/external/wpa_supplicant_8/src/ap/ |
D | wps_hostapd.c | 115 if (psk_len != PMK_LEN) { in hostapd_wps_new_psk_cb() 127 os_memcpy(p->psk, psk, PMK_LEN); in hostapd_wps_new_psk_cb() 139 char hex[PMK_LEN * 2 + 1]; in hostapd_wps_new_psk_cb() 359 cred->key_len != 2 * PMK_LEN) { in hapd_wps_reconfig_in_memory() 382 bss->ssid.wpa_psk->psk, PMK_LEN) == 0) { in hapd_wps_reconfig_in_memory() 465 (cred->key_len < 8 || cred->key_len > 2 * PMK_LEN)) { in hapd_wps_cred_cb() 554 cred->key_len != 2 * PMK_LEN) { in hapd_wps_cred_cb() 1145 wps->network_key = os_malloc(2 * PMK_LEN + 1); in hostapd_init_wps() 1148 wpa_snprintf_hex((char *) wps->network_key, 2 * PMK_LEN + 1, in hostapd_init_wps() 1149 conf->ssid.wpa_psk->psk, PMK_LEN); in hostapd_init_wps() [all …]
|
D | preauth_auth.c | 205 if (len > PMK_LEN) in rsn_preauth_finished() 206 len = PMK_LEN; in rsn_preauth_finished()
|
D | ap_config.h | 136 #define PMK_LEN 32 macro 143 u8 psk[PMK_LEN]; 152 u8 psk[PMK_LEN];
|
D | wpa_auth.c | 1978 u8 msk[2 * PMK_LEN]; in SM_STATE() 1979 size_t len = 2 * PMK_LEN; in SM_STATE() 2003 pmk_len = PMK_LEN; in SM_STATE() 2017 if (len >= 2 * PMK_LEN) { in SM_STATE() 2022 os_memcpy(sm->xxkey, msk + PMK_LEN, PMK_LEN); in SM_STATE() 2023 sm->xxkey_len = PMK_LEN; in SM_STATE() 2060 os_memcpy(sm->xxkey, psk, PMK_LEN); in SM_STATE() 2061 sm->xxkey_len = PMK_LEN; in SM_STATE() 2221 size_t pmk_r0_len = use_sha384 ? SHA384_MAC_LEN : PMK_LEN; in fils_auth_pmk_to_ptk() 2969 os_memcpy(sm->PMK, pmk, PMK_LEN); in SM_STATE() [all …]
|
D | ap_config.c | 359 if (len == 64 && hexstr2bin(pos, psk->psk, PMK_LEN) == 0) in hostapd_config_read_wpa_psk() 363 4096, psk->psk, PMK_LEN); in hostapd_config_read_wpa_psk() 410 4096, ssid->wpa_psk->psk, PMK_LEN); in hostapd_derive_psk() 412 ssid->wpa_psk->psk, PMK_LEN); in hostapd_derive_psk()
|
D | wpa_auth_ft.c | 2057 SHA384_MAC_LEN : PMK_LEN; in wpa_ft_store_pmk_fils() 2082 SHA384_MAC_LEN : PMK_LEN; in wpa_auth_derive_ptk_ft() 2666 u8 pmk_r0[PMK_LEN], pmk_r0_name[WPA_PMK_NAME_LEN]; in wpa_ft_psk_pmk_r1() 2667 u8 pmk_r1[PMK_LEN], pmk_r1_name[WPA_PMK_NAME_LEN]; in wpa_ft_psk_pmk_r1() 2685 if (wpa_derive_pmk_r0(pmk, PMK_LEN, ssid, ssid_len, mdid, r0kh, in wpa_ft_psk_pmk_r1() 2688 wpa_derive_pmk_r1(pmk_r0, PMK_LEN, pmk_r0_name, r1kh, in wpa_ft_psk_pmk_r1() 2697 os_memcpy(out_pmk_r1, pmk_r1, PMK_LEN); in wpa_ft_psk_pmk_r1() 2700 os_memcpy(sm->PMK, pmk, PMK_LEN); in wpa_ft_psk_pmk_r1() 2701 sm->pmk_len = PMK_LEN; in wpa_ft_psk_pmk_r1() 2885 pmk_r1_len = use_sha384 ? SHA384_MAC_LEN : PMK_LEN; in wpa_ft_process_auth_req() [all …]
|
D | ctrl_iface_ap.c | 926 if (pmk_len < PMK_LEN || pmk_len > PMK_LEN_MAX || in hostapd_ctrl_iface_pmksa_add() 979 if (hexstr2bin(pos, pmk, PMK_LEN) < 0) in hostapd_ctrl_iface_pmksa_create_entry()
