/external/wpa_supplicant_8/src/ap/ |
D | peerkey_auth.c | 151 2 + RSN_SELECTOR_LEN + PMK_LEN + WPA_NONCE_LEN + in wpa_send_smk_m4() 166 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN, in wpa_send_smk_m4() 205 2 + RSN_SELECTOR_LEN + PMK_LEN + WPA_NONCE_LEN + in wpa_send_smk_m5() 223 pos = wpa_add_kde(pos, RSN_KEY_DATA_SMK, smk, PMK_LEN, in wpa_send_smk_m5() 279 if (random_get_bytes(smk, PMK_LEN)) { in wpa_smk_m3() 295 sha256_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf), in wpa_smk_m3() 296 smk, PMK_LEN); in wpa_smk_m3() 298 sha1_prf(smk, PMK_LEN, "SMK Derivation", buf, sizeof(buf), in wpa_smk_m3() 299 smk, PMK_LEN); in wpa_smk_m3() 302 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", smk, PMK_LEN); in wpa_smk_m3()
|
D | wpa_auth_ft.c | 158 u8 pmk_r0[PMK_LEN]; 168 u8 pmk_r1[PMK_LEN]; 199 os_memset(r0prev->pmk_r0, 0, PMK_LEN); in wpa_ft_pmk_cache_deinit() 207 os_memset(r1prev->pmk_r1, 0, PMK_LEN); in wpa_ft_pmk_cache_deinit() 228 os_memcpy(r0->pmk_r0, pmk_r0, PMK_LEN); in wpa_ft_store_pmk_r0() 252 os_memcpy(pmk_r0, r0->pmk_r0, PMK_LEN); in wpa_ft_fetch_pmk_r0() 278 os_memcpy(r1->pmk_r1, pmk_r1, PMK_LEN); in wpa_ft_store_pmk_r1() 302 os_memcpy(pmk_r1, r1->pmk_r1, PMK_LEN); in wpa_ft_fetch_pmk_r1() 378 u8 pmk_r0[PMK_LEN], pmk_r0_name[WPA_PMK_NAME_LEN]; in wpa_auth_derive_ptk_ft() 379 u8 pmk_r1[PMK_LEN]; in wpa_auth_derive_ptk_ft() [all …]
|
D | wpa_auth.h | 66 FT_R1KH_ID_LEN + ETH_ALEN + PMK_LEN + \ 78 u8 pmk_r1[PMK_LEN]; 86 WPA_PMK_NAME_LEN + PMK_LEN + \ 101 u8 pmk_r1[PMK_LEN];
|
D | preauth_auth.c | 205 if (len > PMK_LEN) in rsn_preauth_finished() 206 len = PMK_LEN; in rsn_preauth_finished()
|
D | wpa_auth.c | 854 pmk_len = PMK_LEN; in wpa_try_alt_snonce() 1914 u8 msk[2 * PMK_LEN]; in SM_STATE() 1915 size_t len = 2 * PMK_LEN; in SM_STATE() 1931 pmk_len = PMK_LEN; in SM_STATE() 1945 if (len >= 2 * PMK_LEN) { in SM_STATE() 1946 os_memcpy(sm->xxkey, msk + PMK_LEN, PMK_LEN); in SM_STATE() 1947 sm->xxkey_len = PMK_LEN; in SM_STATE() 1977 os_memcpy(sm->PMK, psk, PMK_LEN); in SM_STATE() 1978 sm->pmk_len = PMK_LEN; in SM_STATE() 1980 os_memcpy(sm->xxkey, psk, PMK_LEN); in SM_STATE() [all …]
|
D | ap_config.h | 134 #define PMK_LEN 32 macro 140 u8 psk[PMK_LEN]; 148 u8 psk[PMK_LEN];
|
D | wps_hostapd.c | 115 if (psk_len != PMK_LEN) { in hostapd_wps_new_psk_cb() 127 os_memcpy(p->psk, psk, PMK_LEN); in hostapd_wps_new_psk_cb() 139 char hex[PMK_LEN * 2 + 1]; in hostapd_wps_new_psk_cb() 370 bss->ssid.wpa_psk->psk, PMK_LEN) == 0) { in hapd_wps_reconfig_in_memory() 452 (cred->key_len < 8 || cred->key_len > 2 * PMK_LEN)) { in hapd_wps_cred_cb() 1104 wps->network_key = os_malloc(2 * PMK_LEN + 1); in hostapd_init_wps() 1107 wpa_snprintf_hex((char *) wps->network_key, 2 * PMK_LEN + 1, in hostapd_init_wps() 1108 conf->ssid.wpa_psk->psk, PMK_LEN); in hostapd_init_wps() 1109 wps->network_key_len = 2 * PMK_LEN; in hostapd_init_wps() 1120 os_memcpy(wps->psk, conf->ssid.wpa_psk->psk, PMK_LEN); in hostapd_init_wps()
|
