Home
last modified time | relevance | path

Searched refs:akmp (Results 1 – 25 of 92) sorted by relevance

1234

/dports/net/hostapd-devel/hostap-14ab4a816/src/rsn_supp/
H A Dpmksa_cache.c67 if (wpa_key_mgmt_sae(entry->akmp) && in pmksa_cache_expire()
204 entry->akmp = akmp; in pmksa_cache_add()
316 entry->akmp); in pmksa_cache_add_entry()
400 int akmp) in pmksa_cache_get() argument
407 (!akmp || akmp == entry->akmp) && in pmksa_cache_get()
461 const u8 *aa, int akmp) in pmksa_cache_get_opportunistic() argument
470 (!akmp || entry->akmp == akmp)) { in pmksa_cache_get_opportunistic()
558 int akmp) in pmksa_cache_set_current() argument
578 network_ctx, akmp); in pmksa_cache_set_current()
581 network_ctx, akmp); in pmksa_cache_set_current()
[all …]
H A Dpmksa_cache.h21 int akmp; /* WPA_KEY_MGMT_* */ member
69 int akmp);
75 const u8 *aa, const u8 *spa, void *network_ctx, int akmp,
85 int akmp);
88 void *network_ctx, const u8 *aa, int akmp);
111 const void *network_ctx, int akmp) in pmksa_cache_get() argument
144 const u8 *aa, const u8 *spa, void *network_ctx, int akmp, in pmksa_cache_add() argument
159 int akmp) in pmksa_cache_set_current() argument
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/rsn_supp/
H A Dpmksa_cache.c67 if (wpa_key_mgmt_sae(entry->akmp) && in pmksa_cache_expire()
204 entry->akmp = akmp; in pmksa_cache_add()
316 entry->akmp); in pmksa_cache_add_entry()
400 int akmp) in pmksa_cache_get() argument
407 (!akmp || akmp == entry->akmp) && in pmksa_cache_get()
461 const u8 *aa, int akmp) in pmksa_cache_get_opportunistic() argument
470 (!akmp || entry->akmp == akmp)) { in pmksa_cache_get_opportunistic()
558 int akmp) in pmksa_cache_set_current() argument
578 network_ctx, akmp); in pmksa_cache_set_current()
581 network_ctx, akmp); in pmksa_cache_set_current()
[all …]
H A Dpmksa_cache.h21 int akmp; /* WPA_KEY_MGMT_* */ member
69 int akmp);
75 const u8 *aa, const u8 *spa, void *network_ctx, int akmp,
85 int akmp);
88 void *network_ctx, const u8 *aa, int akmp);
111 const void *network_ctx, int akmp) in pmksa_cache_get() argument
144 const u8 *aa, const u8 *spa, void *network_ctx, int akmp, in pmksa_cache_add() argument
159 int akmp) in pmksa_cache_set_current() argument
/dports/net/hostapd/hostapd-2.9/src/common/
H A Dwpa_common.c26 switch (akmp) { in wpa_kck_len()
48 switch (akmp) { in wpa_kck2_len()
62 switch (akmp) { in wpa_kek_len()
84 switch (akmp) { in wpa_kek2_len()
98 switch (akmp) { in wpa_mic_len()
130 wpa_key_mgmt_fils(akmp); in wpa_use_akm_defined()
139 int wpa_use_cmac(int akmp) in wpa_use_cmac() argument
144 wpa_key_mgmt_ft(akmp) || in wpa_use_cmac()
221 switch (akmp) { in wpa_eapol_key_mic()
311 akmp); in wpa_eapol_key_mic()
[all …]
H A Dwpa_common.h350 struct wpa_ptk *ptk, int akmp, int cipher,
352 int fils_rmsk_to_pmk(int akmp, const u8 *rmsk, size_t rmsk_len,
355 int fils_pmkid_erp(int akmp, const u8 *reauth, size_t reauth_len,
360 u8 *ick, size_t *ick_len, int akmp, int cipher,
366 int akmp, u8 *key_auth_sta, u8 *key_auth_ap,
390 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher);
414 u8 *pmkid, int akmp);
488 unsigned int wpa_mic_len(int akmp, size_t pmk_len);
489 int wpa_use_akm_defined(int akmp);
490 int wpa_use_cmac(int akmp);
[all …]
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/common/
H A Dwpa_common.c26 switch (akmp) { in wpa_kck_len()
48 switch (akmp) { in wpa_kck2_len()
62 switch (akmp) { in wpa_kek_len()
84 switch (akmp) { in wpa_kek2_len()
98 switch (akmp) { in wpa_mic_len()
