/freebsd-11-stable/contrib/wpa/hostapd/ |
H A D | ctrl_iface.c | 1496 const u8 *pmk; local 1503 pmk = wpa_auth_get_pmk(sta->wpa_sm, &pmk_len); 1505 for (psk = hapd->conf->ssid.wpa_psk; pmk && psk; psk = psk->next) { 1507 os_memcmp(psk->psk, pmk, pmk_len) == 0;
|
/freebsd-11-stable/contrib/wpa/src/ap/ |
H A D | ctrl_iface_ap.c | 898 u8 pmk[PMK_LEN_MAX]; local 929 hexstr2bin(pos, pmk, pmk_len) < 0) 937 return wpa_auth_pmksa_add2(hapd->wpa_auth, spa, pmk, pmk_len, 956 u8 pmk[PMK_LEN_MAX]; local 981 if (hexstr2bin(pos, pmk, PMK_LEN) < 0) 992 return wpa_auth_pmksa_create_entry(aa, spa, pmk, pmkid, expiration);
|
H A D | dpp_hostapd.c | 1134 if (wpa_auth_pmksa_add2(hapd->wpa_auth, src, intro.pmk, intro.pmk_len,
|
H A D | ieee802_11.c | 758 sta->sae->pmk, sta->sae->pmkid); 1682 const u8 *pmk = NULL; local 1804 pmk = pmk_buf; 1827 wpa_auth_add_fils_pmk_pmkid(sta->wpa_sm, pmk, pmk_len, 1832 pmk, pmk_len, 1841 pmk = pmksa->pmk; 1845 if (!pmk) { 1853 if (fils_auth_pmk_to_ptk(sta->wpa_sm, pmk, pmk_len,
|
H A D | pmksa_cache_auth.c | 261 * @pmk: The new pairwise master key 280 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 287 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len, 300 * @pmk: The new pairwise master key 315 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid, argument 332 os_memcpy(entry->pmk, pmk, pmk_len); 341 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); 404 os_memcpy(entry->pmk, old_entry->pmk, old_entr 279 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument [all...] |
H A D | pmksa_cache_auth.h | 20 u8 pmk[PMK_LEN_MAX]; member in struct:rsn_pmksa_cache_entry 52 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 57 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid,
|
H A D | sta_info.c | 1197 const u8 *pmk; local 1202 pmk = wpa_auth_get_pmk(sta->wpa_sm, &pmk_len); 1203 if (!pmk || pmk_len != PMK_LEN) 1207 if (os_memcmp(pmk, psk->psk, PMK_LEN) == 0)
|
H A D | wpa_auth.c | 58 const u8 *pmk, unsigned int pmk_len, 879 const u8 *pmk = NULL; local 887 pmk = wpa_auth_get_psk(sm->wpa_auth, sm->addr, 888 sm->p2p_dev_addr, pmk, &pmk_len, 890 if (pmk == NULL) 894 os_memcpy(sm->xxkey, pmk, pmk_len); 899 pmk = sm->PMK; 903 if (wpa_derive_ptk(sm, sm->alt_SNonce, pmk, pmk_len, &PTK) < 0) 908 if (sm->PMK != pmk) { 909 os_memcpy(sm->PMK, pmk, pmk_le 2209 wpa_derive_ptk(struct wpa_state_machine *sm, const u8 *snonce, const u8 *pmk, unsigned int pmk_len, struct wpa_ptk *ptk) argument 2248 fils_auth_pmk_to_ptk(struct wpa_state_machine *sm, const u8 *pmk, size_t pmk_len, const u8 *snonce, const u8 *anonce, const u8 *dhss, size_t dhss_len, struct wpabuf *g_sta, struct wpabuf *g_ap) argument 2812 const u8 *pmk = NULL; local 4362 wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk, unsigned int pmk_len, int session_timeout, struct eapol_state_machine *eapol) argument 4397 wpa_auth_pmksa_add_preauth(struct wpa_authenticator *wpa_auth, const u8 *pmk, size_t len, const u8 *sta_addr, int session_timeout, struct eapol_state_machine *eapol) argument 4417 wpa_auth_pmksa_add_sae(struct