/freebsd-11-stable/contrib/wpa/src/rsn_supp/ |
H A D | pmksa_cache.h | 18 u8 pmk[PMK_LEN_MAX]; member in struct:rsn_pmksa_cache_entry 69 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 86 const u8 *pmk, size_t pmk_len); 135 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument 159 const u8 *pmk, size_t pmk_len) 157 pmksa_cache_flush(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *pmk, size_t pmk_len) argument
|
H A D | pmksa_cache.c | 113 * @pmk: The new pairwise master key 131 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument 148 os_memcpy(entry->pmk, pmk, pmk_len); 157 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); 187 os_memcmp_const(pos->pmk, entry->pmk, 215 pos->pmk, pos->pmk_len); 270 entry->pmk, entry->pmk_len); 280 * @pmk 283 pmksa_cache_flush(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *pmk, size_t pmk_len) argument [all...] |
H A D | preauth.c | 78 u8 pmk[PMK_LEN]; local 83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 89 res = eapol_sm_get_key(eapol, pmk, 16); 94 pmk, pmk_len); 96 pmksa_cache_add(sm->pmksa, pmk, pmk_len, NULL, 346 NULL, p->pmk, p->pmk_len);
|
H A D | wpa_i.h | 21 u8 pmk[PMK_LEN_MAX]; member in struct:wpa_sm 249 const u8 *cache_id, const u8 *pmk, 254 cache_id, pmk, pmk_len); 389 const u8 *pmk, size_t pmk_len) 393 return sm->ctx->key_mgmt_set_pmk(sm->ctx->ctx, pmk, pmk_len); 247 wpa_sm_add_pmkid(struct wpa_sm *sm, void *network_ctx, const u8 *bssid, const u8 *pmkid, const u8 *cache_id, const u8 *pmk, size_t pmk_len) argument 388 wpa_sm_key_mgmt_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len) argument
|
H A D | wpa.c | 252 if (wpa_sm_key_mgmt_set_pmk(sm, sm->pmk, sm->pmk_len)) 289 sm->pmk, sm->pmk_len); 301 os_memcpy(sm->xxkey, sm->pmk, sm->pmk_len); 316 res = eapol_sm_get_key(sm->eapol, sm->pmk, pmk_len); 323 res = eapol_sm_get_key(sm->eapol, sm->pmk, 16); 372 "machines", sm->pmk, pmk_len); 379 sm->pmk, pmk_len, NULL, 578 return wpa_pmk_to_ptk(sm->pmk, sm->pmk_len, "Pairwise key expansion", 1583 sa = pmksa_cache_add(sm->pmksa, sm->pmk, sm->pmk_len, NULL, 2618 os_memcmp(sm->pmk, entr 2831 wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *bssid) argument 3350 wpa_sm_pmksa_cache_add(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *bssid, const u8 *fils_cache_id) argument [all...] |
H A D | wpa.h | 44 const u8 *pmk, size_t pmk_len); 83 int (*key_mgmt_set_pmk)(void *ctx, const u8 *pmk, size_t pmk_len); 124 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, 163 void wpa_sm_pmksa_cache_add(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, 202 static inline void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, argument
|
/freebsd-11-stable/contrib/wpa/src/ap/ |
H A D | pmksa_cache_auth.h | 20 u8 pmk[PMK_LEN_MAX]; member in struct:rsn_pmksa_cache_entry 52 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 57 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid,
|
H A D | pmksa_cache_auth.c | 261 * @pmk: The new pairwise master key 280 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 287 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len, 300 * @pmk: The new pairwise master key 315 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid, argument 332 os_memcpy(entry->pmk, pmk, pmk_len); 341 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); 404 os_memcpy(entry->pmk, old_entry->pmk, old_entr 279 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument [all...] |
