Home
last modified time | relevance | path

Searched refs:akmp (Results 1 – 25 of 36) sorted by relevance

12

/hostap-latest/src/rsn_supp/
Dpmksa_cache.c98 if (wpa_key_mgmt_sae(entry->akmp) && pmksa->is_current_cb && in pmksa_cache_expire()
142 if (entry && wpa_key_mgmt_sae(entry->akmp)) { in pmksa_cache_reauth()
171 if (wpa_key_mgmt_sae(pmksa->pmksa->akmp) && in pmksa_cache_set_expiration()
199 (!wpa_key_mgmt_sae(entry->akmp) || in pmksa_cache_set_expiration()
234 const u8 *aa, const u8 *spa, void *network_ctx, int akmp, in pmksa_cache_add() argument
248 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_add()
261 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) in pmksa_cache_add()
263 else if (wpa_key_mgmt_suite_b(akmp)) in pmksa_cache_add()
266 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_add()
276 entry->akmp = akmp; in pmksa_cache_add()
[all …]
Dpmksa_cache.h23 int akmp; /* WPA_KEY_MGMT_* */ member
80 int akmp);
86 const u8 *aa, const u8 *spa, void *network_ctx, int akmp,
96 int akmp, bool associated);
99 void *network_ctx, const u8 *aa, int akmp);
Dwpa.h48 u8 pmk_reauth_threshold, int akmp);
257 int akmp);
481 const void *network_ctx, int akmp) in wpa_sm_pmksa_cache_get() argument
553 int wpa_pasn_ft_derive_pmk_r1(struct wpa_sm *sm, int akmp, const u8 *r1kh_id,
604 wpa_pasn_ft_derive_pmk_r1(struct wpa_sm *sm, int akmp, const u8 *r1kh_id, in wpa_pasn_ft_derive_pmk_r1() argument
Dpreauth.c52 static int rsn_preauth_key_mgmt(int akmp) in rsn_preauth_key_mgmt() argument
54 return !!(akmp & (WPA_KEY_MGMT_IEEE8021X | in rsn_preauth_key_mgmt()
356 p->akmp); in rsn_preauth_candidate_process()
Dwpa_i.h320 u8 pmk_reauth_threshold, int akmp) in wpa_sm_add_pmkid() argument
325 pmk_reauth_threshold, akmp); in wpa_sm_add_pmkid()
Dwpa_ft.c1370 int wpa_pasn_ft_derive_pmk_r1(struct wpa_sm *sm, int akmp, const u8 *bssid, in wpa_pasn_ft_derive_pmk_r1() argument
1375 if (sm->key_mgmt != (unsigned int) akmp) { in wpa_pasn_ft_derive_pmk_r1()
1378 sm->key_mgmt, akmp); in wpa_pasn_ft_derive_pmk_r1()
/hostap-latest/src/pasn/
Dpasn_responder.c165 if (!pasn->sae.akmp) in pasn_wd_handle_sae_confirm()
166 pasn->sae.akmp = WPA_KEY_MGMT_SAE; in pasn_wd_handle_sae_confirm()
170 peer_addr, 0, NULL, pasn->sae.akmp); in pasn_wd_handle_sae_confirm()
242 wpa_pasn_add_rsne(buf, NULL, pasn->akmp, pasn->cipher); in pasn_get_fils_wd()
269 switch (pasn->akmp) { in pasn_get_wrapped_data()
293 pasn->akmp); in pasn_get_wrapped_data()
318 if (pasn->akmp == WPA_KEY_MGMT_PASN) { in pasn_derive_keys()
329 switch (pasn->akmp) { in pasn_derive_keys()
351 &pasn->ptk, pasn->akmp, in pasn_derive_keys()
359 ret = wpa_ltf_keyseed(&pasn->ptk, pasn->akmp, in pasn_derive_keys()
[all …]
Dpasn_initiator.c238 wpa_pasn_add_rsne(buf, NULL, pasn->akmp, pasn->cipher); in wpas_pasn_fils_build_auth()
262 ret = fils_pmkid_erp(pasn->akmp, wpabuf_head(erp_msg), in wpas_pasn_fils_build_auth()
422 ret = fils_rmsk_to_pmk(pasn->akmp, rmsk, rmsk_len, in wpas_pasn_wd_fils_rx()
