/external/wpa_supplicant_8/src/rsn_supp/ |
D | pmksa_cache.h | 18 u8 pmk[PMK_LEN]; member 59 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 71 const u8 *pmk, size_t pmk_len); 107 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, in pmksa_cache_add() argument 128 const u8 *pmk, size_t pmk_len) in pmksa_cache_flush() argument
|
D | pmksa_cache.c | 126 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, in pmksa_cache_add() argument 142 os_memcpy(entry->pmk, pmk, pmk_len); in pmksa_cache_add() 149 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, in pmksa_cache_add() 166 os_memcmp_const(pos->pmk, pmk, pmk_len) == 0 && in pmksa_cache_add() 192 pmksa_cache_flush(pmksa, network_ctx, pos->pmk, in pmksa_cache_add() 259 const u8 *pmk, size_t pmk_len) in pmksa_cache_flush() argument 268 (pmk == NULL || in pmksa_cache_flush() 270 os_memcmp(pmk, entry->pmk, pmk_len) == 0))) { in pmksa_cache_flush() 346 new_entry = pmksa_cache_add(pmksa, old_entry->pmk, old_entry->pmk_len, in pmksa_cache_clone_entry()
|
D | preauth.c | 78 u8 pmk[PMK_LEN]; in rsn_preauth_eapol_cb() local 83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); in rsn_preauth_eapol_cb() 89 res = eapol_sm_get_key(eapol, pmk, 16); in rsn_preauth_eapol_cb() 94 pmk, pmk_len); in rsn_preauth_eapol_cb() 96 pmksa_cache_add(sm->pmksa, pmk, pmk_len, in rsn_preauth_eapol_cb()
|
D | wpa.c | 165 if (wpa_sm_key_mgmt_set_pmk(sm, sm->pmk, sm->pmk_len)) in wpa_supplicant_key_mgmt_set_pmk() 202 sm->pmk, sm->pmk_len); in wpa_supplicant_get_pmk() 210 res = eapol_sm_get_key(sm->eapol, sm->pmk, PMK_LEN); in wpa_supplicant_get_pmk() 216 res = eapol_sm_get_key(sm->eapol, sm->pmk, 16); in wpa_supplicant_get_pmk() 232 "machines", sm->pmk, pmk_len); in wpa_supplicant_get_pmk() 239 sm->pmk, pmk_len, in wpa_supplicant_get_pmk() 416 return wpa_pmk_to_ptk(sm->pmk, sm->pmk_len, "Pairwise key expansion", in wpa_derive_ptk() 1239 sa = pmksa_cache_add(sm->pmksa, sm->pmk, sm->pmk_len, in wpa_supplicant_process_3_of_4() 2148 os_memcmp(sm->pmk, entry->pmk, sm->pmk_len) == 0)) { in wpa_sm_pmksa_free_cb() 2156 os_memset(sm->pmk, 0, sizeof(sm->pmk)); in wpa_sm_pmksa_free_cb() [all …]
|
D | wpa_i.h | 22 u8 pmk[PMK_LEN]; member 343 const u8 *pmk, size_t pmk_len) in wpa_sm_key_mgmt_set_pmk() argument 349 return sm->ctx->key_mgmt_set_pmk(sm->ctx->ctx, pmk, pmk_len); in wpa_sm_key_mgmt_set_pmk()
|
D | wpa.h | 79 int (*key_mgmt_set_pmk)(void *ctx, const u8 *pmk, size_t pmk_len); 115 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, 182 static inline void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, in wpa_sm_set_pmk() argument
|
/external/wpa_supplicant_8/src/ap/ |
D | pmksa_cache_auth.c | 253 const u8 *pmk, size_t pmk_len, in pmksa_cache_auth_add() argument 270 os_memcpy(entry->pmk, pmk, pmk_len); in pmksa_cache_auth_add() 277 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, in pmksa_cache_auth_add() 320 os_memcpy(entry->pmk, old_entry->pmk, old_entry->pmk_len); in pmksa_cache_add_okc() 429 rsn_pmkid(entry->pmk, entry->pmk_len, aa, spa, new_pmkid, in pmksa_cache_get_okc()
|
D | pmksa_cache_auth.h | 20 u8 pmk[PMK_LEN]; member 52 const u8 *pmk, size_t pmk_len,
|
D | wpa_auth.c | 47 const u8 *pmk, struct wpa_ptk *ptk); 829 const u8 *pmk = NULL; in wpa_try_alt_snonce() local 833 pmk = wpa_auth_get_psk(sm->wpa_auth, sm->addr, in wpa_try_alt_snonce() 834 sm->p2p_dev_addr, pmk); in wpa_try_alt_snonce() 835 if (pmk == NULL) in wpa_try_alt_snonce() 838 pmk = sm->PMK; in wpa_try_alt_snonce() 840 wpa_derive_ptk(sm, sm->alt_SNonce, pmk, &PTK); in wpa_try_alt_snonce() 1893 os_memcpy(sm->PMK, sm->pmksa->pmk, PMK_LEN); in SM_STATE() 1995 const u8 *pmk, struct wpa_ptk *ptk) in wpa_derive_ptk() argument 1999 return wpa_auth_derive_ptk_ft(sm, pmk, ptk); in wpa_derive_ptk() [all …]
