/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/ |
H A D | pmksa_cache.c | 67 if (wpa_key_mgmt_sae(entry->akmp) && in pmksa_cache_expire() 119 if (wpa_key_mgmt_sae(pmksa->pmksa->akmp) && in pmksa_cache_set_expiration() 142 if (entry && !wpa_key_mgmt_sae(entry->akmp)) { in pmksa_cache_set_expiration() 163 * @akmp: WPA_KEY_MGMT_* used in key derivation 175 const u8 *aa, const u8 *spa, void *network_ctx, int akmp, in pmksa_cache_add() 184 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_add() 194 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) in pmksa_cache_add() 196 else if (wpa_key_mgmt_suite_b(akmp)) in pmksa_cache_add() 199 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_add() 204 entry->akmp in pmksa_cache_add() 173 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp, const u8 *cache_id) pmksa_cache_add() argument 397 pmksa_cache_get(struct rsn_pmksa_cache *pmksa, const u8 *aa, const u8 *pmkid, const void *network_ctx, int akmp) pmksa_cache_get() argument 460 pmksa_cache_get_opportunistic(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *aa, int akmp) pmksa_cache_get_opportunistic() argument 555 pmksa_cache_set_current(struct wpa_sm *sm, const u8 *pmkid, const u8 *bssid, void *network_ctx, int try_opportunistic, const u8 *fils_cache_id, int akmp) pmksa_cache_set_current() argument [all...] |
H A D | pmksa_cache.h | 21 int akmp; /* WPA_KEY_MGMT_* */ member 69 int akmp); 75 const u8 *aa, const u8 *spa, void *network_ctx, int akmp, 85 int akmp); 88 void *network_ctx, const u8 *aa, int akmp); 111 const void *network_ctx, int akmp) in pmksa_cache_get() 144 const u8 *aa, const u8 *spa, void *network_ctx, int akmp, in pmksa_cache_add() 159 int akmp) in pmksa_cache_set_current() 110 pmksa_cache_get(struct rsn_pmksa_cache *pmksa, const u8 *aa, const u8 *pmkid, const void *network_ctx, int akmp) pmksa_cache_get() argument 142 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp, const u8 *cache_id) pmksa_cache_add() argument 154 pmksa_cache_set_current(struct wpa_sm *sm, const u8 *pmkid, const u8 *bssid, void *network_ctx, int try_opportunistic, const u8 *fils_cache_id, int akmp) pmksa_cache_set_current() argument
|
H A D | wpa.h | 50 u8 pmk_reauth_threshold, int akmp); 231 int akmp); 425 const void *network_ctx, int akmp) in wpa_sm_pmksa_cache_get() 497 int wpa_pasn_ft_derive_pmk_r1(struct wpa_sm *sm, int akmp, const u8 *r1kh_id, 547 int wpa_pasn_ft_derive_pmk_r1(struct wpa_sm *sm, int akmp, const u8 *r1kh_id, in wpa_pasn_ft_derive_pmk_r1() argument 424 wpa_sm_pmksa_cache_get(struct wpa_sm *sm, const u8 *aa, const u8 *pmkid, const void *network_ctx, int akmp) wpa_sm_pmksa_cache_get() argument
|
H A D | preauth.c | 52 static int rsn_preauth_key_mgmt(int akmp) in rsn_preauth_key_mgmt() argument 54 return !!(akmp & (WPA_KEY_MGMT_IEEE8021X | in rsn_preauth_key_mgmt() 367 p->akmp); in rsn_preauth_candidate_process()
|
H A D | wpa_i.h | 314 u8 pmk_reauth_threshold, int akmp) in wpa_sm_add_pmkid() 319 pmk_reauth_threshold, akmp); in wpa_sm_add_pmkid() 310 wpa_sm_add_pmkid(struct wpa_sm *sm, void *network_ctx, const u8 *bssid, const u8 *pmkid, const u8 *cache_id, const u8 *pmk, size_t pmk_len, u32 pmk_lifetime, u8 pmk_reauth_threshold, int akmp) wpa_sm_add_pmkid() argument
