/freebsd-9.3-release/contrib/wpa/src/rsn_supp/ |
H A D | pmksa_cache.h | 24 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry 58 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 103 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument
|
H A D | pmksa_cache.c | 115 * @pmk: The new pairwise master key 129 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument 141 os_memcpy(entry->pmk, pmk, pmk_len); 143 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, 160 os_memcmp(pos->pmk, pmk, pmk_len) == 0 && 299 new_entry = pmksa_cache_add(pmksa, old_entry->pmk, old_entry->pmk_len,
|
H A D | preauth.c | 84 u8 pmk[PMK_LEN]; local 89 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 95 res = eapol_sm_get_key(eapol, pmk, 16); 100 pmk, pmk_len); 102 pmksa_cache_add(sm->pmksa, pmk, pmk_len,
|
H A D | wpa.c | 162 sm->pmk, sm->pmk_len); 170 res = eapol_sm_get_key(sm->eapol, sm->pmk, PMK_LEN); 176 res = eapol_sm_get_key(sm->eapol, sm->pmk, 16); 191 "machines", sm->pmk, pmk_len); 194 pmksa_cache_add(sm->pmksa, sm->pmk, pmk_len, 349 wpa_pmk_to_ptk(sm->pmk, sm->pmk_len, "Pairwise key expansion", 1942 os_memcmp(sm->pmk, entry->pmk, sm->pmk_len) == 0)) { 1954 os_memset(sm->pmk, 0, sizeof(sm->pmk)); 2092 wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len) argument [all...] |
H A D | wpa.h | 92 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len); 148 static inline void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, argument
|
H A D | wpa_i.h | 27 u8 pmk[PMK_LEN]; member in struct:wpa_sm
|
/freebsd-9.3-release/contrib/wpa/src/ap/ |
H A D | pmksa_cache_auth.h | 26 u8 pmk[PMK_LEN]; member in struct:rsn_pmksa_cache_entry 54 const u8 *pmk, size_t pmk_len,
|
H A D | pmksa_cache_auth.c | 220 * @pmk: The new pairwise master key 236 const u8 *pmk, size_t pmk_len, 249 os_memcpy(entry->pmk, pmk, pmk_len); 251 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, 294 os_memcpy(entry->pmk, old_entry->pmk, old_entry->pmk_len); 396 rsn_pmkid(entry->pmk, entry->pmk_len, aa, spa, new_pmkid, 235 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument
|
H A D | wpa_auth.h | 255 int wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk, 258 const u8 *pmk, size_t len, const u8 *sta_addr,
|
H A D | wpa_auth.c | 1439 os_memcpy(sm->PMK, sm->pmksa->pmk, PMK_LEN); 1531 static int wpa_derive_ptk(struct wpa_state_machine *sm, const u8 *pmk, argument 1537 return wpa_auth_derive_ptk_ft(sm, pmk, ptk, ptk_len); 1540 wpa_pmk_to_ptk(pmk, PMK_LEN, "Pairwise key expansion", 1553 const u8 *pmk = NULL; local 1563 pmk = wpa_auth_get_psk(sm->wpa_auth, sm->addr, pmk); 1564 if (pmk == NULL) 1567 pmk = sm->PMK; 1569 wpa_derive_ptk(sm, pmk, 2570 wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk, int session_timeout, struct eapol_state_machine *eapol) argument 2585 wpa_auth_pmksa_add_preauth(struct wpa_authenticator *wpa_auth, const u8 *pmk, size_t len, const u8 *sta_addr, int session_timeout, struct eapol_state_machine *eapol) argument [all...] |
H A D | wpa_auth_i.h | 223 int wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, const u8 *pmk,
|
H A D | wpa_auth_ft.c | 356 int wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, const u8 *pmk, argument
|
/freebsd-9.3-release/contrib/wpa/src/common/ |
H A D | wpa_common.c | 73 * @pmk: Pairwise master key 93 void wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, argument 120 sha256_prf(pmk, pmk_len, label, data, sizeof(data), 124 sha1_prf(pmk, pmk_len, label, data, sizeof(data), ptk, 129 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len); 575 * @pmk: Pairwise master key 576 * @pmk_len: Length of pmk in bytes 585 void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa, argument 599 hmac_sha256_vector(pmk, pmk_len, 3, addr, len, hash); 602 hmac_sha1_vector(pmk, pmk_le [all...] |
H A D | wpa_common.h | 300 void wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, 341 void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa,
|
/freebsd-9.3-release/contrib/wpa/wpa_supplicant/ |
H A D | eapol_test.c | 337 u8 pmk[PMK_LEN]; local 340 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { 341 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); 342 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) { 349 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) { 350 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16); 351 if (os_memcmp(pmk, e->authenticator_pmk, 16) != 0) {
|
H A D | wpas_glue.c | 231 u8 pmk[PMK_LEN]; local 258 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 264 res = eapol_sm_get_key(eapol, pmk, 16); 274 if (wpa_drv_set_key(wpa_s, WPA_ALG_PMK, NULL, 0, 0, NULL, 0, pmk,
|