130 wpa_key_mgmt_fils(akmp); in wpa_use_akm_defined()
139 int wpa_use_cmac(int akmp) in wpa_use_cmac() argument
144 wpa_key_mgmt_ft(akmp) || in wpa_use_cmac()
221 switch (akmp) { in wpa_eapol_key_mic()
311 akmp); in wpa_eapol_key_mic()
[all …]
H A Dwpa_common.h350 struct wpa_ptk *ptk, int akmp, int cipher,
352 int fils_rmsk_to_pmk(int akmp, const u8 *rmsk, size_t rmsk_len,
355 int fils_pmkid_erp(int akmp, const u8 *reauth, size_t reauth_len,
360 u8 *ick, size_t *ick_len, int akmp, int cipher,
366 int akmp, u8 *key_auth_sta, u8 *key_auth_ap,
390 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher);
414 u8 *pmkid, int akmp);
488 unsigned int wpa_mic_len(int akmp, size_t pmk_len);
489 int wpa_use_akm_defined(int akmp);
490 int wpa_use_cmac(int akmp);
[all …]
/dports/security/wpa_supplicant/wpa_supplicant-2.9/src/common/
H A Dwpa_common.c26 switch (akmp) { in wpa_kck_len()
48 switch (akmp) { in wpa_kck2_len()
62 switch (akmp) { in wpa_kek_len()
84 switch (akmp) { in wpa_kek2_len()
98 switch (akmp) { in wpa_mic_len()
130 wpa_key_mgmt_fils(akmp); in wpa_use_akm_defined()
139 int wpa_use_cmac(int akmp) in wpa_use_cmac() argument
144 wpa_key_mgmt_ft(akmp) || in wpa_use_cmac()
221 switch (akmp) { in wpa_eapol_key_mic()
311 akmp); in wpa_eapol_key_mic()
[all …]
H A Dwpa_common.h350 struct wpa_ptk *ptk, int akmp, int cipher,
352 int fils_rmsk_to_pmk(int akmp, const u8 *rmsk, size_t rmsk_len,
355 int fils_pmkid_erp(int akmp, const u8 *reauth, size_t reauth_len,
360 u8 *ick, size_t *ick_len, int akmp, int cipher,
366 int akmp, u8 *key_auth_sta, u8 *key_auth_ap,
390 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher);
414 u8 *pmkid, int akmp);
488 unsigned int wpa_mic_len(int akmp, size_t pmk_len);
489 int wpa_use_akm_defined(int akmp);
490 int wpa_use_cmac(int akmp);
[all …]
/dports/net/hostapd/hostapd-2.9/src/rsn_supp/
H A Dpmksa_cache.c154 else if (wpa_key_mgmt_suite_b(akmp)) in pmksa_cache_add()
162 entry->akmp = akmp; in pmksa_cache_add()
267 entry->network_ctx, entry->akmp); in pmksa_cache_add_entry()
351 int akmp) in pmksa_cache_get() argument
358 (!akmp || akmp == entry->akmp) && in pmksa_cache_get()
406 const u8 *aa, int akmp) in pmksa_cache_get_opportunistic() argument
415 (!akmp || entry->akmp == akmp)) { in pmksa_cache_get_opportunistic()
486 int akmp) in pmksa_cache_set_current() argument
506 network_ctx, akmp); in pmksa_cache_set_current()
509 network_ctx, akmp); in pmksa_cache_set_current()
[all …]
H A Dpmksa_cache.h21 int akmp; /* WPA_KEY_MGMT_* */ member
65 int akmp);
71 const u8 *aa, const u8 *spa, void *network_ctx, int akmp,
81 int akmp);
84 void *network_ctx, const u8 *aa, int akmp);
104 const void *network_ctx, int akmp) in pmksa_cache_get() argument
137 const u8 *aa, const u8 *spa, void *network_ctx, int akmp, in pmksa_cache_add() argument
152 int akmp) in pmksa_cache_set_current() argument
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/rsn_supp/
H A Dpmksa_cache.c154 else if (wpa_key_mgmt_suite_b(akmp)) in pmksa_cache_add()
162 entry->akmp = akmp; in pmksa_cache_add()
267 entry->network_ctx, entry->akmp); in pmksa_cache_add_entry()
351 int akmp) in pmksa_cache_get() argument
358 (!akmp || akmp == entry->akmp) && in pmksa_cache_get()
406 const u8 *aa, int akmp) in pmksa_cache_get_opportunistic() argument
415 (!akmp || entry->akmp == akmp)) { in pmksa_cache_get_opportunistic()
486 int akmp) in pmksa_cache_set_current() argument
506 network_ctx, akmp); in pmksa_cache_set_current()