|
D | ieee802_11_auth.c | 479 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) { in decode_tunnel_passwords()
|
D | sta_info.c | 1190 if (!pmk || pmk_len != PMK_LEN) in ap_sta_wpa_get_keyid() 1194 if (os_memcmp(pmk, psk->psk, PMK_LEN) == 0) in ap_sta_wpa_get_keyid()
|
D | wpa_auth_glue.c | 259 *psk_len = PMK_LEN; in hostapd_wpa_auth_get_psk() 311 pos->psk, PMK_LEN); in hostapd_wpa_auth_get_psk()
|
D | dpp_hostapd.c | 626 char hex[PMK_LEN * 2 + 1]; in hostapd_dpp_handle_config_obj() 628 wpa_snprintf_hex(hex, sizeof(hex), auth->psk, PMK_LEN); in hostapd_dpp_handle_config_obj()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | wpas_glue.c | 276 u8 pmk[PMK_LEN]; in wpa_supplicant_eapol_cb() 308 pmk_len = PMK_LEN; in wpa_supplicant_eapol_cb() 311 u8 buf[2 * PMK_LEN]; in wpa_supplicant_eapol_cb() 314 res = eapol_sm_get_key(eapol, buf, 2 * PMK_LEN); in wpa_supplicant_eapol_cb() 316 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN); in wpa_supplicant_eapol_cb() 323 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); in wpa_supplicant_eapol_cb()
|
D | eapol_test.c | 61 u8 authenticator_pmk[PMK_LEN]; 362 u8 pmk[PMK_LEN]; in eapol_test_compare_pmk() 367 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { in eapol_test_compare_pmk() 368 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); in eapol_test_compare_pmk() 369 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) { in eapol_test_compare_pmk() 372 e->authenticator_pmk, PMK_LEN); in eapol_test_compare_pmk() 871 keys->recv_len > PMK_LEN ? PMK_LEN : in ieee802_1x_get_keys()
|
D | ibss_rsn.h | 50 u8 psk[PMK_LEN];
|
D | ibss_rsn.c | 234 wpa_sm_set_pmk(peer->supp, psk, PMK_LEN, NULL, NULL); in ibss_rsn_supp_init() 268 *psk_len = PMK_LEN; in auth_get_psk() 834 os_memcpy(ibss_rsn->psk, psk, PMK_LEN); in ibss_rsn_set_psk()
|
D | wpa_supplicant.c | 1587 ssid->psk, PMK_LEN); in wpa_supplicant_set_suites() 1588 wpa_sm_set_pmk(wpa_s->wpa, ssid->psk, PMK_LEN, NULL, in wpa_supplicant_set_suites() 1600 u8 psk[PMK_LEN]; in wpa_supplicant_set_suites() 1602 4096, psk, PMK_LEN); in wpa_supplicant_set_suites() 1604 psk, PMK_LEN); in wpa_supplicant_set_suites() 1605 wpa_sm_set_pmk(wpa_s->wpa, psk, PMK_LEN, NULL, NULL); in wpa_supplicant_set_suites() 1615 u8 psk[PMK_LEN]; in wpa_supplicant_set_suites() 1638 4096, psk, PMK_LEN); in wpa_supplicant_set_suites() 1642 psk, PMK_LEN); in wpa_supplicant_set_suites() 1643 wpa_sm_set_pmk(wpa_s->wpa, psk, PMK_LEN, NULL, in wpa_supplicant_set_suites() [all …]
|