|
H A D | wpa_ft.c | 1337 int wpa_pasn_ft_derive_pmk_r1(struct wpa_sm *sm, int akmp, const u8 *bssid, 1342 if (sm->key_mgmt != (unsigned int) akmp) { 1345 sm->key_mgmt, akmp);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/ |
H A D | wpa_common.c | 24 static unsigned int wpa_kck_len(int akmp, size_t pmk_len) in wpa_kck_len() argument 26 switch (akmp) { in wpa_kck_len() 46 static unsigned int wpa_kck2_len(int akmp) in wpa_kck2_len() argument 48 switch (akmp) { in wpa_kck2_len() 60 static unsigned int wpa_kek_len(int akmp, size_t pmk_len) in wpa_kek_len() argument 62 switch (akmp) { in wpa_kek_len() 82 static unsigned int wpa_kek2_len(int akmp) in wpa_kek2_len() argument 84 switch (akmp) { in wpa_kek2_len() 96 unsigned int wpa_mic_len(int akmp, size_t pmk_len) in wpa_mic_len() argument 98 switch (akmp) { in wpa_mic_len() 122 wpa_use_akm_defined(int akmp) wpa_use_akm_defined() argument 139 wpa_use_cmac(int akmp) wpa_use_cmac() argument 160 wpa_use_aes_key_wrap(int akmp) wpa_use_aes_key_wrap() argument 192 wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver, const u8 *buf, size_t len, u8 *mic) wpa_eapol_key_mic() argument 349 wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, const u8 *addr1, const u8 *addr2, const u8 *nonce1, const u8 *nonce2, struct wpa_ptk *ptk, int akmp, int cipher, const u8 *z, size_t z_len) wpa_pmk_to_ptk() argument 477 fils_rmsk_to_pmk(int akmp, const u8 *rmsk, size_t rmsk_len, const u8 *snonce, const u8 *anonce, const u8 *dh_ss, size_t dh_ss_len, u8 *pmk, size_t *pmk_len) fils_rmsk_to_pmk() argument 526 fils_pmkid_erp(int akmp, const u8 *reauth, size_t reauth_len, u8 *pmkid) fils_pmkid_erp() argument 551 fils_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const u8 *spa, const u8 *aa, const u8 *snonce, const u8 *anonce, const u8 *dhss, size_t dhss_len, struct wpa_ptk *ptk, u8 *ick, size_t *ick_len, int akmp, int cipher, u8 *fils_ft, size_t *fils_ft_len) fils_pmk_to_ptk() argument 662 fils_key_auth_sk(const u8 *ick, size_t ick_len, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *g_sta, size_t g_sta_len, const u8 *g_ap, size_t g_ap_len, int akmp, u8 *key_auth_sta, u8 *key_auth_ap, size_t *key_auth_len) fils_key_auth_sk() argument 1696 wpa_pmk_r1_to_ptk(const u8 *pmk_r1, size_t pmk_r1_len, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *pmk_r1_name, struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher) wpa_pmk_r1_to_ptk() argument 1837 rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa, u8 *pmkid, int akmp) rsn_pmkid() argument [all...] |
H A D | wpa_common.h | 345 int wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver, 350 struct wpa_ptk *ptk, int akmp, int cipher, 352 int fils_rmsk_to_pmk(int akmp, const u8 *rmsk, size_t rmsk_len, 355 int fils_pmkid_erp(int akmp, const u8 *reauth, size_t reauth_len, 360 u8 *ick, size_t *ick_len, int akmp, int cipher, 366 int akmp, u8 *key_auth_sta, u8 *key_auth_ap, 390 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher); 414 u8 *pmkid, int akmp); 488 unsigned int wpa_mic_len(int akmp, size_t pmk_len); 489 int wpa_use_akm_defined(int akmp); [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/ |