wpa_authenticator *wpa_auth, const u8 *addr, const u8 *pmk, const u8 *pmkid) argument 4441 wpa_auth_pmksa_add2(struct wpa_authenticator *wpa_auth, const u8 *addr, const u8 *pmk, size_t pmk_len, const u8 *pmkid, int session_timeout, int akmp) argument 4504 wpa_auth_pmksa_create_entry(const u8 *aa, const u8 *spa, const u8 *pmk, const u8 *pmkid, int expiration) argument 4552 wpa_auth_pmksa_set_to_sm(struct rsn_pmksa_cache_entry *pmksa, struct wpa_state_machine *sm, struct wpa_authenticator *wpa_auth, u8 *pmkid, u8 *pmk) argument 4923 wpa_auth_add_fils_pmk_pmkid(struct wpa_state_machine *sm, const u8 *pmk, size_t pmk_len, const u8 *pmkid) argument [all...] |
H A D | wpa_auth.h | 366 int wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk, 370 const u8 *pmk, size_t len, const u8 *sta_addr, 374 const u8 *pmk, const u8 *pmkid); 377 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 387 wpa_auth_pmksa_create_entry(const u8 *aa, const u8 *spa, const u8 *pmk, 400 u8 *pmkid, u8 *pmk); 445 int fils_auth_pmk_to_ptk(struct wpa_state_machine *sm, const u8 *pmk, 473 void wpa_auth_add_fils_pmk_pmkid(struct wpa_state_machine *sm, const u8 *pmk,
|
H A D | wpa_auth_ft.c | 2105 mpmk = sm->pmksa->pmk; 2674 const u8 *pmk = NULL; local 2689 pmk = wpa_ft_get_psk(wpa_auth, sm->addr, sm->p2p_dev_addr, 2690 pmk); 2691 if (pmk == NULL) 2694 if (wpa_derive_pmk_r0(pmk, PMK_LEN, ssid, ssid_len, mdid, r0kh, 2709 os_memcpy(sm->PMK, pmk, PMK_LEN);
|
H A D | wpa_auth_glue.c | 269 return sta->sae->pmk; 292 return sa->pmk;
|
/freebsd-11-stable/contrib/wpa/src/common/ |
H A D | common_module_tests.c | 315 const u8 pmk[] = { local 389 if (os_memcmp(pmk, sae.pmk, SAE_PMK_LEN) != 0) {
|
H A D | dpp.c | 6376 static int dpp_derive_pmk(const u8 *Nx, size_t Nx_len, u8 *pmk, argument 6393 res = dpp_hkdf_expand(hash_len, prk, hash_len, info, pmk, hash_len); 6399 pmk, hash_len); 6584 if (dpp_derive_pmk(Nx, Nx_len, intro->pmk, curve->hash_len) < 0) {
|
H A D | dpp.h | 260 u8 pmk[PMK_LEN_MAX]; member in struct:dpp_introduction
|
H A D | sae.c | 727 os_memcpy(sae->pmk, keys + SAE_KCK_LEN, SAE_PMK_LEN); 731 wpa_hexdump_key(MSG_DEBUG, "SAE: PMK", sae->pmk, SAE_PMK_LEN);
|
H A D | sae.h | 55 u8 pmk[SAE_PMK_LEN]; member in struct:sae_data
|
H A D | wpa_common.c | 328 * @pmk: Pairwise master key 349 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, argument 406 if (sha384_prf(pmk, pmk_len, label, data, data_len, 415 if (sha256_prf(pmk, pmk_len, label, data, data_len, 424 if (sha256_prf(pmk, pmk_len, label, data, data_len, 429 if (sha384_prf(pmk, pmk_len, label, data, data_len, 434 if (sha512_prf(pmk, pmk_len, label, data, data_len, 444 if (sha1_prf(pmk, pmk_len, label, data, data_len, tmp, 455 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len); 479 size_t dh_ss_len, u8 *pmk, size_ 477 fils_rmsk_to_pmk(int akmp, const u8 *rmsk, size_t rmsk_len, const u8 *snonce, const u8 *anonce, const u8 *dh_ss, size_t dh_ss_len, u8 *pmk, size_t *pmk_len) argument 551 fils_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const u8 *spa, const u8 *aa, const u8 *snonce, const u8 *anonce, const u8 *dhss, size_t dhss_len, struct wpa_ptk *ptk, u8 *ick, size_t *ick_len, int akmp, int cipher, u8 *fils_ft, size_t *fils_ft_len) argument 1837 rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa, u8 *pmkid, int akmp) argument [all...] |
