Home
last modified time | relevance | path

Searched refs:pmk (Results 1 – 25 of 33) sorted by relevance

12

/dragonfly/contrib/wpa_supplicant/src/rsn_supp/
H A Dpmksa_cache.c131 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, in pmksa_cache_add() argument
148 os_memcpy(entry->pmk, pmk, pmk_len); in pmksa_cache_add()
157 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_add()
187 os_memcmp_const(pos->pmk, entry->pmk, in pmksa_cache_add_entry()
215 pos->pmk, pos->pmk_len); in pmksa_cache_add_entry()
270 entry->pmk, entry->pmk_len); in pmksa_cache_add_entry()
284 const u8 *pmk, size_t pmk_len) in pmksa_cache_flush() argument
293 (pmk == NULL || in pmksa_cache_flush()
295 os_memcmp(pmk, entry->pmk, pmk_len) == 0))) { in pmksa_cache_flush()
375 new_entry = pmksa_cache_add(pmksa, old_entry->pmk, old_entry->pmk_len, in pmksa_cache_clone_entry()
H A Dpmksa_cache.h18 u8 pmk[PMK_LEN_MAX]; member
69 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
86 const u8 *pmk, size_t pmk_len);
135 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, in pmksa_cache_add() argument
159 const u8 *pmk, size_t pmk_len) in pmksa_cache_flush() argument
H A Dpreauth.c78 u8 pmk[PMK_LEN]; in rsn_preauth_eapol_cb() local
83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); in rsn_preauth_eapol_cb()
89 res = eapol_sm_get_key(eapol, pmk, 16); in rsn_preauth_eapol_cb()
94 pmk, pmk_len); in rsn_preauth_eapol_cb()
96 pmksa_cache_add(sm->pmksa, pmk, pmk_len, NULL, in rsn_preauth_eapol_cb()
346 NULL, p->pmk, p->pmk_len); in rsn_preauth_candidate_process()
H A Dwpa_i.h21 u8 pmk[PMK_LEN_MAX]; member
249 const u8 *cache_id, const u8 *pmk, in wpa_sm_add_pmkid() argument
254 cache_id, pmk, pmk_len); in wpa_sm_add_pmkid()
389 const u8 *pmk, size_t pmk_len) in wpa_sm_key_mgmt_set_pmk() argument
393 return sm->ctx->key_mgmt_set_pmk(sm->ctx->ctx, pmk, pmk_len); in wpa_sm_key_mgmt_set_pmk()
H A Dwpa.c289 sm->pmk, sm->pmk_len); in wpa_supplicant_get_pmk()
372 "machines", sm->pmk, pmk_len); in wpa_supplicant_get_pmk()
379 sm->pmk, pmk_len, NULL, in wpa_supplicant_get_pmk()
2618 os_memcmp(sm->pmk, entry->pmk, sm->pmk_len) == 0)) { in wpa_sm_pmksa_free_cb()
2627 os_memset(sm->pmk, 0, sizeof(sm->pmk)); in wpa_sm_pmksa_free_cb()
2838 pmk, pmk_len); in wpa_sm_set_pmk()
2840 os_memcpy(sm->pmk, pmk, pmk_len); in wpa_sm_set_pmk()
2845 os_memcpy(sm->xxkey, pmk, pmk_len); in wpa_sm_set_pmk()
2873 os_memcpy(sm->pmk, sm->cur_pmksa->pmk, sm->pmk_len); in wpa_sm_set_pmk_from_pmksa()
3373 os_memset(sm->pmk, 0, sizeof(sm->pmk)); in wpa_sm_drop_sa()
[all …]
H A Dwpa.h44 const u8 *pmk, size_t pmk_len);
83 int (*key_mgmt_set_pmk)(void *ctx, const u8 *pmk, size_t pmk_len);
124 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len,
163 void wpa_sm_pmksa_cache_add(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len,
202 static inline void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, in wpa_sm_set_pmk() argument
/dragonfly/contrib/wpa_supplicant/src/ap/
H A Dpmksa_cache_auth.c280 const u8 *pmk, size_t pmk_len, const u8 *pmkid, in pmksa_cache_auth_add() argument
287 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len, in pmksa_cache_auth_add()
315 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid, in pmksa_cache_auth_create_entry() argument
332 os_memcpy(entry->pmk, pmk, pmk_len); in pmksa_cache_auth_create_entry()