H A D | pmksa_cache.c | 121 * @akmp: WPA_KEY_MGMT_* used in key derivation 133 const u8 *aa, const u8 *spa, void *network_ctx, int akmp, in pmksa_cache_add() 142 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_add() 152 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) in pmksa_cache_add() 154 else if (wpa_key_mgmt_suite_b(akmp)) in pmksa_cache_add() 157 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_add() 162 entry->akmp = akmp; in pmksa_cache_add() 266 " network_ctx=%p akmp=0x%x", MAC2STR(entry->aa), in pmksa_cache_add_entry() 267 entry->network_ctx, entry->akmp); in pmksa_cache_add_entry() 131 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp, const u8 *cache_id) pmksa_cache_add() argument 348 pmksa_cache_get(struct rsn_pmksa_cache *pmksa, const u8 *aa, const u8 *pmkid, const void *network_ctx, int akmp) pmksa_cache_get() argument 405 pmksa_cache_get_opportunistic(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *aa, int akmp) pmksa_cache_get_opportunistic() argument 483 pmksa_cache_set_current(struct wpa_sm *sm, const u8 *pmkid, const u8 *bssid, void *network_ctx, int try_opportunistic, const u8 *fils_cache_id, int akmp) pmksa_cache_set_current() argument [all...] |
H A D | pmksa_cache.h | 21 int akmp; /* WPA_KEY_MGMT_* */ member 65 int akmp); 71 const u8 *aa, const u8 *spa, void *network_ctx, int akmp, 81 int akmp); 84 void *network_ctx, const u8 *aa, int akmp); 104 const void *network_ctx, int akmp) in pmksa_cache_get() 137 const u8 *aa, const u8 *spa, void *network_ctx, int akmp, in pmksa_cache_add() 152 int akmp) in pmksa_cache_set_current() 103 pmksa_cache_get(struct rsn_pmksa_cache *pmksa, const u8 *aa, const u8 *pmkid, const void *network_ctx, int akmp) pmksa_cache_get() argument 135 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp, const u8 *cache_id) pmksa_cache_add() argument 147 pmksa_cache_set_current(struct wpa_sm *sm, const u8 *pmkid, const u8 *bssid, void *network_ctx, int try_opportunistic, const u8 *fils_cache_id, int akmp) pmksa_cache_set_current() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | wpa_common.c | 28 static unsigned int wpa_kck_len(int akmp, size_t pmk_len) in wpa_kck_len() argument 30 switch (akmp) { in wpa_kck_len() 52 static unsigned int wpa_kck2_len(int akmp) in wpa_kck2_len() argument 54 switch (akmp) { in wpa_kck2_len() 66 static unsigned int wpa_kek_len(int akmp, size_t pmk_len) in wpa_kek_len() argument 68 switch (akmp) { in wpa_kek_len() 90 static unsigned int wpa_kek2_len(int akmp) in wpa_kek2_len() argument 92 switch (akmp) { in wpa_kek2_len() 104 unsigned int wpa_mic_len(int akmp, size_t pmk_len) in wpa_mic_len() argument 106 switch (akmp) { in wpa_mic_len() 132 wpa_use_akm_defined(int akmp) wpa_use_akm_defined() argument 149 wpa_use_cmac(int akmp) wpa_use_cmac() argument 171 wpa_use_aes_key_wrap(int akmp) wpa_use_aes_key_wrap() argument 203 wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver, const u8 *buf, size_t len, u8 *mic) wpa_eapol_key_mic() argument 384 wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, const u8 *addr1, const u8 *addr2, const u8 *nonce1, const u8 *nonce2, struct wpa_ptk *ptk, int akmp, int cipher, const u8 *z, size_t z_len, size_t kdk_len) wpa_pmk_to_ptk() argument 583 fils_rmsk_to_pmk(int akmp, const u8 *rmsk, size_t