| /hal_espressif-latest/components/wpa_supplicant/src/common/ |
| D | wpa_common.c | 238 static unsigned int wpa_kck_len(int akmp, size_t pmk_len) in wpa_kck_len() argument 240 switch (akmp) { in wpa_kck_len() 250 static unsigned int wpa_kek_len(int akmp, size_t pmk_len) in wpa_kek_len() argument 252 switch (akmp) { in wpa_kek_len() 263 unsigned int wpa_mic_len(int akmp, size_t pmk_len) in wpa_mic_len() argument 265 switch (akmp) { in wpa_mic_len() 775 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher) in wpa_pmk_r1_to_ptk() argument 798 ptk->kck_len = wpa_kck_len(akmp, PMK_LEN); in wpa_pmk_r1_to_ptk() 799 ptk->kek_len = wpa_kek_len(akmp, PMK_LEN); in wpa_pmk_r1_to_ptk() 847 int wpa_use_akm_defined(int akmp){ in wpa_use_akm_defined() argument [all …]
|
| D | wpa_common.h | 351 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher); 431 int wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver, 436 struct wpa_ptk *ptk, int akmp, int cipher); 439 u8 *pmkid, int akmp); 454 unsigned int wpa_mic_len(int akmp, size_t pmk_len); 455 int wpa_use_akm_defined(int akmp); 456 int wpa_use_aes_key_wrap(int akmp); 457 int wpa_use_akm_defined(int akmp); 458 int wpa_use_aes_key_wrap(int akmp);
|
| /hal_espressif-latest/components/wpa_supplicant/src/ap/ |
| D | pmksa_cache_auth.c | 207 struct eapol_state_machine *eapol, int akmp) in pmksa_cache_auth_add() argument 213 akmp); in pmksa_cache_auth_add() 242 struct eapol_state_machine *eapol, int akmp) in pmksa_cache_auth_create_entry() argument 250 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_auth_create_entry() 260 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) in pmksa_cache_auth_create_entry() 262 else if (wpa_key_mgmt_suite_b(akmp)) in pmksa_cache_auth_create_entry() 265 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_auth_create_entry() 272 entry->akmp = akmp; in pmksa_cache_auth_create_entry()
|
| D | pmksa_cache_auth.h | 22 int akmp; /* WPA_KEY_MGMT_* */ member 53 struct eapol_state_machine *eapol, int akmp); 58 struct eapol_state_machine *eapol, int akmp);
|
| D | wpa_auth.c | 46 static int wpa_verify_key_mic(int akmp, struct wpa_ptk *PTK, u8 *data, 1214 static int wpa_verify_key_mic(int akmp, struct wpa_ptk *PTK, u8 *data, in wpa_verify_key_mic() argument 1234 if (wpa_eapol_key_mic(PTK->kck, PTK->kck_len, akmp, in wpa_verify_key_mic()
|
| /hal_espressif-latest/components/wpa_supplicant/src/rsn_supp/ |
| D | pmksa_cache.c | 109 const u8 *aa, const u8 *spa, void *network_ctx, int akmp) in pmksa_cache_add() argument 117 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_add() 127 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) in pmksa_cache_add() 129 else if (wpa_key_mgmt_suite_b(akmp)) in pmksa_cache_add() 132 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_add() 138 entry->akmp = akmp; in pmksa_cache_add() 332 old_entry->network_ctx, old_entry->akmp); in pmksa_cache_clone_entry()
|
| D | pmksa_cache.h | 21 int akmp; /* WPA_KEY_MGMT_* */ member 61 const u8 *aa, const u8 *spa, void *network_ctx, int akmp); 109 const u8 *aa, const u8 *spa, void *network_ctx, int akmp) in pmksa_cache_add() argument
|
| D | wpa.c | 2365 if (pmksa && (pmksa->akmp != sm->key_mgmt)) { in wpa_set_bss() 2720 sm->key_mgmt == pmksa->akmp); in wpa_sta_cur_pmksa_matches_akm()
|