Searched defs:akmp (Results 1 - 24 of 24) sorted by relevance

/external/wpa_supplicant_8/hostapd/src/ap/
H A Dpmksa_cache_auth.h23 int akmp; /* WPA_KEY_MGMT_* */ member in struct:rsn_pmksa_cache_entry
54 struct eapol_state_machine *eapol, int akmp);
H A Dpmksa_cache_auth.c270 * @akmp: WPA_KEY_MGMT_* used in key derivation
283 struct eapol_state_machine *eapol, int akmp)
291 if (wpa_key_mgmt_suite_b(akmp) && !kck)
301 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192)
303 else if (wpa_key_mgmt_suite_b(akmp))
307 wpa_key_mgmt_sha256(akmp));
314 entry->akmp = akmp;
352 entry->akmp = old_entry->akmp;
279 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument
[all...]
H A Dwpa_auth.c36 static int wpa_verify_key_mic(int akmp, struct wpa_ptk *PTK, u8 *data,
1639 static int wpa_verify_key_mic(int akmp, struct wpa_ptk *PTK, u8 *data, argument
1648 size_t mic_len = wpa_mic_len(akmp);
1659 if (wpa_eapol_key_mic(PTK->kck, PTK->kck_len, akmp,
/external/wpa_supplicant_8/src/ap/
H A Dpmksa_cache_auth.h23 int akmp; /* WPA_KEY_MGMT_* */ member in struct:rsn_pmksa_cache_entry
54 struct eapol_state_machine *eapol, int akmp);
H A Dpmksa_cache_auth.c270 * @akmp: WPA_KEY_MGMT_* used in key derivation
283 struct eapol_state_machine *eapol, int akmp)
291 if (wpa_key_mgmt_suite_b(akmp) && !kck)
301 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192)
303 else if (wpa_key_mgmt_suite_b(akmp))
307 wpa_key_mgmt_sha256(akmp));
314 entry->akmp = akmp;
352 entry->akmp = old_entry->akmp;
279 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument
[all...]
H A Dwpa_auth.c36 static int wpa_verify_key_mic(int akmp, struct wpa_ptk *PTK, u8 *data,
1639 static int wpa_verify_key_mic(int akmp, struct wpa_ptk *PTK, u8 *data, argument
1648 size_t mic_len = wpa_mic_len(akmp);
1659 if (wpa_eapol_key_mic(PTK->kck, PTK->kck_len, akmp,
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dpmksa_cache_auth.h23 int akmp; /* WPA_KEY_MGMT_* */ member in struct:rsn_pmksa_cache_entry
54 struct eapol_state_machine *eapol, int akmp);
H A Dpmksa_cache_auth.c270 * @akmp: WPA_KEY_MGMT_* used in key derivation
283 struct eapol_state_machine *eapol, int akmp)
291 if (wpa_key_mgmt_suite_b(akmp) && !kck)
301 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192)
303 else if (wpa_key_mgmt_suite_b(akmp))
307 wpa_key_mgmt_sha256(akmp));
314 entry->akmp = akmp;
352 entry->akmp = old_entry->akmp;
279 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument
[all...]
H A Dwpa_auth.c36 static int wpa_verify_key_mic(int akmp, struct wpa_ptk *PTK, u8 *data,
1639 static int wpa_verify_key_mic(int akmp, struct wpa_ptk *PTK, u8 *data, argument
1648 size_t mic_len = wpa_mic_len(akmp);
1659 if (wpa_eapol_key_mic(PTK->kck, PTK->kck_len, akmp,
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dpeerkey.h30 int akmp; member in struct:wpa_peerkey
H A Dpmksa_cache.h21 int akmp; /* WPA_KEY_MGMT_* */ member in struct:rsn_pmksa_cache_entry
61 const u8 *aa, const u8 *spa, void *network_ctx, int akmp);
109 const u8 *aa, const u8 *spa, void *network_ctx, int akmp)
107 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp) argument
H A Dpmksa_cache.c118 * @akmp: WPA_KEY_MGMT_* used in key derivation
129 const u8 *aa, const u8 *spa, void *network_ctx, int akmp)
137 if (wpa_key_mgmt_suite_b(akmp) && !kck)
147 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192)
149 else if (wpa_key_mgmt_suite_b(akmp))
153 wpa_key_mgmt_sha256(akmp));
158 entry->akmp = akmp;
352 old_entry->network_ctx, old_entry->akmp);
127 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp) argument
H A Dpeerkey.c247 peerkey->akmp = ie.key_mgmt;
291 * @akmp: Negotiated AKM
298 int akmp)
313 if (wpa_key_mgmt_sha256(akmp))
579 peerkey->akmp);
584 peerkey->akmp);
698 stk, peerkey->akmp, peerkey->cipher);
925 &peerkey->stk, peerkey->akmp, peerkey->cipher);
1020 peerkey->akmp = sm->key_mgmt;
296 rsn_smkid(const u8 *smk, const u8 *pnonce, const u8 *mac_p, const u8 *inonce, const u8 *mac_i, u8 *smkid, int akmp) argument
/external/wpa_supplicant_8/src/rsn_supp/
H A Dpeerkey.h30 int akmp; member in struct:wpa_peerkey
H A Dpmksa_cache.h21 int akmp; /* WPA_KEY_MGMT_* */ member in struct:rsn_pmksa_cache_entry
61 const u8 *aa, const u8 *spa, void *network_ctx, int akmp);
109 const u8 *aa, const u8 *spa, void *network_ctx, int akmp)
107 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp) argument
H A Dpmksa_cache.c118 * @akmp: WPA_KEY_MGMT_* used in key derivation
129 const u8 *aa, const u8 *spa, void *network_ctx, int akmp)
137 if (wpa_key_mgmt_suite_b(akmp) && !kck)
