/freebsd-10.1-release/contrib/wpa/src/ap/ |
H A D | peerkey_auth.c | 163 2 + RSN_SELECTOR_LEN + PMK_LEN + WPA_NONCE_LEN + 178 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN, 217 2 + RSN_SELECTOR_LEN + PMK_LEN + WPA_NONCE_LEN + 235 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN, 292 if (random_get_bytes(smk, PMK_LEN)) { 308 sha256_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf), 309 smk, PMK_LEN); 311 sha1_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf), 312 smk, PMK_LEN); 315 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", smk, PMK_LEN); [all...] |
H A D | pmksa_cache_auth.h | 20 u8 pmk[PMK_LEN];
|
H A D | wpa_auth_ft.c | 139 u8 pmk_r0[PMK_LEN]; 149 u8 pmk_r1[PMK_LEN]; 180 os_memset(r0prev->pmk_r0, 0, PMK_LEN); 188 os_memset(r1prev->pmk_r1, 0, PMK_LEN); 209 os_memcpy(r0->pmk_r0, pmk_r0, PMK_LEN); 233 os_memcpy(pmk_r0, r0->pmk_r0, PMK_LEN); 259 os_memcpy(r1->pmk_r1, pmk_r1, PMK_LEN); 283 os_memcpy(pmk_r1, r1->pmk_r1, PMK_LEN); 346 u8 pmk_r0[PMK_LEN], pmk_r0_name[WPA_PMK_NAME_LEN]; 347 u8 pmk_r1[PMK_LEN]; [all...] |
H A D | ap_config.h | 99 #define PMK_LEN 32 macro 102 u8 psk[PMK_LEN]; 108 u8 psk[PMK_LEN];
|
H A D | preauth_auth.c | 205 if (len > PMK_LEN) 206 len = PMK_LEN;
|
H A D | wpa_auth_i.h | 60 u8 PMK[PMK_LEN]; 111 u8 xxkey[PMK_LEN]; /* PSK or the second 256 bits of MSK */
|
H A D | ap_config.c | 245 if (len == 64 && hexstr2bin(pos, psk->psk, PMK_LEN) == 0) 249 4096, psk->psk, PMK_LEN); 284 4096, ssid->wpa_psk->psk, PMK_LEN); 286 ssid->wpa_psk->psk, PMK_LEN);
|
H A D | wpa_auth.h | 69 u8 pmk_r1[PMK_LEN]; 88 u8 pmk_r1[PMK_LEN];
|
H A D | wpa_auth.c | 1628 u8 msk[2 * PMK_LEN]; 1629 size_t len = 2 * PMK_LEN; 1637 os_memcpy(sm->PMK, sm->pmksa->pmk, PMK_LEN); 1641 os_memcpy(sm->PMK, msk, PMK_LEN); 1643 if (len >= 2 * PMK_LEN) { 1644 os_memcpy(sm->xxkey, msk + PMK_LEN, PMK_LEN); 1645 sm->xxkey_len = PMK_LEN; 1671 os_memcpy(sm->PMK, psk, PMK_LEN); 1673 os_memcpy(sm->xxkey, psk, PMK_LEN); [all...] |
H A D | wps_hostapd.c | 96 if (psk_len != PMK_LEN) { 107 os_memcpy(p->psk, psk, PMK_LEN); 114 char hex[PMK_LEN * 2 + 1]; 913 wps->network_key = os_malloc(2 * PMK_LEN + 1); 918 wpa_snprintf_hex((char *) wps->network_key, 2 * PMK_LEN + 1, 919 conf->ssid.wpa_psk->psk, PMK_LEN); 920 wps->network_key_len = 2 * PMK_LEN; 933 os_memcpy(wps->psk, conf->ssid.wpa_psk->psk, PMK_LEN);
|
/freebsd-10.1-release/contrib/wpa/wpa_supplicant/ |
H A D | ibss_rsn.h | 32 u8 psk[PMK_LEN];
|
H A D | wpas_glue.c | 224 u8 pmk[PMK_LEN]; 250 pmk_len = PMK_LEN; 253 u8 buf[2 * PMK_LEN]; 256 res = eapol_sm_get_key(eapol, buf, 2 * PMK_LEN); 258 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN); 265 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
|
H A D | eapol_test.c | 62 u8 authenticator_pmk[PMK_LEN]; 337 u8 pmk[PMK_LEN]; 340 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { 341 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); 342 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) { 345 e->authenticator_pmk, PMK_LEN); 722 keys->recv_len > PMK_LEN ? PMK_LEN :
