Home
last modified time | relevance | path

Searched refs:akmp (Results 1 – 25 of 33) sorted by relevance

12

/freebsd/contrib/wpa/src/rsn_supp/
H A Dpmksa_cache.c98 if (wpa_key_mgmt_sae(entry->akmp) && pmksa->is_current_cb && in pmksa_cache_expire()
142 if (entry && wpa_key_mgmt_sae(entry->akmp)) { in pmksa_cache_reauth()
171 if (wpa_key_mgmt_sae(pmksa->pmksa->akmp) && in pmksa_cache_set_expiration()
199 (!wpa_key_mgmt_sae(entry->akmp) || in pmksa_cache_set_expiration()
234 const u8 *aa, const u8 *spa, void *network_ctx, int akmp, in pmksa_cache_add() argument
248 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_add()
261 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) in pmksa_cache_add()
263 else if (wpa_key_mgmt_suite_b(akmp)) in pmksa_cache_add()
266 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_add()
276 entry->akmp = akmp; in pmksa_cache_add()
[all …]
H A Dpmksa_cache.h23 int akmp; /* WPA_KEY_MGMT_* */ member
80 int akmp);
86 const u8 *aa, const u8 *spa, void *network_ctx, int akmp,
96 int akmp, bool associated);
99 void *network_ctx, const u8 *aa, int akmp);
H A Dwpa.h48 u8 pmk_reauth_threshold, int akmp);
244 int akmp);
433 const void *network_ctx, int akmp) in wpa_sm_pmksa_cache_get() argument
505 int wpa_pasn_ft_derive_pmk_r1(struct wpa_sm *sm, int akmp, const u8 *r1kh_id,
556 wpa_pasn_ft_derive_pmk_r1(struct wpa_sm *sm, int akmp, const u8 *r1kh_id, in wpa_pasn_ft_derive_pmk_r1() argument
H A Dpreauth.c52 static int rsn_preauth_key_mgmt(int akmp) in rsn_preauth_key_mgmt() argument
54 return !!(akmp & (WPA_KEY_MGMT_IEEE8021X | in rsn_preauth_key_mgmt()
356 p->akmp); in rsn_preauth_candidate_process()
H A Dwpa_i.h314 u8 pmk_reauth_threshold, int akmp) in wpa_sm_add_pmkid() argument
319 pmk_reauth_threshold, akmp); in wpa_sm_add_pmkid()
H A Dwpa_ft.c1367 int wpa_pasn_ft_derive_pmk_r1(struct wpa_sm *sm, int akmp, const u8 *bssid, in wpa_pasn_ft_derive_pmk_r1() argument
1372 if (sm->key_mgmt != (unsigned int) akmp) { in wpa_pasn_ft_derive_pmk_r1()
1375 sm->key_mgmt, akmp); in wpa_pasn_ft_derive_pmk_r1()
/freebsd/contrib/wpa/src/pasn/
H A Dpasn_responder.c165 if (!pasn->sae.akmp) in pasn_wd_handle_sae_confirm()
166 pasn->sae.akmp = WPA_KEY_MGMT_SAE; in pasn_wd_handle_sae_confirm()
170 peer_addr, 0, NULL, pasn->sae.akmp); in pasn_wd_handle_sae_confirm()
242 wpa_pasn_add_rsne(buf, NULL, pasn->akmp, pasn->cipher); in pasn_get_fils_wd()
269 switch (pasn->akmp) { in pasn_get_wrapped_data()
293 pasn->akmp); in pasn_get_wrapped_data()
318 if (pasn->akmp == WPA_KEY_MGMT_PASN) { in pasn_derive_keys()
329 switch (pasn->akmp) { in pasn_derive_keys()
351 &pasn->ptk, pasn->akmp, in pasn_derive_keys()
359 ret = wpa_ltf_keyseed(&pasn->ptk, pasn->akmp, in pasn_derive_keys()
[all …]
H A Dpasn_initiator.c238 wpa_pasn_add_rsne(buf, NULL, pasn->akmp, pasn->cipher); in wpas_pasn_fils_build_auth()
262 ret = fils_pmkid_erp(pasn->akmp, wpabuf_head(erp_msg), in wpas_pasn_fils_build_auth()
422 ret = fils_rmsk_to_pmk(pasn->akmp, rmsk, rmsk_len, in wpas_pasn_wd_fils_rx()
442 pasn->akmp, 0); in wpas_pasn_wd_fils_rx()
456 switch (pasn->akmp) { in wpas_pasn_get_wrapped_data()
487 pasn->akmp); in wpas_pasn_get_wrapped_data()