D | ap_config.c | 281 if (len == 64 && hexstr2bin(pos, psk->psk, PMK_LEN) == 0) in hostapd_config_read_wpa_psk() 285 4096, psk->psk, PMK_LEN); in hostapd_config_read_wpa_psk() 320 4096, ssid->wpa_psk->psk, PMK_LEN); in hostapd_derive_psk() 322 ssid->wpa_psk->psk, PMK_LEN); in hostapd_derive_psk()
|
D | wpa_auth_i.h | 109 u8 xxkey[PMK_LEN]; /* PSK or the second 256 bits of MSK */
|
D | ieee802_11_auth.c | 469 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) { in decode_tunnel_passwords()
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | peerkey.c | 312 hmac_sha256_vector(smk, PMK_LEN, 5, addr, len, hash); in rsn_smkid() 315 hmac_sha1_vector(smk, PMK_LEN, 5, addr, len, hash); in rsn_smkid() 440 if (os_memcmp(kde->smk + PMK_LEN, peerkey->pnonce, WPA_NONCE_LEN) != 0) in wpa_supplicant_process_smk_m4() 482 if (os_memcmp(kde->smk + PMK_LEN, peerkey->inonce, WPA_NONCE_LEN) != 0) in wpa_supplicant_process_smk_m5() 534 kde.smk == NULL || kde.smk_len < PMK_LEN + WPA_NONCE_LEN || in wpa_supplicant_process_smk_m45() 564 os_memcpy(peerkey->smk, kde.smk, PMK_LEN); in wpa_supplicant_process_smk_m45() 566 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", peerkey->smk, PMK_LEN); in wpa_supplicant_process_smk_m45() 693 wpa_pmk_to_ptk(peerkey->smk, PMK_LEN, "Peer key expansion", in wpa_supplicant_process_stk_1_of_4() 927 wpa_pmk_to_ptk(peerkey->smk, PMK_LEN, "Peer key expansion", in peerkey_verify_eapol_key_mic()
|
D | wpa_i.h | 115 u8 xxkey[PMK_LEN]; /* PSK or the second 256 bits of MSK */ 117 u8 pmk_r0[PMK_LEN]; 119 u8 pmk_r1[PMK_LEN];
|
D | preauth.c | 78 u8 pmk[PMK_LEN]; in rsn_preauth_eapol_cb() 82 pmk_len = PMK_LEN; in rsn_preauth_eapol_cb() 83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); in rsn_preauth_eapol_cb()
|
D | peerkey.h | 23 u8 smk[PMK_LEN];
|
D | wpa_ft.c | 37 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R0", sm->pmk_r0, PMK_LEN); in wpa_derive_ptk_ft() 42 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", sm->pmk_r1, PMK_LEN); in wpa_derive_ptk_ft() 471 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", sm->pmk_r1, PMK_LEN); in wpa_ft_process_response()
|
D | wpa.c | 294 pmk_len = PMK_LEN; in wpa_supplicant_get_pmk() 297 if (pmk_len == PMK_LEN) { in wpa_supplicant_get_pmk() 307 u8 buf[2 * PMK_LEN]; in wpa_supplicant_get_pmk() 308 if (eapol_sm_get_key(sm->eapol, buf, 2 * PMK_LEN) == 0) in wpa_supplicant_get_pmk() 310 os_memcpy(sm->xxkey, buf + PMK_LEN, PMK_LEN); in wpa_supplicant_get_pmk() 311 sm->xxkey_len = PMK_LEN; in wpa_supplicant_get_pmk() 2597 sm->pmk_len = PMK_LEN; in wpa_sm_set_pmk_from_pmksa() 2598 os_memset(sm->pmk, 0, PMK_LEN); in wpa_sm_set_pmk_from_pmksa() 3432 if (res == PMK_LEN) { in fils_process_auth() 3433 rmsk_len = PMK_LEN; in fils_process_auth()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | wpas_glue.c | 274 u8 pmk[PMK_LEN]; in wpa_supplicant_eapol_cb() 306 pmk_len = PMK_LEN; in wpa_supplicant_eapol_cb() 309 u8 buf[2 * PMK_LEN]; in wpa_supplicant_eapol_cb() 312 res = eapol_sm_get_key(eapol, buf, 2 * PMK_LEN); in wpa_supplicant_eapol_cb() 314 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN); in wpa_supplicant_eapol_cb() 321 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); in wpa_supplicant_eapol_cb()
