/dragonfly/contrib/wpa_supplicant/src/common/ |
H A D | wpa_common.c | 26 switch (akmp) { in wpa_kck_len() 48 switch (akmp) { in wpa_kck2_len() 62 switch (akmp) { in wpa_kek_len() 84 switch (akmp) { in wpa_kek2_len() 98 switch (akmp) { in wpa_mic_len() 130 wpa_key_mgmt_fils(akmp); in wpa_use_akm_defined() 139 int wpa_use_cmac(int akmp) in wpa_use_cmac() argument 144 wpa_key_mgmt_ft(akmp) || in wpa_use_cmac() 221 switch (akmp) { in wpa_eapol_key_mic() 311 akmp); in wpa_eapol_key_mic() [all …]
|
H A D | wpa_common.h | 350 struct wpa_ptk *ptk, int akmp, int cipher, 352 int fils_rmsk_to_pmk(int akmp, const u8 *rmsk, size_t rmsk_len, 355 int fils_pmkid_erp(int akmp, const u8 *reauth, size_t reauth_len, 360 u8 *ick, size_t *ick_len, int akmp, int cipher, 366 int akmp, u8 *key_auth_sta, u8 *key_auth_ap, 390 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher); 414 u8 *pmkid, int akmp); 488 unsigned int wpa_mic_len(int akmp, size_t pmk_len); 489 int wpa_use_akm_defined(int akmp); 490 int wpa_use_cmac(int akmp); [all …]
|
/dragonfly/contrib/wpa_supplicant/src/rsn_supp/ |
H A D | pmksa_cache.c | 154 else if (wpa_key_mgmt_suite_b(akmp)) in pmksa_cache_add() 162 entry->akmp = akmp; in pmksa_cache_add() 267 entry->network_ctx, entry->akmp); in pmksa_cache_add_entry() 351 int akmp) in pmksa_cache_get() argument 358 (!akmp || akmp == entry->akmp) && in pmksa_cache_get() 406 const u8 *aa, int akmp) in pmksa_cache_get_opportunistic() argument 415 (!akmp || entry->akmp == akmp)) { in pmksa_cache_get_opportunistic() 486 int akmp) in pmksa_cache_set_current() argument 506 network_ctx, akmp); in pmksa_cache_set_current() 509 network_ctx, akmp); in pmksa_cache_set_current() [all …]
|
H A D | pmksa_cache.h | 21 int akmp; /* WPA_KEY_MGMT_* */ member 65 int akmp); 71 const u8 *aa, const u8 *spa, void *network_ctx, int akmp, 81 int akmp); 84 void *network_ctx, const u8 *aa, int akmp); 104 const void *network_ctx, int akmp) in pmksa_cache_get() argument 137 const u8 *aa, const u8 *spa, void *network_ctx, int akmp, in pmksa_cache_add() argument 152 int akmp) in pmksa_cache_set_current() argument
|
/dragonfly/contrib/wpa_supplicant/src/ap/ |
H A D | pmksa_cache_auth.c | 283 struct eapol_state_machine *eapol, int akmp) in pmksa_cache_auth_add() argument 289 akmp); in pmksa_cache_auth_add() 318 struct eapol_state_machine *eapol, int akmp) in pmksa_cache_auth_create_entry() argument 326 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_auth_create_entry() 336 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) in pmksa_cache_auth_create_entry() 338 else if (wpa_key_mgmt_suite_b(akmp)) in pmksa_cache_auth_create_entry() 341 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_auth_create_entry() 348 entry->akmp = akmp; in pmksa_cache_auth_create_entry() 407 entry->akmp = old_entry->akmp; in pmksa_cache_add_okc() 520 entry->akmp); in pmksa_cache_get_okc()
|
H A D | pmksa_cache_auth.h | 23 int akmp; /* WPA_KEY_MGMT_* */ member 55 struct eapol_state_machine *eapol, int akmp); 60 struct eapol_state_machine *eapol, int akmp);
|
H A D | ctrl_iface_ap.c | 901 int akmp = 0, expiration = 0; in hostapd_ctrl_iface_pmksa_add() local 934 if (sscanf(pos, "%d %d", &expiration, &akmp) != 2) in hostapd_ctrl_iface_pmksa_add() 938 pmkid, expiration, akmp); in hostapd_ctrl_iface_pmksa_add()
|
H A D | wpa_auth.h | 378 int session_timeout, int akmp);
|
H A D | wpa_auth.c | 41 static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK, 1682 static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK, in wpa_verify_key_mic() argument 1690 size_t mic_len = wpa_mic_len(akmp, pmk_len); in wpa_verify_key_mic() 1701 if (wpa_eapol_key_mic(PTK->kck, PTK->kck_len, akmp, in wpa_verify_key_mic() 4443 int session_timeout, int akmp) in wpa_auth_pmksa_add2() argument 4451 NULL, akmp)) in wpa_auth_pmksa_add2()
|
H A D | wpa_auth_glue.c | 289 if (sa && sa->akmp == WPA_KEY_MGMT_OWE) { in hostapd_wpa_auth_get_psk()
|
H A D | ieee802_11.c | 1596 if (pmksa && wpa_auth_sta_key_mgmt(sta->wpa_sm) != pmksa->akmp) { in handle_auth_fils() 1599 wpa_auth_sta_key_mgmt(sta->wpa_sm), pmksa->akmp); in handle_auth_fils() 3136 if (!sa || sa->akmp != WPA_KEY_MGMT_SAE) { in check_assoc_ies()
|
/dragonfly/contrib/wpa_supplicant/wpa_supplicant/ |
H A D | dpp_supplicant.c | 1419 entry->akmp = WPA_KEY_MGMT_DPP; in wpas_dpp_rx_peer_disc_resp()
|
H A D | ctrl_iface.c | 9712 entry->akmp, in wpas_ctrl_iface_pmksa_get() 9799 &entry->akmp, &entry->opportunistic) != 4) in wpas_ctrl_iface_pmksa_add()
|