H A D | wpa_auth.h | 366 int wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk, 370 const u8 *pmk, size_t len, const u8 *sta_addr, 374 const u8 *pmk, const u8 *pmkid); 377 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 387 wpa_auth_pmksa_create_entry(const u8 *aa, const u8 *spa, const u8 *pmk, 400 u8 *pmkid, u8 *pmk); 445 int fils_auth_pmk_to_ptk(struct wpa_state_machine *sm, const u8 *pmk, 473 void wpa_auth_add_fils_pmk_pmkid(struct wpa_state_machine *sm, const u8 *pmk,
|
H A D | wpa_auth.c | 58 const u8 *pmk, unsigned int pmk_len, 879 const u8 *pmk = NULL; local 887 pmk = wpa_auth_get_psk(sm->wpa_auth, sm->addr, 888 sm->p2p_dev_addr, pmk, &pmk_len, 890 if (pmk == NULL) 894 os_memcpy(sm->xxkey, pmk, pmk_len); 899 pmk = sm->PMK; 903 if (wpa_derive_ptk(sm, sm->alt_SNonce, pmk, pmk_len, &PTK) < 0) 908 if (sm->PMK != pmk) { 909 os_memcpy(sm->PMK, pmk, pmk_le 2209 wpa_derive_ptk(struct wpa_state_machine *sm, const u8 *snonce, const u8 *pmk, unsigned int pmk_len, struct wpa_ptk *ptk) argument 2248 fils_auth_pmk_to_ptk(struct wpa_state_machine *sm, const u8 *pmk, size_t pmk_len, const u8 *snonce, const u8 *anonce, const u8 *dhss, size_t dhss_len, struct wpabuf *g_sta, struct wpabuf *g_ap) argument 2812 const u8 *pmk = NULL; local 4362 wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk, unsigned int pmk_len, int session_timeout, struct eapol_state_machine *eapol) argument 4397 wpa_auth_pmksa_add_preauth(struct wpa_authenticator *wpa_auth, const u8 *pmk, size_t len, const u8 *sta_addr, int session_timeout, struct eapol_state_machine *eapol) argument 4417 wpa_auth_pmksa_add_sae(struct wpa_authenticator *wpa_auth, const u8 *addr, const u8 *pmk, const u8 *pmkid) argument 4441 wpa_auth_pmksa_add2(struct wpa_authenticator *wpa_auth, const u8 *addr, const u8 *pmk, size_t pmk_len, const u8 *pmkid, int session_timeout, int akmp) argument 4504 wpa_auth_pmksa_create_entry(const u8 *aa, const u8 *spa, const u8 *pmk, const u8 *pmkid, int expiration) argument 4552 wpa_auth_pmksa_set_to_sm(struct rsn_pmksa_cache_entry *pmksa, struct wpa_state_machine *sm, struct wpa_authenticator *wpa_auth, u8 *pmkid, u8 *pmk) argument 4923 wpa_auth_add_fils_pmk_pmkid(struct wpa_state_machine *sm, const u8 *pmk, size_t pmk_len, const u8 *pmkid) argument [all...] |
H A D | ctrl_iface_ap.c | 898 u8 pmk[PMK_LEN_MAX]; local 929 hexstr2bin(pos, pmk, pmk_len) < 0) 937 return wpa_auth_pmksa_add2(hapd->wpa_auth, spa, pmk, pmk_len, 956 u8 pmk[PMK_LEN_MAX]; local 981 if (hexstr2bin(pos, pmk, PMK_LEN) < 0) 992 return wpa_auth_pmksa_create_entry(aa, spa, pmk, pmkid, expiration);
|
H A D | sta_info.c | 1197 const u8 *pmk; local 1202 pmk = wpa_auth_get_pmk(sta->wpa_sm, &pmk_len); 1203 if (!pmk || pmk_len != PMK_LEN) 1207 if (os_memcmp(pmk, psk->psk, PMK_LEN) == 0)
|
H A D | ieee802_11.c | 758 sta->sae->pmk, sta->sae->pmkid); 1682 const u8 *pmk = NULL; local 1804 pmk = pmk_buf; 1827 wpa_auth_add_fils_pmk_pmkid(sta->wpa_sm, pmk, pmk_len, 1832 pmk, pmk_len, 1841 pmk = pmksa->pmk; 1845 if (!pmk) { 1853 if (fils_auth_pmk_to_ptk(sta->wpa_sm, pmk, pmk_len,
|
H A D | wpa_auth_glue.c | 269 return sta->sae->pmk; 292 return sa->pmk;
|
H A D | wpa_auth_ft.c | 2105 mpmk = sm->pmksa->pmk; 2674 const u8 *pmk = NULL; local 2689 pmk = wpa_ft_get_psk(wpa_auth, sm->addr, sm->p2p_dev_addr, 2690 pmk); 2691 if (pmk == NULL) 2694 if (wpa_derive_pmk_r0(pmk, PMK_LEN, ssid, ssid_len, mdid, r0kh, 2709 os_memcpy(sm->PMK, pmk, PMK_LEN);