|
D | wpa_auth.h | 277 int wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk, 280 const u8 *pmk, size_t len, const u8 *sta_addr, 284 const u8 *pmk);
|
D | wpa_auth_i.h | 252 int wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, const u8 *pmk,
|
D | wpa_auth_glue.c | 228 return sta->sae->pmk; in hostapd_wpa_auth_get_psk()
|
D | wpa_auth_ft.c | 364 int wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, const u8 *pmk, in wpa_auth_derive_ptk_ft() argument
|
D | ieee802_11.c | 663 sta->sae->pmk); in sae_sm_step()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | mesh_rsn.c | 93 return sta->sae->pmk; in auth_get_psk() 330 rsn_pmkid(sta->sae->pmk, PMK_LEN, rsn->wpa_s->own_addr, in mesh_rsn_get_pmkid() 354 sha256_prf(sta->sae->pmk, sizeof(sta->sae->pmk), "AEK Derivation", in mesh_rsn_derive_aek() 409 sha256_prf(sta->sae->pmk, sizeof(sta->sae->pmk), in mesh_rsn_derive_mtk()
|
D | wpas_glue.c | 273 u8 pmk[PMK_LEN]; in wpa_supplicant_eapol_cb() local 313 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN); in wpa_supplicant_eapol_cb() 320 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); in wpa_supplicant_eapol_cb() 326 res = eapol_sm_get_key(eapol, pmk, 16); in wpa_supplicant_eapol_cb() 338 "handshake", pmk, pmk_len); in wpa_supplicant_eapol_cb() 340 if (wpa_drv_set_key(wpa_s, WPA_ALG_PMK, NULL, 0, 0, NULL, 0, pmk, in wpa_supplicant_eapol_cb() 1019 static int wpa_supplicant_key_mgmt_set_pmk(void *ctx, const u8 *pmk, in wpa_supplicant_key_mgmt_set_pmk() argument 1027 NULL, 0, pmk, pmk_len); in wpa_supplicant_key_mgmt_set_pmk()
|
D | eapol_test.c | 347 u8 pmk[PMK_LEN]; in eapol_test_compare_pmk() local 352 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { in eapol_test_compare_pmk() 353 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); in eapol_test_compare_pmk() 354 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) { in eapol_test_compare_pmk() 361 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) { in eapol_test_compare_pmk() 362 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16); in eapol_test_compare_pmk() 363 if (os_memcmp(pmk, e->authenticator_pmk, 16) != 0) { in eapol_test_compare_pmk()
|
D | mesh_mpm.c | 27 const u8 *pmk; member 78 mpm_ie->pmk = ie + len - 16; in mesh_mpm_parse_peer_mgmt()
|
D | sme.c | 798 wpa_sm_set_pmk(wpa_s->wpa, wpa_s->sme.sae.pmk, PMK_LEN, in sme_event_auth()
|
/external/wpa_supplicant_8/src/common/ |
D | wpa_common.c | 141 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, in wpa_pmk_to_ptk() argument 175 sha256_prf(pmk, pmk_len, label, data, sizeof(data), in wpa_pmk_to_ptk() 179 sha1_prf(pmk, pmk_len, label, data, sizeof(data), tmp, ptk_len); in wpa_pmk_to_ptk() 185 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len); in wpa_pmk_to_ptk() 1017 void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa, in rsn_pmkid() argument 1031 hmac_sha256_vector(pmk, pmk_len, 3, addr, len, hash); in rsn_pmkid() 1034 hmac_sha1_vector(pmk, pmk_len, 3, addr, len, hash); in rsn_pmkid()
|
D | sae.h | 47 u8 pmk[SAE_PMK_LEN]; member
|
D | wpa_common.h | 337 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, 381 void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa,
|
D | sae.c | 818 os_memcpy(sae->pmk, keys + SAE_KCK_LEN, SAE_PMK_LEN); in sae_derive_keys() 821 wpa_hexdump_key(MSG_DEBUG, "SAE: PMK", sae->pmk, SAE_PMK_LEN); in sae_derive_keys()
|
/external/svox/pico_resources/tools/LingwareBuilding/PicoLingware_source_files/pkb/en-GB/ |
D | en-GB_kh0_kpdf_mgc.pkb | 1206 …Ogen�����}M?W�� ��E�F}�G�����m�M�B�M��n��������,�c� pmk|����������j����w��f…
|
/external/chromium-trace/trace-viewer/tracing/test_data/ |
D | ddms_calculator_start.trace | 55844 ���pmkx�� 143263 ���pmk{�� 156443 �@�pmk k��
|