/dragonfly/contrib/wpa_supplicant/src/rsn_supp/ |
H A D | pmksa_cache.c | 139 if (pmk_len > PMK_LEN_MAX) in pmksa_cache_add() 148 os_memcpy(entry->pmk, pmk, pmk_len); in pmksa_cache_add() 149 entry->pmk_len = pmk_len; in pmksa_cache_add() 157 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_add() 186 if (pos->pmk_len == entry->pmk_len && in pmksa_cache_add_entry() 188 entry->pmk_len) == 0 && in pmksa_cache_add_entry() 215 pos->pmk, pos->pmk_len); in pmksa_cache_add_entry() 270 entry->pmk, entry->pmk_len); in pmksa_cache_add_entry() 284 const u8 *pmk, size_t pmk_len) in pmksa_cache_flush() argument 294 (pmk_len == entry->pmk_len && in pmksa_cache_flush() [all …]
|
H A D | pmksa_cache.h | 19 size_t pmk_len; member 69 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 86 const u8 *pmk, size_t pmk_len); 135 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, in pmksa_cache_add() argument 159 const u8 *pmk, size_t pmk_len) in pmksa_cache_flush() argument
|
H A D | preauth.c | 81 int res, pmk_len; in rsn_preauth_eapol_cb() local 82 pmk_len = PMK_LEN; in rsn_preauth_eapol_cb() 90 pmk_len = 16; in rsn_preauth_eapol_cb() 94 pmk, pmk_len); in rsn_preauth_eapol_cb() 95 sm->pmk_len = pmk_len; in rsn_preauth_eapol_cb() 96 pmksa_cache_add(sm->pmksa, pmk, pmk_len, NULL, in rsn_preauth_eapol_cb() 346 NULL, p->pmk, p->pmk_len); in rsn_preauth_candidate_process()
|
H A D | wpa.c | 307 int res, pmk_len; in wpa_supplicant_get_pmk() local 315 pmk_len = PMK_LEN; in wpa_supplicant_get_pmk() 324 pmk_len = 16; in wpa_supplicant_get_pmk() 373 sm->pmk_len = pmk_len; in wpa_supplicant_get_pmk() 2617 (sm->pmk_len == entry->pmk_len && in wpa_sm_pmksa_free_cb() 2626 sm->pmk_len = 0; in wpa_sm_pmksa_free_cb() 2838 pmk, pmk_len); in wpa_sm_set_pmk() 2839 sm->pmk_len = pmk_len; in wpa_sm_set_pmk() 2872 sm->pmk_len = sm->cur_pmksa->pmk_len; in wpa_sm_set_pmk_from_pmksa() 2876 sm->pmk_len = 0; in wpa_sm_set_pmk_from_pmksa() [all …]
|
H A D | wpa_i.h | 22 size_t pmk_len; member 250 size_t pmk_len) in wpa_sm_add_pmkid() argument 254 cache_id, pmk, pmk_len); in wpa_sm_add_pmkid() 389 const u8 *pmk, size_t pmk_len) in wpa_sm_key_mgmt_set_pmk() argument 393 return sm->ctx->key_mgmt_set_pmk(sm->ctx->ctx, pmk, pmk_len); in wpa_sm_key_mgmt_set_pmk()
|
H A D | wpa.h | 44 const u8 *pmk, size_t pmk_len); 83 int (*key_mgmt_set_pmk)(void *ctx, const u8 *pmk, size_t pmk_len); 124 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, 163 void wpa_sm_pmksa_cache_add(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, 203 size_t pmk_len, const u8 *pmkid, in wpa_sm_set_pmk() argument
|
H A D | wpa_ft.c | 39 mpmk_len = sm->cur_pmksa->pmk_len; in wpa_derive_ptk_ft()
|
/dragonfly/contrib/wpa_supplicant/src/common/ |
H A D | wpa_common.c | 36 return pmk_len / 2; in wpa_kck_len() 38 return pmk_len / 2; in wpa_kck_len() 72 return pmk_len <= 32 ? 16 : 32; in wpa_kek_len() 74 return pmk_len <= 32 ? 16 : 32; in wpa_kek_len() 108 return pmk_len / 2; in wpa_mic_len() 110 return pmk_len / 2; in wpa_mic_len() 361 if (pmk_len == 0) { in wpa_pmk_to_ptk() 439 (unsigned int) pmk_len); in wpa_pmk_to_ptk() 491 *pmk_len = SHA384_MAC_LEN; in fils_rmsk_to_pmk() 493 *pmk_len = SHA256_MAC_LEN; in fils_rmsk_to_pmk() [all …]
|
H A D | wpa_common.h | 347 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, 354 size_t dh_ss_len, u8 *pmk, size_t *pmk_len); 357 int fils_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const u8 *spa, const u8 *aa, 413 void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa, 488 unsigned int wpa_mic_len(int akmp, size_t pmk_len);
|
H A D | dpp.h | 261 size_t pmk_len; member
|
/dragonfly/contrib/wpa_supplicant/src/ap/ |
