/hostap-latest/wlantest/ |
D | bss.c | 63 dl_list_init(&bss->pmk); in bss_get() 73 void pmk_deinit(struct wlantest_pmk *pmk) in pmk_deinit() argument 75 dl_list_del(&pmk->list); in pmk_deinit() 76 os_free(pmk); in pmk_deinit() 90 struct wlantest_pmk *pmk, *np; in bss_deinit() local 94 dl_list_for_each_safe(pmk, np, &bss->pmk, struct wlantest_pmk, list) in bss_deinit() 95 pmk_deinit(pmk); in bss_deinit() 106 struct wlantest_pmk *pmk; in bss_add_pmk_from_passphrase() local 108 pmk = os_zalloc(sizeof(*pmk)); in bss_add_pmk_from_passphrase() 109 if (pmk == NULL) in bss_add_pmk_from_passphrase() [all …]
|
D | wlantest.c | 60 dl_list_init(&wt->pmk); in wlantest_init() 92 struct wlantest_pmk *pmk, *np; in wlantest_deinit() local 109 dl_list_for_each_safe(pmk, np, &wt->pmk, struct wlantest_pmk, list) in wlantest_deinit() 110 pmk_deinit(pmk); in wlantest_deinit() 158 u8 pmk[PMK_LEN_MAX]; in add_pmk_file() local 179 if (hexstr2bin(buf, pmk, pmk_len) < 0) in add_pmk_file() 184 os_memcpy(p->pmk, pmk, pmk_len); in add_pmk_file() 186 dl_list_add(&wt->pmk, &p->list); in add_pmk_file() 187 wpa_hexdump(MSG_DEBUG, "Added PMK from file", pmk, pmk_len); in add_pmk_file() 190 if (hexstr2bin(&buf[2 * PMK_LEN], pmk, PMK_LEN) < 0) in add_pmk_file() [all …]
|
D | wired.c | 90 static void wlantest_add_pmk(struct wlantest *wt, const u8 *pmk, size_t pmk_len) in wlantest_add_pmk() argument 97 os_memcpy(p->pmk, pmk, pmk_len); in wlantest_add_pmk() 99 dl_list_add(&wt->pmk, &p->list); in wlantest_add_pmk() 100 wpa_hexdump(MSG_INFO, "Add PMK", pmk, pmk_len); in wlantest_add_pmk() 131 u8 pmk[PMK_LEN_MAX]; in process_radius_access_accept() local 141 os_memcpy(pmk, keys->recv, pmk_len); in process_radius_access_accept() 146 os_memcpy(pmk + pmk_len, keys->send, len2); in process_radius_access_accept() 149 wlantest_add_pmk(wt, pmk, pmk_len); in process_radius_access_accept()
|
D | rx_eapol.c | 180 struct wlantest_pmk *pmk) in try_pmk() argument 215 if (wpa_derive_pmk_r0(pmk->pmk, pmk->pmk_len, in try_pmk() 222 sta->pmk_r0_len = pmk->pmk_len; in try_pmk() 239 } else if (wpa_pmk_to_ptk(pmk->pmk, pmk->pmk_len, in try_pmk() 284 struct wlantest_pmk *pmk; in derive_ptk() local 289 dl_list_for_each(pmk, &bss->pmk, struct wlantest_pmk, list) { in derive_ptk() 291 if (try_pmk(wt, bss, sta, ver, data, len, pmk) == 0) in derive_ptk() 295 dl_list_for_each(pmk, &wt->pmk, struct wlantest_pmk, list) { in derive_ptk() 297 if (try_pmk(wt, bss, sta, ver, data, len, pmk) == 0) in derive_ptk()
|
D | wlantest.h | 38 u8 pmk[PMK_LEN_MAX]; member 173 struct dl_list pmk; /* struct wlantest_pmk */ member 222 struct dl_list pmk; /* struct wlantest_pmk */ member 312 void pmk_deinit(struct wlantest_pmk *pmk);
|
/hostap-latest/src/rsn_supp/ |
D | pmksa_cache.c | 232 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, in pmksa_cache_add() argument 254 os_memcpy(entry->pmk, pmk, pmk_len); in pmksa_cache_add() 266 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_add() 303 os_memcmp_const(pos->pmk, entry->pmk, in pmksa_cache_add_entry() 331 pos->pmk, pos->pmk_len, in pmksa_cache_add_entry() 395 entry->pmk, entry->pmk_len, in pmksa_cache_add_entry() 414 const u8 *pmk, size_t pmk_len, bool external_only) in pmksa_cache_flush() argument 423 (pmk == NULL || in pmksa_cache_flush() 425 os_memcmp(pmk, entry->pmk, pmk_len) == 0)) && in pmksa_cache_flush() 516 new_entry = pmksa_cache_add(pmksa, old_entry->pmk, old_entry->pmk_len, in pmksa_cache_clone_entry() [all …]
