/external/wpa_supplicant_8/src/ap/ |
D | pmksa_cache_auth.c | 283 struct eapol_state_machine *eapol, int akmp) in pmksa_cache_auth_add() argument 291 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_auth_add() 301 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) in pmksa_cache_auth_add() 303 else if (wpa_key_mgmt_suite_b(akmp)) in pmksa_cache_auth_add() 307 wpa_key_mgmt_sha256(akmp)); in pmksa_cache_auth_add() 314 entry->akmp = akmp; in pmksa_cache_auth_add() 352 entry->akmp = old_entry->akmp; in pmksa_cache_add_okc() 465 wpa_key_mgmt_sha256(entry->akmp)); in pmksa_cache_get_okc()
|
D | pmksa_cache_auth.h | 23 int akmp; /* WPA_KEY_MGMT_* */ member 54 struct eapol_state_machine *eapol, int akmp);
|
D | wpa_auth.c | 36 static int wpa_verify_key_mic(int akmp, struct wpa_ptk *PTK, u8 *data, 1639 static int wpa_verify_key_mic(int akmp, struct wpa_ptk *PTK, u8 *data, in wpa_verify_key_mic() argument 1648 size_t mic_len = wpa_mic_len(akmp); in wpa_verify_key_mic() 1659 if (wpa_eapol_key_mic(PTK->kck, PTK->kck_len, akmp, in wpa_verify_key_mic()
|
D | ieee802_11.c | 1654 if (!sa || sa->akmp != WPA_KEY_MGMT_SAE) { in check_assoc_ies()
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | pmksa_cache.c | 129 const u8 *aa, const u8 *spa, void *network_ctx, int akmp) in pmksa_cache_add() argument 137 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_add() 147 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) in pmksa_cache_add() 149 else if (wpa_key_mgmt_suite_b(akmp)) in pmksa_cache_add() 153 wpa_key_mgmt_sha256(akmp)); in pmksa_cache_add() 158 entry->akmp = akmp; in pmksa_cache_add() 352 old_entry->network_ctx, old_entry->akmp); in pmksa_cache_clone_entry()
|
D | pmksa_cache.h | 21 int akmp; /* WPA_KEY_MGMT_* */ member 61 const u8 *aa, const u8 *spa, void *network_ctx, int akmp); 109 const u8 *aa, const u8 *spa, void *network_ctx, int akmp) in pmksa_cache_add() argument
|
D | peerkey.c | 247 peerkey->akmp = ie.key_mgmt; in wpa_supplicant_process_smk_m2() 298 int akmp) in rsn_smkid() argument 313 if (wpa_key_mgmt_sha256(akmp)) in rsn_smkid() 579 peerkey->akmp); in wpa_supplicant_process_smk_m45() 584 peerkey->akmp); in wpa_supplicant_process_smk_m45() 698 stk, peerkey->akmp, peerkey->cipher); in wpa_supplicant_process_stk_1_of_4() 925 &peerkey->stk, peerkey->akmp, peerkey->cipher); in peerkey_verify_eapol_key_mic() 1020 peerkey->akmp = sm->key_mgmt; in wpa_sm_stkstart()
|
D | peerkey.h | 30 int akmp; member
|
/external/wpa_supplicant_8/src/common/ |
D | wpa_common.c | 23 static unsigned int wpa_kck_len(int akmp) in wpa_kck_len() argument 25 if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) in wpa_kck_len() 31 static unsigned int wpa_kek_len(int akmp) in wpa_kek_len() argument 33 if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) in wpa_kek_len() 39 unsigned int wpa_mic_len(int akmp) in wpa_mic_len() argument 41 if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) in wpa_mic_len() 67 int wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver, in wpa_eapol_key_mic() argument 87 switch (akmp) { in wpa_eapol_key_mic() 144 struct wpa_ptk *ptk, int akmp, int cipher) in wpa_pmk_to_ptk() argument 168 ptk->kck_len = wpa_kck_len(akmp); in wpa_pmk_to_ptk() [all …]
|
D | wpa_common.h | 337 int wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver, 342 struct wpa_ptk *ptk, int akmp, int cipher); 363 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher); 451 unsigned int wpa_mic_len(int akmp);
|