/freebsd/contrib/wpa/src/rsn_supp/ |
H A D | pmksa_cache.c | 98 if (wpa_key_mgmt_sae(entry->akmp) && pmksa->is_current_cb && in pmksa_cache_expire() 142 if (entry && wpa_key_mgmt_sae(entry->akmp)) { in pmksa_cache_reauth() 171 if (wpa_key_mgmt_sae(pmksa->pmksa->akmp) && in pmksa_cache_set_expiration() 199 (!wpa_key_mgmt_sae(entry->akmp) || in pmksa_cache_set_expiration() 234 const u8 *aa, const u8 *spa, void *network_ctx, int akmp, in pmksa_cache_add() argument 248 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_add() 261 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) in pmksa_cache_add() 263 else if (wpa_key_mgmt_suite_b(akmp)) in pmksa_cache_add() 266 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_add() 276 entry->akmp = akmp; in pmksa_cache_add() [all …]
|
H A D | pmksa_cache.h | 23 int akmp; /* WPA_KEY_MGMT_* */ member 80 int akmp); 86 const u8 *aa, const u8 *spa, void *network_ctx, int akmp, 96 int akmp, bool associated); 99 void *network_ctx, const u8 *aa, int akmp);
|
H A D | wpa.h | 48 u8 pmk_reauth_threshold, int akmp); 244 int akmp); 433 const void *network_ctx, int akmp) in wpa_sm_pmksa_cache_get() argument 505 int wpa_pasn_ft_derive_pmk_r1(struct wpa_sm *sm, int akmp, const u8 *r1kh_id, 556 wpa_pasn_ft_derive_pmk_r1(struct wpa_sm *sm, int akmp, const u8 *r1kh_id, in wpa_pasn_ft_derive_pmk_r1() argument
|
H A D | preauth.c | 52 static int rsn_preauth_key_mgmt(int akmp) in rsn_preauth_key_mgmt() argument 54 return !!(akmp & (WPA_KEY_MGMT_IEEE8021X | in rsn_preauth_key_mgmt() 356 p->akmp); in rsn_preauth_candidate_process()
|
H A D | wpa_i.h | 314 u8 pmk_reauth_threshold, int akmp) in wpa_sm_add_pmkid() argument 319 pmk_reauth_threshold, akmp); in wpa_sm_add_pmkid()
|
H A D | wpa_ft.c | 1367 int wpa_pasn_ft_derive_pmk_r1(struct wpa_sm *sm, int akmp, const u8 *bssid, in wpa_pasn_ft_derive_pmk_r1() argument 1372 if (sm->key_mgmt != (unsigned int) akmp) { in wpa_pasn_ft_derive_pmk_r1() 1375 sm->key_mgmt, akmp); in wpa_pasn_ft_derive_pmk_r1()
|
/freebsd/contrib/wpa/src/pasn/ |
H A D | pasn_responder.c | 165 if (!pasn->sae.akmp) in pasn_wd_handle_sae_confirm() 166 pasn->sae.akmp = WPA_KEY_MGMT_SAE; in pasn_wd_handle_sae_confirm() 170 peer_addr, 0, NULL, pasn->sae.akmp); in pasn_wd_handle_sae_confirm() 242 wpa_pasn_add_rsne(buf, NULL, pasn->akmp, pasn->cipher); in pasn_get_fils_wd() 269 switch (pasn->akmp) { in pasn_get_wrapped_data() 293 pasn->akmp); in pasn_get_wrapped_data() 318 if (pasn->akmp == WPA_KEY_MGMT_PASN) { in pasn_derive_keys() 329 switch (pasn->akmp) { in pasn_derive_keys() 351 &pasn->ptk, pasn->akmp, in pasn_derive_keys() 359 ret = wpa_ltf_keyseed(&pasn->ptk, pasn->akmp, in pasn_derive_keys() [all …]
|
H A D | pasn_initiator.c | 238 wpa_pasn_add_rsne(buf, NULL, pasn->akmp, pasn->cipher); in wpas_pasn_fils_build_auth() 262 ret = fils_pmkid_erp(pasn->akmp, wpabuf_head(erp_msg), in wpas_pasn_fils_build_auth() 422 ret = fils_rmsk_to_pmk(pasn->akmp, rmsk, rmsk_len, in wpas_pasn_wd_fils_rx() 442 pasn->akmp, 0); in wpas_pasn_wd_fils_rx() 456 switch (pasn->akmp) { in wpas_pasn_get_wrapped_data() 487 pasn->akmp); in wpas_pasn_get_wrapped_data() 499 switch (pasn->akmp) { in wpas_pasn_get_wrapped_data_format() 554 if (wpa_key_mgmt_ft(pasn->akmp)) { in wpas_pasn_build_auth_1() 564 pasn->own_addr, NULL, NULL, pasn->akmp); in wpas_pasn_build_auth_1() 578 if (wpa_pasn_add_rsne(buf, pmkid, pasn->akmp, pasn->cipher) < 0) in wpas_pasn_build_auth_1() [all …]