H A D | wpa_common.h | 347 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, 354 size_t dh_ss_len, u8 *pmk, size_t *pmk_len); 357 int fils_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const u8 *spa, const u8 *aa, 413 void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa,
|
/freebsd-11-stable/contrib/wpa/src/drivers/ |
H A D | driver.h | 2177 const u8 *pmk; member in struct:wpa_pmkid_params 2407 * parameters are either a set of bssid, pmkid, and pmk; or a set of 2408 * ssid, fils_cache_id, pmkid, and pmk.
|
/freebsd-11-stable/contrib/wpa/src/rsn_supp/ |
H A D | pmksa_cache.c | 113 * @pmk: The new pairwise master key 131 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument 148 os_memcpy(entry->pmk, pmk, pmk_len); 157 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); 187 os_memcmp_const(pos->pmk, entry->pmk, 215 pos->pmk, pos->pmk_len); 270 entry->pmk, entry->pmk_len); 280 * @pmk 283 pmksa_cache_flush(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *pmk, size_t pmk_len) argument [all...] |
H A D | pmksa_cache.h | 18 u8 pmk[PMK_LEN_MAX]; member in struct:rsn_pmksa_cache_entry 69 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 86 const u8 *pmk, size_t pmk_len); 135 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, argument 159 const u8 *pmk, size_t pmk_len) 157 pmksa_cache_flush(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *pmk, size_t pmk_len) argument
|
H A D | preauth.c | 78 u8 pmk[PMK_LEN]; local 83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 89 res = eapol_sm_get_key(eapol, pmk, 16); 94 pmk, pmk_len); 96 pmksa_cache_add(sm->pmksa, pmk, pmk_len, NULL, 346 NULL, p->pmk, p->pmk_len);
|
H A D | wpa.c | 252 if (wpa_sm_key_mgmt_set_pmk(sm, sm->pmk, sm->pmk_len)) 289 sm->pmk, sm->pmk_len); 301 os_memcpy(sm->xxkey, sm->pmk, sm->pmk_len); 316 res = eapol_sm_get_key(sm->eapol, sm->pmk, pmk_len); 323 res = eapol_sm_get_key(sm->eapol, sm->pmk, 16); 372 "machines", sm->pmk, pmk_len); 379 sm->pmk, pmk_len, NULL, 578 return wpa_pmk_to_ptk(sm->pmk, sm->pmk_len, "Pairwise key expansion", 1583 sa = pmksa_cache_add(sm->pmksa, sm->pmk, sm->pmk_len, NULL, 2618 os_memcmp(sm->pmk, entr 2831 wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *bssid) argument 3350 wpa_sm_pmksa_cache_add(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *bssid, const u8 *fils_cache_id) argument [all...] |
H A D | wpa.h | 44 const u8 *pmk, size_t pmk_len); 83 int (*key_mgmt_set_pmk)(void *ctx, const u8 *pmk, size_t pmk_len); 124 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, 163 void wpa_sm_pmksa_cache_add(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, 202 static inline void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, argument
|
H A D | wpa_ft.c | 38 mpmk = sm->cur_pmksa->pmk;
|