpy(sm->PMK, sm->pmksa->pmk, PMK_LEN);
1441 wpa_printf(MSG_DEBUG, "WPA: PMK from EAPOL state machine "
1443 os_memcpy(sm->PMK, msk, PMK_LEN);
1451 wpa_printf(MSG_DEBUG, "WPA: Could not get PMK");
1459 * state and takes PMK from the previously used AAA Key. This will
1460 * eventually fail in 4-Way Handshake because Supplicant uses PMK
1473 os_memcpy(sm->PMK, psk, PMK_LEN);
1520 rsn_pmkid(sm->PMK, PMK_LE
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant-0.7.3/src/ap/
H A Dwpa_auth_i.h66 u8 PMK[PMK_LEN]; member in struct:wpa_state_machine
H A Dwpa_auth.c386 wpa_printf(MSG_ERROR, "FT PMK cache initialization failed.");
1438 wpa_printf(MSG_DEBUG, "WPA: PMK from PMKSA cache");
1439 os_memcpy(sm->PMK, sm->pmksa->pmk, PMK_LEN);
1441 wpa_printf(MSG_DEBUG, "WPA: PMK from EAPOL state machine "
1443 os_memcpy(sm->PMK, msk, PMK_LEN);
1451 wpa_printf(MSG_DEBUG, "WPA: Could not get PMK");
1459 * state and takes PMK from the previously used AAA Key. This will
1460 * eventually fail in 4-Way Handshake because Supplicant uses PMK
1473 os_memcpy(sm->PMK, psk, PMK_LEN);
1520 rsn_pmkid(sm->PMK, PMK_LE
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/drivers/staging/rt2860/
H A Dsta_ioctl.c90 NdisZeroMemory(pAd->StaCfg.PMK, 32);
91 NdisMoveMemory(pAd->StaCfg.PMK,
456 /* Reset Ralink supplicant to not use, it will be set to start when UI set PMK key */
2076 pKey = (char *)& pAd->StaCfg.PMK[0];
2676 RTMPZeroMemory(pAdapter->StaCfg.PMK, 32);
2679 pAdapter->StaCfg.PMK, 32);
2684 NdisMoveMemory(pAdapter->StaCfg.PMK,
2908 /* Reset Ralink supplicant to not use, it will be set to start when UI set PMK key */
H A Drtmp.h1384 u8 PMK[32]; /* WPA PSK mode PMK */ member in struct:rt_sta_admin_config
3424 u8 *PMK,
3505 void WpaDeriveGTK(u8 *PMK,
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/drivers/staging/rt2860/
H A Dsta_ioctl.c90 NdisZeroMemory(pAd->StaCfg.PMK, 32);
91 NdisMoveMemory(pAd->StaCfg.PMK,
456 /* Reset Ralink supplicant to not use, it will be set to start when UI set PMK key */
2076 pKey = (char *)& pAd->StaCfg.PMK[0];
2676 RTMPZeroMemory(pAdapter->StaCfg.PMK, 32);
2679 pAdapter->StaCfg.PMK, 32);
2684 NdisMoveMemory(pAdapter->StaCfg.PMK,
2908 /* Reset Ralink supplicant to not use, it will be set to start when UI set PMK key */
H A Drtmp.h1384 u8 PMK[32]; /* WPA PSK mode PMK */ member in struct:rt_sta_admin_config
3424 u8 *PMK,
3505 void WpaDeriveGTK(u8 *PMK,
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/drivers/staging/rt2860/common/
H A Dcmm_wpa.c545 pmk_ptr = pAd->StaCfg.PMK;
1382 It utilizes PRF-384 or PRF-512 to derive session-specific keys from a PMK.
1387 PMK - pointer to PMK
1403 u8 * PMK,
1460 PRF(PMK, LEN_MASTER_KEY, Prefix, 22, concatenation, 76, output, len);
1402 WpaDerivePTK(struct rt_rtmp_adapter *pAd, u8 * PMK, u8 * ANonce, u8 * AA, u8 * SNonce, u8 * SA, u8 * output, u32 len) argument
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/drivers/staging/rt2860/sta/
H A Dconnect.c1445 pAd->StaCfg.PMK, LEN_TKIP_EK);
1450 &pAd->StaCfg.PMK[16],
1453 &pAd->StaCfg.PMK[16],
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/drivers/staging/rt2860/common/
H A Dcmm_wpa.c545 pmk_ptr = pAd->StaCfg.PMK;
1382 It utilizes PRF-384 or PRF-512 to derive session-specific keys from a PMK.
1387 PMK - pointer to PMK
1403 u8 * PMK,
1460 PRF(PMK, LEN_MASTER_KEY, Prefix, 22, concatenation, 76, output, len);
1402 WpaDerivePTK(struct rt_rtmp_adapter *pAd, u8 * PMK, u8 * ANonce, u8 * AA, u8 * SNonce, u8 * SA, u8 * output, u32 len) argument
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/drivers/staging/rt2860/sta/
H A Dconnect.c1445 pAd->StaCfg.PMK, LEN_TKIP_EK);
1450 &pAd->StaCfg.PMK[16],
1453 &pAd->StaCfg.PMK[16],

Completed in 300 milliseconds