|
H A D | pasn_common.c | 71 void pasn_set_akmp(struct pasn_data *pasn, int akmp) in pasn_set_akmp() argument 75 pasn->akmp = akmp; in pasn_set_akmp() 199 return pasn->akmp; in pasn_get_akmp()
|
H A D | pasn_common.h | 38 int akmp; member 159 int akmp, int cipher, u16 group, 165 int akmp, int cipher, u16 group, 198 void pasn_set_akmp(struct pasn_data *pasn, int akmp);
|
/freebsd/contrib/wpa/src/common/ |
H A D | wpa_common.c | 25 static unsigned int wpa_kck_len(int akmp, size_t pmk_len) in wpa_kck_len() argument 27 switch (akmp) { in wpa_kck_len() 51 static unsigned int wpa_kck2_len(int akmp) in wpa_kck2_len() argument 53 switch (akmp) { in wpa_kck2_len() 65 static unsigned int wpa_kek_len(int akmp, size_t pmk_len) in wpa_kek_len() argument 67 switch (akmp) { in wpa_kek_len() 91 static unsigned int wpa_kek2_len(int akmp) in wpa_kek2_len() argument 93 switch (akmp) { in wpa_kek2_len() 105 unsigned int wpa_mic_len(int akmp, size_t pmk_len) in wpa_mic_len() argument 107 switch (akmp) { in wpa_mic_len() [all …]
|
H A D | wpa_common.h | 461 int wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver, 466 struct wpa_ptk *ptk, int akmp, int cipher, 468 int fils_rmsk_to_pmk(int akmp, const u8 *rmsk, size_t rmsk_len, 471 int fils_pmkid_erp(int akmp, const u8 *reauth, size_t reauth_len, 476 u8 *ick, size_t *ick_len, int akmp, int cipher, 482 int akmp, u8 *key_auth_sta, u8 *key_auth_ap, 510 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher, 535 u8 *pmkid, int akmp); 743 unsigned int wpa_mic_len(int akmp, size_t pmk_len); 744 int wpa_use_akm_defined(int akmp); [all …]
|
H A D | ptksa_cache.h | 29 u32 akmp; member 47 void *ctx, u32 akmp);
|
H A D | ptksa_cache.c | 283 void *ctx, u32 akmp) in ptksa_cache_add() argument 308 entry->akmp = akmp; in ptksa_cache_add() 377 void (*cb)(struct ptksa_cache_entry *e), void *ctx, u32 akmp) in ptksa_cache_add() argument
|
H A D | sae.c | 1551 if (wpa_key_mgmt_sae_ext_key(sae->akmp)) in sae_derive_keys() 1556 sae->h2e, sae->akmp, in sae_derive_keys() 1557 wpa_akm_to_suite(sae->akmp), in sae_derive_keys() 1558 wpa_key_mgmt_txt(sae->akmp, WPA_PROTO_RSN)); in sae_derive_keys() 1743 if (wpa_key_mgmt_sae_ext_key(sae->akmp)) { in sae_write_commit() 1744 u32 suite = wpa_akm_to_suite(sae->akmp); in sae_write_commit() 2233 if (!sae->akmp) { in sae_parse_commit() 2236 sae->akmp = WPA_KEY_MGMT_SAE_EXT_KEY; in sae_parse_commit() 2239 sae->akmp = WPA_KEY_MGMT_FT_SAE_EXT_KEY; in sae_parse_commit()
|
H A D | sae.h | 112 int akmp; /* WPA_KEY_MGMT_* used in key derivation */ member
|
/freebsd/contrib/wpa/wpa_supplicant/ |
