/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | pmksa_cache_auth.h | 23 int akmp; /* WPA_KEY_MGMT_* */ member in struct:rsn_pmksa_cache_entry 54 struct eapol_state_machine *eapol, int akmp); 59 struct eapol_state_machine *eapol, int akmp);
|
H A D | pmksa_cache_auth.c | 270 * @akmp: WPA_KEY_MGMT_* used in key derivation 283 struct eapol_state_machine *eapol, int akmp) 289 akmp); 309 * @akmp: WPA_KEY_MGMT_* used in key derivation 318 struct eapol_state_machine *eapol, int akmp) 326 if (wpa_key_mgmt_suite_b(akmp) && !kck) 336 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) 338 else if (wpa_key_mgmt_suite_b(akmp)) 342 wpa_key_mgmt_sha256(akmp)); 349 entry->akmp 279 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument 315 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument [all...] |
H A D | wpa_auth.c | 38 static int wpa_verify_key_mic(int akmp, struct wpa_ptk *PTK, u8 *data, 1643 static int wpa_verify_key_mic(int akmp, struct wpa_ptk *PTK, u8 *data, argument 1651 size_t mic_len = wpa_mic_len(akmp); 1662 if (wpa_eapol_key_mic(PTK->kck, PTK->kck_len, akmp,
|
/external/wpa_supplicant_8/src/ap/ |
H A D | pmksa_cache_auth.h | 23 int akmp; /* WPA_KEY_MGMT_* */ member in struct:rsn_pmksa_cache_entry 54 struct eapol_state_machine *eapol, int akmp); 59 struct eapol_state_machine *eapol, int akmp);
|
H A D | pmksa_cache_auth.c | 270 * @akmp: WPA_KEY_MGMT_* used in key derivation 283 struct eapol_state_machine *eapol, int akmp) 289 akmp); 309 * @akmp: WPA_KEY_MGMT_* used in key derivation 318 struct eapol_state_machine *eapol, int akmp) 326 if (wpa_key_mgmt_suite_b(akmp) && !kck) 336 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) 338 else if (wpa_key_mgmt_suite_b(akmp)) 342 wpa_key_mgmt_sha256(akmp)); 349 entry->akmp 279 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument 315 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | pmksa_cache_auth.h | 23 int akmp; /* WPA_KEY_MGMT_* */ member in struct:rsn_pmksa_cache_entry 54 struct eapol_state_machine *eapol, int akmp); 59 struct eapol_state_machine *eapol, int akmp);
|
H A D | pmksa_cache_auth.c | 270 * @akmp: WPA_KEY_MGMT_* used in key derivation 283 struct eapol_state_machine *eapol, int akmp) 289 akmp); 309 * @akmp: WPA_KEY_MGMT_* used in key derivation 318 struct eapol_state_machine *eapol, int akmp) 326 if (wpa_key_mgmt_suite_b(akmp) && !kck) 336 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) 338 else if (wpa_key_mgmt_suite_b(akmp)) 342 wpa_key_mgmt_sha256(akmp)); 349 entry->akmp 279 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument 315 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | pmksa_cache.h | 21 int akmp; /* WPA_KEY_MGMT_* */ member in struct:rsn_pmksa_cache_entry 62 const u8 *aa, const u8 *spa, void *network_ctx, int akmp); 126 const u8 *aa, const u8 *spa, void *network_ctx, int akmp) 124 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp) argument
|
H A D | pmksa_cache.c | 119 * @akmp: WPA_KEY_MGMT_* used in key derivation 130 const u8 *aa, const u8 *spa, void *network_ctx, int akmp) 138 if (wpa_key_mgmt_suite_b(akmp) && !kck) 148 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) 150 else if (wpa_key_mgmt_suite_b(akmp)) 154 wpa_key_mgmt_sha256(akmp)); 159 entry->akmp = akmp; 365 old_entry->network_ctx, old_entry->akmp); 128 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp) argument
|
H A D | peerkey.h | 30 int akmp; member in struct:wpa_peerkey
|
H A D | peerkey.c | 245 peerkey->akmp = ie.key_mgmt; 289 * @akmp: Negotiated AKM 296 int akmp) 311 if (wpa_key_mgmt_sha256(akmp)) 578 peerkey->akmp); 583 peerkey->akmp); 696 stk, peerkey->akmp, peerkey->cipher); 930 &peerkey->stk, peerkey->akmp, peerkey->cipher); 1027 peerkey->akmp = sm->key_mgmt; 294 rsn_smkid(const u8 *smk, const u8 *pnonce, const u8 *mac_p, const u8 *inonce, const u8 *mac_i, u8 *smkid, int akmp) argument
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | pmksa_cache.h | 21 int akmp; /* WPA_KEY_MGMT_* */ member in struct:rsn_pmksa_cache_entry 62 const u8 *aa, const u8 *spa, void *network_ctx, int akmp); 126 const u8 *aa, const u8 *spa, void *network_ctx, int akmp) 124 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp) argument
