Home
last modified time | relevance | path

Searched refs:akmp (Results 1 – 16 of 16) sorted by relevance

/external/wpa_supplicant_8/src/rsn_supp/
Dpmksa_cache.c135 const u8 *aa, const u8 *spa, void *network_ctx, int akmp, in pmksa_cache_add() argument
144 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_add()
154 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) in pmksa_cache_add()
156 else if (wpa_key_mgmt_suite_b(akmp)) in pmksa_cache_add()
159 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_add()
164 entry->akmp = akmp; in pmksa_cache_add()
269 entry->network_ctx, entry->akmp); in pmksa_cache_add_entry()
356 int akmp) in pmksa_cache_get() argument
363 (!akmp || akmp == entry->akmp) && in pmksa_cache_get()
381 if (wpa_key_mgmt_sae(old_entry->akmp)) in pmksa_cache_clone_entry()
[all …]
Dpmksa_cache.h21 int akmp; /* WPA_KEY_MGMT_* */ member
66 int akmp);
72 const u8 *aa, const u8 *spa, void *network_ctx, int akmp,
82 int akmp);
85 void *network_ctx, const u8 *aa, int akmp);
105 const void *network_ctx, int akmp) in pmksa_cache_get() argument
138 const u8 *aa, const u8 *spa, void *network_ctx, int akmp, in pmksa_cache_add() argument
153 int akmp) in pmksa_cache_set_current() argument
Dpreauth.c52 static int rsn_preauth_key_mgmt(int akmp) in rsn_preauth_key_mgmt() argument
54 return !!(akmp & (WPA_KEY_MGMT_IEEE8021X | in rsn_preauth_key_mgmt()
Dwpa.c582 int akmp; in wpa_derive_ptk() local
596 akmp = sm->key_mgmt; in wpa_derive_ptk()
598 if (sm->owe_ptk_workaround && akmp == WPA_KEY_MGMT_OWE && in wpa_derive_ptk()
602 akmp |= WPA_KEY_MGMT_PSK_SHA256; in wpa_derive_ptk()
607 key->key_nonce, ptk, akmp, in wpa_derive_ptk()
/external/wpa_supplicant_8/src/common/
Dwpa_common.c24 static unsigned int wpa_kck_len(int akmp, size_t pmk_len) in wpa_kck_len() argument
26 switch (akmp) { in wpa_kck_len()
46 static unsigned int wpa_kck2_len(int akmp) in wpa_kck2_len() argument
48 switch (akmp) { in wpa_kck2_len()
60 static unsigned int wpa_kek_len(int akmp, size_t pmk_len) in wpa_kek_len() argument
62 switch (akmp) { in wpa_kek_len()
82 static unsigned int wpa_kek2_len(int akmp) in wpa_kek2_len() argument
84 switch (akmp) { in wpa_kek2_len()
96 unsigned int wpa_mic_len(int akmp, size_t pmk_len) in wpa_mic_len() argument
98 switch (akmp) { in wpa_mic_len()
[all …]
Dwpa_common.h375 int wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver,
380 struct wpa_ptk *ptk, int akmp, int cipher,
382 int fils_rmsk_to_pmk(int akmp, const u8 *rmsk, size_t rmsk_len,
385 int fils_pmkid_erp(int akmp, const u8 *reauth, size_t reauth_len,
390 u8 *ick, size_t *ick_len, int akmp, int cipher,
396 int akmp, u8 *key_auth_sta, u8 *key_auth_ap,
422 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher);
446 u8 *pmkid, int akmp);
588 unsigned int wpa_mic_len(int akmp, size_t pmk_len);
589 int wpa_use_akm_defined(int akmp);
[all …]
/external/wpa_supplicant_8/src/ap/
Dpmksa_cache_auth.c283 struct eapol_state_machine *eapol, int akmp) in pmksa_cache_auth_add() argument
289 akmp); in pmksa_cache_auth_add()
318 struct eapol_state_machine *eapol, int akmp) in pmksa_cache_auth_create_entry() argument
326 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_auth_create_entry()
336 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) in pmksa_cache_auth_create_entry()
338 else if (wpa_key_mgmt_suite_b(akmp)) in pmksa_cache_auth_create_entry()
341 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_auth_create_entry()
348 entry->akmp = akmp; in pmksa_cache_auth_create_entry()
407 entry->akmp = old_entry->akmp; in pmksa_cache_add_okc()
519 if (wpa_key_mgmt_sae(entry->akmp)) { in pmksa_cache_get_okc()
[all …]
Dpmksa_cache_auth.h23 int akmp; /* WPA_KEY_MGMT_* */ member
55 struct eapol_state_machine *eapol, int akmp);
60 struct eapol_state_machine *eapol, int akmp);
Dctrl_iface_ap.c944 int akmp = 0, expiration = 0; in hostapd_ctrl_iface_pmksa_add() local
977 if (sscanf(pos, "%d %d", &expiration, &akmp) != 2) in hostapd_ctrl_iface_pmksa_add()
981 pmkid, expiration, akmp); in hostapd_ctrl_iface_pmksa_add()
Dwpa_auth.c42 static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK,
1708 static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK, in wpa_verify_key_mic() argument
1716 size_t mic_len = wpa_mic_len(akmp, pmk_len); in wpa_verify_key_mic()
1727 if (wpa_eapol_key_mic(PTK->kck, PTK->kck_len, akmp, in wpa_verify_key_mic()
2261 int akmp; in wpa_derive_ptk() local
2287 akmp = sm->wpa_key_mgmt; in wpa_derive_ptk()
2289 akmp |= WPA_KEY_MGMT_PSK_SHA256; in wpa_derive_ptk()
2292 ptk, akmp, sm->pairwise, z, z_len); in wpa_derive_ptk()
4720 int session_timeout, int akmp) in wpa_auth_pmksa_add2() argument
4728 NULL, akmp)) in wpa_auth_pmksa_add2()
Dwpa_auth.h407 int session_timeout, int akmp);
Dwpa_auth_glue.c354 if (sa && sa->akmp == WPA_KEY_MGMT_OWE) { in hostapd_wpa_auth_get_psk()
Dieee802_11.c1821 if (pmksa && wpa_auth_sta_key_mgmt(sta->wpa_sm) != pmksa->akmp) { in handle_auth_fils()
1824 wpa_auth_sta_key_mgmt(sta->wpa_sm), pmksa->akmp); in handle_auth_fils()
3329 if (!sa || sa->akmp != WPA_KEY_MGMT_SAE) { in check_assoc_ies()
/external/wpa_supplicant_8/wpa_supplicant/hidl/1.3/
Dmisc_utils.h75 ss.write((char *) &pmksa_entry->akmp, sizeof(pmksa_entry->akmp)); in serializePmkCacheEntry()
94 ss.read((char *) &pmksa_entry->akmp, sizeof(pmksa_entry->akmp)); in deserializePmkCacheEntry()
/external/wpa_supplicant_8/wpa_supplicant/
Ddpp_supplicant.c2189 entry->akmp = WPA_KEY_MGMT_DPP; in wpas_dpp_rx_peer_disc_resp()
Dctrl_iface.c10059 entry->akmp, in wpas_ctrl_iface_pmksa_get()
10146 &entry->akmp, &entry->opportunistic) != 4) in wpas_ctrl_iface_pmksa_add()