/hostap-latest/src/rsn_supp/ |
D | pmksa_cache.c | 98 if (wpa_key_mgmt_sae(entry->akmp) && pmksa->is_current_cb && in pmksa_cache_expire() 142 if (entry && wpa_key_mgmt_sae(entry->akmp)) { in pmksa_cache_reauth() 171 if (wpa_key_mgmt_sae(pmksa->pmksa->akmp) && in pmksa_cache_set_expiration() 199 (!wpa_key_mgmt_sae(entry->akmp) || in pmksa_cache_set_expiration() 234 const u8 *aa, const u8 *spa, void *network_ctx, int akmp, in pmksa_cache_add() argument 248 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_add() 261 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) in pmksa_cache_add() 263 else if (wpa_key_mgmt_suite_b(akmp)) in pmksa_cache_add() 266 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_add() 276 entry->akmp = akmp; in pmksa_cache_add() [all …]
|
D | pmksa_cache.h | 23 int akmp; /* WPA_KEY_MGMT_* */ member 80 int akmp); 86 const u8 *aa, const u8 *spa, void *network_ctx, int akmp, 96 int akmp, bool associated); 99 void *network_ctx, const u8 *aa, int akmp);
|
D | wpa.h | 48 u8 pmk_reauth_threshold, int akmp); 257 int akmp); 481 const void *network_ctx, int akmp) in wpa_sm_pmksa_cache_get() argument 553 int wpa_pasn_ft_derive_pmk_r1(struct wpa_sm *sm, int akmp, const u8 *r1kh_id, 604 wpa_pasn_ft_derive_pmk_r1(struct wpa_sm *sm, int akmp, const u8 *r1kh_id, in wpa_pasn_ft_derive_pmk_r1() argument
|
D | preauth.c | 52 static int rsn_preauth_key_mgmt(int akmp) in rsn_preauth_key_mgmt() argument 54 return !!(akmp & (WPA_KEY_MGMT_IEEE8021X | in rsn_preauth_key_mgmt() 356 p->akmp); in rsn_preauth_candidate_process()
|
D | wpa_i.h | 320 u8 pmk_reauth_threshold, int akmp) in wpa_sm_add_pmkid() argument 325 pmk_reauth_threshold, akmp); in wpa_sm_add_pmkid()
|
D | wpa_ft.c | 1370 int wpa_pasn_ft_derive_pmk_r1(struct wpa_sm *sm, int akmp, const u8 *bssid, in wpa_pasn_ft_derive_pmk_r1() argument 1375 if (sm->key_mgmt != (unsigned int) akmp) { in wpa_pasn_ft_derive_pmk_r1() 1378 sm->key_mgmt, akmp); in wpa_pasn_ft_derive_pmk_r1()
|
/hostap-latest/src/pasn/ |
D | pasn_responder.c | 165 if (!pasn->sae.akmp) in pasn_wd_handle_sae_confirm() 166 pasn->sae.akmp = WPA_KEY_MGMT_SAE; in pasn_wd_handle_sae_confirm() 170 peer_addr, 0, NULL, pasn->sae.akmp); in pasn_wd_handle_sae_confirm() 242 wpa_pasn_add_rsne(buf, NULL, pasn->akmp, pasn->cipher); in pasn_get_fils_wd() 269 switch (pasn->akmp) { in pasn_get_wrapped_data() 293 pasn->akmp); in pasn_get_wrapped_data() 318 if (pasn->akmp == WPA_KEY_MGMT_PASN) { in pasn_derive_keys() 329 switch (pasn->akmp) { in pasn_derive_keys() 351 &pasn->ptk, pasn->akmp, in pasn_derive_keys() 359 ret = wpa_ltf_keyseed(&pasn->ptk, pasn->akmp, in pasn_derive_keys() [all …]
|
