HomeSort by: relevance | last modified time | path
    Searched defs:akmp (Results 1 - 12 of 12) sorted by relevancy

  /src/external/bsd/wpa/dist/src/common/
ptksa_cache.h 29 u32 akmp; member in struct:ptksa_cache_entry
47 void *ctx, u32 akmp);
sae.h 112 int akmp; /* WPA_KEY_MGMT_* used in key derivation */ member in struct:sae_data
  /src/external/bsd/wpa/dist/src/ap/
pmksa_cache_auth.h 25 int akmp; /* WPA_KEY_MGMT_* */ member in struct:rsn_pmksa_cache_entry
59 struct eapol_state_machine *eapol, int akmp);
64 struct eapol_state_machine *eapol, int akmp);
ctrl_iface_ap.c 1176 int akmp = 0, expiration = 0; local
1180 * <STA addr> <PMKID> <PMK> <expiration in seconds> <akmp>
1209 if (sscanf(pos, "%d %d", &expiration, &akmp) != 2)
1213 pmkid, expiration, akmp, NULL);
ieee802_11.c 975 sta->sae->pmkid, sta->sae->akmp);
1982 if (pmksa && wpa_auth_sta_key_mgmt(sta->wpa_sm) != pmksa->akmp) {
1984 "FILS: Matching PMKSA cache entry has different AKMP (0x%x != 0x%x) - ignore",
1985 wpa_auth_sta_key_mgmt(sta->wpa_sm), pmksa->akmp);
2677 int cipher, int akmp)
2719 int akmp; local
2739 wpa_printf(MSG_DEBUG, "PASN: Mismatch in AKMP/cipher");
2754 akmp = pasn_get_akmp(pasn);
2756 if (wpa_key_mgmt_ft(akmp) && rsn_data.num_pmkid) {
2767 if (akmp != WPA_KEY_MGMT_FILS_SHA256 &
    [all...]
wpa_auth.c 45 static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK,
2250 static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK,
2258 size_t mic_len = wpa_mic_len(akmp, pmk_len);
2269 if (wpa_eapol_key_mic(PTK->kck, PTK->kck_len, akmp,
2867 int akmp; local
2922 akmp = sm->wpa_key_mgmt;
2924 akmp |= WPA_KEY_MGMT_PSK_SHA256;
2927 sm->ANonce, snonce, ptk, akmp,
6272 int akmp)
6278 if (!akmp)
    [all...]
  /src/external/bsd/wpa/dist/src/rsn_supp/
pmksa_cache.h 23 int akmp; /* WPA_KEY_MGMT_* */ member in struct:rsn_pmksa_cache_entry
80 int akmp);
86 const u8 *aa, const u8 *spa, void *network_ctx, int akmp,
96 int akmp, bool associated);
99 void *network_ctx, const u8 *aa, int akmp);
wpa.c 689 int akmp; local
703 akmp = sm->key_mgmt;
705 if (sm->owe_ptk_workaround && akmp == WPA_KEY_MGMT_OWE &&
709 akmp |= WPA_KEY_MGMT_PSK_SHA256;
722 key->key_nonce, ptk, akmp,
733 ret = wpa_ltf_keyseed(ptk, akmp, sm->pairwise_cipher);
5191 int akmp)
5194 akmp);
  /src/external/bsd/wpa/dist/src/pasn/
pasn_common.h 38 int akmp; member in struct:pasn_data
159 int akmp, int cipher, u16 group,
165 int akmp, int cipher, u16 group,
198 void pasn_set_akmp(struct pasn_data *pasn, int akmp);
  /src/external/bsd/wpa/dist/wpa_supplicant/
pasn_supplicant.c 34 int akmp; member in struct:wpa_pasn_auth_work
82 int akmp, int cipher, u8 status,
96 " akmp=%s, status=%u comeback_after=%u comeback=%s",
98 wpa_key_mgmt_txt(akmp, WPA_PROTO_RSN),
107 PASN_AUTH_STATUS MACSTR " akmp=%s, status=%u",
108 MAC2STR(peer_addr), wpa_key_mgmt_txt(akmp, WPA_PROTO_RSN),
223 wpa_printf(MSG_DEBUG, "PASN: peer AKMP 0x%x, select 0x%x",
297 wpa_printf(MSG_DEBUG, "PASN: invalid AKMP");
301 peer->akmp = key_mgmt;
312 int cipher, int akmp)
768 int akmp = pasn_get_akmp(pasn); local
    [all...]
ctrl_iface.c 10861 * <expiration in seconds> <akmp> <opportunistic>
10891 entry->akmp,
10931 * <expiration in seconds> <akmp> <opportunistic>
10978 &entry->akmp, &entry->opportunistic) != 4)
11175 int akmp = -1, cipher = -1, got_bssid = 0; local
11182 * Entry format: bssid=<BSSID> akmp=<AKMP> cipher=<CIPHER> group=<group>
11190 } else if (os_strcmp(token, "akmp=PASN") == 0) {
11191 akmp = WPA_KEY_MGMT_PASN;
11193 } else if (os_strcmp(token, "akmp=FT-PSK") == 0)
    [all...]
  /src/external/bsd/wpa/dist/src/drivers/
driver.h 2943 * @akmp: Authentication key management protocol type supported.
2956 int akmp; member in struct:pasn_peer

Completed in 33 milliseconds