442 pasn->akmp, 0); in wpas_pasn_wd_fils_rx()
456 switch (pasn->akmp) { in wpas_pasn_get_wrapped_data()
487 pasn->akmp); in wpas_pasn_get_wrapped_data()
499 switch (pasn->akmp) { in wpas_pasn_get_wrapped_data_format()
554 if (wpa_key_mgmt_ft(pasn->akmp)) { in wpas_pasn_build_auth_1()
564 pasn->own_addr, NULL, NULL, pasn->akmp); in wpas_pasn_build_auth_1()
578 if (wpa_pasn_add_rsne(buf, pmkid, pasn->akmp, pasn->cipher) < 0) in wpas_pasn_build_auth_1()
[all …]
Dpasn_common.c71 void pasn_set_akmp(struct pasn_data *pasn, int akmp) in pasn_set_akmp() argument
75 pasn->akmp = akmp; in pasn_set_akmp()
199 return pasn->akmp; in pasn_get_akmp()
Dpasn_common.h38 int akmp; member
159 int akmp, int cipher, u16 group,
165 int akmp, int cipher, u16 group,
198 void pasn_set_akmp(struct pasn_data *pasn, int akmp);
/hostap-latest/src/common/
Dwpa_common.c25 static unsigned int wpa_kck_len(int akmp, size_t pmk_len) in wpa_kck_len() argument
27 switch (akmp) { in wpa_kck_len()
51 static unsigned int wpa_kck2_len(int akmp) in wpa_kck2_len() argument
53 switch (akmp) { in wpa_kck2_len()
65 static unsigned int wpa_kek_len(int akmp, size_t pmk_len) in wpa_kek_len() argument
67 switch (akmp) { in wpa_kek_len()
91 static unsigned int wpa_kek2_len(int akmp) in wpa_kek2_len() argument
93 switch (akmp) { in wpa_kek2_len()
105 unsigned int wpa_mic_len(int akmp, size_t pmk_len) in wpa_mic_len() argument
107 switch (akmp) { in wpa_mic_len()
[all …]
Dwpa_common.h462 int wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver,
467 struct wpa_ptk *ptk, int akmp, int cipher,
469 int fils_rmsk_to_pmk(int akmp, const u8 *rmsk, size_t rmsk_len,
472 int fils_pmkid_erp(int akmp, const u8 *reauth, size_t reauth_len,
477 u8 *ick, size_t *ick_len, int akmp, int cipher,
483 int akmp, u8 *key_auth_sta, u8 *key_auth_ap,
511 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher,
536 u8 *pmkid, int akmp);
762 unsigned int wpa_mic_len(int akmp, size_t pmk_len);
763 int wpa_use_akm_defined(int akmp);
[all …]
Dptksa_cache.h29 u32 akmp; member
47 void *ctx, u32 akmp);
Dptksa_cache.c283 void *ctx, u32 akmp) in ptksa_cache_add() argument
308 entry->akmp = akmp; in ptksa_cache_add()
377 void (*cb)(struct ptksa_cache_entry *e), void *ctx, u32 akmp) in ptksa_cache_add() argument
Dsae.c1558 if (wpa_key_mgmt_sae_ext_key(sae->akmp)) in sae_derive_keys()
1563 sae->h2e, sae->akmp, in sae_derive_keys()
1564 wpa_akm_to_suite(sae->akmp), in sae_derive_keys()
1565 wpa_key_mgmt_txt(sae->akmp, WPA_PROTO_RSN)); in sae_derive_keys()
1750 if (wpa_key_mgmt_sae_ext_key(sae->akmp)) { in sae_write_commit()
1751 u32 suite = wpa_akm_to_suite(sae->akmp); in sae_write_commit()
2240 if (!sae->akmp) { in sae_parse_commit()
2243 sae->akmp = WPA_KEY_MGMT_SAE_EXT_KEY; in sae_parse_commit()
2246 sae->akmp = WPA_KEY_MGMT_FT_SAE_EXT_KEY; in sae_parse_commit()
Dsae.h112 int akmp; /* WPA_KEY_MGMT_* used in key derivation */ member
/hostap-latest/wpa_supplicant/
