/hostap-latest/src/rsn_supp/ |
D | wpa_ft.c | 71 sm->pmk_r1_name) < 0) in wpa_derive_ptk_ft() 85 sm->pmk_r1_name, ptk, ptk_name, sm->key_mgmt, in wpa_derive_ptk_ft() 695 sm->pmk_r1_name) < 0) in wpa_ft_process_response() 713 sm->pmk_r1_name, &sm->ptk, ptk_name, sm->key_mgmt, in wpa_ft_process_response() 741 sm->pmk_r1_name, in wpa_ft_process_response() 1130 os_memcmp_const(parse.rsn_pmkid, sm->pmk_r1_name, WPA_PMK_NAME_LEN)) in wpa_ft_validate_reassoc_resp() 1371 u8 *pmk_r1, size_t *pmk_r1_len, u8 *pmk_r1_name) in wpa_pasn_ft_derive_pmk_r1() argument 1397 pmk_r1_name) < 0) in wpa_pasn_ft_derive_pmk_r1() 1403 wpa_hexdump(MSG_DEBUG, "PASN: FT: PMKR1Name", pmk_r1_name, in wpa_pasn_ft_derive_pmk_r1()
|
D | wpa.h | 554 u8 *pmk_r1, size_t *pmk_r1_len, u8 *pmk_r1_name); 605 u8 *pmk_r1, size_t *pmk_r1_len, u8 *pmk_r1_name) in wpa_pasn_ft_derive_pmk_r1() argument
|
D | wpa_i.h | 155 u8 pmk_r1_name[WPA_PMK_NAME_LEN]; member
|
D | wpa.c | 562 sm->pmk_r1_name, !sm->ft_prepend_pmkid); in wpa_supplicant_send_2_of_4() 2112 if (os_memcmp_const(rsn.pmkid, sm->pmk_r1_name, WPA_PMK_NAME_LEN) != 0) in ft_validate_rsnie() 2120 sm->pmk_r1_name, WPA_PMK_NAME_LEN); in ft_validate_rsnie() 6337 sm->pmk_r1_name, sm->fils_ft_len) < 0) { in fils_ft_build_assoc_req_rsne() 6341 os_memcpy(pos, sm->pmk_r1_name, WPA_PMK_NAME_LEN); in fils_ft_build_assoc_req_rsne() 6685 os_memcmp(rsn.pmkid, sm->pmk_r1_name, in fils_process_assoc_resp()
|
/hostap-latest/src/ap/ |
D | wpa_auth_ft.c | 1225 u8 pmk_r1_name[WPA_PMK_NAME_LEN]; member 1446 const u8 *pmk_r1_name, int pairwise, in wpa_ft_store_pmk_r1() argument 1469 os_memcpy(r1->pmk_r1_name, pmk_r1_name, WPA_PMK_NAME_LEN); in wpa_ft_store_pmk_r1() 1511 const u8 *spa, const u8 *pmk_r1_name, in wpa_ft_fetch_pmk_r1() argument 1526 os_memcmp_const(r1->pmk_r1_name, pmk_r1_name, in wpa_ft_fetch_pmk_r1() 2158 pmk_r1, sm->pmk_r1_name) < 0) in wpa_auth_derive_ptk_ft() 2162 sm->addr, sm->wpa_auth->addr, sm->pmk_r1_name, in wpa_auth_derive_ptk_ft() 2200 sm->pmk_r1_name, sm->pairwise, &vlan, in wpa_auth_ft_store_keys() 2610 sm->pmk_r1_name, WPA_PMK_NAME_LEN); in wpa_sm_write_assoc_resp_ies() 2626 sm->pmk_r1_name, WPA_PMK_NAME_LEN); in wpa_sm_write_assoc_resp_ies() [all …]
|
D | wpa_auth_i.h | 138 u8 pmk_r1_name[WPA_PMK_NAME_LEN]; /* PMKR1Name derived from FT Auth member
|
D | wpa_auth.h | 564 const u8 *spa, const u8 *pmk_r1_name,
|