|
D | pmksa_cache.h | 18 u8 pmk[PMK_LEN_MAX]; member 84 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 101 const u8 *pmk, size_t pmk_len, bool external_only);
|
D | preauth.c | 89 u8 pmk[PMK_LEN]; in rsn_preauth_eapol_cb() local 94 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); in rsn_preauth_eapol_cb() 100 res = eapol_sm_get_key(eapol, pmk, 16); in rsn_preauth_eapol_cb() 105 pmk, pmk_len); in rsn_preauth_eapol_cb() 107 pmksa_cache_add(sm->pmksa, pmk, pmk_len, NULL, in rsn_preauth_eapol_cb() 355 NULL, p->pmk, p->pmk_len, 0, 0, in rsn_preauth_candidate_process()
|
D | wpa_i.h | 26 u8 pmk[PMK_LEN_MAX]; member 318 const u8 *cache_id, const u8 *pmk, in wpa_sm_add_pmkid() argument 324 cache_id, pmk, pmk_len, pmk_lifetime, in wpa_sm_add_pmkid() 469 const u8 *pmk, size_t pmk_len) in wpa_sm_key_mgmt_set_pmk() argument 473 return sm->ctx->key_mgmt_set_pmk(sm->ctx->ctx, pmk, pmk_len); in wpa_sm_key_mgmt_set_pmk()
|
D | wpa.h | 47 const u8 *pmk, size_t pmk_len, u32 pmk_lifetime, 93 int (*key_mgmt_set_pmk)(void *ctx, const u8 *pmk, size_t pmk_len); 197 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, 247 void wpa_sm_pmksa_cache_add(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, 301 static inline void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, in wpa_sm_set_pmk() argument
|
D | wpa.c | 302 if (wpa_sm_key_mgmt_set_pmk(sm, sm->pmk, sm->pmk_len)) in wpa_supplicant_key_mgmt_set_pmk() 340 sm->pmk, sm->pmk_len); in wpa_supplicant_get_pmk() 353 os_memcpy(sm->xxkey, sm->pmk, sm->pmk_len); in wpa_supplicant_get_pmk() 368 res = eapol_sm_get_key(sm->eapol, sm->pmk, pmk_len); in wpa_supplicant_get_pmk() 375 res = eapol_sm_get_key(sm->eapol, sm->pmk, 16); in wpa_supplicant_get_pmk() 424 "machines", sm->pmk, pmk_len); in wpa_supplicant_get_pmk() 431 sm->pmk, pmk_len, NULL, in wpa_supplicant_get_pmk() 753 ret = wpa_pmk_to_ptk(sm->pmk, sm->pmk_len, "Pairwise key expansion", in wpa_derive_ptk() 2973 sa = pmksa_cache_add(sm->pmksa, sm->pmk, sm->pmk_len, NULL, in wpa_supplicant_process_3_of_4() 4269 os_memcmp(sm->pmk, entry->pmk, sm->pmk_len) == 0)) { in wpa_sm_pmksa_free_cb() [all …]
|
/hostap-latest/tests/hwsim/ |
D | test_ap_psk.py | 1461 def pmk_to_ptk(pmk, addr1, addr2, nonce1, nonce2): argument 1471 ptk = sha1_prf(pmk, label, data, 48) 1523 pmk = binascii.unhexlify(psk) 1544 return (bssid, ssid, hapd, snonce, pmk, addr, rsne) 1549 (bssid, ssid, hapd, snonce, pmk, addr, rsne) = eapol_test(apdev[0], dev[0]) 1556 (ptk, kck, kek) = pmk_to_ptk(pmk, addr, bssid, snonce, anonce) 1578 (bssid, ssid, hapd, snonce, pmk, addr, rsne) = eapol_test(apdev[0], dev[0]) 1587 (ptk, kck, kek) = pmk_to_ptk(pmk, addr, bssid, snonce, anonce) 1606 (bssid, ssid, hapd, snonce, pmk, addr, rsne) = eapol_test(apdev[0], dev[0]) 1614 (ptk, kck, kek) = pmk_to_ptk(pmk, addr, bssid, snonce, anonce) [all …]
|
D | test_erp.py | 383 pmk = None 402 pmk = binascii.unhexlify(val) 409 if not msk or not emsk or not rIK or not rRK or not pmk or not ptk or not gtk: 423 get_key_locations(buf, pmk, "PMK") 430 if pmk not in buf: 446 get_key_locations(buf, pmk, "PMK") 470 pmk = None 477 pmk = binascii.unhexlify(val) 484 if not pmk or not ptk or not gtk: 497 get_key_locations(buf, pmk, "PMK") [all …]