147 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192)
149 else if (wpa_key_mgmt_suite_b(akmp))
153 wpa_key_mgmt_sha256(akmp));
158 entry->akmp = akmp;
352 old_entry->network_ctx, old_entry->akmp);
127 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp) argument
H A Dpeerkey.c247 peerkey->akmp = ie.key_mgmt;
291 * @akmp: Negotiated AKM
298 int akmp)
313 if (wpa_key_mgmt_sha256(akmp))
579 peerkey->akmp);
584 peerkey->akmp);
698 stk, peerkey->akmp, peerkey->cipher);
925 &peerkey->stk, peerkey->akmp, peerkey->cipher);
1020 peerkey->akmp = sm->key_mgmt;
296 rsn_smkid(const u8 *smk, const u8 *pnonce, const u8 *mac_p, const u8 *inonce, const u8 *mac_i, u8 *smkid, int akmp) argument
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dpeerkey.h30 int akmp; member in struct:wpa_peerkey
H A Dpmksa_cache.h21 int akmp; /* WPA_KEY_MGMT_* */ member in struct:rsn_pmksa_cache_entry
61 const u8 *aa, const u8 *spa, void *network_ctx, int akmp);
109 const u8 *aa, const u8 *spa, void *network_ctx, int akmp)
107 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp) argument
H A Dpmksa_cache.c118 * @akmp: WPA_KEY_MGMT_* used in key derivation
129 const u8 *aa, const u8 *spa, void *network_ctx, int akmp)
137 if (wpa_key_mgmt_suite_b(akmp) && !kck)
147 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192)
149 else if (wpa_key_mgmt_suite_b(akmp))
153 wpa_key_mgmt_sha256(akmp));
158 entry->akmp = akmp;
352 old_entry->network_ctx, old_entry->akmp);
127 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp) argument
H A Dpeerkey.c247 peerkey->akmp = ie.key_mgmt;
291 * @akmp: Negotiated AKM
298 int akmp)
313 if (wpa_key_mgmt_sha256(akmp))
579 peerkey->akmp);
584 peerkey->akmp);
698 stk, peerkey->akmp, peerkey->cipher);
925 &peerkey->stk, peerkey->akmp, peerkey->cipher);
1020 peerkey->akmp = sm->key_mgmt;
296 rsn_smkid(const u8 *smk, const u8 *pnonce, const u8 *mac_p, const u8 *inonce, const u8 *mac_i, u8 *smkid, int akmp) argument
/external/wpa_supplicant_8/hostapd/src/common/
H A Dwpa_common.c23 static unsigned int wpa_kck_len(int akmp) argument
25 if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192)
31 static unsigned int wpa_kek_len(int akmp) argument
33 if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192)
39 unsigned int wpa_mic_len(int akmp) argument
41 if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192)
51 * @akmp: WPA_KEY_MGMT_* used in key derivation
67 int wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver, argument
87 switch (akmp) {
128 * @akmp
141 wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, const u8 *addr1, const u8 *addr2, const u8 *nonce1, const u8 *nonce2, struct wpa_ptk *ptk, int akmp, int cipher) argument
962 wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *pmk_r1_name, struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher) argument
[all...]
/external/wpa_supplicant_8/src/common/
H A Dwpa_common.c23 static unsigned int wpa_kck_len(int akmp) argument
25 if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192)
31 static unsigned int wpa_kek_len(int akmp) argument
33 if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192)
39 unsigned int wpa_mic_len(int akmp) argument
41 if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192)
51 * @akmp: WPA_KEY_MGMT_* used in key derivation
67 int wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver, argument
87 switch (akmp) {
128 * @akmp
141 wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, const u8 *addr1, const u8 *addr2, const u8 *nonce1, const u8 *nonce2, struct wpa_ptk *ptk, int akmp, int cipher) argument
962 wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *pmk_r1_name, struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/common/
H A Dwpa_common.c23 static unsigned int wpa_kck_len(int akmp) argument
25 if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192)
31 static unsigned int wpa_kek_len(int akmp) argument
33 if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192)
39 unsigned int wpa_mic_len(int akmp) argument
41 if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192)
51 * @akmp: WPA_KEY_MGMT_* used in key derivation
67 int wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver, argument
87 switch (akmp) {
128 * @akmp
141 wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, const u8 *addr1, const u8 *addr2, const u8 *nonce1, const u8 *nonce2, struct wpa_ptk *ptk, int akmp, int cipher) argument
962 wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *pmk_r1_name, struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher) argument
[all...]

Completed in 278 milliseconds