H A D | pmksa_cache_auth.c | 280 const u8 *pmk, size_t pmk_len, const u8 *pmkid, in pmksa_cache_auth_add() argument 287 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len, in pmksa_cache_auth_add() 315 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid, in pmksa_cache_auth_create_entry() argument 323 if (pmk_len > PMK_LEN_MAX) in pmksa_cache_auth_create_entry() 332 os_memcpy(entry->pmk, pmk, pmk_len); in pmksa_cache_auth_create_entry() 333 entry->pmk_len = pmk_len; in pmksa_cache_auth_create_entry() 341 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_auth_create_entry() 404 os_memcpy(entry->pmk, old_entry->pmk, old_entry->pmk_len); in pmksa_cache_add_okc() 405 entry->pmk_len = old_entry->pmk_len; in pmksa_cache_add_okc() 519 rsn_pmkid(entry->pmk, entry->pmk_len, aa, spa, new_pmkid, in pmksa_cache_get_okc() [all …]
|
H A D | wpa_auth.c | 880 size_t pmk_len; in wpa_try_alt_snonce() local 900 pmk_len = sm->pmk_len; in wpa_try_alt_snonce() 910 sm->pmk_len = pmk_len; in wpa_try_alt_snonce() 2007 sm->pmk_len = sm->pmksa->pmk_len; in SM_STATE() 2025 pmk_len); in SM_STATE() 2034 sm->pmk_len = pmk_len; in SM_STATE() 2087 sm->pmk_len = sm->pmksa->pmk_len; in SM_STATE() 2850 pmk_len = sm->pmk_len; in SM_STATE() 2856 pmk_len = sm->pmksa->pmk_len; in SM_STATE() 2868 sm->pmk_len = pmk_len; in SM_STATE() [all …]
|
H A D | pmksa_cache_auth.h | 21 size_t pmk_len; member 52 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 57 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid,
|
H A D | wpa_auth.h | 367 unsigned int pmk_len, 377 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 446 size_t pmk_len, const u8 *snonce, const u8 *anonce, 474 size_t pmk_len, const u8 *pmkid);
|
H A D | ctrl_iface_ap.c | 899 size_t pmk_len; in hostapd_ctrl_iface_pmksa_add() local 927 pmk_len = (pos2 - pos) / 2; in hostapd_ctrl_iface_pmksa_add() 928 if (pmk_len < PMK_LEN || pmk_len > PMK_LEN_MAX || in hostapd_ctrl_iface_pmksa_add() 929 hexstr2bin(pos, pmk, pmk_len) < 0) in hostapd_ctrl_iface_pmksa_add() 937 return wpa_auth_pmksa_add2(hapd->wpa_auth, spa, pmk, pmk_len, in hostapd_ctrl_iface_pmksa_add()
|
H A D | wpa_auth_i.h | 61 unsigned int pmk_len; member
|
H A D | sta_info.c | 1198 int pmk_len; in ap_sta_wpa_get_keyid() local 1202 pmk = wpa_auth_get_pmk(sta->wpa_sm, &pmk_len); in ap_sta_wpa_get_keyid() 1203 if (!pmk || pmk_len != PMK_LEN) in ap_sta_wpa_get_keyid()
|
H A D | ieee802_11.c | 1683 size_t pmk_len = 0; in prepare_auth_resp_fils() local 1797 pmk_buf, &pmk_len)) { in prepare_auth_resp_fils() 1827 wpa_auth_add_fils_pmk_pmkid(sta->wpa_sm, pmk, pmk_len, in prepare_auth_resp_fils() 1832 pmk, pmk_len, in prepare_auth_resp_fils() 1842 pmk_len = pmksa->pmk_len; in prepare_auth_resp_fils() 1853 if (fils_auth_pmk_to_ptk(sta->wpa_sm, pmk, pmk_len, in prepare_auth_resp_fils()
|
H A D | wpa_auth_glue.c | 291 *psk_len = sa->pmk_len; in hostapd_wpa_auth_get_psk()
|
H A D | dpp_hostapd.c | 1134 if (wpa_auth_pmksa_add2(hapd->wpa_auth, src, intro.pmk, intro.pmk_len, in hostapd_dpp_rx_peer_disc_req()
|
/dragonfly/contrib/wpa_supplicant/wpa_supplicant/ |
H A D | wpas_glue.c | 275 int res, pmk_len; in wpa_supplicant_eapol_cb() local 308 pmk_len = PMK_LEN; in wpa_supplicant_eapol_cb() 330 pmk_len = 16; in wpa_supplicant_eapol_cb() 341 "handshake", pmk, pmk_len); in wpa_supplicant_eapol_cb() 344 pmk_len)) { in wpa_supplicant_eapol_cb() 546 const u8 *pmk, size_t pmk_len) in wpa_supplicant_add_pmkid() argument 567 params.pmk_len = pmk_len; in wpa_supplicant_add_pmkid() 1153 size_t pmk_len) in wpa_supplicant_key_mgmt_set_pmk() argument 1160 NULL, 0, pmk, pmk_len); in wpa_supplicant_key_mgmt_set_pmk()
|
H A D | preauth_test.c | 149 const u8 *pmk, size_t pmk_len) in wpa_supplicant_add_pmkid() argument
|
H A D | dpp_supplicant.c | 1417 os_memcpy(entry->pmk, intro.pmk, intro.pmk_len); in wpas_dpp_rx_peer_disc_resp() 1418 entry->pmk_len = intro.pmk_len; in wpas_dpp_rx_peer_disc_resp()
|
H A D | ctrl_iface.c | 9707 entry->pmk_len); in wpas_ctrl_iface_pmksa_get() 9788 entry->pmk_len = (pos2 - pos) / 2; in wpas_ctrl_iface_pmksa_add() 9789 if (entry->pmk_len < PMK_LEN || entry->pmk_len > PMK_LEN_MAX || in wpas_ctrl_iface_pmksa_add() 9790 hexstr2bin(pos, entry->pmk, entry->pmk_len) < 0) in wpas_ctrl_iface_pmksa_add()
|
/dragonfly/contrib/wpa_supplicant/src/drivers/ |
H A D | driver.h | 2178 size_t pmk_len; member
|