|
H A D | pmksa_cache.c | 119 * @akmp: WPA_KEY_MGMT_* used in key derivation 130 const u8 *aa, const u8 *spa, void *network_ctx, int akmp) 138 if (wpa_key_mgmt_suite_b(akmp) && !kck) 148 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) 150 else if (wpa_key_mgmt_suite_b(akmp)) 154 wpa_key_mgmt_sha256(akmp)); 159 entry->akmp = akmp; 365 old_entry->network_ctx, old_entry->akmp); 128 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp) argument
|
H A D | peerkey.h | 30 int akmp; member in struct:wpa_peerkey
|
H A D | peerkey.c | 245 peerkey->akmp = ie.key_mgmt; 289 * @akmp: Negotiated AKM 296 int akmp) 311 if (wpa_key_mgmt_sha256(akmp)) 578 peerkey->akmp); 583 peerkey->akmp); 696 stk, peerkey->akmp, peerkey->cipher); 930 &peerkey->stk, peerkey->akmp, peerkey->cipher); 1027 peerkey->akmp = sm->key_mgmt; 294 rsn_smkid(const u8 *smk, const u8 *pnonce, const u8 *mac_p, const u8 *inonce, const u8 *mac_i, u8 *smkid, int akmp) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | pmksa_cache.h | 21 int akmp; /* WPA_KEY_MGMT_* */ member in struct:rsn_pmksa_cache_entry 62 const u8 *aa, const u8 *spa, void *network_ctx, int akmp); 126 const u8 *aa, const u8 *spa, void *network_ctx, int akmp) 124 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp) argument
|
H A D | pmksa_cache.c | 119 * @akmp: WPA_KEY_MGMT_* used in key derivation 130 const u8 *aa, const u8 *spa, void *network_ctx, int akmp) 138 if (wpa_key_mgmt_suite_b(akmp) && !kck) 148 else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) 150 else if (wpa_key_mgmt_suite_b(akmp)) 154 wpa_key_mgmt_sha256(akmp)); 159 entry->akmp = akmp; 365 old_entry->network_ctx, old_entry->akmp); 128 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp) argument
|
H A D | peerkey.h | 30 int akmp; member in struct:wpa_peerkey
|
H A D | peerkey.c | 245 peerkey->akmp = ie.key_mgmt; 289 * @akmp: Negotiated AKM 296 int akmp) 311 if (wpa_key_mgmt_sha256(akmp)) 578 peerkey->akmp); 583 peerkey->akmp); 696 stk, peerkey->akmp, peerkey->cipher); 930 &peerkey->stk, peerkey->akmp, peerkey->cipher); 1027 peerkey->akmp = sm->key_mgmt; 294 rsn_smkid(const u8 *smk, const u8 *pnonce, const u8 *mac_p, const u8 *inonce, const u8 *mac_i, u8 *smkid, int akmp) argument
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | wpa_common.c | 23 static unsigned int wpa_kck_len(int akmp) argument 25 switch (akmp) { 39 static unsigned int wpa_kek_len(int akmp) argument 41 switch (akmp) { 55 unsigned int wpa_mic_len(int akmp) argument 57 switch (akmp) { 75 * @akmp: WPA_KEY_MGMT_* used in key derivation 91 int wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver, argument 111 switch (akmp) { 152 * @akmp 165 wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, const u8 *addr1, const u8 *addr2, const u8 *nonce1, const u8 *nonce2, struct wpa_ptk *ptk, int akmp, int cipher) argument 233 fils_rmsk_to_pmk(int akmp, const u8 *rmsk, size_t rmsk_len, const u8 *snonce, const u8 *anonce, const u8 *dh_ss, size_t dh_ss_len, u8 *pmk, size_t *pmk_len) argument 280 fils_pmkid_erp(int akmp, const u8 *reauth, size_t reauth_len, u8 *pmkid) argument 305 fils_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const u8 *spa, const u8 *aa, const u8 *snonce, const u8 *anonce, struct wpa_ptk *ptk, u8 *ick, size_t *ick_len, int akmp, int cipher) argument 370 fils_key_auth_sk(const u8 *ick, size_t ick_len, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *g_sta, size_t g_sta_len, const u8 *g_ap, size_t g_ap_len, int akmp, u8 *key_auth_sta, u8 *key_auth_ap, size_t *key_auth_len) argument 1225 wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *pmk_r1_name, struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher) argument [all...] |
H A D | wpa_common.h | 333 int wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver, 338 struct wpa_ptk *ptk, int akmp, int cipher); 339 int fils_rmsk_to_pmk(int akmp, const u8 *rmsk, size_t rmsk_len, 342 int fils_pmkid_erp(int akmp, const u8 *reauth, size_t reauth_len, 346 u8 *ick, size_t *ick_len, int akmp, int cipher); 351 int akmp, u8 *key_auth_sta, u8 *key_auth_ap, 373 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher); 463 unsigned int wpa_mic_len(int akmp);
