Searched refs:sae_pk (Results 1 – 22 of 22) sorted by relevance
29 struct sae_pk { struct70 const struct sae_pk *ap_pk;128 int *rejected_groups, const struct sae_pk *pk);164 void sae_deinit_pk(struct sae_pk *pk);165 struct sae_pk * sae_parse_pk(const char *val);
436 void sae_deinit_pk(struct sae_pk *pk) in sae_deinit_pk()450 struct sae_pk * sae_parse_pk(const char *val) in sae_parse_pk()452 struct sae_pk *pk; in sae_parse_pk()607 const struct sae_pk *pk; in sae_write_confirm_pk()808 if (!elems.fils_pk || !elems.fils_key_confirm || !elems.sae_pk) { in sae_check_confirm_pk()823 elems.sae_pk, SAE_PK_M_LEN + AES_BLOCK_SIZE); in sae_check_confirm_pk()826 elems.sae_pk, SAE_PK_M_LEN + AES_BLOCK_SIZE, in sae_check_confirm_pk()
117 const u8 *sae_pk; member
140 elems->sae_pk = pos + 4; in ieee802_11_parse_vendor_specific()
1376 int *rejected_groups, const struct sae_pk *pk) in sae_prepare_commit_pt()
361 (sm->sae_pwe == 1 || sm->sae_pwe == 2 || sm->sae_pk)) { in wpa_gen_rsnxe()364 if (sm->sae_pk) in wpa_gen_rsnxe()
110 unsigned int sae_pk:1; /* whether SAE-PK is used */ member
3331 sm->sae_pk = value; in wpa_sm_set_param()
1102 bool sae_pk = false; in hostapd_eid_rsnxe() local1110 sae_pk = hostapd_sae_pk_in_use(hapd->conf); in hostapd_eid_rsnxe()1115 hostapd_sae_pw_id_in_use(hapd->conf) || sae_pk) && in hostapd_eid_rsnxe()1119 if (sae_pk) in hostapd_eid_rsnxe()
398 (conf->sae_pwe == 1 || conf->sae_pwe == 2 || conf->sae_pk)) { in wpa_write_rsnxe()401 if (conf->sae_pk) in wpa_write_rsnxe()
261 bool sae_pk; member
255 struct sae_pk *pk;
495 const struct sae_pk **s_pk) in sae_get_password()500 const struct sae_pk *pk = NULL; in sae_get_password()543 const struct sae_pk *pk = NULL; in auth_build_sae_commit()1195 bool sae_pk = false; in sae_status_success() local1203 sae_pk = hostapd_sae_pk_in_use(hapd->conf); in sae_status_success()1204 if (sae_pwe == 0 && sae_pk) in sae_status_success()1212 (sae_pk && status_code == WLAN_STATUS_SAE_PK))) || in sae_status_success()1216 (sae_pk && status_code == WLAN_STATUS_SAE_PK))); in sae_status_success()
205 wconf->sae_pk = hostapd_sae_pk_in_use(conf); in hostapd_wpa_auth_conf()
1148 enum sae_pk_mode sae_pk; member
1315 (ssid->sae_pk != SAE_PK_MODE_ONLY || in wpa_supplicant_transition_disable()1321 ssid->sae_pk = SAE_PK_MODE_ONLY; in wpa_supplicant_transition_disable()
153 ssid->sae_pk != SAE_PK_MODE_DISABLED && in sme_auth_build_sae_commit()162 if (ssid->sae_pk == SAE_PK_MODE_ONLY && !use_pk) { in sme_auth_build_sae_commit()
844 INT(sae_pk); in wpa_config_write_network()
1329 if (ssid->sae_pk == SAE_PK_MODE_ONLY && in wpa_scan_res_ok()1443 if (ssid->sae_pk == SAE_PK_MODE_AUTOMATIC && in wpa_scan_res_ok()
2640 { INT_RANGE(sae_pk, 0, 2) },
1684 ssid->sae_pk != SAE_PK_MODE_DISABLED && in wpa_supplicant_set_suites()
2644 wpa_ssid->sae_pk = enable ? SAE_PK_MODE_ONLY : SAE_PK_MODE_AUTOMATIC; in enableSaePkOnlyModeInternal()