/dragonfly/contrib/wpa_supplicant/src/rsn_supp/ |
H A D | pmksa_cache.c | 131 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, in pmksa_cache_add() argument 148 os_memcpy(entry->pmk, pmk, pmk_len); in pmksa_cache_add() 157 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_add() 187 os_memcmp_const(pos->pmk, entry->pmk, in pmksa_cache_add_entry() 215 pos->pmk, pos->pmk_len); in pmksa_cache_add_entry() 270 entry->pmk, entry->pmk_len); in pmksa_cache_add_entry() 284 const u8 *pmk, size_t pmk_len) in pmksa_cache_flush() argument 293 (pmk == NULL || in pmksa_cache_flush() 295 os_memcmp(pmk, entry->pmk, pmk_len) == 0))) { in pmksa_cache_flush() 375 new_entry = pmksa_cache_add(pmksa, old_entry->pmk, old_entry->pmk_len, in pmksa_cache_clone_entry()
|
H A D | pmksa_cache.h | 18 u8 pmk[PMK_LEN_MAX]; member 69 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 86 const u8 *pmk, size_t pmk_len); 135 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, in pmksa_cache_add() argument 159 const u8 *pmk, size_t pmk_len) in pmksa_cache_flush() argument
|
H A D | preauth.c | 78 u8 pmk[PMK_LEN]; in rsn_preauth_eapol_cb() local 83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); in rsn_preauth_eapol_cb() 89 res = eapol_sm_get_key(eapol, pmk, 16); in rsn_preauth_eapol_cb() 94 pmk, pmk_len); in rsn_preauth_eapol_cb() 96 pmksa_cache_add(sm->pmksa, pmk, pmk_len, NULL, in rsn_preauth_eapol_cb() 346 NULL, p->pmk, p->pmk_len); in rsn_preauth_candidate_process()
|
H A D | wpa_i.h | 21 u8 pmk[PMK_LEN_MAX]; member 249 const u8 *cache_id, const u8 *pmk, in wpa_sm_add_pmkid() argument 254 cache_id, pmk, pmk_len); in wpa_sm_add_pmkid() 389 const u8 *pmk, size_t pmk_len) in wpa_sm_key_mgmt_set_pmk() argument 393 return sm->ctx->key_mgmt_set_pmk(sm->ctx->ctx, pmk, pmk_len); in wpa_sm_key_mgmt_set_pmk()
|
H A D | wpa.c | 289 sm->pmk, sm->pmk_len); in wpa_supplicant_get_pmk() 372 "machines", sm->pmk, pmk_len); in wpa_supplicant_get_pmk() 379 sm->pmk, pmk_len, NULL, in wpa_supplicant_get_pmk() 2618 os_memcmp(sm->pmk, entry->pmk, sm->pmk_len) == 0)) { in wpa_sm_pmksa_free_cb() 2627 os_memset(sm->pmk, 0, sizeof(sm->pmk)); in wpa_sm_pmksa_free_cb() 2838 pmk, pmk_len); in wpa_sm_set_pmk() 2840 os_memcpy(sm->pmk, pmk, pmk_len); in wpa_sm_set_pmk() 2845 os_memcpy(sm->xxkey, pmk, pmk_len); in wpa_sm_set_pmk() 2873 os_memcpy(sm->pmk, sm->cur_pmksa->pmk, sm->pmk_len); in wpa_sm_set_pmk_from_pmksa() 3373 os_memset(sm->pmk, 0, sizeof(sm->pmk)); in wpa_sm_drop_sa() [all …]
|
H A D | wpa.h | 44 const u8 *pmk, size_t pmk_len); 83 int (*key_mgmt_set_pmk)(void *ctx, const u8 *pmk, size_t pmk_len); 124 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, 163 void wpa_sm_pmksa_cache_add(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, 202 static inline void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, in wpa_sm_set_pmk() argument
|
/dragonfly/contrib/wpa_supplicant/src/ap/ |
H A D | pmksa_cache_auth.c | 280 const u8 *pmk, size_t pmk_len, const u8 *pmkid, in pmksa_cache_auth_add() argument 287 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len, in pmksa_cache_auth_add() 315 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid, in pmksa_cache_auth_create_entry() argument 332 os_memcpy(entry->pmk, pmk, pmk_len); in pmksa_cache_auth_create_entry() 341 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_auth_create_entry() 404 os_memcpy(entry->pmk, old_entry->pmk, old_entry->pmk_len); in pmksa_cache_add_okc() 519 rsn_pmkid(entry->pmk, entry->pmk_len, aa, spa, new_pmkid, in pmksa_cache_get_okc() 715 pos += wpa_snprintf_hex(pos, end - pos, entry->pmk, in pmksa_cache_auth_list_mesh()