D | config.c | 550 if (hexstr2bin(value, ssid->psk, PMK_LEN) || in wpa_config_parse_psk() 551 value[PMK_LEN * 2] != '\0') { in wpa_config_parse_psk() 561 wpa_hexdump_key(MSG_MSGDUMP, "PSK", ssid->psk, PMK_LEN); in wpa_config_parse_psk() 593 return wpa_config_write_string_hex(ssid->psk, PMK_LEN); in wpa_config_write_psk() 1937 if (hexstr2bin(pos, p->psk, PMK_LEN) || pos[PMK_LEN * 2] != '\0') { in wpa_config_parse_psk_list() 3150 ssid->psk, PMK_LEN); in wpa_config_update_psk() 3152 ssid->psk, PMK_LEN); in wpa_config_update_psk()
|
D | wps_supplicant.c | 421 if (cred->key_len < 8 || cred->key_len > 2 * PMK_LEN) { in wpa_supplicant_wps_cred() 534 cred->key_len != 2 * PMK_LEN) { in wpa_supplicant_wps_cred() 545 if (cred->key_len == 2 * PMK_LEN) { in wpa_supplicant_wps_cred() 547 PMK_LEN)) { in wpa_supplicant_wps_cred() 554 } else if (cred->key_len >= 8 && cred->key_len < 2 * PMK_LEN) { in wpa_supplicant_wps_cred()
|
/external/wpa_supplicant_8/tests/ |
D | test-eapol.c | 25 u8 psk[PMK_LEN]; 331 wpa_sm_set_pmk(wpa->supp, wpa->psk, PMK_LEN, NULL, NULL); in supp_init() 406 *psk_len = PMK_LEN; in auth_get_psk() 576 os_memset(wpa.psk, 0x44, PMK_LEN); in main()
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | preauth.c | 78 u8 pmk[PMK_LEN]; in rsn_preauth_eapol_cb() 82 pmk_len = PMK_LEN; in rsn_preauth_eapol_cb() 83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); in rsn_preauth_eapol_cb()
|
D | wpa.c | 295 sm->pmk_len == PMK_LEN) { in wpa_supplicant_get_pmk() 312 pmk_len = PMK_LEN; in wpa_supplicant_get_pmk() 315 if (pmk_len == PMK_LEN) { in wpa_supplicant_get_pmk() 325 u8 buf[2 * PMK_LEN]; in wpa_supplicant_get_pmk() 326 if (eapol_sm_get_key(sm->eapol, buf, 2 * PMK_LEN) == 0) in wpa_supplicant_get_pmk() 333 os_memcpy(sm->xxkey, buf + PMK_LEN, in wpa_supplicant_get_pmk() 334 PMK_LEN); in wpa_supplicant_get_pmk() 335 sm->xxkey_len = PMK_LEN; in wpa_supplicant_get_pmk() 3842 if (res == PMK_LEN) { in fils_process_auth() 3843 rmsk_len = PMK_LEN; in fils_process_auth() [all …]
|
/external/wpa_supplicant_8/src/common/ |
D | wpa_common.c | 1573 if (xxkey_len != PMK_LEN) { in wpa_derive_pmk_r0() 1576 (int) xxkey_len, PMK_LEN); in wpa_derive_pmk_r0() 1674 if (pmk_r0_len == PMK_LEN && in wpa_derive_pmk_r1() 1678 if (pmk_r0_len != SHA384_MAC_LEN && pmk_r0_len != PMK_LEN) { in wpa_derive_pmk_r1() 1731 ptk->kck_len = wpa_kck_len(akmp, PMK_LEN); in wpa_pmk_r1_to_ptk() 1733 ptk->kek_len = wpa_kek_len(akmp, PMK_LEN); in wpa_pmk_r1_to_ptk() 1753 if (pmk_r1_len != PMK_LEN) { in wpa_pmk_r1_to_ptk() 1756 (int) pmk_r1_len, PMK_LEN); in wpa_pmk_r1_to_ptk()
|
D | dpp.h | 233 u8 psk[PMK_LEN];
|
D | wpa_common.h | 14 #define PMK_LEN 32 macro
|
/external/wpa_supplicant_8/src/drivers/ |
D | driver_wext.c | 1691 ext = os_zalloc(sizeof(*ext) + PMK_LEN); in wpa_driver_wext_set_psk() 1696 iwr.u.encoding.length = sizeof(*ext) + PMK_LEN; in wpa_driver_wext_set_psk() 1697 ext->key_len = PMK_LEN; in wpa_driver_wext_set_psk()
|