/external/wpa_supplicant_8/src/rsn_supp/ |
D | pmksa_cache.c | 135 const u8 *aa, const u8 *spa, void *network_ctx, int akmp, in pmksa_cache_add() argument 144 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_add() 154 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) in pmksa_cache_add() 156 else if (wpa_key_mgmt_suite_b(akmp)) in pmksa_cache_add() 159 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_add() 164 entry->akmp = akmp; in pmksa_cache_add() 269 entry->network_ctx, entry->akmp); in pmksa_cache_add_entry() 356 int akmp) in pmksa_cache_get() argument 363 (!akmp || akmp == entry->akmp) && in pmksa_cache_get() 381 if (wpa_key_mgmt_sae(old_entry->akmp)) in pmksa_cache_clone_entry() [all …]
|
D | pmksa_cache.h | 21 int akmp; /* WPA_KEY_MGMT_* */ member 66 int akmp); 72 const u8 *aa, const u8 *spa, void *network_ctx, int akmp, 82 int akmp); 85 void *network_ctx, const u8 *aa, int akmp); 105 const void *network_ctx, int akmp) in pmksa_cache_get() argument 138 const u8 *aa, const u8 *spa, void *network_ctx, int akmp, in pmksa_cache_add() argument 153 int akmp) in pmksa_cache_set_current() argument
|
D | preauth.c | 52 static int rsn_preauth_key_mgmt(int akmp) in rsn_preauth_key_mgmt() argument 54 return !!(akmp & (WPA_KEY_MGMT_IEEE8021X | in rsn_preauth_key_mgmt()
|
D | wpa.c | 582 int akmp; in wpa_derive_ptk() local 596 akmp = sm->key_mgmt; in wpa_derive_ptk() 598 if (sm->owe_ptk_workaround && akmp == WPA_KEY_MGMT_OWE && in wpa_derive_ptk() 602 akmp |= WPA_KEY_MGMT_PSK_SHA256; in wpa_derive_ptk() 607 key->key_nonce, ptk, akmp, in wpa_derive_ptk()
|
/external/wpa_supplicant_8/src/common/ |
D | wpa_common.c | 24 static unsigned int wpa_kck_len(int akmp, size_t pmk_len) in wpa_kck_len() argument 26 switch (akmp) { in wpa_kck_len() 46 static unsigned int wpa_kck2_len(int akmp) in wpa_kck2_len() argument 48 switch (akmp) { in wpa_kck2_len() 60 static unsigned int wpa_kek_len(int akmp, size_t pmk_len) in wpa_kek_len() argument 62 switch (akmp) { in wpa_kek_len() 82 static unsigned int wpa_kek2_len(int akmp) in wpa_kek2_len() argument 84 switch (akmp) { in wpa_kek2_len() 96 unsigned int wpa_mic_len(int akmp, size_t pmk_len) in wpa_mic_len() argument 98 switch (akmp) { in wpa_mic_len() [all …]
|
D | wpa_common.h | 375 int wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver, 380 struct wpa_ptk *ptk, int akmp, int cipher, 382 int fils_rmsk_to_pmk(int akmp, const u8 *rmsk, size_t rmsk_len, 385 int fils_pmkid_erp(int akmp, const u8 *reauth, size_t reauth_len, 390 u8 *ick, size_t *ick_len, int akmp, int cipher, 396 int akmp, u8 *key_auth_sta, u8 *key_auth_ap, 422 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher); 446 u8 *pmkid, int akmp); 588 unsigned int wpa_mic_len(int akmp, size_t pmk_len); 589 int wpa_use_akm_defined(int akmp); [all …]
|
/external/wpa_supplicant_8/src/ap/ |
D | pmksa_cache_auth.c | 283 struct eapol_state_machine *eapol, int akmp) in pmksa_cache_auth_add() argument 289 akmp); in pmksa_cache_auth_add() 318 struct eapol_state_machine *eapol, int akmp) in pmksa_cache_auth_create_entry() argument 326 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_auth_create_entry() 336 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) in pmksa_cache_auth_create_entry() 338 else if (wpa_key_mgmt_suite_b(akmp)) in pmksa_cache_auth_create_entry() 341 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_auth_create_entry() 348 entry->akmp = akmp; in pmksa_cache_auth_create_entry() 407 entry->akmp = old_entry->akmp; in pmksa_cache_add_okc() 519 if (wpa_key_mgmt_sae(entry->akmp)) { in pmksa_cache_get_okc() [all …]
|
D | pmksa_cache_auth.h | 23 int akmp; /* WPA_KEY_MGMT_* */ member 55 struct eapol_state_machine *eapol, int akmp); 60 struct eapol_state_machine *eapol, int akmp);
|
D | ctrl_iface_ap.c | 944 int akmp = 0, expiration = 0; in hostapd_ctrl_iface_pmksa_add() local 977 if (sscanf(pos, "%d %d", &expiration, &akmp) != 2) in hostapd_ctrl_iface_pmksa_add() 981 pmkid, expiration, akmp); in hostapd_ctrl_iface_pmksa_add()
|
D | wpa_auth.c | 42 static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK, 1708 static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK, in wpa_verify_key_mic() argument 1716 size_t mic_len = wpa_mic_len(akmp, pmk_len); in wpa_verify_key_mic() 1727 if (wpa_eapol_key_mic(PTK->kck, PTK->kck_len, akmp, in wpa_verify_key_mic() 2261 int akmp; in wpa_derive_ptk() local 2287 akmp = sm->wpa_key_mgmt; in wpa_derive_ptk() 2289 akmp |= WPA_KEY_MGMT_PSK_SHA256; in wpa_derive_ptk() 2292 ptk, akmp, sm->pairwise, z, z_len); in wpa_derive_ptk() 4720 int session_timeout, int akmp) in wpa_auth_pmksa_add2() argument 4728 NULL, akmp)) in wpa_auth_pmksa_add2()
|
D | wpa_auth.h | 407 int session_timeout, int akmp);
|
D | wpa_auth_glue.c | 354 if (sa && sa->akmp == WPA_KEY_MGMT_OWE) { in hostapd_wpa_auth_get_psk()
|
D | ieee802_11.c | 1821 if (pmksa && wpa_auth_sta_key_mgmt(sta->wpa_sm) != pmksa->akmp) { in handle_auth_fils() 1824 wpa_auth_sta_key_mgmt(sta->wpa_sm), pmksa->akmp); in handle_auth_fils() 3329 if (!sa || sa->akmp != WPA_KEY_MGMT_SAE) { in check_assoc_ies()
|
/external/wpa_supplicant_8/wpa_supplicant/hidl/1.3/ |
D | misc_utils.h | 75 ss.write((char *) &pmksa_entry->akmp, sizeof(pmksa_entry->akmp)); in serializePmkCacheEntry() 94 ss.read((char *) &pmksa_entry->akmp, sizeof(pmksa_entry->akmp)); in deserializePmkCacheEntry()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | dpp_supplicant.c | 2189 entry->akmp = WPA_KEY_MGMT_DPP; in wpas_dpp_rx_peer_disc_resp()
|
D | ctrl_iface.c | 10059 entry->akmp, in wpas_ctrl_iface_pmksa_get() 10146 &entry->akmp, &entry->opportunistic) != 4) in wpas_ctrl_iface_pmksa_add()
|