| /src/external/bsd/wpa/dist/src/common/ |
| ptksa_cache.h | 29 u32 akmp; member in struct:ptksa_cache_entry 47 void *ctx, u32 akmp);
|
| sae.h | 112 int akmp; /* WPA_KEY_MGMT_* used in key derivation */ member in struct:sae_data
|
| /src/external/bsd/wpa/dist/src/ap/ |
| pmksa_cache_auth.h | 25 int akmp; /* WPA_KEY_MGMT_* */ member in struct:rsn_pmksa_cache_entry 59 struct eapol_state_machine *eapol, int akmp); 64 struct eapol_state_machine *eapol, int akmp);
|
| ctrl_iface_ap.c | 1176 int akmp = 0, expiration = 0; local 1180 * <STA addr> <PMKID> <PMK> <expiration in seconds> <akmp> 1209 if (sscanf(pos, "%d %d", &expiration, &akmp) != 2) 1213 pmkid, expiration, akmp, NULL);
|
| ieee802_11.c | 975 sta->sae->pmkid, sta->sae->akmp); 1982 if (pmksa && wpa_auth_sta_key_mgmt(sta->wpa_sm) != pmksa->akmp) { 1984 "FILS: Matching PMKSA cache entry has different AKMP (0x%x != 0x%x) - ignore", 1985 wpa_auth_sta_key_mgmt(sta->wpa_sm), pmksa->akmp); 2677 int cipher, int akmp) 2719 int akmp; local 2739 wpa_printf(MSG_DEBUG, "PASN: Mismatch in AKMP/cipher"); 2754 akmp = pasn_get_akmp(pasn); 2756 if (wpa_key_mgmt_ft(akmp) && rsn_data.num_pmkid) { 2767 if (akmp != WPA_KEY_MGMT_FILS_SHA256 & [all...] |
| wpa_auth.c | 45 static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK, 2250 static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK, 2258 size_t mic_len = wpa_mic_len(akmp, pmk_len); 2269 if (wpa_eapol_key_mic(PTK->kck, PTK->kck_len, akmp, 2867 int akmp; local 2922 akmp = sm->wpa_key_mgmt; 2924 akmp |= WPA_KEY_MGMT_PSK_SHA256; 2927 sm->ANonce, snonce, ptk, akmp, 6272 int akmp) 6278 if (!akmp) [all...] |
| /src/external/bsd/wpa/dist/src/rsn_supp/ |
| pmksa_cache.h | 23 int akmp; /* WPA_KEY_MGMT_* */ member in struct:rsn_pmksa_cache_entry 80 int akmp); 86 const u8 *aa, const u8 *spa, void *network_ctx, int akmp, 96 int akmp, bool associated); 99 void *network_ctx, const u8 *aa, int akmp);
|
| wpa.c | 689 int akmp; local 703 akmp = sm->key_mgmt; 705 if (sm->owe_ptk_workaround && akmp == WPA_KEY_MGMT_OWE && 709 akmp |= WPA_KEY_MGMT_PSK_SHA256; 722 key->key_nonce, ptk, akmp, 733 ret = wpa_ltf_keyseed(ptk, akmp, sm->pairwise_cipher); 5191 int akmp) 5194 akmp);
|
| /src/external/bsd/wpa/dist/src/pasn/ |
| pasn_common.h | 38 int akmp; member in struct:pasn_data 159 int akmp, int cipher, u16 group, 165 int akmp, int cipher, u16 group, 198 void pasn_set_akmp(struct pasn_data *pasn, int akmp);
|
| /src/external/bsd/wpa/dist/wpa_supplicant/ |
| pasn_supplicant.c | 34 int akmp; member in struct:wpa_pasn_auth_work 82 int akmp, int cipher, u8 status, 96 " akmp=%s, status=%u comeback_after=%u comeback=%s", 98 wpa_key_mgmt_txt(akmp, WPA_PROTO_RSN), 107 PASN_AUTH_STATUS MACSTR " akmp=%s, status=%u", 108 MAC2STR(peer_addr), wpa_key_mgmt_txt(akmp, WPA_PROTO_RSN), 223 wpa_printf(MSG_DEBUG, "PASN: peer AKMP 0x%x, select 0x%x", 297 wpa_printf(MSG_DEBUG, "PASN: invalid AKMP"); 301 peer->akmp = key_mgmt; 312 int cipher, int akmp) 768 int akmp = pasn_get_akmp(pasn); local [all...] |
| ctrl_iface.c | 10861 * <expiration in seconds> <akmp> <opportunistic> 10891 entry->akmp, 10931 * <expiration in seconds> <akmp> <opportunistic> 10978 &entry->akmp, &entry->opportunistic) != 4) 11175 int akmp = -1, cipher = -1, got_bssid = 0; local 11182 * Entry format: bssid=<BSSID> akmp=<AKMP> cipher=<CIPHER> group=<group> 11190 } else if (os_strcmp(token, "akmp=PASN") == 0) { 11191 akmp = WPA_KEY_MGMT_PASN; 11193 } else if (os_strcmp(token, "akmp=FT-PSK") == 0) [all...] |
| /src/external/bsd/wpa/dist/src/drivers/ |
| driver.h | 2943 * @akmp: Authentication key management protocol type supported. 2956 int akmp; member in struct:pasn_peer
|