|
/external/wpa_supplicant_8/src/common/ |
H A D | wpa_common.c | 23 static unsigned int wpa_kck_len(int akmp) argument 25 switch (akmp) { 39 static unsigned int wpa_kek_len(int akmp) argument 41 switch (akmp) { 55 unsigned int wpa_mic_len(int akmp) argument 57 switch (akmp) { 75 * @akmp: WPA_KEY_MGMT_* used in key derivation 91 int wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver, argument 111 switch (akmp) { 152 * @akmp 165 wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, const u8 *addr1, const u8 *addr2, const u8 *nonce1, const u8 *nonce2, struct wpa_ptk *ptk, int akmp, int cipher) argument 233 fils_rmsk_to_pmk(int akmp, const u8 *rmsk, size_t rmsk_len, const u8 *snonce, const u8 *anonce, const u8 *dh_ss, size_t dh_ss_len, u8 *pmk, size_t *pmk_len) argument 280 fils_pmkid_erp(int akmp, const u8 *reauth, size_t reauth_len, u8 *pmkid) argument 305 fils_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const u8 *spa, const u8 *aa, const u8 *snonce, const u8 *anonce, struct wpa_ptk *ptk, u8 *ick, size_t *ick_len, int akmp, int cipher) argument 370 fils_key_auth_sk(const u8 *ick, size_t ick_len, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *g_sta, size_t g_sta_len, const u8 *g_ap, size_t g_ap_len, int akmp, u8 *key_auth_sta, u8 *key_auth_ap, size_t *key_auth_len) argument 1225 wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *pmk_r1_name, struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher) argument [all...] |
H A D | wpa_common.h | 333 int wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver, 338 struct wpa_ptk *ptk, int akmp, int cipher); 339 int fils_rmsk_to_pmk(int akmp, const u8 *rmsk, size_t rmsk_len, 342 int fils_pmkid_erp(int akmp, const u8 *reauth, size_t reauth_len, 346 u8 *ick, size_t *ick_len, int akmp, int cipher); 351 int akmp, u8 *key_auth_sta, u8 *key_auth_ap, 373 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher); 463 unsigned int wpa_mic_len(int akmp);
|
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | wpa_common.c | 23 static unsigned int wpa_kck_len(int akmp) argument 25 switch (akmp) { 39 static unsigned int wpa_kek_len(int akmp) argument 41 switch (akmp) { 55 unsigned int wpa_mic_len(int akmp) argument 57 switch (akmp) { 75 * @akmp: WPA_KEY_MGMT_* used in key derivation 91 int wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver, argument 111 switch (akmp) { 152 * @akmp 165 wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, const u8 *addr1, const u8 *addr2, const u8 *nonce1, const u8 *nonce2, struct wpa_ptk *ptk, int akmp, int cipher) argument 233 fils_rmsk_to_pmk(int akmp, const u8 *rmsk, size_t rmsk_len, const u8 *snonce, const u8 *anonce, const u8 *dh_ss, size_t dh_ss_len, u8 *pmk, size_t *pmk_len) argument 280 fils_pmkid_erp(int akmp, const u8 *reauth, size_t reauth_len, u8 *pmkid) argument 305 fils_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const u8 *spa, const u8 *aa, const u8 *snonce, const u8 *anonce, struct wpa_ptk *ptk, u8 *ick, size_t *ick_len, int akmp, int cipher) argument 370 fils_key_auth_sk(const u8 *ick, size_t ick_len, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *g_sta, size_t g_sta_len, const u8 *g_ap, size_t g_ap_len, int akmp, u8 *key_auth_sta, u8 *key_auth_ap, size_t *key_auth_len) argument 1225 wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *pmk_r1_name, struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher) argument [all...] |
H A D | wpa_common.h | 333 int wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver, 338 struct wpa_ptk *ptk, int akmp, int cipher); 339 int fils_rmsk_to_pmk(int akmp, const u8 *rmsk, size_t rmsk_len, 342 int fils_pmkid_erp(int akmp, const u8 *reauth, size_t reauth_len, 346 u8 *ick, size_t *ick_len, int akmp, int cipher); 351 int akmp, u8 *key_auth_sta, u8 *key_auth_ap, 373 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher); 463 unsigned int wpa_mic_len(int akmp);
|