/hal_espressif-latest/components/wpa_supplicant/src/rsn_supp/ |
D | pmksa_cache.h | 18 u8 pmk[PMK_LEN_MAX]; member 59 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 71 const u8 *pmk, size_t pmk_len); 107 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, in pmksa_cache_add() argument 128 const u8 *pmk, size_t pmk_len) in pmksa_cache_flush() argument
|
D | pmksa_cache.c | 107 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, in pmksa_cache_add() argument 123 os_memcpy(entry->pmk, pmk, pmk_len); in pmksa_cache_add() 132 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_add() 149 os_memcmp_const(pos->pmk, pmk, pmk_len) == 0 && in pmksa_cache_add() 175 pmksa_cache_flush(pmksa, network_ctx, pos->pmk, in pmksa_cache_add() 241 const u8 *pmk, size_t pmk_len) in pmksa_cache_flush() argument 250 (pmk == NULL || in pmksa_cache_flush() 252 os_memcmp(pmk, entry->pmk, pmk_len) == 0))) { in pmksa_cache_flush() 329 new_entry = pmksa_cache_add(pmksa, old_entry->pmk, old_entry->pmk_len, in pmksa_cache_clone_entry()
|
D | wpa.c | 378 os_memcmp(sm->pmk, entry->pmk, sm->pmk_len) == 0)) { in wpa_sm_pmksa_free_cb() 386 os_memset(sm->pmk, 0, sizeof(sm->pmk)); in wpa_sm_pmksa_free_cb() 423 sm->pmk, sm->pmk_len); in wpa_supplicant_get_pmk() 435 os_memcpy(sm->xxkey, sm->pmk, sm->pmk_len); in wpa_supplicant_get_pmk() 457 "machines", sm->pmk, pmk_len); in wpa_supplicant_get_pmk() 463 sa = pmksa_cache_add(sm->pmksa, sm->pmk, pmk_len, in wpa_supplicant_get_pmk() 653 return wpa_pmk_to_ptk(sm->pmk, sm->pmk_len, "Pairwise key expansion", in wpa_derive_ptk() 1453 sa = pmksa_cache_add(sm->pmksa, sm->pmk, sm->pmk_len, NULL, in wpa_supplicant_send_4_of_4_txcallback() 2121 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, in wpa_sm_set_pmk() argument 2128 os_memcpy(sm->pmk, pmk, pmk_len); in wpa_sm_set_pmk() [all …]
|
D | wpa.h | 41 void wpa_set_pmk(uint8_t *pmk, size_t pmk_length, const u8 *pmkid, bool cache_pmksa);
|
D | wpa_i.h | 29 u8 pmk[PMK_LEN_MAX]; member
|
/hal_espressif-latest/components/wpa_supplicant/src/ap/ |
D | pmksa_cache_auth.h | 19 u8 pmk[PMK_LEN_MAX]; member 50 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 55 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid,
|
D | pmksa_cache_auth.c | 204 const u8 *pmk, size_t pmk_len, const u8 *pmkid, in pmksa_cache_auth_add() argument 211 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len, in pmksa_cache_auth_add() 239 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid, in pmksa_cache_auth_create_entry() argument 256 os_memcpy(entry->pmk, pmk, pmk_len); in pmksa_cache_auth_create_entry() 265 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_auth_create_entry()
|
D | wpa_auth.c | 139 return sta->sae->pmk; in wpa_auth_get_psk() 952 const u8 *pmk, const u8 *pmkid, bool cache_pmksa) in wpa_auth_pmksa_add_sae() argument 957 wpa_hexdump_key(MSG_DEBUG, "RSN: Cache PMK from SAE", pmk, PMK_LEN); in wpa_auth_pmksa_add_sae() 958 if (pmksa_cache_auth_add(wpa_auth->pmksa, pmk, PMK_LEN, pmkid, in wpa_auth_pmksa_add_sae() 1525 os_memcpy(sm->PMK, sm->pmksa->pmk, sm->pmksa->pmk_len); in SM_STATE() 1602 const u8 *pmk, struct wpa_ptk *ptk) in wpa_derive_ptk() argument 1609 return wpa_auth_derive_ptk_ft(sm, pmk, ptk); in wpa_derive_ptk() 1612 return wpa_pmk_to_ptk(pmk, PMK_LEN, "Pairwise key expansion", in wpa_derive_ptk() 1622 const u8 *pmk = NULL; in SM_STATE() local 1639 pmk = wpa_auth_get_psk(sm->wpa_auth, sm->addr, pmk); in SM_STATE() [all …]
|
D | wpa_auth.h | 263 int wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk, 266 const u8 *pmk, size_t len, const u8 *sta_addr, 298 const u8 *pmk, const u8 *pmkid,bool cache_pmksa);
|
D | wpa_auth_i.h | 219 int wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, const u8 *pmk,
|
D | ieee802_11.c | 247 sta->sae->pmk, sta->sae->pmkid, false); in sae_accept_sta()
|
/hal_espressif-latest/components/wpa_supplicant/src/common/ |
D | wpa_common.c | 1143 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, in wpa_pmk_to_ptk() argument 1183 if (sha384_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk() 1189 sha256_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk() 1192 sha1_prf(pmk, pmk_len, label, data, data_len, tmp, ptk_len); in wpa_pmk_to_ptk() 1197 wpa_hexdump(MSG_MSGDUMP, "WPA: PMK", pmk, pmk_len); in wpa_pmk_to_ptk() 1225 void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa, in rsn_pmkid() argument 1240 hmac_sha256_vector(pmk, pmk_len, 3, addr, len, hash); in rsn_pmkid() 1245 hmac_sha1_vector(pmk, pmk_len, 3, addr, len, hash); in rsn_pmkid()
|
D | wpa_common.h | 433 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, 438 void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa,
|
D | sae.h | 111 u8 pmk[SAE_PMK_LEN]; member
|
D | dpp.h | 326 u8 pmk[PMK_LEN_MAX]; member
|
D | sae.c | 1572 os_memcpy(sae->pmk, keys + hash_len, SAE_PMK_LEN); in sae_derive_keys() 1587 wpa_hexdump_key(MSG_DEBUG, "SAE: PMK", sae->pmk, SAE_PMK_LEN); in sae_derive_keys()
|
D | dpp.c | 5718 static int dpp_derive_pmk(const u8 *Nx, size_t Nx_len, u8 *pmk, in dpp_derive_pmk() argument 5735 res = dpp_hkdf_expand(hash_len, prk, hash_len, info, pmk, hash_len); in dpp_derive_pmk() 5741 pmk, hash_len); in dpp_derive_pmk() 5925 if (dpp_derive_pmk(Nx, Nx_len, intro->pmk, curve->hash_len) < 0) { in dpp_peer_intro()
|
/hal_espressif-latest/components/esp_wifi/include/ |
D | esp_now.h | 349 esp_err_t esp_now_set_pmk(const uint8_t *pmk);
|
/hal_espressif-latest/components/wpa_supplicant/esp_supplicant/src/ |
D | esp_wpa3.c | 356 wpa_set_pmk(g_sae_data.pmk, g_sae_data.pmk_len, g_sae_data.pmkid, true); in wpa3_parse_sae_confirm()
|