Searched refs:akmp (Results 1 - 13 of 13) sorted by relevance

/freebsd-11-stable/contrib/wpa/src/rsn_supp/
H A Dpmksa_cache.h21 int akmp; /* WPA_KEY_MGMT_* */ member in struct:rsn_pmksa_cache_entry
65 int akmp);
71 const u8 *aa, const u8 *spa, void *network_ctx, int akmp,
81 int akmp);
84 void *network_ctx, const u8 *aa, int akmp);
104 const void *network_ctx, int akmp)
137 const u8 *aa, const u8 *spa, void *network_ctx, int akmp,
152 int akmp)
103 pmksa_cache_get(struct rsn_pmksa_cache *pmksa, const u8 *aa, const u8 *pmkid, const void *network_ctx, int akmp) argument
135 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp, const u8 *cache_id) argument
147 pmksa_cache_set_current(struct wpa_sm *sm, const u8 *pmkid, const u8 *bssid, void *network_ctx, int try_opportunistic, const u8 *fils_cache_id, int akmp) argument
H A Dpmksa_cache.c121 * @akmp: WPA_KEY_MGMT_* used in key derivation
133 const u8 *aa, const u8 *spa, void *network_ctx, int akmp,
142 if (wpa_key_mgmt_suite_b(akmp) && !kck)
152 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192)
154 else if (wpa_key_mgmt_suite_b(akmp))
157 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp);
162 entry->akmp = akmp;
266 " network_ctx=%p akmp=0x%x", MAC2STR(entry->aa),
267 entry->network_ctx, entry->akmp);
131 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp, const u8 *cache_id) argument
348 pmksa_cache_get(struct rsn_pmksa_cache *pmksa, const u8 *aa, const u8 *pmkid, const void *network_ctx, int akmp) argument
405 pmksa_cache_get_opportunistic(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *aa, int akmp) argument
483 pmksa_cache_set_current(struct wpa_sm *sm, const u8 *pmkid, const u8 *bssid, void *network_ctx, int try_opportunistic, const u8 *fils_cache_id, int akmp) argument
[all...]
/freebsd-11-stable/contrib/wpa/src/ap/
H A Dpmksa_cache_auth.h23 int akmp; /* WPA_KEY_MGMT_* */ member in struct:rsn_pmksa_cache_entry
55 struct eapol_state_machine *eapol, int akmp);
60 struct eapol_state_machine *eapol, int akmp);
H A Dpmksa_cache_auth.c270 * @akmp: WPA_KEY_MGMT_* used in key derivation
283 struct eapol_state_machine *eapol, int akmp)
289 akmp);
309 * @akmp: WPA_KEY_MGMT_* used in key derivation
318 struct eapol_state_machine *eapol, int akmp)
326 if (wpa_key_mgmt_suite_b(akmp) && !kck)
336 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192)
338 else if (wpa_key_mgmt_suite_b(akmp))
341 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp);
348 entry->akmp
279 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument
315 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument
[all...]
H A Dctrl_iface_ap.c901 int akmp = 0, expiration = 0; local
905 * <STA addr> <PMKID> <PMK> <expiration in seconds> <akmp>
934 if (sscanf(pos, "%d %d", &expiration, &akmp) != 2)
938 pmkid, expiration, akmp);
H A Dwpa_auth.h378 int session_timeout, int akmp);
H A Dwpa_auth.c41 static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK,
1682 static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK, argument
1690 size_t mic_len = wpa_mic_len(akmp, pmk_len);
1701 if (wpa_eapol_key_mic(PTK->kck, PTK->kck_len, akmp,
4443 int session_timeout, int akmp)
4451 NULL, akmp))
4441 wpa_auth_pmksa_add2(struct wpa_authenticator *wpa_auth, const u8 *addr, const u8 *pmk, size_t pmk_len, const u8 *pmkid, int session_timeout, int akmp) argument
H A Dwpa_auth_glue.c289 if (sa && sa->akmp == WPA_KEY_MGMT_OWE) {
H A Dieee802_11.c1596 if (pmksa && wpa_auth_sta_key_mgmt(sta->wpa_sm) != pmksa->akmp) {
1599 wpa_auth_sta_key_mgmt(sta->wpa_sm), pmksa->akmp);
3136 if (!sa || sa->akmp != WPA_KEY_MGMT_SAE) {
/freebsd-11-stable/contrib/wpa/src/common/
H A Dwpa_common.c24 static unsigned int wpa_kck_len(int akmp, size_t pmk_len) argument
26 switch (akmp) {
46 static unsigned int wpa_kck2_len(int akmp) argument
48 switch (akmp) {
60 static unsigned int wpa_kek_len(int akmp, size_t pmk_len) argument
62 switch (akmp) {
82 static unsigned int wpa_kek2_len(int akmp) argument
84 switch (akmp) {
96 unsigned int wpa_mic_len(int akmp, size_t pmk_len) argument
98 switch (akmp) {
122 wpa_use_akm_defined(int akmp) argument
139 wpa_use_cmac(int akmp) argument
160 wpa_use_aes_key_wrap(int akmp) argument
192 wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver, const u8 *buf, size_t len, u8 *mic) argument
349 wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, const u8 *addr1, const u8 *addr2, const u8 *nonce1, const u8 *nonce2, struct wpa_ptk *ptk, int akmp, int cipher, const u8 *z, size_t z_len) argument
477 fils_rmsk_to_pmk(int akmp, const u8 *rmsk, size_t rmsk_len, const u8 *snonce, const u8 *anonce, const u8 *dh_ss, size_t dh_ss_len, u8 *pmk, size_t *pmk_len) argument
526 fils_pmkid_erp(int akmp, const u8 *reauth, size_t reauth_len, u8 *pmkid) argument
551 fils_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const u8 *spa, const u8 *aa, const u8 *snonce, const u8 *anonce, const u8 *dhss, size_t dhss_len, struct wpa_ptk *ptk, u8 *ick, size_t *ick_len, int akmp, int cipher, u8 *fils_ft, size_t *fils_ft_len) argument
662 fils_key_auth_sk(const u8 *ick, size_t ick_len, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *g_sta, size_t g_sta_len, const u8 *g_ap, size_t g_ap_len, int akmp, u8 *key_auth_sta, u8 *key_auth_ap, size_t *key_auth_len) argument
1696 wpa_pmk_r1_to_ptk(const u8 *pmk_r1, size_t pmk_r1_len, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *pmk_r1_name, struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher) argument
1837 rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa, u8 *pmkid, int akmp) argument
[all...]
H A Dwpa_common.h345 int wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver,
350 struct wpa_ptk *ptk, int akmp, int cipher,
352 int fils_rmsk_to_pmk(int akmp, const u8 *rmsk, size_t rmsk_len,
355 int fils_pmkid_erp(int akmp, const u8 *reauth, size_t reauth_len,
360 u8 *ick, size_t *ick_len, int akmp, int cipher,
366 int akmp, u8 *key_auth_sta, u8 *key_auth_ap,
390 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher);
414 u8 *pmkid, int akmp);
488 unsigned int wpa_mic_len(int akmp, size_t pmk_len);
489 int wpa_use_akm_defined(int akmp);
[all...]
/freebsd-11-stable/contrib/wpa/wpa_supplicant/
H A Ddpp_supplicant.c1419 entry->akmp = WPA_KEY_MGMT_DPP;
H A Dctrl_iface.c9682 * <expiration in seconds> <akmp> <opportunistic>
9712 entry->akmp,
9752 * <expiration in seconds> <akmp> <opportunistic>
9799 &entry->akmp, &entry->opportunistic) != 4)

Completed in 154 milliseconds