499 switch (pasn->akmp) { in wpas_pasn_get_wrapped_data_format()
554 if (wpa_key_mgmt_ft(pasn->akmp)) { in wpas_pasn_build_auth_1()
564 pasn->own_addr, NULL, NULL, pasn->akmp); in wpas_pasn_build_auth_1()
578 if (wpa_pasn_add_rsne(buf, pmkid, pasn->akmp, pasn->cipher) < 0) in wpas_pasn_build_auth_1()
[all …]
H A Dpasn_common.c71 void pasn_set_akmp(struct pasn_data *pasn, int akmp) in pasn_set_akmp() argument
75 pasn->akmp = akmp; in pasn_set_akmp()
199 return pasn->akmp; in pasn_get_akmp()
H A Dpasn_common.h38 int akmp; member
159 int akmp, int cipher, u16 group,
165 int akmp, int cipher, u16 group,
198 void pasn_set_akmp(struct pasn_data *pasn, int akmp);
/freebsd/contrib/wpa/src/common/
H A Dwpa_common.c25 static unsigned int wpa_kck_len(int akmp, size_t pmk_len) in wpa_kck_len() argument
27 switch (akmp) { in wpa_kck_len()
51 static unsigned int wpa_kck2_len(int akmp) in wpa_kck2_len() argument
53 switch (akmp) { in wpa_kck2_len()
65 static unsigned int wpa_kek_len(int akmp, size_t pmk_len) in wpa_kek_len() argument
67 switch (akmp) { in wpa_kek_len()
91 static unsigned int wpa_kek2_len(int akmp) in wpa_kek2_len() argument
93 switch (akmp) { in wpa_kek2_len()
105 unsigned int wpa_mic_len(int akmp, size_t pmk_len) in wpa_mic_len() argument
107 switch (akmp) { in wpa_mic_len()
[all …]
H A Dwpa_common.h461 int wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver,
466 struct wpa_ptk *ptk, int akmp, int cipher,
468 int fils_rmsk_to_pmk(int akmp, const u8 *rmsk, size_t rmsk_len,
471 int fils_pmkid_erp(int akmp, const u8 *reauth, size_t reauth_len,
476 u8 *ick, size_t *ick_len, int akmp, int cipher,
482 int akmp, u8 *key_auth_sta, u8 *key_auth_ap,
510 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher,
535 u8 *pmkid, int akmp);
743 unsigned int wpa_mic_len(int akmp, size_t pmk_len);
744 int wpa_use_akm_defined(int akmp);
[all …]
H A Dptksa_cache.h29 u32 akmp; member
47 void *ctx, u32 akmp);
H A Dptksa_cache.c283 void *ctx, u32 akmp) in ptksa_cache_add() argument
308 entry->akmp = akmp; in ptksa_cache_add()
377 void (*cb)(struct ptksa_cache_entry *e), void *ctx, u32 akmp) in ptksa_cache_add() argument
H A Dsae.c1551 if (wpa_key_mgmt_sae_ext_key(sae->akmp)) in sae_derive_keys()
1556 sae->h2e, sae->akmp, in sae_derive_keys()
1557 wpa_akm_to_suite(sae->akmp), in sae_derive_keys()
1558 wpa_key_mgmt_txt(sae->akmp, WPA_PROTO_RSN)); in sae_derive_keys()
1743 if (wpa_key_mgmt_sae_ext_key(sae->akmp)) { in sae_write_commit()
1744 u32 suite = wpa_akm_to_suite(sae->akmp); in sae_write_commit()
2233 if (!sae->akmp) { in sae_parse_commit()
2236 sae->akmp = WPA_KEY_MGMT_SAE_EXT_KEY; in sae_parse_commit()
2239 sae->akmp = WPA_KEY_MGMT_FT_SAE_EXT_KEY; in sae_parse_commit()
H A Dsae.h112 int akmp; /* WPA_KEY_MGMT_* used in key derivation */ member
/freebsd/contrib/wpa/wpa_supplicant/
H A Dpasn_supplicant.c34 int akmp; member
82 int akmp, int cipher, u8 status, in wpas_pasn_auth_status() argument
98 wpa_key_mgmt_txt(akmp, WPA_PROTO_RSN), in wpas_pasn_auth_status()
108 MAC2STR(peer_addr), wpa_key_mgmt_txt(akmp, WPA_PROTO_RSN), in wpas_pasn_auth_status()
301 peer->akmp = key_mgmt; in wpas_pasn_get_params_from_bss()