341 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_auth_create_entry()
404 os_memcpy(entry->pmk, old_entry->pmk, old_entry->pmk_len); in pmksa_cache_add_okc()
519 rsn_pmkid(entry->pmk, entry->pmk_len, aa, spa, new_pmkid, in pmksa_cache_get_okc()
715 pos += wpa_snprintf_hex(pos, end - pos, entry->pmk, in pmksa_cache_auth_list_mesh()
H A Dpmksa_cache_auth.h20 u8 pmk[PMK_LEN_MAX]; member
52 const u8 *pmk, size_t pmk_len, const u8 *pmkid,
57 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid,
H A Dwpa_auth.h366 int wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk,
370 const u8 *pmk, size_t len, const u8 *sta_addr,
374 const u8 *pmk, const u8 *pmkid);
377 const u8 *pmk, size_t pmk_len, const u8 *pmkid,
387 wpa_auth_pmksa_create_entry(const u8 *aa, const u8 *spa, const u8 *pmk,
400 u8 *pmkid, u8 *pmk);
445 int fils_auth_pmk_to_ptk(struct wpa_state_machine *sm, const u8 *pmk,
473 void wpa_auth_add_fils_pmk_pmkid(struct wpa_state_machine *sm, const u8 *pmk,
H A Dwpa_auth.c879 const u8 *pmk = NULL; in wpa_try_alt_snonce() local
890 if (pmk == NULL) in wpa_try_alt_snonce()
899 pmk = sm->PMK; in wpa_try_alt_snonce()
908 if (sm->PMK != pmk) { in wpa_try_alt_snonce()
2812 const u8 *pmk = NULL; in SM_STATE() local
2839 if (pmk == NULL) in SM_STATE()
2849 pmk = sm->PMK; in SM_STATE()
2855 pmk = sm->pmksa->pmk; in SM_STATE()
2866 if (sm->PMK != pmk) { in SM_STATE()
4375 pmk = pmk + PMK_LEN; in wpa_auth_pmksa_add()
[all …]
H A Dctrl_iface_ap.c898 u8 pmk[PMK_LEN_MAX]; in hostapd_ctrl_iface_pmksa_add() local
929 hexstr2bin(pos, pmk, pmk_len) < 0) in hostapd_ctrl_iface_pmksa_add()
937 return wpa_auth_pmksa_add2(hapd->wpa_auth, spa, pmk, pmk_len, in hostapd_ctrl_iface_pmksa_add()
956 u8 pmk[PMK_LEN_MAX]; in hostapd_ctrl_iface_pmksa_create_entry() local
981 if (hexstr2bin(pos, pmk, PMK_LEN) < 0) in hostapd_ctrl_iface_pmksa_create_entry()
992 return wpa_auth_pmksa_create_entry(aa, spa, pmk, pmkid, expiration); in hostapd_ctrl_iface_pmksa_create_entry()
H A Dsta_info.c1197 const u8 *pmk; in ap_sta_wpa_get_keyid() local
1202 pmk = wpa_auth_get_pmk(sta->wpa_sm, &pmk_len); in ap_sta_wpa_get_keyid()
1203 if (!pmk || pmk_len != PMK_LEN) in ap_sta_wpa_get_keyid()
1207 if (os_memcmp(pmk, psk->psk, PMK_LEN) == 0) in ap_sta_wpa_get_keyid()
H A Dieee802_11.c758 sta->sae->pmk, sta->sae->pmkid); in sae_accept_sta()
1682 const u8 *pmk = NULL; in prepare_auth_resp_fils() local
1804 pmk = pmk_buf; in prepare_auth_resp_fils()
1827 wpa_auth_add_fils_pmk_pmkid(sta->wpa_sm, pmk, pmk_len, in prepare_auth_resp_fils()
1832 pmk, pmk_len, in prepare_auth_resp_fils()
1841 pmk = pmksa->pmk; in prepare_auth_resp_fils()
1845 if (!pmk) { in prepare_auth_resp_fils()
1853 if (fils_auth_pmk_to_ptk(sta->wpa_sm, pmk, pmk_len, in prepare_auth_resp_fils()
H A Dwpa_auth_ft.c2105 mpmk = sm->pmksa->pmk; in wpa_auth_derive_ptk_ft()
2674 const u8 *pmk = NULL; in wpa_ft_psk_pmk_r1() local
2689 pmk = wpa_ft_get_psk(wpa_auth, sm->addr, sm->p2p_dev_addr, in wpa_ft_psk_pmk_r1()
2690 pmk); in wpa_ft_psk_pmk_r1()
2691 if (pmk == NULL) in wpa_ft_psk_pmk_r1()
2694 if (wpa_derive_pmk_r0(pmk, PMK_LEN, ssid, ssid_len, mdid, r0kh, in wpa_ft_psk_pmk_r1()
2709 os_memcpy(sm->PMK, pmk, PMK_LEN); in wpa_ft_psk_pmk_r1()
H A Dwpa_auth_glue.c269 return sta->sae->pmk; in hostapd_wpa_auth_get_psk()