509 network_ctx, akmp); in pmksa_cache_set_current()
[all …]
H A Dpmksa_cache.h21 int akmp; /* WPA_KEY_MGMT_* */ member
65 int akmp);
71 const u8 *aa, const u8 *spa, void *network_ctx, int akmp,
81 int akmp);
84 void *network_ctx, const u8 *aa, int akmp);
104 const void *network_ctx, int akmp) in pmksa_cache_get() argument
137 const u8 *aa, const u8 *spa, void *network_ctx, int akmp, in pmksa_cache_add() argument
152 int akmp) in pmksa_cache_set_current() argument
/dports/security/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/
H A Dpmksa_cache.c154 else if (wpa_key_mgmt_suite_b(akmp)) in pmksa_cache_add()
162 entry->akmp = akmp; in pmksa_cache_add()
267 entry->network_ctx, entry->akmp); in pmksa_cache_add_entry()
351 int akmp) in pmksa_cache_get() argument
358 (!akmp || akmp == entry->akmp) && in pmksa_cache_get()
406 const u8 *aa, int akmp) in pmksa_cache_get_opportunistic() argument
415 (!akmp || entry->akmp == akmp)) { in pmksa_cache_get_opportunistic()
486 int akmp) in pmksa_cache_set_current() argument
506 network_ctx, akmp); in pmksa_cache_set_current()
509 network_ctx, akmp); in pmksa_cache_set_current()
[all …]
H A Dpmksa_cache.h21 int akmp; /* WPA_KEY_MGMT_* */ member
65 int akmp);
71 const u8 *aa, const u8 *spa, void *network_ctx, int akmp,
81 int akmp);
84 void *network_ctx, const u8 *aa, int akmp);
104 const void *network_ctx, int akmp) in pmksa_cache_get() argument
137 const u8 *aa, const u8 *spa, void *network_ctx, int akmp, in pmksa_cache_add() argument
152 int akmp) in pmksa_cache_set_current() argument
/dports/net/hostapd-devel/hostap-14ab4a816/src/common/
H A Dwpa_common.c26 switch (akmp) { in wpa_kck_len()
48 switch (akmp) { in wpa_kck2_len()
62 switch (akmp) { in wpa_kek_len()
84 switch (akmp) { in wpa_kek2_len()
98 switch (akmp) { in wpa_mic_len()
130 wpa_key_mgmt_fils(akmp); in wpa_use_akm_defined()
139 int wpa_use_cmac(int akmp) in wpa_use_cmac() argument
144 wpa_key_mgmt_ft(akmp) || in wpa_use_cmac()
219 switch (akmp) { in wpa_eapol_key_mic()
309 akmp); in wpa_eapol_key_mic()
[all …]
H A Dwpa_common.h391 struct wpa_ptk *ptk, int akmp, int cipher,
407 int akmp, u8 *key_auth_sta, u8 *key_auth_ap,
458 u8 *pmkid, int akmp);
635 unsigned int wpa_mic_len(int akmp, size_t pmk_len);
636 int wpa_use_akm_defined(int akmp);
637 int wpa_use_cmac(int akmp);
638 int wpa_use_aes_key_wrap(int akmp);
644 struct wpa_ptk *ptk, int akmp, int cipher,
647 u8 pasn_mic_len(int akmp, int cipher);
649 int pasn_mic(const u8 *kck, int akmp, int cipher,
[all …]
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/common/
H A Dwpa_common.c26 switch (akmp) { in wpa_kck_len()
48 switch (akmp) { in wpa_kck2_len()
62 switch (akmp) { in wpa_kek_len()
84 switch (akmp) { in wpa_kek2_len()
98 switch (akmp) { in wpa_mic_len()
130 wpa_key_mgmt_fils(akmp); in wpa_use_akm_defined()
139 int wpa_use_cmac(int akmp) in wpa_use_cmac() argument
144 wpa_key_mgmt_ft(akmp) || in wpa_use_cmac()
219 switch (akmp) { in wpa_eapol_key_mic()
309 akmp); in wpa_eapol_key_mic()
[all …]
H A Dwpa_common.h391 struct wpa_ptk *ptk, int akmp, int cipher,
407 int akmp, u8 *key_auth_sta, u8 *key_auth_ap,
458 u8 *pmkid, int akmp);
635 unsigned int wpa_mic_len(int akmp, size_t pmk_len);
636 int wpa_use_akm_defined(int akmp);
637 int wpa_use_cmac(int akmp);
638 int wpa_use_aes_key_wrap(int akmp);
644 struct wpa_ptk *ptk, int akmp, int cipher,
647 u8 pasn_mic_len(int akmp, int cipher);
649 int pasn_mic(const u8 *kck, int akmp, int cipher,
[all …]
