/hostap-3.6.0/src/ap/ |
D | wpa_auth_ft.c | 1191 u8 pmk_r1_name[WPA_PMK_NAME_LEN]; member 1412 const u8 *pmk_r1_name, int pairwise, in wpa_ft_store_pmk_r1() argument 1435 os_memcpy(r1->pmk_r1_name, pmk_r1_name, WPA_PMK_NAME_LEN); in wpa_ft_store_pmk_r1() 1477 const u8 *spa, const u8 *pmk_r1_name, in wpa_ft_fetch_pmk_r1() argument 1492 os_memcmp_const(r1->pmk_r1_name, pmk_r1_name, in wpa_ft_fetch_pmk_r1() 2140 pmk_r1, sm->pmk_r1_name) < 0) in wpa_auth_derive_ptk_ft() 2144 sm->pmk_r1_name, sm->pairwise, &vlan, in wpa_auth_derive_ptk_ft() 2149 sm->addr, sm->wpa_auth->addr, sm->pmk_r1_name, in wpa_auth_derive_ptk_ft() 2559 sm->pmk_r1_name, WPA_PMK_NAME_LEN); in wpa_sm_write_assoc_resp_ies() 2575 sm->pmk_r1_name, WPA_PMK_NAME_LEN); in wpa_sm_write_assoc_resp_ies() [all …]
|
D | wpa_auth_i.h | 129 u8 pmk_r1_name[WPA_PMK_NAME_LEN]; /* PMKR1Name derived from FT Auth member
|
D | wpa_auth.h | 477 const u8 *spa, const u8 *pmk_r1_name,
|
D | wpa_auth.c | 2315 sm->pmk_r1_name, in wpa_derive_ptk() 2391 sm->addr, sm->pmk_r1_name, in fils_auth_pmk_to_ptk() 2396 wpa_hexdump(MSG_DEBUG, "FILS+FT: PMKR1Name", sm->pmk_r1_name, in fils_auth_pmk_to_ptk() 3178 if (os_memcmp_const(sm->sup_pmk_r1_name, sm->pmk_r1_name, in SM_STATE() 3186 sm->pmk_r1_name, WPA_PMK_NAME_LEN); in SM_STATE() 3530 res = wpa_insert_pmkid(kde, &elen, sm->pmk_r1_name); in SM_STATE() 5483 res = wpa_insert_pmkid(kde, &elen, sm->pmk_r1_name); in wpa_auth_resend_m3()
|
D | wpa_auth_ie.c | 929 os_memcmp_const(data.pmkid, sm->pmk_r1_name, in wpa_validate_wpa_ie()
|
/hostap-3.6.0/src/rsn_supp/ |
D | wpa_ft.c | 66 sm->pmk_r1_name) < 0) in wpa_derive_ptk_ft() 79 sm->own_addr, sm->bssid, sm->pmk_r1_name, ptk, in wpa_derive_ptk_ft() 666 sm->pmk_r1_name) < 0) in wpa_ft_process_response() 683 sm->pmk_r1_name, &sm->ptk, ptk_name, sm->key_mgmt, in wpa_ft_process_response() 696 sm->pmk_r1_name, in wpa_ft_process_response() 1093 os_memcmp_const(parse.rsn_pmkid, sm->pmk_r1_name, WPA_PMK_NAME_LEN)) in wpa_ft_validate_reassoc_resp() 1318 u8 *pmk_r1, size_t *pmk_r1_len, u8 *pmk_r1_name) in wpa_pasn_ft_derive_pmk_r1() argument 1344 pmk_r1_name) < 0) in wpa_pasn_ft_derive_pmk_r1() 1350 wpa_hexdump(MSG_DEBUG, "PASN: FT: PMKR1Name", pmk_r1_name, in wpa_pasn_ft_derive_pmk_r1()
|
D | wpa.h | 468 u8 *pmk_r1, size_t *pmk_r1_len, u8 *pmk_r1_name); 518 u8 *pmk_r1, size_t *pmk_r1_len, u8 *pmk_r1_name) in wpa_pasn_ft_derive_pmk_r1() argument
|
D | wpa_i.h | 150 u8 pmk_r1_name[WPA_PMK_NAME_LEN]; member
|
