/freebsd-11-stable/contrib/wpa/src/rsn_supp/ |
H A D | pmksa_cache.h | 21 int akmp; /* WPA_KEY_MGMT_* */ member in struct:rsn_pmksa_cache_entry 65 int akmp); 71 const u8 *aa, const u8 *spa, void *network_ctx, int akmp, 81 int akmp); 84 void *network_ctx, const u8 *aa, int akmp); 104 const void *network_ctx, int akmp) 137 const u8 *aa, const u8 *spa, void *network_ctx, int akmp, 152 int akmp) 103 pmksa_cache_get(struct rsn_pmksa_cache *pmksa, const u8 *aa, const u8 *pmkid, const void *network_ctx, int akmp) argument 135 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp, const u8 *cache_id) argument 147 pmksa_cache_set_current(struct wpa_sm *sm, const u8 *pmkid, const u8 *bssid, void *network_ctx, int try_opportunistic, const u8 *fils_cache_id, int akmp) argument
|
H A D | pmksa_cache.c | 121 * @akmp: WPA_KEY_MGMT_* used in key derivation 133 const u8 *aa, const u8 *spa, void *network_ctx, int akmp, 142 if (wpa_key_mgmt_suite_b(akmp) && !kck) 152 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) 154 else if (wpa_key_mgmt_suite_b(akmp)) 157 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); 162 entry->akmp = akmp; 266 " network_ctx=%p akmp=0x%x", MAC2STR(entry->aa), 267 entry->network_ctx, entry->akmp); 131 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp, const u8 *cache_id) argument 348 pmksa_cache_get(struct rsn_pmksa_cache *pmksa, const u8 *aa, const u8 *pmkid, const void *network_ctx, int akmp) argument 405 pmksa_cache_get_opportunistic(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *aa, int akmp) argument 483 pmksa_cache_set_current(struct wpa_sm *sm, const u8 *pmkid, const u8 *bssid, void *network_ctx, int try_opportunistic, const u8 *fils_cache_id, int akmp) argument [all...] |
/freebsd-11-stable/contrib/wpa/src/ap/ |
H A D | pmksa_cache_auth.h | 23 int akmp; /* WPA_KEY_MGMT_* */ member in struct:rsn_pmksa_cache_entry 55 struct eapol_state_machine *eapol, int akmp); 60 struct eapol_state_machine *eapol, int akmp);
|
H A D | pmksa_cache_auth.c | 270 * @akmp: WPA_KEY_MGMT_* used in key derivation 283 struct eapol_state_machine *eapol, int akmp) 289 akmp); 309 * @akmp: WPA_KEY_MGMT_* used in key derivation 318 struct eapol_state_machine *eapol, int akmp) 326 if (wpa_key_mgmt_suite_b(akmp) && !kck) 336 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) 338 else if (wpa_key_mgmt_suite_b(akmp)) 341 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); 348 entry->akmp 279 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument 315 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument [all...] |
H A D | ctrl_iface_ap.c | 901 int akmp = 0, expiration = 0; local 905 * <STA addr> <PMKID> <PMK> <expiration in seconds> <akmp> 934 if (sscanf(pos, "%d %d", &expiration, &akmp) != 2) 938 pmkid, expiration, akmp);
|
H A D | wpa_auth.h | 378 int session_timeout, int akmp);
|
H A D | wpa_auth.c | 41 static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK, 1682 static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK, argument 1690 size_t mic_len = wpa_mic_len(akmp, pmk_len); 1701 if (wpa_eapol_key_mic(PTK->kck, PTK->kck_len, akmp, 4443 int session_timeout, int akmp) 4451 NULL, akmp)) 4441 wpa_auth_pmksa_add2(struct wpa_authenticator *wpa_auth, const u8 *addr, const u8 *pmk, size_t pmk_len, const u8 *pmkid, int session_timeout, int akmp) argument