D | wpa_auth.c | 1191 if (os_memcmp_const(pmkid, sm->pmk_r1_name, 1226 sm->pmk_r1_name, WPA_PMK_NAME_LEN); 2888 sm->pmk_r1_name, ptk, 3015 sm->pmk_r1_name, 3020 wpa_hexdump(MSG_DEBUG, "FILS+FT: PMKR1Name", sm->pmk_r1_name, 4880 res = wpa_insert_pmkid(kde, &elen, sm->pmk_r1_name, true); 7129 res = wpa_insert_pmkid(kde, &elen, sm->pmk_r1_name, true);
|
D | wpa_auth_ie.c | 1236 os_memcmp_const(data.pmkid, sm->pmk_r1_name, in wpa_validate_wpa_ie()
|
/hostap-latest/wlantest/ |
D | rx_mgmt.c | 799 sta->pmk_r1_name) < 0) in process_ft_auth() 816 sta->pmk_r1_name, &ptk, ptk_name, sta->key_mgmt, in process_ft_auth() 1603 if (os_memcmp_const(parse.rsn_pmkid, sta->pmk_r1_name, in rx_mgmt_reassoc_req() 1612 sta->pmk_r1_name, WPA_PMK_NAME_LEN); in rx_mgmt_reassoc_req() 1684 os_memcmp_const(parse.rsn_pmkid, sta->pmk_r1_name, in rx_mgmt_reassoc_req() 2220 if (os_memcmp_const(parse.rsn_pmkid, sta->pmk_r1_name, in rx_mgmt_reassoc_resp() 2229 sta->pmk_r1_name, WPA_PMK_NAME_LEN); in rx_mgmt_reassoc_resp() 2362 sta->pmk_r1_name, in rx_mgmt_reassoc_resp() 2711 sta->pmk_r1_name) < 0) in rx_mgmt_action_ft_response() 2726 os_memcpy(new_sta->pmk_r1_name, sta->pmk_r1_name, in rx_mgmt_action_ft_response() [all …]
|
D | wlantest.h | 86 u8 pmk_r1_name[WPA_PMK_NAME_LEN]; member
|
D | rx_eapol.c | 229 sta->pmk_r1, sta->pmk_r1_name) < 0) in try_pmk() 234 aa, sta->pmk_r1_name, in try_pmk() 1158 os_memcmp_const(rsn.pmkid, sta->pmk_r1_name, in rx_data_eapol_key_3_of_4()
|
/hostap-latest/src/common/ |
D | wpa_common.h | 502 const u8 *s1kh_id, u8 *pmk_r1_name, 507 u8 *pmk_r1, u8 *pmk_r1_name); 510 const u8 *pmk_r1_name,
|
D | wpa_common.c | 2319 const u8 *s1kh_id, u8 *pmk_r1_name, in wpa_derive_pmk_r1_name() argument 2364 os_memcpy(pmk_r1_name, hash, WPA_PMK_NAME_LEN); in wpa_derive_pmk_r1_name() 2365 wpa_hexdump(MSG_DEBUG, title, pmk_r1_name, WPA_PMK_NAME_LEN); in wpa_derive_pmk_r1_name() 2378 u8 *pmk_r1, u8 *pmk_r1_name) in wpa_derive_pmk_r1() argument 2417 pmk_r1_name, pmk_r0_len); in wpa_derive_pmk_r1() 2429 const u8 *pmk_r1_name, in wpa_pmk_r1_to_ptk() argument 2531 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", pmk_r1_name, WPA_PMK_NAME_LEN); in wpa_pmk_r1_to_ptk() 2532 addr[0] = pmk_r1_name; in wpa_pmk_r1_to_ptk()
|
/hostap-latest/src/pasn/ |
D | pasn_common.h | 102 u8 pmk_r1_name[WPA_PMK_NAME_LEN]; member
|
D | pasn_initiator.c | 556 pmkid = pasn->pmk_r1_name; in wpas_pasn_build_auth_1() 739 os_memset(pasn->pmk_r1_name, 0, sizeof(pasn->pmk_r1_name)); in wpa_pasn_reset()
|
/hostap-latest/wpa_supplicant/ |
D | pasn_supplicant.c | 640 pasn->pmk_r1_name); in wpas_pasn_auth_start_cb()
|