/freebsd-10.1-release/contrib/wpa/src/rsn_supp/ |
H A D | pmksa_cache.h | 18 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry 59 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 105 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument
|
H A D | pmksa_cache.c | 110 * @pmk: The new pairwise master key 124 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument 136 os_memcpy(entry->pmk, pmk, pmk_len); 138 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, 155 os_memcmp(pos->pmk, pmk, pmk_len) == 0 && 322 new_entry = pmksa_cache_add(pmksa, old_entry->pmk, old_entry->pmk_len,
|
H A D | preauth.c | 77 u8 pmk[PMK_LEN]; local 82 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 88 res = eapol_sm_get_key(eapol, pmk, 16); 93 pmk, pmk_len); 95 pmksa_cache_add(sm->pmksa, pmk, pmk_len,
|
H A D | wpa.c | 165 sm->pmk, sm->pmk_len); 173 res = eapol_sm_get_key(sm->eapol, sm->pmk, PMK_LEN); 179 res = eapol_sm_get_key(sm->eapol, sm->pmk, 16); 195 "machines", sm->pmk, pmk_len); 200 sm->pmk, pmk_len, 365 wpa_pmk_to_ptk(sm->pmk, sm->pmk_len, "Pairwise key expansion", 1964 os_memcmp(sm->pmk, entry->pmk, sm->pmk_len) == 0)) { 1972 os_memset(sm->pmk, 0, sizeof(sm->pmk)); 2119 wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len) argument [all...] |
H A D | wpa.h | 98 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len); 158 static inline void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, argument
|
H A D | wpa_i.h | 22 u8 pmk[PMK_LEN]; member in struct:wpa_sm
|
/freebsd-10.1-release/contrib/wpa/src/ap/ |
H A D | pmksa_cache_auth.h | 20 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry 49 const u8 *pmk, size_t pmk_len,
|
H A D | pmksa_cache_auth.c | 223 * @pmk: The new pairwise master key 239 const u8 *pmk, size_t pmk_len, 252 os_memcpy(entry->pmk, pmk, pmk_len); 254 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, 297 os_memcpy(entry->pmk, old_entry->pmk, old_entry->pmk_len); 401 rsn_pmkid(entry->pmk, entry->pmk_len, aa, spa, new_pmkid, 238 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument
|
H A D | wpa_auth.h | 257 int wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk, 260 const u8 *pmk, size_t len, const u8 *sta_addr,
|
H A D | wpa_auth.c | 1637 os_memcpy(sm->PMK, sm->pmksa->pmk, PMK_LEN); 1729 static int wpa_derive_ptk(struct wpa_state_machine *sm, const u8 *pmk, argument 1735 return wpa_auth_derive_ptk_ft(sm, pmk, ptk, ptk_len); 1738 wpa_pmk_to_ptk(pmk, PMK_LEN, "Pairwise key expansion", 1751 const u8 *pmk = NULL; local 1762 pmk = wpa_auth_get_psk(sm->wpa_auth, sm->addr, pmk); 1763 if (pmk == NULL) 1766 pmk = sm->PMK; 1768 wpa_derive_ptk(sm, pmk, 2902 wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk, int session_timeout, struct eapol_state_machine *eapol) argument 2918 wpa_auth_pmksa_add_preauth(struct wpa_authenticator *wpa_auth, const u8 *pmk, size_t len, const u8 *sta_addr, int session_timeout, struct eapol_state_machine *eapol) argument [all...] |
H A D | wpa_auth_i.h | 225 int wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, const u8 *pmk,
|
H A D | wpa_auth_ft.c | 343 int wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, const u8 *pmk, argument
|
/freebsd-10.1-release/contrib/wpa/wpa_supplicant/ |
H A D | wpas_glue.c | 224 u8 pmk[PMK_LEN]; local 258 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN); 265 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 271 res = eapol_sm_get_key(eapol, pmk, 16); 283 "handshake", pmk, pmk_len); 285 if (wpa_drv_set_key(wpa_s, WPA_ALG_PMK, NULL, 0, 0, NULL, 0, pmk,
|
H A D | eapol_test.c | 337 u8 pmk[PMK_LEN]; local 340 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { 341 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); 342 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) { 349 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) { 350 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16); 351 if (os_memcmp(pmk, e->authenticator_pmk, 16) != 0) {
|
/freebsd-10.1-release/contrib/wpa/src/common/ |
H A D | wpa_common.c | 69 * @pmk: Pairwise master key 89 void wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, argument 116 sha256_prf(pmk, pmk_len, label, data, sizeof(data), 120 sha1_prf(pmk, pmk_len, label, data, sizeof(data), ptk, 127 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len); 867 * @pmk: Pairwise master key 868 * @pmk_len: Length of pmk in bytes 877 void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa, argument 891 hmac_sha256_vector(pmk, pmk_len, 3, addr, len, hash); 894 hmac_sha1_vector(pmk, pmk_le [all...] |
H A D | wpa_common.h | 310 void wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, 353 void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa,
|