/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/supp/include/ |
H A D | wlc_wpa.h | 146 uint8 PMK[PMK_LEN]; member in struct:_sup_pmkid 150 #define SUP_MAXPMKID 16 /* Supplementary Max PMK ID */
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant-0.7.3/src/ap/ |
H A D | wpa_auth_i.h | 66 u8 PMK[PMK_LEN]; member in struct:wpa_state_machine
|
H A D | wpa_auth.c | 386 wpa_printf(MSG_ERROR, "FT PMK cache initialization failed."); 1438 wpa_printf(MSG_DEBUG, "WPA: PMK from PMKSA cache"); 1439 os_memcpy(sm->PMK, sm->pmksa->pmk, PMK_LEN); 1441 wpa_printf(MSG_DEBUG, "WPA: PMK from EAPOL state machine " 1443 os_memcpy(sm->PMK, msk, PMK_LEN); 1451 wpa_printf(MSG_DEBUG, "WPA: Could not get PMK"); 1459 * state and takes PMK from the previously used AAA Key. This will 1460 * eventually fail in 4-Way Handshake because Supplicant uses PMK 1473 os_memcpy(sm->PMK, psk, PMK_LEN); 1520 rsn_pmkid(sm->PMK, PMK_LE [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant-0.7.3/src/ap/ |
H A D | wpa_auth_i.h | 66 u8 PMK[PMK_LEN]; member in struct:wpa_state_machine
|
H A D | wpa_auth.c | 386 wpa_printf(MSG_ERROR, "FT PMK cache initialization failed."); 1438 wpa_printf(MSG_DEBUG, "WPA: PMK from PMKSA cache"); 1439 os_memcpy(sm->PMK, sm->pmksa->pmk, PMK_LEN); 1441 wpa_printf(MSG_DEBUG, "WPA: PMK from EAPOL state machine " 1443 os_memcpy(sm->PMK, msk, PMK_LEN); 1451 wpa_printf(MSG_DEBUG, "WPA: Could not get PMK"); 1459 * state and takes PMK from the previously used AAA Key. This will 1460 * eventually fail in 4-Way Handshake because Supplicant uses PMK 1473 os_memcpy(sm->PMK, psk, PMK_LEN); 1520 rsn_pmkid(sm->PMK, PMK_LE [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant-0.7.3/src/ap/ |
H A D | wpa_auth_i.h | 66 u8 PMK[PMK_LEN]; member in struct:wpa_state_machine
|
H A D | wpa_auth.c | 386 wpa_printf(MSG_ERROR, "FT PMK cache initialization failed."); 1438 wpa_printf(MSG_DEBUG, "WPA: PMK from PMKSA cache"); 1439 os_memcpy(sm->PMK, sm->pmksa->pmk, PMK_LEN); 1441 wpa_printf(MSG_DEBUG, "WPA: PMK from EAPOL state machine " 1443 os_memcpy(sm->PMK, msk, PMK_LEN); 1451 wpa_printf(MSG_DEBUG, "WPA: Could not get PMK"); 1459 * state and takes PMK from the previously used AAA Key. This will 1460 * eventually fail in 4-Way Handshake because Supplicant uses PMK 1473 os_memcpy(sm->PMK, psk, PMK_LEN); 1520 rsn_pmkid(sm->PMK, PMK_LE [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/drivers/staging/rt2860/ |
H A D | sta_ioctl.c | 90 NdisZeroMemory(pAd->StaCfg.PMK, 32); 91 NdisMoveMemory(pAd->StaCfg.PMK, 456 /* Reset Ralink supplicant to not use, it will be set to start when UI set PMK key */ 2076 pKey = (char *)& pAd->StaCfg.PMK[0]; 2676 RTMPZeroMemory(pAdapter->StaCfg.PMK, 32); 2679 pAdapter->StaCfg.PMK, 32); 2684 NdisMoveMemory(pAdapter->StaCfg.PMK, 2908 /* Reset Ralink supplicant to not use, it will be set to start when UI set PMK key */
|
H A D | rtmp.h | 1384 u8 PMK[32]; /* WPA PSK mode PMK */ member in struct:rt_sta_admin_config 3424 u8 *PMK, 3505 void WpaDeriveGTK(u8 *PMK,
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/drivers/staging/rt2860/ |
H A D | sta_ioctl.c | 90 NdisZeroMemory(pAd->StaCfg.PMK, 32); 91 NdisMoveMemory(pAd->StaCfg.PMK, 456 /* Reset Ralink supplicant to not use, it will be set to start when UI set PMK key */ 2076 pKey = (char *)& pAd->StaCfg.PMK[0]; 2676 RTMPZeroMemory(pAdapter->StaCfg.PMK, 32); 2679 pAdapter->StaCfg.PMK, 32); 2684 NdisMoveMemory(pAdapter->StaCfg.PMK, 2908 /* Reset Ralink supplicant to not use, it will be set to start when UI set PMK key */
|
H A D | rtmp.h | 1384 u8 PMK[32]; /* WPA PSK mode PMK */ member in struct:rt_sta_admin_config 3424 u8 *PMK, 3505 void WpaDeriveGTK(u8 *PMK,
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/drivers/staging/rt2860/common/ |
H A D | cmm_wpa.c | 545 pmk_ptr = pAd->StaCfg.PMK; 1382 It utilizes PRF-384 or PRF-512 to derive session-specific keys from a PMK. 1387 PMK - pointer to PMK 1403 u8 * PMK, 1460 PRF(PMK, LEN_MASTER_KEY, Prefix, 22, concatenation, 76, output, len); 1402 WpaDerivePTK(struct rt_rtmp_adapter *pAd, u8 * PMK, u8 * ANonce, u8 * AA, u8 * SNonce, u8 * SA, u8 * output, u32 len) argument
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/drivers/staging/rt2860/sta/ |
H A D | connect.c | 1445 pAd->StaCfg.PMK, LEN_TKIP_EK); 1450 &pAd->StaCfg.PMK[16], 1453 &pAd->StaCfg.PMK[16],
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/drivers/staging/rt2860/common/ |
H A D | cmm_wpa.c | 545 pmk_ptr = pAd->StaCfg.PMK; 1382 It utilizes PRF-384 or PRF-512 to derive session-specific keys from a PMK. 1387 PMK - pointer to PMK 1403 u8 * PMK, 1460 PRF(PMK, LEN_MASTER_KEY, Prefix, 22, concatenation, 76, output, len); 1402 WpaDerivePTK(struct rt_rtmp_adapter *pAd, u8 * PMK, u8 * ANonce, u8 * AA, u8 * SNonce, u8 * SA, u8 * output, u32 len) argument
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/drivers/staging/rt2860/sta/ |
H A D | connect.c | 1445 pAd->StaCfg.PMK, LEN_TKIP_EK); 1450 &pAd->StaCfg.PMK[16], 1453 &pAd->StaCfg.PMK[16],
|