Dpasn_supplicant.c34 int akmp; member
82 int akmp, int cipher, u8 status, in wpas_pasn_auth_status() argument
98 wpa_key_mgmt_txt(akmp, WPA_PROTO_RSN), in wpas_pasn_auth_status()
108 MAC2STR(peer_addr), wpa_key_mgmt_txt(akmp, WPA_PROTO_RSN), in wpas_pasn_auth_status()
301 peer->akmp = key_mgmt; in wpas_pasn_get_params_from_bss()
312 int cipher, int akmp) in wpas_pasn_set_keys_from_cache() argument
366 peer->akmp) == 0) { in wpas_pasn_configure_next_peer()
379 peer->peer_addr, peer->akmp, in wpas_pasn_configure_next_peer()
463 const u8 *peer_addr, int akmp, in wpas_pasn_allowed() argument
495 if (!(rsne_data.key_mgmt & akmp) || in wpas_pasn_allowed()
[all …]
Dpreauth_test.c159 int akmp) in wpa_supplicant_add_pmkid() argument
Dwpas_glue.c616 int akmp) in wpa_supplicant_add_pmkid() argument
627 if ((akmp == WPA_KEY_MGMT_FT_IEEE8021X || in wpa_supplicant_add_pmkid()
628 akmp == WPA_KEY_MGMT_FT_IEEE8021X_SHA384) && in wpa_supplicant_add_pmkid()
/hostap-latest/src/ap/
Dpmksa_cache_auth.c286 struct eapol_state_machine *eapol, int akmp) in pmksa_cache_auth_add() argument
292 akmp); in pmksa_cache_auth_add()
321 struct eapol_state_machine *eapol, int akmp) in pmksa_cache_auth_create_entry() argument
329 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_auth_create_entry()
343 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) in pmksa_cache_auth_create_entry()
345 else if (wpa_key_mgmt_suite_b(akmp)) in pmksa_cache_auth_create_entry()
348 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_auth_create_entry()
355 entry->akmp = akmp; in pmksa_cache_auth_create_entry()
414 entry->akmp = old_entry->akmp; in pmksa_cache_add_okc()
526 if (wpa_key_mgmt_sae(entry->akmp) || in pmksa_cache_get_okc()
[all …]
Dpmksa_cache_auth.h25 int akmp; /* WPA_KEY_MGMT_* */ member
59 struct eapol_state_machine *eapol, int akmp);
64 struct eapol_state_machine *eapol, int akmp);
Dwpa_auth.h507 int akmp);
511 int session_timeout, int akmp, const u8 *dpp_pkhash);
521 size_t pmk_len, int akmp,
Dwpa_auth.c45 static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK,
2252 static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK, argument
2260 size_t mic_len = wpa_mic_len(akmp, pmk_len);
2271 if (wpa_eapol_key_mic(PTK->kck, PTK->kck_len, akmp,
2869 int akmp; local
2924 akmp = sm->wpa_key_mgmt;
2926 akmp |= WPA_KEY_MGMT_PSK_SHA256;
2929 sm->ANonce, snonce, ptk, akmp,
6420 int akmp) argument
6426 if (!akmp)
[all …]
/hostap-latest/tests/hwsim/
Dtest_pasn.py30 def pasn_ap_params(akmp="PASN", cipher="CCMP", group="19"): argument
35 "wpa_key_mgmt": "WPA-PSK " + akmp,
96 def check_pasn_akmp_cipher(dev, hapd, akmp="PASN", cipher="CCMP", argument
102 cmd = "PASN_START bssid=%s akmp=%s cipher=%s group=%s" % (hapd.own_addr(), akmp, cipher, group)
121 if hapd.own_addr() + " akmp=" + akmp + ", status=" + str(status) not in ev:
/hostap-latest/tests/fuzzing/pasn-resp/
Dpasn-resp.c30 struct eapol_state_machine *eapol, int akmp) in pmksa_cache_auth_add() argument

12