rmsk_len, const u8 *snonce, const u8 *anonce, const u8 *dh_ss, size_t dh_ss_len, u8 *pmk, size_t *pmk_len) fils_rmsk_to_pmk() argument 632 fils_pmkid_erp(int akmp, const u8 *reauth, size_t reauth_len, u8 *pmkid) fils_pmkid_erp() argument 657 fils_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const u8 *spa, const u8 *aa, const u8 *snonce, const u8 *anonce, const u8 *dhss, size_t dhss_len, struct wpa_ptk *ptk, u8 *ick, size_t *ick_len, int akmp, int cipher, u8 *fils_ft, size_t *fils_ft_len, size_t kdk_len) fils_pmk_to_ptk() argument 793 fils_key_auth_sk(const u8 *ick, size_t ick_len, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *g_sta, size_t g_sta_len, const u8 *g_ap, size_t g_ap_len, int akmp, u8 *key_auth_sta, u8 *key_auth_ap, size_t *key_auth_len) fils_key_auth_sk() argument 1252 pasn_use_sha384(int akmp, int cipher) pasn_use_sha384() argument 1275 pasn_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const u8 *spa, const u8 *bssid, const u8 *dhss, size_t dhss_len, struct wpa_ptk *ptk, int akmp, int cipher, size_t kdk_len) pasn_pmk_to_ptk() argument 1377 pasn_mic_len(int akmp, int cipher) pasn_mic_len() argument 1406 pasn_mic(const u8 *kck, int akmp, int cipher, const u8 *addr1, const u8 *addr2, const u8 *data, size_t data_len, const u8 *frame, size_t frame_len, u8 *mic) pasn_mic() argument 1482 pasn_auth_frame_hash(int akmp, int cipher, const u8 *data, size_t len, u8 *hash) pasn_auth_frame_hash() argument 2106 wpa_pmk_r1_to_ptk(const u8 *pmk_r1, size_t pmk_r1_len, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *pmk_r1_name, struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher, size_t kdk_len) wpa_pmk_r1_to_ptk() argument 2262 rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa, u8 *pmkid, int akmp) rsn_pmkid() argument 3632 wpa_pasn_add_rsne(struct wpabuf *buf, const u8 *pmkid, int akmp, int cipher) wpa_pasn_add_rsne() argument [all...] |
H A D | wpa_common.h | 439 int wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver, 444 struct wpa_ptk *ptk, int akmp, int cipher, 446 int fils_rmsk_to_pmk(int akmp, const u8 *rmsk, size_t rmsk_len, 449 int fils_pmkid_erp(int akmp, const u8 *reauth, size_t reauth_len, 454 u8 *ick, size_t *ick_len, int akmp, int cipher, 460 int akmp, u8 *key_auth_sta, u8 *key_auth_ap, 486 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher, 511 u8 *pmkid, int akmp); 703 unsigned int wpa_mic_len(int akmp, size_t pmk_len); 704 int wpa_use_akm_defined(int akmp); [all...] |
H A D | sae.c | 1551 if (wpa_key_mgmt_sae_ext_key(sae->akmp)) in sae_derive_keys() 1556 sae->h2e, sae->akmp, in sae_derive_keys() 1557 wpa_akm_to_suite(sae->akmp), in sae_derive_keys() 1558 wpa_key_mgmt_txt(sae->akmp, WPA_PROTO_RSN)); in sae_derive_keys() 1741 if (wpa_key_mgmt_sae_ext_key(sae->akmp)) { in sae_write_commit() 1742 u32 suite = wpa_akm_to_suite(sae->akmp); in sae_write_commit() 2222 if (!sae->akmp) { in sae_parse_commit() 2225 sae->akmp = WPA_KEY_MGMT_SAE_EXT_KEY; in sae_parse_commit()
|