|
H A D | ibss_rsn.c | 208 wpa_sm_set_pmk(peer->supp, psk, PMK_LEN); 655 os_memcpy(ibss_rsn->psk, psk, PMK_LEN);
|
H A D | wpa_supplicant.c | 1155 wpa_sm_set_pmk(wpa_s->wpa, ssid->psk, PMK_LEN); 1159 u8 psk[PMK_LEN]; 1161 4096, psk, PMK_LEN); 1163 psk, PMK_LEN); 1164 wpa_sm_set_pmk(wpa_s->wpa, psk, PMK_LEN); 1172 u8 psk[PMK_LEN]; 1195 4096, psk, PMK_LEN); 1199 psk, PMK_LEN); 1200 wpa_sm_set_pmk(wpa_s->wpa, psk, PMK_LEN); 1203 if (wpabuf_len(pw) == 2 * PMK_LEN) { [all...] |
H A D | config.c | 331 if (hexstr2bin(value, ssid->psk, PMK_LEN) || 332 value[PMK_LEN * 2] != '\0') { 342 wpa_hexdump_key(MSG_MSGDUMP, "PSK", ssid->psk, PMK_LEN); 368 return wpa_config_write_string_hex(ssid->psk, PMK_LEN); 2274 ssid->psk, PMK_LEN); 2276 ssid->psk, PMK_LEN);
|
/freebsd-10.1-release/contrib/wpa/src/rsn_supp/ |
H A D | peerkey.h | 23 u8 smk[PMK_LEN];
|
H A D | pmksa_cache.h | 18 u8 pmk[PMK_LEN];
|
H A D | wpa_i.h | 22 u8 pmk[PMK_LEN]; 107 u8 xxkey[PMK_LEN]; /* PSK or the second 256 bits of MSK */ 109 u8 pmk_r0[PMK_LEN]; 111 u8 pmk_r1[PMK_LEN];
|
H A D | peerkey.c | 320 hmac_sha256_vector(smk, PMK_LEN, 5, addr, len, hash); 323 hmac_sha1_vector(smk, PMK_LEN, 5, addr, len, hash); 446 if (os_memcmp(kde->smk + PMK_LEN, peerkey->pnonce, WPA_NONCE_LEN) != 0) 488 if (os_memcmp(kde->smk + PMK_LEN, peerkey->inonce, WPA_NONCE_LEN) != 0) 546 kde.smk == NULL || kde.smk_len < PMK_LEN + WPA_NONCE_LEN || 576 os_memcpy(peerkey->smk, kde.smk, PMK_LEN); 578 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", peerkey->smk, PMK_LEN); 709 wpa_pmk_to_ptk(peerkey->smk, PMK_LEN, "Peer key expansion", 942 wpa_pmk_to_ptk(peerkey->smk, PMK_LEN, "Peer key expansion",
|
H A D | preauth.c | 77 u8 pmk[PMK_LEN]; 81 pmk_len = PMK_LEN; 82 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
|
H A D | wpa.c | 172 pmk_len = PMK_LEN; 173 res = eapol_sm_get_key(sm->eapol, sm->pmk, PMK_LEN); 183 u8 buf[2 * PMK_LEN]; 184 if (eapol_sm_get_key(sm->eapol, buf, 2 * PMK_LEN) == 0) 186 os_memcpy(sm->xxkey, buf + PMK_LEN, PMK_LEN); 187 sm->xxkey_len = PMK_LEN; 2151 sm->pmk_len = PMK_LEN; 2152 os_memset(sm->pmk, 0, PMK_LEN);
|
H A D | wpa_ft.c | 38 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R0", sm->pmk_r0, PMK_LEN); 43 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", sm->pmk_r1, PMK_LEN); 473 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", sm->pmk_r1, PMK_LEN);
|
/freebsd-10.1-release/contrib/wpa/wpa_supplicant/tests/ |
H A D | test_wpa.c | 27 u8 psk[PMK_LEN]; 198 wpa_sm_set_pmk(wpa->supp, wpa->psk, PMK_LEN); 343 os_memset(wpa.psk, 0x44, PMK_LEN);
|
/freebsd-10.1-release/contrib/wpa/src/common/ |
H A D | wpa_common.c | 740 os_memcpy(pmk_r0, r0_key_data, PMK_LEN); 747 addr[1] = r0_key_data + PMK_LEN; 804 sha256_prf(pmk_r0, PMK_LEN, "FT-R1", buf, pos - buf, pmk_r1, PMK_LEN); 839 sha256_prf(pmk_r1, PMK_LEN, "FT-PTK", buf, pos - buf, ptk, ptk_len);
|