D | pasn_initiator.c | 238 wpa_pasn_add_rsne(buf, NULL, pasn->akmp, pasn->cipher); in wpas_pasn_fils_build_auth() 262 ret = fils_pmkid_erp(pasn->akmp, wpabuf_head(erp_msg), in wpas_pasn_fils_build_auth() 422 ret = fils_rmsk_to_pmk(pasn->akmp, rmsk, rmsk_len, in wpas_pasn_wd_fils_rx() 442 pasn->akmp, 0); in wpas_pasn_wd_fils_rx() 456 switch (pasn->akmp) { in wpas_pasn_get_wrapped_data() 487 pasn->akmp); in wpas_pasn_get_wrapped_data() 499 switch (pasn->akmp) { in wpas_pasn_get_wrapped_data_format() 554 if (wpa_key_mgmt_ft(pasn->akmp)) { in wpas_pasn_build_auth_1() 564 pasn->own_addr, NULL, NULL, pasn->akmp); in wpas_pasn_build_auth_1() 578 if (wpa_pasn_add_rsne(buf, pmkid, pasn->akmp, pasn->cipher) < 0) in wpas_pasn_build_auth_1() [all …]
|
D | pasn_common.c | 71 void pasn_set_akmp(struct pasn_data *pasn, int akmp) in pasn_set_akmp() argument 75 pasn->akmp = akmp; in pasn_set_akmp() 199 return pasn->akmp; in pasn_get_akmp()
|
D | pasn_common.h | 38 int akmp; member 159 int akmp, int cipher, u16 group, 165 int akmp, int cipher, u16 group, 198 void pasn_set_akmp(struct pasn_data *pasn, int akmp);
|
/hostap-latest/src/common/ |
D | wpa_common.c | 25 static unsigned int wpa_kck_len(int akmp, size_t pmk_len) in wpa_kck_len() argument 27 switch (akmp) { in wpa_kck_len() 51 static unsigned int wpa_kck2_len(int akmp) in wpa_kck2_len() argument 53 switch (akmp) { in wpa_kck2_len() 65 static unsigned int wpa_kek_len(int akmp, size_t pmk_len) in wpa_kek_len() argument 67 switch (akmp) { in wpa_kek_len() 91 static unsigned int wpa_kek2_len(int akmp) in wpa_kek2_len() argument 93 switch (akmp) { in wpa_kek2_len() 105 unsigned int wpa_mic_len(int akmp, size_t pmk_len) in wpa_mic_len() argument 107 switch (akmp) { in wpa_mic_len() [all …]
|
D | wpa_common.h | 462 int wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver, 467 struct wpa_ptk *ptk, int akmp, int cipher, 469 int fils_rmsk_to_pmk(int akmp, const u8 *rmsk, size_t rmsk_len, 472 int fils_pmkid_erp(int akmp, const u8 *reauth, size_t reauth_len, 477 u8 *ick, size_t *ick_len, int akmp, int cipher, 483 int akmp, u8 *key_auth_sta, u8 *key_auth_ap, 511 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher, 536 u8 *pmkid, int akmp); 762 unsigned int wpa_mic_len(int akmp, size_t pmk_len); 763 int wpa_use_akm_defined(int akmp); [all …]
|
D | ptksa_cache.h | 29 u32 akmp; member 47 void *ctx, u32 akmp);
|
D | ptksa_cache.c | 283 void *ctx, u32 akmp) in ptksa_cache_add() argument 308 entry->akmp = akmp; in ptksa_cache_add() 377 void (*cb)(struct ptksa_cache_entry *e), void *ctx, u32 akmp) in ptksa_cache_add() argument
|
D | sae.c | 1558 if (wpa_key_mgmt_sae_ext_key(sae->akmp)) in sae_derive_keys() 1563 sae->h2e, sae->akmp, in sae_derive_keys() 1564 wpa_akm_to_suite(sae->akmp), in sae_derive_keys() 1565 wpa_key_mgmt_txt(sae->akmp, WPA_PROTO_RSN)); in sae_derive_keys() 1750 if (wpa_key_mgmt_sae_ext_key(sae->akmp)) { in sae_write_commit() 1751 u32 suite = wpa_akm_to_suite(sae->akmp); in sae_write_commit() 2240 if (!sae->akmp) { in sae_parse_commit() 2243 sae->akmp = WPA_KEY_MGMT_SAE_EXT_KEY; in sae_parse_commit() 2246 sae->akmp = WPA_KEY_MGMT_FT_SAE_EXT_KEY; in sae_parse_commit()
|
D | sae.h | 112 int akmp; /* WPA_KEY_MGMT_* used in key derivation */ member
|
/hostap-latest/wpa_supplicant/ |