292 return sa->pmk; in hostapd_wpa_auth_get_psk()
/dragonfly/contrib/wpa_supplicant/wpa_supplicant/
H A Dwpas_glue.c276 u8 pmk[PMK_LEN]; in wpa_supplicant_eapol_cb() local
316 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN); in wpa_supplicant_eapol_cb()
323 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); in wpa_supplicant_eapol_cb()
329 res = eapol_sm_get_key(eapol, pmk, 16); in wpa_supplicant_eapol_cb()
341 "handshake", pmk, pmk_len); in wpa_supplicant_eapol_cb()
343 if (wpa_drv_set_key(wpa_s, WPA_ALG_PMK, NULL, 0, 0, NULL, 0, pmk, in wpa_supplicant_eapol_cb()
546 const u8 *pmk, size_t pmk_len) in wpa_supplicant_add_pmkid() argument
566 params.pmk = pmk; in wpa_supplicant_add_pmkid()
1152 static int wpa_supplicant_key_mgmt_set_pmk(void *ctx, const u8 *pmk, in wpa_supplicant_key_mgmt_set_pmk() argument
1160 NULL, 0, pmk, pmk_len); in wpa_supplicant_key_mgmt_set_pmk()
H A Dmesh_rsn.c95 return sta->sae->pmk; in auth_get_psk()
390 sta->sae->pmkid, sta->sae->pmk); in mesh_rsn_auth_sae_sta()
449 sha256_prf(sta->sae->pmk, sizeof(sta->sae->pmk), "AEK Derivation", in mesh_rsn_derive_aek()
510 sha256_prf(sta->sae->pmk, SAE_PMK_LEN, in mesh_rsn_derive_mtk()
H A Deapol_test.c363 u8 pmk[PMK_LEN]; in eapol_test_compare_pmk() local
368 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { in eapol_test_compare_pmk()
369 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); in eapol_test_compare_pmk()
370 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) { in eapol_test_compare_pmk()
377 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) { in eapol_test_compare_pmk()
378 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16); in eapol_test_compare_pmk()
379 if (os_memcmp(pmk, e->authenticator_pmk, 16) != 0) { in eapol_test_compare_pmk()
H A Dpreauth_test.c149 const u8 *pmk, size_t pmk_len) in wpa_supplicant_add_pmkid() argument
/dragonfly/contrib/wpa_supplicant/src/common/
H A Dwpa_common.c406 if (sha384_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk()
415 if (sha256_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk()
424 if (sha256_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk()
429 if (sha384_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk()
434 if (sha512_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk()
455 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len); in wpa_pmk_to_ptk()
479 size_t dh_ss_len, u8 *pmk, size_t *pmk_len) in fils_rmsk_to_pmk() argument
514 addr, len, pmk); in fils_rmsk_to_pmk()
517 addr, len, pmk); in fils_rmsk_to_pmk()
616 if (sha384_prf(pmk, pmk_len, label, data, data_len, in fils_pmk_to_ptk()
[all …]
H A Dcommon_module_tests.c315 const u8 pmk[] = { in sae_tests() local
389 if (os_memcmp(pmk, sae.pmk, SAE_PMK_LEN) != 0) { in sae_tests()
H A Dwpa_common.h347 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label,
354 size_t dh_ss_len, u8 *pmk, size_t *pmk_len);
357 int fils_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const u8 *spa, const u8 *aa,
413 void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa,
H A Dsae.h55 u8 pmk[SAE_PMK_LEN]; member
H A Ddpp.h260 u8 pmk[PMK_LEN_MAX]; member
H A Dsae.c727 os_memcpy(sae->pmk, keys + SAE_KCK_LEN, SAE_PMK_LEN); in sae_derive_keys()
731 wpa_hexdump_key(MSG_DEBUG, "SAE: PMK", sae->pmk, SAE_PMK_LEN); in sae_derive_keys()

12