/dports/net/hostapd-devel/hostap-14ab4a816/wpa_supplicant/
H A Dpasn_supplicant.c32 int akmp; member
577 pasn->bssid, pasn->akmp); in wpas_pasn_wd_fils_rx()
593 switch (pasn->akmp) { in wpas_pasn_get_wrapped_data()
624 pasn->akmp); in wpas_pasn_get_wrapped_data()
636 switch (pasn->akmp) { in wpas_pasn_get_wrapped_data_format()
861 pasn->akmp = 0; in wpas_pasn_reset()
934 pasn->akmp); in wpas_pasn_set_pmk()
1013 switch (akmp) { in wpas_pasn_start()
1077 pasn->akmp = akmp; in wpas_pasn_start()
1270 awork->akmp = akmp; in wpas_pasn_auth_start()
[all …]
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/wpa_supplicant/
H A Dpasn_supplicant.c32 int akmp; member
577 pasn->bssid, pasn->akmp); in wpas_pasn_wd_fils_rx()
593 switch (pasn->akmp) { in wpas_pasn_get_wrapped_data()
624 pasn->akmp); in wpas_pasn_get_wrapped_data()
636 switch (pasn->akmp) { in wpas_pasn_get_wrapped_data_format()
861 pasn->akmp = 0; in wpas_pasn_reset()
934 pasn->akmp); in wpas_pasn_set_pmk()
1013 switch (akmp) { in wpas_pasn_start()
1077 pasn->akmp = akmp; in wpas_pasn_start()
1274 awork->akmp = akmp; in wpas_pasn_auth_start()
[all …]
/dports/net/hostapd-devel/hostap-14ab4a816/src/ap/
H A Dpmksa_cache_auth.c283 struct eapol_state_machine *eapol, int akmp) in pmksa_cache_auth_add() argument
289 akmp); in pmksa_cache_auth_add()
318 struct eapol_state_machine *eapol, int akmp) in pmksa_cache_auth_create_entry() argument
326 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_auth_create_entry()
336 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) in pmksa_cache_auth_create_entry()
338 else if (wpa_key_mgmt_suite_b(akmp)) in pmksa_cache_auth_create_entry()
348 entry->akmp = akmp; in pmksa_cache_auth_create_entry()
407 entry->akmp = old_entry->akmp; in pmksa_cache_add_okc()
519 if (wpa_key_mgmt_sae(entry->akmp) || in pmksa_cache_get_okc()
520 wpa_key_mgmt_fils(entry->akmp)) { in pmksa_cache_get_okc()
[all …]
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/ap/
H A Dpmksa_cache_auth.c283 struct eapol_state_machine *eapol, int akmp) in pmksa_cache_auth_add() argument
289 akmp); in pmksa_cache_auth_add()
318 struct eapol_state_machine *eapol, int akmp) in pmksa_cache_auth_create_entry() argument
326 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_auth_create_entry()
336 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) in pmksa_cache_auth_create_entry()
338 else if (wpa_key_mgmt_suite_b(akmp)) in pmksa_cache_auth_create_entry()
348 entry->akmp = akmp; in pmksa_cache_auth_create_entry()
407 entry->akmp = old_entry->akmp; in pmksa_cache_add_okc()
519 if (wpa_key_mgmt_sae(entry->akmp) || in pmksa_cache_get_okc()
520 wpa_key_mgmt_fils(entry->akmp)) { in pmksa_cache_get_okc()
[all …]
/dports/net/hostapd/hostapd-2.9/src/ap/
H A Dpmksa_cache_auth.c283 struct eapol_state_machine *eapol, int akmp) in pmksa_cache_auth_add() argument
289 akmp); in pmksa_cache_auth_add()
318 struct eapol_state_machine *eapol, int akmp) in pmksa_cache_auth_create_entry() argument
326 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_auth_create_entry()
336 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) in pmksa_cache_auth_create_entry()
338 else if (wpa_key_mgmt_suite_b(akmp)) in pmksa_cache_auth_create_entry()
341 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_auth_create_entry()
348 entry->akmp = akmp; in pmksa_cache_auth_create_entry()
407 entry->akmp = old_entry->akmp; in pmksa_cache_add_okc()
520 entry->akmp); in pmksa_cache_get_okc()

1234