|
D | test_wpas_ap.py | 1066 pmk = binascii.unhexlify(psk) 1084 buf = read_process_memory(pid, pmk) 1085 get_key_locations(buf, pmk, "PMK") 1091 buf = read_process_memory(pid, pmk) 1092 get_key_locations(buf, pmk, "PMK") 1097 buf = read_process_memory(pid, pmk) 1104 buf2 = read_process_memory(pid, pmk) 1109 buf3 = read_process_memory(pid, pmk) 1122 if not pmk or not ptk or not gtk: 1132 get_key_locations(buf, pmk, "PMK") [all …]
|
/hostap-latest/src/common/ |
D | common_module_tests.c | 313 const u8 pmk[] = { in sae_tests() local 440 if (os_memcmp(pmk, sae.pmk, SAE_PMK_LEN) != 0) { in sae_tests() 612 const u8 pmk[] = { in pasn_test_pasn_auth() local 650 ret = pasn_pmk_to_ptk(pmk, sizeof(pmk), in pasn_test_pasn_auth() 684 const u8 pmk[] = { in pasn_test_no_pasn_auth() local 729 ret = wpa_pmk_to_ptk(pmk, sizeof(pmk), in pasn_test_no_pasn_auth()
|
D | wpa_common.c | 393 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, in wpa_pmk_to_ptk() argument 467 if (sha384_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk() 475 if (sha256_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk() 482 if (sha256_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk() 487 if (sha384_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk() 492 if (sha512_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk() 503 if (sha256_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk() 508 if (sha384_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk() 513 if (sha512_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk() 526 if (sha256_prf(pmk, pmk_len, label, data, data_len, in wpa_pmk_to_ptk() [all …]
|
D | wpa_common.h | 464 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, 471 size_t dh_ss_len, u8 *pmk, size_t *pmk_len); 474 int fils_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const u8 *spa, const u8 *aa, 535 void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa, 769 int pasn_pmk_to_ptk(const u8 *pmk, size_t pmk_len,
|
/hostap-latest/src/pasn/ |
D | pasn_responder.c | 164 pasn->sae.pmk, pasn->sae.pmk_len); in pasn_wd_handle_sae_confirm() 168 pmksa_cache_auth_add(pasn->pmksa, pasn->sae.pmk, pasn->sae.pmk_len, in pasn_wd_handle_sae_confirm() 308 u8 pmk[PMK_LEN_MAX]; in pasn_derive_keys() local 312 os_memset(pmk, 0, sizeof(pmk)); in pasn_derive_keys() 322 os_memcpy(pmk, pasn_default_pmk, sizeof(pasn_default_pmk)); in pasn_derive_keys() 327 os_memcpy(pmk, cached_pmk, cached_pmk_len); in pasn_derive_keys() 334 os_memcpy(pmk, pasn->sae.pmk, PMK_LEN); in pasn_derive_keys() 348 os_memcpy(pasn->pmk, pmk, pmk_len); in pasn_derive_keys() 349 ret = pasn_pmk_to_ptk(pmk, pmk_len, peer_addr, own_addr, in pasn_derive_keys() 868 cached_pmk = pmksa->pmk; in handle_auth_pasn_1()
|
D | pasn_initiator.c | 424 pasn->pmk, &pasn->pmk_len); in wpas_pasn_wd_fils_rx() 438 pasn->pmksa_entry = pmksa_cache_add(pasn->pmksa, pasn->pmk, in wpas_pasn_wd_fils_rx() 712 forced_memzero(pasn->pmk, sizeof(pasn->pmk)); in wpa_pasn_reset() 767 os_memset(pasn->pmk, 0, sizeof(pasn->pmk)); in wpas_pasn_set_pmk() 774 os_memcpy(pasn->pmk, pasn_default_pmk, in wpas_pasn_set_pmk() 783 os_memcpy(pasn->pmk, pasn->pmk_r1, pasn->pmk_r1_len); in wpas_pasn_set_pmk() 817 os_memcpy(pasn->pmk, pmksa->pmk, pmksa->pmk_len); in wpas_pasn_set_pmk() 838 os_memcpy(pasn->pmk, pasn->sae.pmk, PMK_LEN); in wpas_pasn_set_pmk() 840 pasn->pmksa_entry = pmksa_cache_add(pasn->pmksa, pasn->pmk, in wpas_pasn_set_pmk() 1232 ret = pasn_pmk_to_ptk(pasn->pmk, pasn->pmk_len, in wpa_pasn_auth_rx()