|
H A D | pmksa_cache_auth.h | 20 u8 pmk[PMK_LEN_MAX]; member 52 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 57 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid,
|
H A D | wpa_auth.h | 366 int wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk, 370 const u8 *pmk, size_t len, const u8 *sta_addr, 374 const u8 *pmk, const u8 *pmkid); 377 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 387 wpa_auth_pmksa_create_entry(const u8 *aa, const u8 *spa, const u8 *pmk, 400 u8 *pmkid, u8 *pmk); 445 int fils_auth_pmk_to_ptk(struct wpa_state_machine *sm, const u8 *pmk, 473 void wpa_auth_add_fils_pmk_pmkid(struct wpa_state_machine *sm, const u8 *pmk,
|
H A D | wpa_auth.c | 879 const u8 *pmk = NULL; in wpa_try_alt_snonce() local 890 if (pmk == NULL) in wpa_try_alt_snonce() 899 pmk = sm->PMK; in wpa_try_alt_snonce() 908 if (sm->PMK != pmk) { in wpa_try_alt_snonce() 2812 const u8 *pmk = NULL; in SM_STATE() local 2839 if (pmk == NULL) in SM_STATE() 2849 pmk = sm->PMK; in SM_STATE() 2855 pmk = sm->pmksa->pmk; in SM_STATE() 2866 if (sm->PMK != pmk) { in SM_STATE() 4375 pmk = pmk + PMK_LEN; in wpa_auth_pmksa_add() [all …]
|
H A D | ctrl_iface_ap.c | 898 u8 pmk[PMK_LEN_MAX]; in hostapd_ctrl_iface_pmksa_add() local 929 hexstr2bin(pos, pmk, pmk_len) < 0) in hostapd_ctrl_iface_pmksa_add() 937 return wpa_auth_pmksa_add2(hapd->wpa_auth, spa, pmk, pmk_len, in hostapd_ctrl_iface_pmksa_add() 956 u8 pmk[PMK_LEN_MAX]; in hostapd_ctrl_iface_pmksa_create_entry() local 981 if (hexstr2bin(pos, pmk, PMK_LEN) < 0) in hostapd_ctrl_iface_pmksa_create_entry() 992 return wpa_auth_pmksa_create_entry(aa, spa, pmk, pmkid, expiration); in hostapd_ctrl_iface_pmksa_create_entry()
|
H A D | sta_info.c | 1197 const u8 *pmk; in ap_sta_wpa_get_keyid() local 1202 pmk = wpa_auth_get_pmk(sta->wpa_sm, &pmk_len); in ap_sta_wpa_get_keyid() 1203 if (!pmk || pmk_len != PMK_LEN) in ap_sta_wpa_get_keyid() 1207 if (os_memcmp(pmk, psk->psk, PMK_LEN) == 0) in ap_sta_wpa_get_keyid()
|
H A D | ieee802_11.c | 758 sta->sae->pmk, sta->sae->pmkid); in sae_accept_sta() 1682 const u8 *pmk = NULL; in prepare_auth_resp_fils() local 1804 pmk = pmk_buf; in prepare_auth_resp_fils() 1827 wpa_auth_add_fils_pmk_pmkid(sta->wpa_sm, pmk, pmk_len, in prepare_auth_resp_fils() 1832 pmk, pmk_len, in prepare_auth_resp_fils() 1841 pmk = pmksa->pmk; in prepare_auth_resp_fils() 1845 if (!pmk) { in prepare_auth_resp_fils() 1853 if (fils_auth_pmk_to_ptk(sta->wpa_sm, pmk, pmk_len, in prepare_auth_resp_fils()
|
H A D | wpa_auth_ft.c | 2105 mpmk = sm->pmksa->pmk; in wpa_auth_derive_ptk_ft() 2674 const u8 *pmk = NULL; in wpa_ft_psk_pmk_r1() local 2689 pmk = wpa_ft_get_psk(wpa_auth, sm->addr, sm->p2p_dev_addr, in wpa_ft_psk_pmk_r1() 2690 pmk); in wpa_ft_psk_pmk_r1() 2691 if (pmk == NULL) in wpa_ft_psk_pmk_r1() 2694 if (wpa_derive_pmk_r0(pmk, PMK_LEN, ssid, ssid_len, mdid, r0kh, in wpa_ft_psk_pmk_r1() 2709 os_memcpy(sm->PMK, pmk, PMK_LEN); in wpa_ft_psk_pmk_r1()
|
H A D | wpa_auth_glue.c | 269 return sta->sae->pmk; in hostapd_wpa_auth_get_psk() 292 return sa->pmk; in hostapd_wpa_auth_get_psk()