H A D | sae.h | 110 int akmp; /* WPA_KEY_MGMT_* used in key derivation */ member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | pasn_supplicant.c | 32 int akmp; member 68 int akmp, int cipher, u8 status, in wpas_pasn_auth_status() 82 " akmp=%s, status=%u comeback_after=%u comeback=%s", in wpas_pasn_auth_status() 84 wpa_key_mgmt_txt(akmp, WPA_PROTO_RSN), in wpas_pasn_auth_status() 87 " akmp=%s, status=%u comeback_after=%u comeback=%s", in wpas_pasn_auth_status() 89 wpa_key_mgmt_txt(akmp, WPA_PROTO_RSN), in wpas_pasn_auth_status() 98 PASN_AUTH_STATUS MACSTR " akmp=%s, status=%u", in wpas_pasn_auth_status() 99 MAC2STR(bssid), wpa_key_mgmt_txt(akmp, WPA_PROTO_RSN), in wpas_pasn_auth_status() 341 wpa_pasn_add_rsne(buf, NULL, pasn->akmp, pasn->cipher); in wpas_pasn_fils_build_auth() 365 ret = fils_pmkid_erp(pasn->akmp, wpabuf_hea in wpas_pasn_fils_build_auth() 67 wpas_pasn_auth_status(struct wpa_supplicant *wpa_s, const u8 *bssid, int akmp, int cipher, u8 status, struct wpabuf *comeback, u16 comeback_after) wpas_pasn_auth_status() argument 1005 wpas_pasn_start(struct wpa_supplicant *wpa_s, const u8 *bssid, int akmp, int cipher, u16 group, int freq, const u8 *beacon_rsne, u8 beacon_rsne_len, const u8 *beacon_rsnxe, u8 beacon_rsnxe_len, int network_id, struct wpabuf *comeback) wpas_pasn_start() argument 1132 wpas_pasn_allowed(struct wpa_supplicant *wpa_s, const u8 *bssid, int akmp, int cipher) wpas_pasn_allowed() argument 1239 wpas_pasn_auth_start(struct wpa_supplicant *wpa_s, const u8 *bssid, int akmp, int cipher, u16 group, int network_id, const u8 *comeback, size_t comeback_len) wpas_pasn_auth_start() argument 1327 int akmp = pasn->akmp; wpas_pasn_immediate_retry() local [all...] |
H A D | preauth_test.c | 158 int akmp) in wpa_supplicant_add_pmkid() 153 wpa_supplicant_add_pmkid(void *wpa_s, void *network_ctx, const u8 *bssid, const u8 *pmkid, const u8 *fils_cache_id, const u8 *pmk, size_t pmk_len, u32 pmk_lifetime, u8 pmk_reauth_threshold, int akmp) wpa_supplicant_add_pmkid() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | pmksa_cache_auth.c | 270 * @akmp: WPA_KEY_MGMT_* used in key derivation 283 struct eapol_state_machine *eapol, int akmp) in pmksa_cache_auth_add() 289 akmp); in pmksa_cache_auth_add() 309 * @akmp: WPA_KEY_MGMT_* used in key derivation 318 struct eapol_state_machine *eapol, int akmp) in pmksa_cache_auth_create_entry() 326 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_auth_create_entry() 336 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) in pmksa_cache_auth_create_entry() 338 else if (wpa_key_mgmt_suite_b(akmp)) in pmksa_cache_auth_create_entry() 341 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_auth_create_entry() 348 entry->akmp in pmksa_cache_auth_create_entry() 279 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) pmksa_cache_auth_add() argument 315 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) pmksa_cache_auth_create_entry() argument [all...] |
H A D | pmksa_cache_auth.h | 23 int akmp; /* WPA_KEY_MGMT_* */ member 55 struct eapol_state_machine *eapol, int akmp); 60 struct eapol_state_machine *eapol, int akmp);
|
