/external/wpa_supplicant_8/src/ap/ |
pmksa_cache_auth.h | 23 int akmp; /* WPA_KEY_MGMT_* */ member in struct:rsn_pmksa_cache_entry 55 struct eapol_state_machine *eapol, int akmp); 60 struct eapol_state_machine *eapol, int akmp);
|
pmksa_cache_auth.c | 270 * @akmp: WPA_KEY_MGMT_* used in key derivation 283 struct eapol_state_machine *eapol, int akmp) 289 akmp); 309 * @akmp: WPA_KEY_MGMT_* used in key derivation 318 struct eapol_state_machine *eapol, int akmp) 326 if (wpa_key_mgmt_suite_b(akmp) && !kck) 336 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) 338 else if (wpa_key_mgmt_suite_b(akmp)) 341 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); 348 entry->akmp = akmp [all...] |
ctrl_iface_ap.c | 720 int akmp = 0, expiration = 0; local 724 * <STA addr> <PMKID> <PMK> <expiration in seconds> <akmp> 753 if (sscanf(pos, "%d %d", &expiration, &akmp) != 2) 757 pmkid, expiration, akmp);
|
wpa_auth.h | 336 int session_timeout, int akmp);
|
wpa_auth.c | 38 static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK, [all...] |
wpa_auth_glue.c | 276 if (sa && sa->akmp == WPA_KEY_MGMT_OWE) {
|
ieee802_11.c | 1218 if (pmksa && wpa_auth_sta_key_mgmt(sta->wpa_sm) != pmksa->akmp) { 1220 "FILS: Matching PMKSA cache entry has different AKMP (0x%x != 0x%x) - ignore", 1221 wpa_auth_sta_key_mgmt(sta->wpa_sm), pmksa->akmp); [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
pmksa_cache.h | 21 int akmp; /* WPA_KEY_MGMT_* */ member in struct:rsn_pmksa_cache_entry 70 const u8 *aa, const u8 *spa, void *network_ctx, int akmp, 135 const u8 *aa, const u8 *spa, void *network_ctx, int akmp,
|
pmksa_cache.c | 121 * @akmp: WPA_KEY_MGMT_* used in key derivation 133 const u8 *aa, const u8 *spa, void *network_ctx, int akmp, 142 if (wpa_key_mgmt_suite_b(akmp) && !kck) 152 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) 154 else if (wpa_key_mgmt_suite_b(akmp)) 157 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, akmp); 162 entry->akmp = akmp; 374 old_entry->network_ctx, old_entry->akmp,
|
/external/wpa_supplicant_8/src/common/ |
wpa_common.c | 24 static unsigned int wpa_kck_len(int akmp, size_t pmk_len) 26 switch (akmp) { 44 static unsigned int wpa_kek_len(int akmp, size_t pmk_len) 46 switch (akmp) { 64 unsigned int wpa_mic_len(int akmp, size_t pmk_len) 66 switch (akmp) { 88 * @akmp: WPA_KEY_MGMT_* used in key derivation 104 int wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver, 133 switch (akmp) { 206 "WPA: EAPOL-Key MIC algorithm not known (AKM-defined - akmp=0x%x)" [all...] |
wpa_common.h | 331 int wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver, 336 struct wpa_ptk *ptk, int akmp, int cipher); 337 int fils_rmsk_to_pmk(int akmp, const u8 *rmsk, size_t rmsk_len, 340 int fils_pmkid_erp(int akmp, const u8 *reauth, size_t reauth_len, 345 u8 *ick, size_t *ick_len, int akmp, int cipher, 351 int akmp, u8 *key_auth_sta, u8 *key_auth_ap, 373 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher); 394 u8 *pmkid, int akmp); 463 unsigned int wpa_mic_len(int akmp, size_t pmk_len);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
dpp_supplicant.c | [all...] |
ctrl_iface.c | [all...] |