Home
last modified time | relevance | path

Searched refs:akmp (Results 1 – 6 of 6) sorted by relevance

/hal_espressif-3.6.0/components/wpa_supplicant/src/common/
Dwpa_common.c31 static unsigned int wpa_kck_len(int akmp) in wpa_kck_len() argument
33 if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) in wpa_kck_len()
38 static unsigned int wpa_kek_len(int akmp) in wpa_kek_len() argument
40 if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) in wpa_kek_len()
46 unsigned int wpa_mic_len(int akmp) in wpa_mic_len() argument
48 if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) in wpa_mic_len()
446 int wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver, in wpa_eapol_key_mic() argument
463 switch (akmp) { in wpa_eapol_key_mic()
657 struct wpa_ptk *ptk, int akmp, int cipher) in wpa_pmk_to_ptk() argument
681 ptk->kck_len = wpa_kck_len(akmp); in wpa_pmk_to_ptk()
[all …]
Dwpa_common.h384 int wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver,
389 struct wpa_ptk *ptk, int akmp, int cipher);
406 unsigned int wpa_mic_len(int akmp);
/hal_espressif-3.6.0/components/wpa_supplicant/src/rsn_supp/
Dpmksa_cache.c107 const u8 *aa, const u8 *spa, void *network_ctx, int akmp) in pmksa_cache_add() argument
115 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_add()
125 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) in pmksa_cache_add()
127 else if (wpa_key_mgmt_suite_b(akmp)) in pmksa_cache_add()
131 wpa_key_mgmt_sha256(akmp)); in pmksa_cache_add()
135 entry->akmp = akmp; in pmksa_cache_add()
330 old_entry->network_ctx, old_entry->akmp); in pmksa_cache_clone_entry()
Dpmksa_cache.h21 int akmp; /* WPA_KEY_MGMT_* */ member
61 const u8 *aa, const u8 *spa, void *network_ctx, int akmp);
109 const u8 *aa, const u8 *spa, void *network_ctx, int akmp) in pmksa_cache_add() argument
Dwpa.c2490 sm->key_mgmt == pmksa->akmp); in wpa_sta_cur_pmksa_matches_akm()
/hal_espressif-3.6.0/components/wpa_supplicant/src/ap/
Dwpa_auth.c39 static int wpa_verify_key_mic(int akmp, struct wpa_ptk *PTK, u8 *data,
1168 static int wpa_verify_key_mic(int akmp, struct wpa_ptk *PTK, u8 *data, in wpa_verify_key_mic() argument
1188 if (wpa_eapol_key_mic(PTK->kck, PTK->kck_len, akmp, in wpa_verify_key_mic()