312 int cipher, int akmp) in wpas_pasn_set_keys_from_cache() argument
366 peer->akmp) == 0) { in wpas_pasn_configure_next_peer()
379 peer->peer_addr, peer->akmp, in wpas_pasn_configure_next_peer()
463 const u8 *peer_addr, int akmp, in wpas_pasn_allowed() argument
495 if (!(rsne_data.key_mgmt & akmp) || in wpas_pasn_allowed()
[all …]
H A Dpreauth_test.c159 int akmp) in wpa_supplicant_add_pmkid() argument
H A Dwpas_glue.c600 int akmp) in wpa_supplicant_add_pmkid() argument
611 if ((akmp == WPA_KEY_MGMT_FT_IEEE8021X || in wpa_supplicant_add_pmkid()
612 akmp == WPA_KEY_MGMT_FT_IEEE8021X_SHA384) && in wpa_supplicant_add_pmkid()
/freebsd/contrib/wpa/src/ap/
H A Dpmksa_cache_auth.c286 struct eapol_state_machine *eapol, int akmp) in pmksa_cache_auth_add() argument
292 akmp); in pmksa_cache_auth_add()
321 struct eapol_state_machine *eapol, int akmp) in pmksa_cache_auth_create_entry() argument
329 if (wpa_key_mgmt_suite_b(akmp) && !kck) in pmksa_cache_auth_create_entry()
343 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) in pmksa_cache_auth_create_entry()
345 else if (wpa_key_mgmt_suite_b(akmp)) in pmksa_cache_auth_create_entry()
348 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); in pmksa_cache_auth_create_entry()
355 entry->akmp = akmp; in pmksa_cache_auth_create_entry()
414 entry->akmp = old_entry->akmp; in pmksa_cache_add_okc()
526 if (wpa_key_mgmt_sae(entry->akmp) || in pmksa_cache_get_okc()
[all …]
H A Dpmksa_cache_auth.h25 int akmp; /* WPA_KEY_MGMT_* */ member
59 struct eapol_state_machine *eapol, int akmp);
64 struct eapol_state_machine *eapol, int akmp);
H A Dwpa_auth.h484 int akmp);
488 int session_timeout, int akmp, const u8 *dpp_pkhash);
498 size_t pmk_len, int akmp,
H A Dwpa_auth.c45 static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK,
2250 static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK, argument
2258 size_t mic_len = wpa_mic_len(akmp, pmk_len);
2269 if (wpa_eapol_key_mic(PTK->kck, PTK->kck_len, akmp,
2867 int akmp; local
2922 akmp = sm->wpa_key_mgmt;
2924 akmp |= WPA_KEY_MGMT_PSK_SHA256;
2927 sm->ANonce, snonce, ptk, akmp,
6272 int akmp) argument
6278 if (!akmp)
[all …]
H A Dctrl_iface_ap.c1176 int akmp = 0, expiration = 0; in hostapd_ctrl_iface_pmksa_add() local
1209 if (sscanf(pos, "%d %d", &expiration, &akmp) != 2) in hostapd_ctrl_iface_pmksa_add()
1213 pmkid, expiration, akmp, NULL); in hostapd_ctrl_iface_pmksa_add()
H A Dieee802_11.c975 sta->sae->pmkid, sta->sae->akmp); in sae_accept_sta()
1982 if (pmksa && wpa_auth_sta_key_mgmt(sta->wpa_sm) != pmksa->akmp) { in handle_auth_fils()
1985 wpa_auth_sta_key_mgmt(sta->wpa_sm), pmksa->akmp); in handle_auth_fils()
2677 int cipher, int akmp) in pasn_set_keys_from_cache() argument
2719 int akmp; in hapd_pasn_update_params() local
2754 akmp = pasn_get_akmp(pasn); in hapd_pasn_update_params()
2756 if (wpa_key_mgmt_ft(akmp) && rsn_data.num_pmkid) { in hapd_pasn_update_params()
2767 if (akmp != WPA_KEY_MGMT_FILS_SHA256 && in hapd_pasn_update_params()
2768 akmp != WPA_KEY_MGMT_FILS_SHA384) in hapd_pasn_update_params()
4178 if (!sa || !wpa_key_mgmt_sae(sa->akmp)) { in __check_assoc_ies()

12