/freebsd-11.0-release/contrib/wpa/src/rsn_supp/ |
H A D | pmksa_cache.h | 18 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry 59 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 71 const u8 *pmk, size_t pmk_len); 107 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument 128 const u8 *pmk, size_t pmk_len) 126 pmksa_cache_flush(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *pmk, size_t pmk_len) argument
|
H A D | pmksa_cache.c | 110 * @pmk: The new pairwise master key 126 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument 142 os_memcpy(entry->pmk, pmk, pmk_len); 149 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, 166 os_memcmp_const(pos->pmk, pmk, pmk_len) == 0 && 192 pmksa_cache_flush(pmksa, network_ctx, pos->pmk, 255 * @pmk: PMK to match for or %NYLL to match all PMKs 259 const u8 *pmk, size_ 258 pmksa_cache_flush(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *pmk, size_t pmk_len) argument [all...] |
H A D | preauth.c | 78 u8 pmk[PMK_LEN]; local 83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 89 res = eapol_sm_get_key(eapol, pmk, 16); 94 pmk, pmk_len); 96 pmksa_cache_add(sm->pmksa, pmk, pmk_len,
|
H A D | wpa.c | 165 if (wpa_sm_key_mgmt_set_pmk(sm, sm->pmk, sm->pmk_len)) 202 sm->pmk, sm->pmk_len); 210 res = eapol_sm_get_key(sm->eapol, sm->pmk, PMK_LEN); 216 res = eapol_sm_get_key(sm->eapol, sm->pmk, 16); 232 "machines", sm->pmk, pmk_len); 239 sm->pmk, pmk_len, 427 return wpa_pmk_to_ptk(sm->pmk, sm->pmk_len, "Pairwise key expansion", 1314 sa = pmksa_cache_add(sm->pmksa, sm->pmk, sm->pmk_len, 2235 os_memcmp(sm->pmk, entry->pmk, s 2415 wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, const u8 *bssid) argument [all...] |
H A D | wpa.h | 79 int (*key_mgmt_set_pmk)(void *ctx, const u8 *pmk, size_t pmk_len); 115 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, 182 static inline void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, argument
|
H A D | wpa_i.h | 22 u8 pmk[PMK_LEN]; member in struct:wpa_sm 350 const u8 *pmk, size_t pmk_len) 356 return sm->ctx->key_mgmt_set_pmk(sm->ctx->ctx, pmk, pmk_len); 349 wpa_sm_key_mgmt_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len) argument
|
/freebsd-11.0-release/contrib/wpa/src/ap/ |
H A D | pmksa_cache_auth.h | 20 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry 52 const u8 *pmk, size_t pmk_len,
|
H A D | pmksa_cache_auth.c | 235 * @pmk: The new pairwise master key 253 const u8 *pmk, size_t pmk_len, 270 os_memcpy(entry->pmk, pmk, pmk_len); 277 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, 320 os_memcpy(entry->pmk, old_entry->pmk, old_entry->pmk_len); 429 rsn_pmkid(entry->pmk, entry->pmk_len, aa, spa, new_pmkid, 252 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument
|
H A D | wpa_auth.h | 282 int wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk, 285 const u8 *pmk, size_t len, const u8 *sta_addr, 289 const u8 *pmk);
|
H A D | wpa_auth.c | 47 const u8 *pmk, struct wpa_ptk *ptk); 829 const u8 *pmk = NULL; local 833 pmk = wpa_auth_get_psk(sm->wpa_auth, sm->addr, 834 sm->p2p_dev_addr, pmk); 835 if (pmk == NULL) 838 pmk = sm->PMK; 840 wpa_derive_ptk(sm, sm->alt_SNonce, pmk, &PTK); 1922 os_memcpy(sm->PMK, sm->pmksa->pmk, PMK_LEN); 2024 const u8 *pmk, struct wpa_ptk *ptk) 2028 return wpa_auth_derive_ptk_ft(sm, pmk, pt 2023 wpa_derive_ptk(struct wpa_state_machine *sm, const u8 *snonce, const u8 *pmk, struct wpa_ptk *ptk) argument 2041 const u8 *pmk = NULL; local 3271 wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk, int session_timeout, struct eapol_state_machine *eapol) argument 3288 wpa_auth_pmksa_add_preauth(struct wpa_authenticator *wpa_auth, const u8 *pmk, size_t len, const u8 *sta_addr, int session_timeout, struct eapol_state_machine *eapol) argument 3307 wpa_auth_pmksa_add_sae(struct wpa_authenticator *wpa_auth, const u8 *addr, const u8 *pmk) argument [all...] |
H A D | wpa_auth_i.h | 253 int wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, const u8 *pmk,
|
H A D | wpa_auth_glue.c | 235 return sta->sae->pmk;
|
H A D | wpa_auth_ft.c | 364 int wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, const u8 *pmk, argument
|
H A D | ieee802_11.c | 668 sta->sae->pmk);
|
/freebsd-11.0-release/contrib/wpa/src/common/ |
H A D | sae.h | 47 u8 pmk[SAE_PMK_LEN]; member in struct:sae_data
|
H A D | wpa_common.c | 120 * @pmk: Pairwise master key 141 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, argument 175 sha384_prf(pmk, pmk_len, label, data, sizeof(data), 181 sha256_prf(pmk, pmk_len, label, data, sizeof(data), 185 sha1_prf(pmk, pmk_len, label, data, sizeof(data), tmp, ptk_len); 191 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len); 1013 * @pmk: Pairwise master key 1014 * @pmk_len: Length of pmk in bytes 1023 void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa, argument 1037 hmac_sha256_vector(pmk, pmk_le [all...] |
H A D | wpa_common.h | 349 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, 393 void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa,
|
H A D | sae.c | 818 os_memcpy(sae->pmk, keys + SAE_KCK_LEN, SAE_PMK_LEN); 821 wpa_hexdump_key(MSG_DEBUG, "SAE: PMK", sae->pmk, SAE_PMK_LEN);
|
/freebsd-11.0-release/contrib/wpa/wpa_supplicant/ |
H A D | mesh_rsn.c | 93 return sta->sae->pmk; 332 rsn_pmkid(sta->sae->pmk, PMK_LEN, rsn->wpa_s->own_addr, 356 sha256_prf(sta->sae->pmk, sizeof(sta->sae->pmk), "AEK Derivation", 361 /* derive mesh temporal key from pmk */ 411 sha256_prf(sta->sae->pmk, sizeof(sta->sae->pmk),
|
H A D | wpas_glue.c | 273 u8 pmk[PMK_LEN]; local 313 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN); 320 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 326 res = eapol_sm_get_key(eapol, pmk, 16); 338 "handshake", pmk, pmk_len); 340 if (wpa_drv_set_key(wpa_s, WPA_ALG_PMK, NULL, 0, 0, NULL, 0, pmk, 1019 static int wpa_supplicant_key_mgmt_set_pmk(void *ctx, const u8 *pmk, argument 1027 NULL, 0, pmk, pmk_len);
|
H A D | eapol_test.c | 354 u8 pmk[PMK_LEN]; local 359 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { 360 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); 361 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) { 368 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) { 369 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16); 370 if (os_memcmp(pmk, e->authenticator_pmk, 16) != 0) {
|
H A D | mesh_mpm.c | 27 const u8 *pmk; member in struct:mesh_peer_mgmt_ie 78 mpm_ie->pmk = ie + len - 16;
|
H A D | sme.c | 814 wpa_sm_set_pmk(wpa_s->wpa, wpa_s->sme.sae.pmk, PMK_LEN,
|