|
/dragonfly/contrib/wpa_supplicant/wpa_supplicant/ |
H A D | wpas_glue.c | 276 u8 pmk[PMK_LEN]; in wpa_supplicant_eapol_cb() local 316 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN); in wpa_supplicant_eapol_cb() 323 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); in wpa_supplicant_eapol_cb() 329 res = eapol_sm_get_key(eapol, pmk, 16); in wpa_supplicant_eapol_cb() 341 "handshake", pmk, pmk_len); in wpa_supplicant_eapol_cb() 343 if (wpa_drv_set_key(wpa_s, WPA_ALG_PMK, NULL, 0, 0, NULL, 0, pmk, in wpa_supplicant_eapol_cb() 546 const u8 *pmk, size_t pmk_len) in wpa_supplicant_add_pmkid() argument 566 params.pmk = pmk; in wpa_supplicant_add_pmkid() 1152 static int wpa_supplicant_key_mgmt_set_pmk(void *ctx, const u8 *pmk, in wpa_supplicant_key_mgmt_set_pmk() argument 1160 NULL, 0, pmk, pmk_len); in wpa_supplicant_key_mgmt_set_pmk()
|
H A D | mesh_rsn.c | 95 return sta->sae->pmk; in auth_get_psk() 390 sta->sae->pmkid, sta->sae->pmk); in mesh_rsn_auth_sae_sta() 449 sha256_prf(sta->sae->pmk, sizeof(sta->sae->pmk), "AEK Derivation", in mesh_rsn_derive_aek() 510 sha256_prf(sta->sae->pmk, SAE_PMK_LEN, in mesh_rsn_derive_mtk()
|
H A D | eapol_test.c | 363 u8 pmk[PMK_LEN]; in eapol_test_compare_pmk() local 368 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { in eapol_test_compare_pmk() 369 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); in eapol_test_compare_pmk() 370 if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) { in eapol_test_compare_pmk() 377 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) { in eapol_test_compare_pmk() 378 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16); in eapol_test_compare_pmk() 379 if (os_memcmp(pmk, e->authenticator_pmk, 16) != 0) { in eapol_test_compare_pmk()
|
H A D | preauth_test.c | 149 const u8 *pmk, size_t pmk_len) in wpa_supplicant_add_pmkid() argument
|
/dragonfly/contrib/wpa_supplicant/src/common/ |
H A D | wpa_common.c | 406 if (sha384_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk() 415 if (sha256_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk() 424 if (sha256_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk() 429 if (sha384_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk() 434 if (sha512_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk() 455 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len); in wpa_pmk_to_ptk() 479 size_t dh_ss_len, u8 *pmk, size_t *pmk_len) in fils_rmsk_to_pmk() argument 514 addr, len, pmk); in fils_rmsk_to_pmk() 517 addr, len, pmk); in fils_rmsk_to_pmk() 616 if (sha384_prf(pmk, pmk_len, label, data, data_len, in fils_pmk_to_ptk() [all …]
|
H A D | common_module_tests.c | 315 const u8 pmk[] = { in sae_tests() local 389 if (os_memcmp(pmk, sae.pmk, SAE_PMK_LEN) != 0) { in sae_tests()
|
H A D | wpa_common.h | 347 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, 354 size_t dh_ss_len, u8 *pmk, size_t *pmk_len); 357 int fils_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const u8 *spa, const u8 *aa, 413 void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa,
|
H A D | sae.h | 55 u8 pmk[SAE_PMK_LEN]; member
|
H A D | dpp.h | 260 u8 pmk[PMK_LEN_MAX]; member
|
H A D | sae.c | 727 os_memcpy(sae->pmk, keys + SAE_KCK_LEN, SAE_PMK_LEN); in sae_derive_keys() 731 wpa_hexdump_key(MSG_DEBUG, "SAE: PMK", sae->pmk, SAE_PMK_LEN); in sae_derive_keys()
|