H A D | ieee802_11.c | 976 sta->sae->pmkid, sta->sae->akmp); in sae_accept_sta() 1952 if (pmksa && wpa_auth_sta_key_mgmt(sta->wpa_sm) != pmksa->akmp) { in handle_auth_fils() 1955 wpa_auth_sta_key_mgmt(sta->wpa_sm), pmksa->akmp); in handle_auth_fils() 2530 pasn->sae.pmkid, pasn->sae.akmp); in pasn_wd_handle_sae_confirm() 2606 wpa_pasn_add_rsne(buf, NULL, pasn->akmp, pasn->cipher); in pasn_get_fils_wd() 2660 ret = fils_rmsk_to_pmk(pasn->akmp, msk, msk_len, fils->nonce, in pasn_fils_auth_resp() 2670 &sta->pasn->ptk, sta->pasn->akmp, in pasn_fils_auth_resp() 2814 fils_pmkid_erp(pasn->akmp, wpabuf_head(fils_wd), wpabuf_len(fils_wd), in pasn_wd_handle_fils() 2828 switch (sta->pasn->akmp) { in pasn_get_wrapped_data() 2851 "PASN: TODO: Wrapped data for akmp in pasn_get_wrapped_data() [all...] |
H A D | wpa_auth.h | 424 int akmp); 428 int session_timeout, int akmp); 438 size_t pmk_len, int akmp,
|
H A D | wpa_auth.c | 50 static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK, 1770 static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK, in wpa_verify_key_mic() argument 1778 size_t mic_len = wpa_mic_len(akmp, pmk_len); in wpa_verify_key_mic() 1789 if (wpa_eapol_key_mic(PTK->kck, PTK->kck_len, akmp, in wpa_verify_key_mic() 2329 int akmp; in wpa_derive_ptk() local 2363 akmp = sm->wpa_key_mgmt; in wpa_derive_ptk() 2365 akmp |= WPA_KEY_MGMT_PSK_SHA256; in wpa_derive_ptk() 2368 ptk, akmp, sm->pairwise, z, z_len, kdk_len); in wpa_derive_ptk() 4855 int akmp) in wpa_auth_pmksa_add_sae() 4861 if (!akmp) in wpa_auth_pmksa_add_sae() 4853 wpa_auth_pmksa_add_sae(struct wpa_authenticator *wpa_auth, const u8 *addr, const u8 *pmk, size_t pmk_len, const u8 *pmkid, int akmp) wpa_auth_pmksa_add_sae() argument 4878 wpa_auth_pmksa_add2(struct wpa_authenticator *wpa_auth, const u8 *addr, const u8 *pmk, size_t pmk_len, const u8 *pmkid, int session_timeout, int akmp) wpa_auth_pmksa_add2() argument 4941 wpa_auth_pmksa_create_entry(const u8 *aa, const u8 *spa, const u8 *pmk, size_t pmk_len, int akmp, const u8 *pmkid, int expiration) wpa_auth_pmksa_create_entry() argument [all...] |
H A D | sta_info.h | 86 int akmp; member
|
H A D | ctrl_iface_ap.c | 958 int akmp = 0, expiration = 0; in hostapd_ctrl_iface_pmksa_add() local 962 * <STA addr> <PMKID> <PMK> <expiration in seconds> <akmp> in hostapd_ctrl_iface_pmksa_add() 991 if (sscanf(pos, "%d %d", &expiration, &akmp) != 2) in hostapd_ctrl_iface_pmksa_add() 995 pmkid, expiration, akmp); in hostapd_ctrl_iface_pmksa_add()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | pmksa_cache_auth.c | 270 * @akmp: WPA_KEY_MGMT_* used in key derivation 283 struct eapol_state_machine *eapol, int akmp) in pmksa_cache_auth_add() 289 akmp); in pmksa_cache_auth_add() 309 * @akmp: WPA_KEY_MGMT_* used in key derivation 318 struct eapol_state_machine *eapol, int akmp) in pmksa_cache_auth_create_entry() 326 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_auth_create_entry() 336 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) in pmksa_cache_auth_create_entry() 338 else if (wpa_key_mgmt_suite_b(akmp)) in pmksa_cache_auth_create_entry() 341 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_auth_create_entry() 348 entry->akmp in pmksa_cache_auth_create_entry() 279 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) pmksa_cache_auth_add() argument 315 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) pmksa_cache_auth_create_entry() argument [all...] |
H A D | pmksa_cache_auth.h | 23 int akmp; /* WPA_KEY_MGMT_* */ member 55 struct eapol_state_machine *eapol, int akmp); 60 struct eapol_state_machine *eapol, int akmp);
|