D | pasn_supplicant.c | 34 int akmp; member 82 int akmp, int cipher, u8 status, in wpas_pasn_auth_status() argument 98 wpa_key_mgmt_txt(akmp, WPA_PROTO_RSN), in wpas_pasn_auth_status() 108 MAC2STR(peer_addr), wpa_key_mgmt_txt(akmp, WPA_PROTO_RSN), in wpas_pasn_auth_status() 301 peer->akmp = key_mgmt; in wpas_pasn_get_params_from_bss() 312 int cipher, int akmp) in wpas_pasn_set_keys_from_cache() argument 366 peer->akmp) == 0) { in wpas_pasn_configure_next_peer() 379 peer->peer_addr, peer->akmp, in wpas_pasn_configure_next_peer() 463 const u8 *peer_addr, int akmp, in wpas_pasn_allowed() argument 495 if (!(rsne_data.key_mgmt & akmp) || in wpas_pasn_allowed() [all …]
|
D | preauth_test.c | 159 int akmp) in wpa_supplicant_add_pmkid() argument
|
D | wpas_glue.c | 616 int akmp) in wpa_supplicant_add_pmkid() argument 627 if ((akmp == WPA_KEY_MGMT_FT_IEEE8021X || in wpa_supplicant_add_pmkid() 628 akmp == WPA_KEY_MGMT_FT_IEEE8021X_SHA384) && in wpa_supplicant_add_pmkid()
|
/hostap-latest/src/ap/ |
D | pmksa_cache_auth.c | 286 struct eapol_state_machine *eapol, int akmp) in pmksa_cache_auth_add() argument 292 akmp); in pmksa_cache_auth_add() 321 struct eapol_state_machine *eapol, int akmp) in pmksa_cache_auth_create_entry() argument 329 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_auth_create_entry() 343 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) in pmksa_cache_auth_create_entry() 345 else if (wpa_key_mgmt_suite_b(akmp)) in pmksa_cache_auth_create_entry() 348 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_auth_create_entry() 355 entry->akmp = akmp; in pmksa_cache_auth_create_entry() 414 entry->akmp = old_entry->akmp; in pmksa_cache_add_okc() 526 if (wpa_key_mgmt_sae(entry->akmp) || in pmksa_cache_get_okc() [all …]
|
D | pmksa_cache_auth.h | 25 int akmp; /* WPA_KEY_MGMT_* */ member 59 struct eapol_state_machine *eapol, int akmp); 64 struct eapol_state_machine *eapol, int akmp);
|
D | wpa_auth.h | 507 int akmp); 511 int session_timeout, int akmp, const u8 *dpp_pkhash); 521 size_t pmk_len, int akmp,
|
D | wpa_auth.c | 45 static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK, 2252 static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK, argument 2260 size_t mic_len = wpa_mic_len(akmp, pmk_len); 2271 if (wpa_eapol_key_mic(PTK->kck, PTK->kck_len, akmp, 2869 int akmp; local 2924 akmp = sm->wpa_key_mgmt; 2926 akmp |= WPA_KEY_MGMT_PSK_SHA256; 2929 sm->ANonce, snonce, ptk, akmp, 6420 int akmp) argument 6426 if (!akmp) [all …]
|
/hostap-latest/tests/hwsim/ |
D | test_pasn.py | 30 def pasn_ap_params(akmp="PASN", cipher="CCMP", group="19"): argument 35 "wpa_key_mgmt": "WPA-PSK " + akmp, 96 def check_pasn_akmp_cipher(dev, hapd, akmp="PASN", cipher="CCMP", argument 102 cmd = "PASN_START bssid=%s akmp=%s cipher=%s group=%s" % (hapd.own_addr(), akmp, cipher, group) 121 if hapd.own_addr() + " akmp=" + akmp + ", status=" + str(status) not in ev:
|
/hostap-latest/tests/fuzzing/pasn-resp/ |
D | pasn-resp.c | 30 struct eapol_state_machine *eapol, int akmp) in pmksa_cache_auth_add() argument
|