|
/freebsd-11-stable/contrib/wpa/src/common/ |
H A D | sae.h | 55 u8 pmk[SAE_PMK_LEN]; member in struct:sae_data
|
H A D | wpa_common.c | 328 * @pmk: Pairwise master key 349 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, argument 406 if (sha384_prf(pmk, pmk_len, label, data, data_len, 415 if (sha256_prf(pmk, pmk_len, label, data, data_len, 424 if (sha256_prf(pmk, pmk_len, label, data, data_len, 429 if (sha384_prf(pmk, pmk_len, label, data, data_len, 434 if (sha512_prf(pmk, pmk_len, label, data, data_len, 444 if (sha1_prf(pmk, pmk_len, label, data, data_len, tmp, 455 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len); 479 size_t dh_ss_len, u8 *pmk, size_ 477 fils_rmsk_to_pmk(int akmp, const u8 *rmsk, size_t rmsk_len, const u8 *snonce, const u8 *anonce, const u8 *dh_ss, size_t dh_ss_len, u8 *pmk, size_t *pmk_len) argument 551 fils_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const u8 *spa, const u8 *aa, const u8 *snonce, const u8 *anonce, const u8 *dhss, size_t dhss_len, struct wpa_ptk *ptk, u8 *ick, size_t *ick_len, int akmp, int cipher, u8 *fils_ft, size_t *fils_ft_len) argument 1837 rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa, u8 *pmkid, int akmp) argument [all...] |
H A D | wpa_common.h | 347 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, 354 size_t dh_ss_len, u8 *pmk, size_t *pmk_len); 357 int fils_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const u8 *spa, const u8 *aa, 413 void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa,
|
H A D | common_module_tests.c | 315 const u8 pmk[] = { local 389 if (os_memcmp(pmk, sae.pmk, SAE_PMK_LEN) != 0) {
|
H A D | dpp.h | 260 u8 pmk[PMK_LEN_MAX]; member in struct:dpp_introduction
|
H A D | sae.c | 727 os_memcpy(sae->pmk, keys + SAE_KCK_LEN, SAE_PMK_LEN); 731 wpa_hexdump_key(MSG_DEBUG, "SAE: PMK", sae->pmk, SAE_PMK_LEN);
|
/freebsd-11-stable/contrib/wpa/wpa_supplicant/ |
H A D | wpas_glue.c | 276 u8 pmk[PMK_LEN]; local 316 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN); 323 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 329 res = eapol_sm_get_key(eapol, pmk, 16); 341 "handshake", pmk, pmk_len); 343 if (wpa_drv_set_key(wpa_s, WPA_ALG_PMK, NULL, 0, 0, NULL, 0, pmk, 546 const u8 *pmk, size_t pmk_len) 566 params.pmk = pmk; 1152 static int wpa_supplicant_key_mgmt_set_pmk(void *ctx, const u8 *pmk, argument 543 wpa_supplicant_add_pmkid(void *_wpa_s, void *network_ctx, const u8 *bssid, const u8 *pmkid, const u8 *fils_cache_id, const u8 *pmk, size_t pmk_len) argument [all...] |
H A D | eapol_test.c | 363 u8 pmk[PMK_LEN]; local 368 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { 369 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); 370 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) { 377 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) { 378 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16); 379 if (os_memcmp(pmk, e->authenticator_pmk, 16) != 0) {
|
H A D | mesh_rsn.c | 95 return sta->sae->pmk; 390 sta->sae->pmkid, sta->sae->pmk); 449 sha256_prf(sta->sae->pmk, sizeof(sta->sae->pmk), "AEK Derivation", 454 /* derive mesh temporal key from pmk */ 510 sha256_prf(sta->sae->pmk, SAE_PMK_LEN,
|
H A D | preauth_test.c | 149 const u8 *pmk, size_t pmk_len) 146 wpa_supplicant_add_pmkid(void *wpa_s, void *network_ctx, const u8 *bssid, const u8 *pmkid, const u8 *fils_cache_id, const u8 *pmk, size_t pmk_len) argument
|