|
H A D | wpa_auth_glue.c | 289 if (sa && sa->akmp == WPA_KEY_MGMT_OWE) {
|
H A D | ieee802_11.c | 1596 if (pmksa && wpa_auth_sta_key_mgmt(sta->wpa_sm) != pmksa->akmp) { 1599 wpa_auth_sta_key_mgmt(sta->wpa_sm), pmksa->akmp); 3136 if (!sa || sa->akmp != WPA_KEY_MGMT_SAE) {
|
/freebsd-11-stable/contrib/wpa/src/common/ |
H A D | wpa_common.c | 24 static unsigned int wpa_kck_len(int akmp, size_t pmk_len) argument 26 switch (akmp) { 46 static unsigned int wpa_kck2_len(int akmp) argument 48 switch (akmp) { 60 static unsigned int wpa_kek_len(int akmp, size_t pmk_len) argument 62 switch (akmp) { 82 static unsigned int wpa_kek2_len(int akmp) argument 84 switch (akmp) { 96 unsigned int wpa_mic_len(int akmp, size_t pmk_len) argument 98 switch (akmp) { 122 wpa_use_akm_defined(int akmp) argument 139 wpa_use_cmac(int akmp) argument 160 wpa_use_aes_key_wrap(int akmp) argument 192 wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver, const u8 *buf, size_t len, u8 *mic) argument 349 wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, const u8 *addr1, const u8 *addr2, const u8 *nonce1, const u8 *nonce2, struct wpa_ptk *ptk, int akmp, int cipher, const u8 *z, size_t z_len) argument 477 fils_rmsk_to_pmk(int akmp, const u8 *rmsk, size_t rmsk_len, const u8 *snonce, const u8 *anonce, const u8 *dh_ss, size_t dh_ss_len, u8 *pmk, size_t *pmk_len) argument 526 fils_pmkid_erp(int akmp, const u8 *reauth, size_t reauth_len, u8 *pmkid) argument 551 fils_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const u8 *spa, const u8 *aa, const u8 *snonce, const u8 *anonce, const u8 *dhss, size_t dhss_len, struct wpa_ptk *ptk, u8 *ick, size_t *ick_len, int akmp, int cipher, u8 *fils_ft, size_t *fils_ft_len) argument 662 fils_key_auth_sk(const u8 *ick, size_t ick_len, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *g_sta, size_t g_sta_len, const u8 *g_ap, size_t g_ap_len, int akmp, u8 *key_auth_sta, u8 *key_auth_ap, size_t *key_auth_len) argument 1696 wpa_pmk_r1_to_ptk(const u8 *pmk_r1, size_t pmk_r1_len, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *pmk_r1_name, struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher) argument 1837 rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa, u8 *pmkid, int akmp) argument [all...] |
H A D | wpa_common.h | 345 int wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver, 350 struct wpa_ptk *ptk, int akmp, int cipher, 352 int fils_rmsk_to_pmk(int akmp, const u8 *rmsk, size_t rmsk_len, 355 int fils_pmkid_erp(int akmp, const u8 *reauth, size_t reauth_len, 360 u8 *ick, size_t *ick_len, int akmp, int cipher, 366 int akmp, u8 *key_auth_sta, u8 *key_auth_ap, 390 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher); 414 u8 *pmkid, int akmp); 488 unsigned int wpa_mic_len(int akmp, size_t pmk_len); 489 int wpa_use_akm_defined(int akmp); [all...] |
/freebsd-11-stable/contrib/wpa/wpa_supplicant/ |
H A D | dpp_supplicant.c | 1419 entry->akmp = WPA_KEY_MGMT_DPP;
|
H A D | ctrl_iface.c | 9682 * <expiration in seconds> <akmp> <opportunistic> 9712 entry->akmp, 9752 * <expiration in seconds> <akmp> <opportunistic> 9799 &entry->akmp, &entry->opportunistic) != 4)
|