H A D | pasn_supplicant.c | 34 int akmp; member 82 int akmp, int cipher, u8 status, in wpas_pasn_auth_status() argument 98 wpa_key_mgmt_txt(akmp, WPA_PROTO_RSN), in wpas_pasn_auth_status() 108 MAC2STR(peer_addr), wpa_key_mgmt_txt(akmp, WPA_PROTO_RSN), in wpas_pasn_auth_status() 301 peer->akmp = key_mgmt; in wpas_pasn_get_params_from_bss() 312 int cipher, int akmp) in wpas_pasn_set_keys_from_cache() argument 366 peer->akmp) == 0) { in wpas_pasn_configure_next_peer() 379 peer->peer_addr, peer->akmp, in wpas_pasn_configure_next_peer() 463 const u8 *peer_addr, int akmp, in wpas_pasn_allowed() argument 495 if (!(rsne_data.key_mgmt & akmp) || in wpas_pasn_allowed() [all …]
|
H A D | preauth_test.c | 159 int akmp) in wpa_supplicant_add_pmkid() argument
|
H A D | wpas_glue.c | 600 int akmp) in wpa_supplicant_add_pmkid() argument 611 if ((akmp == WPA_KEY_MGMT_FT_IEEE8021X || in wpa_supplicant_add_pmkid() 612 akmp == WPA_KEY_MGMT_FT_IEEE8021X_SHA384) && in wpa_supplicant_add_pmkid()
|
/freebsd/contrib/wpa/src/ap/ |
H A D | pmksa_cache_auth.c | 286 struct eapol_state_machine *eapol, int akmp) in pmksa_cache_auth_add() argument 292 akmp); in pmksa_cache_auth_add() 321 struct eapol_state_machine *eapol, int akmp) in pmksa_cache_auth_create_entry() argument 329 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_auth_create_entry() 343 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) in pmksa_cache_auth_create_entry() 345 else if (wpa_key_mgmt_suite_b(akmp)) in pmksa_cache_auth_create_entry() 348 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_auth_create_entry() 355 entry->akmp = akmp; in pmksa_cache_auth_create_entry() 414 entry->akmp = old_entry->akmp; in pmksa_cache_add_okc() 526 if (wpa_key_mgmt_sae(entry->akmp) || in pmksa_cache_get_okc() [all …]
|
H A D | pmksa_cache_auth.h | 25 int akmp; /* WPA_KEY_MGMT_* */ member 59 struct eapol_state_machine *eapol, int akmp); 64 struct eapol_state_machine *eapol, int akmp);
|
H A D | wpa_auth.h | 484 int akmp); 488 int session_timeout, int akmp, const u8 *dpp_pkhash); 498 size_t pmk_len, int akmp,
|
H A D | wpa_auth.c | 45 static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK, 2250 static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK, argument 2258 size_t mic_len = wpa_mic_len(akmp, pmk_len); 2269 if (wpa_eapol_key_mic(PTK->kck, PTK->kck_len, akmp, 2867 int akmp; local 2922 akmp = sm->wpa_key_mgmt; 2924 akmp |= WPA_KEY_MGMT_PSK_SHA256; 2927 sm->ANonce, snonce, ptk, akmp, 6272 int akmp) argument 6278 if (!akmp) [all …]
|
H A D | ctrl_iface_ap.c | 1176 int akmp = 0, expiration = 0; in hostapd_ctrl_iface_pmksa_add() local 1209 if (sscanf(pos, "%d %d", &expiration, &akmp) != 2) in hostapd_ctrl_iface_pmksa_add() 1213 pmkid, expiration, akmp, NULL); in hostapd_ctrl_iface_pmksa_add()
|
H A D | ieee802_11.c | 975 sta->sae->pmkid, sta->sae->akmp); in sae_accept_sta() 1982 if (pmksa && wpa_auth_sta_key_mgmt(sta->wpa_sm) != pmksa->akmp) { in handle_auth_fils() 1985 wpa_auth_sta_key_mgmt(sta->wpa_sm), pmksa->akmp); in handle_auth_fils() 2677 int cipher, int akmp) in pasn_set_keys_from_cache() argument 2719 int akmp; in hapd_pasn_update_params() local 2754 akmp = pasn_get_akmp(pasn); in hapd_pasn_update_params() 2756 if (wpa_key_mgmt_ft(akmp) && rsn_data.num_pmkid) { in hapd_pasn_update_params() 2767 if (akmp != WPA_KEY_MGMT_FILS_SHA256 && in hapd_pasn_update_params() 2768 akmp != WPA_KEY_MGMT_FILS_SHA384) in hapd_pasn_update_params() 4178 if (!sa || !wpa_key_mgmt_sae(sa->akmp)) { in __check_assoc_ies()
|