D | wpa.c | 517 sm->pmk_r1_name); in wpa_supplicant_send_2_of_4() 1476 if (os_memcmp_const(rsn.pmkid, sm->pmk_r1_name, WPA_PMK_NAME_LEN) != 0) in ft_validate_rsnie() 1484 sm->pmk_r1_name, WPA_PMK_NAME_LEN); in ft_validate_rsnie() 4555 sm->pmk_r1_name, use_sha384) < 0) { in fils_ft_build_assoc_req_rsne() 4559 os_memcpy(pos, sm->pmk_r1_name, WPA_PMK_NAME_LEN); in fils_ft_build_assoc_req_rsne() 4900 os_memcmp(rsn.pmkid, sm->pmk_r1_name, in fils_process_assoc_resp()
|
/hostap-3.6.0/wlantest/ |
D | rx_mgmt.c | 287 sta->pmk_r1_name) < 0) in process_ft_auth() 294 sta->pmk_r1_name, &ptk, ptk_name, sta->key_mgmt, in process_ft_auth() 913 if (os_memcmp_const(parse.rsn_pmkid, sta->pmk_r1_name, in rx_mgmt_reassoc_req() 922 sta->pmk_r1_name, WPA_PMK_NAME_LEN); in rx_mgmt_reassoc_req() 994 os_memcmp_const(parse.rsn_pmkid, sta->pmk_r1_name, in rx_mgmt_reassoc_req() 1405 if (os_memcmp_const(parse.rsn_pmkid, sta->pmk_r1_name, in rx_mgmt_reassoc_resp() 1414 sta->pmk_r1_name, WPA_PMK_NAME_LEN); in rx_mgmt_reassoc_resp() 1765 sta->pmk_r1_name) < 0) in rx_mgmt_action_ft_response() 1778 os_memcpy(new_sta->pmk_r1_name, sta->pmk_r1_name, in rx_mgmt_action_ft_response() 1779 sizeof(sta->pmk_r1_name)); in rx_mgmt_action_ft_response() [all …]
|
D | wlantest.h | 82 u8 pmk_r1_name[WPA_PMK_NAME_LEN]; member
|
D | rx_eapol.c | 116 sta->pmk_r1, sta->pmk_r1_name) < 0) in try_pmk() 121 bss->bssid, sta->pmk_r1_name, in try_pmk() 801 os_memcmp_const(rsn.pmkid, sta->pmk_r1_name, in rx_data_eapol_key_3_of_4()
|
/hostap-3.6.0/src/common/ |
D | wpa_common.h | 425 const u8 *s1kh_id, u8 *pmk_r1_name, int use_sha384); 429 u8 *pmk_r1, u8 *pmk_r1_name); 432 const u8 *pmk_r1_name,
|
D | wpa_common.c | 1954 const u8 *s1kh_id, u8 *pmk_r1_name, int use_sha384) in wpa_derive_pmk_r1_name() argument 1979 os_memcpy(pmk_r1_name, hash, WPA_PMK_NAME_LEN); in wpa_derive_pmk_r1_name() 1980 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", pmk_r1_name, WPA_PMK_NAME_LEN); in wpa_derive_pmk_r1_name() 1993 u8 *pmk_r1, u8 *pmk_r1_name) in wpa_derive_pmk_r1() argument 2028 pmk_r1_name, in wpa_derive_pmk_r1() 2041 const u8 *pmk_r1_name, in wpa_pmk_r1_to_ptk() argument 2121 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", pmk_r1_name, WPA_PMK_NAME_LEN); in wpa_pmk_r1_to_ptk() 2122 addr[0] = pmk_r1_name; in wpa_pmk_r1_to_ptk()
|
/hostap-3.6.0/wpa_supplicant/ |
D | pasn_supplicant.c | 697 pasn->pmk_r1_name); in wpas_pasn_build_auth_1() 704 pmkid = pasn->pmk_r1_name; in wpas_pasn_build_auth_1() 890 os_memset(pasn->pmk_r1_name, 0, sizeof(pasn->pmk_r1_name)); in wpas_pasn_reset()
|
D | wpa_supplicant_i.h | 589 u8 pmk_r1_name[WPA_PMK_NAME_LEN]; member
|