|
D | eapol_test.c | 61 u8 authenticator_pmk[PMK_LEN]; 362 u8 pmk[PMK_LEN]; in eapol_test_compare_pmk() 367 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { in eapol_test_compare_pmk() 368 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); in eapol_test_compare_pmk() 369 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) { in eapol_test_compare_pmk() 372 e->authenticator_pmk, PMK_LEN); in eapol_test_compare_pmk() 870 keys->recv_len > PMK_LEN ? PMK_LEN : in ieee802_1x_get_keys()
|
D | ibss_rsn.h | 50 u8 psk[PMK_LEN];
|
D | wpa_supplicant.c | 1386 wpa_sm_set_pmk(wpa_s->wpa, ssid->psk, PMK_LEN, NULL, in wpa_supplicant_set_suites() 1393 u8 psk[PMK_LEN]; in wpa_supplicant_set_suites() 1395 4096, psk, PMK_LEN); in wpa_supplicant_set_suites() 1397 psk, PMK_LEN); in wpa_supplicant_set_suites() 1398 wpa_sm_set_pmk(wpa_s->wpa, psk, PMK_LEN, NULL, NULL); in wpa_supplicant_set_suites() 1408 u8 psk[PMK_LEN]; in wpa_supplicant_set_suites() 1431 4096, psk, PMK_LEN); in wpa_supplicant_set_suites() 1435 psk, PMK_LEN); in wpa_supplicant_set_suites() 1436 wpa_sm_set_pmk(wpa_s->wpa, psk, PMK_LEN, NULL, in wpa_supplicant_set_suites() 1442 if (wpabuf_len(pw) == 2 * PMK_LEN) { in wpa_supplicant_set_suites() [all …]
|
D | ibss_rsn.c | 234 wpa_sm_set_pmk(peer->supp, psk, PMK_LEN, NULL, NULL); in ibss_rsn_supp_init() 829 os_memcpy(ibss_rsn->psk, psk, PMK_LEN); in ibss_rsn_set_psk()
|
D | config.c | 506 if (hexstr2bin(value, ssid->psk, PMK_LEN) || in wpa_config_parse_psk() 507 value[PMK_LEN * 2] != '\0') { in wpa_config_parse_psk() 517 wpa_hexdump_key(MSG_MSGDUMP, "PSK", ssid->psk, PMK_LEN); in wpa_config_parse_psk() 549 return wpa_config_write_string_hex(ssid->psk, PMK_LEN); in wpa_config_write_psk() 1770 if (hexstr2bin(pos, p->psk, PMK_LEN) || pos[PMK_LEN * 2] != '\0') { in wpa_config_parse_psk_list() 2865 ssid->psk, PMK_LEN); in wpa_config_update_psk() 2867 ssid->psk, PMK_LEN); in wpa_config_update_psk()
|
D | wps_supplicant.c | 418 if (cred->key_len < 8 || cred->key_len > 2 * PMK_LEN) { in wpa_supplicant_wps_cred() 525 if (cred->key_len == 2 * PMK_LEN) { in wpa_supplicant_wps_cred() 527 PMK_LEN)) { in wpa_supplicant_wps_cred() 534 } else if (cred->key_len >= 8 && cred->key_len < 2 * PMK_LEN) { in wpa_supplicant_wps_cred()
|
/external/wpa_supplicant_8/src/common/ |
D | wpa_common.c | 1143 os_memcpy(pmk_r0, r0_key_data, PMK_LEN); in wpa_derive_pmk_r0() 1150 addr[1] = r0_key_data + PMK_LEN; in wpa_derive_pmk_r0() 1211 if (sha256_prf(pmk_r0, PMK_LEN, "FT-R1", buf, pos - buf, in wpa_derive_pmk_r1() 1212 pmk_r1, PMK_LEN) < 0) in wpa_derive_pmk_r1() 1256 if (sha256_prf(pmk_r1, PMK_LEN, "FT-PTK", buf, pos - buf, in wpa_pmk_r1_to_ptk()
|
D | wpa_common.h | 14 #define PMK_LEN 32 macro
|