|
/hostap-latest/src/ap/ |
D | pmksa_cache_auth.c | 283 const u8 *pmk, size_t pmk_len, const u8 *pmkid, in pmksa_cache_auth_add() argument 290 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len, in pmksa_cache_auth_add() 318 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid, in pmksa_cache_auth_create_entry() argument 335 os_memcpy(entry->pmk, pmk, pmk_len); in pmksa_cache_auth_create_entry() 348 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_auth_create_entry() 411 os_memcpy(entry->pmk, old_entry->pmk, old_entry->pmk_len); in pmksa_cache_add_okc() 541 rsn_pmkid(entry->pmk, entry->pmk_len, aa, spa, in pmksa_cache_get_okc() 737 pos += wpa_snprintf_hex(pos, end - pos, entry->pmk, in pmksa_cache_auth_list_mesh()
|
D | pmksa_cache_auth.h | 20 u8 pmk[PMK_LEN_MAX]; member 56 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 61 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid,
|
D | wpa_auth.h | 498 int wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk, 502 const u8 *pmk, size_t len, const u8 *sta_addr, 506 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 510 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 520 wpa_auth_pmksa_create_entry(const u8 *aa, const u8 *spa, const u8 *pmk, 536 u8 *pmkid, u8 *pmk, size_t *pmk_len); 591 int fils_auth_pmk_to_ptk(struct wpa_state_machine *sm, const u8 *pmk, 620 void wpa_auth_add_fils_pmk_pmkid(struct wpa_state_machine *sm, const u8 *pmk,
|
D | wpa_auth.c | 62 const u8 *pmk, unsigned int pmk_len, 1298 const u8 *pmk = NULL; local 1310 pmk = wpa_auth_get_psk(sm->wpa_auth, sm->addr, 1311 sm->p2p_dev_addr, pmk, &pmk_len, 1313 if (!pmk) 1317 os_memcpy(sm->xxkey, pmk, pmk_len); 1322 pmk = sm->PMK; 1326 if (wpa_derive_ptk(sm, sm->alt_SNonce, pmk, pmk_len, &PTK, 0, 1333 if (sm->PMK != pmk) { 1334 os_memcpy(sm->PMK, pmk, pmk_len); [all …]
|
/hostap-latest/wpa_supplicant/ |
D | wpas_glue.c | 289 u8 pmk[PMK_LEN_MAX]; in wpa_supplicant_eapol_cb() local 341 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN); in wpa_supplicant_eapol_cb() 348 res = eapol_sm_get_key(eapol, pmk, pmk_len); in wpa_supplicant_eapol_cb() 354 res = eapol_sm_get_key(eapol, pmk, 16); in wpa_supplicant_eapol_cb() 366 "handshake", pmk, pmk_len); in wpa_supplicant_eapol_cb() 368 if (wpa_drv_set_key(wpa_s, -1, 0, NULL, 0, 0, NULL, 0, pmk, in wpa_supplicant_eapol_cb() 614 const u8 *pmk, size_t pmk_len, in wpa_supplicant_add_pmkid() argument 649 params.pmk = pmk; in wpa_supplicant_add_pmkid() 1265 static int wpa_supplicant_key_mgmt_set_pmk(void *ctx, const u8 *pmk, in wpa_supplicant_key_mgmt_set_pmk() argument 1273 NULL, 0, pmk, pmk_len, KEY_FLAG_PMK); in wpa_supplicant_key_mgmt_set_pmk()
|
D | mesh_rsn.c | 95 return sta->sae->pmk; in auth_get_psk() 407 sta->sae->pmkid, sta->sae->pmk, in mesh_rsn_auth_sae_sta() 467 sha256_prf(sta->sae->pmk, sizeof(sta->sae->pmk), "AEK Derivation", in mesh_rsn_derive_aek() 528 sha256_prf(sta->sae->pmk, SAE_PMK_LEN, in mesh_rsn_derive_mtk()
|