| /src/external/bsd/wpa/dist/src/rsn_supp/ |
| preauth.c | 34 * pmksa_candidate_free - Free all entries in PMKSA candidate list 107 pmksa_cache_add(sm->pmksa, pmk, pmk_len, NULL, 177 * address. This is usually called for PMKSA candidates found from scan results 304 * rsn_preauth_candidate_process - Process PMKSA candidates 307 * Go through the PMKSA candidates and start pre-authentication if a candidate 308 * without an existing PMKSA cache entry is found. Processed candidates will be 320 wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: processing PMKSA candidate " 334 p = pmksa_cache_get(sm->pmksa, candidate->bssid, sm->own_addr, 338 wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: PMKSA " 348 wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: PMKSA candidate 484 struct rsn_pmksa_cache_entry *pmksa; local [all...] |
| pmksa_cache.c | 2 * WPA Supplicant - RSN PMKSA cache 23 struct rsn_pmksa_cache_entry *pmksa; /* PMKSA cache */ member in struct:rsn_pmksa_cache 24 int pmksa_count; /* number of entries in PMKSA cache */ 36 static void pmksa_cache_set_expiration(struct rsn_pmksa_cache *pmksa); 45 static void pmksa_cache_free_entry(struct rsn_pmksa_cache *pmksa, 49 if (pmksa->sm) 50 wpa_sm_remove_pmkid(pmksa->sm, entry->network_ctx, entry->aa, 54 pmksa->pmksa_count--; 55 if (pmksa->free_cb 91 struct rsn_pmksa_cache *pmksa = eloop_ctx; local 130 struct rsn_pmksa_cache *pmksa = eloop_ctx; local 648 struct rsn_pmksa_cache *pmksa = sm->pmksa; local 808 struct rsn_pmksa_cache *pmksa; local [all...] |
| wpa_i.h | 47 struct rsn_pmksa_cache *pmksa; /* PMKSA cache */ member in struct:wpa_sm 48 struct rsn_pmksa_cache_entry *cur_pmksa; /* current PMKSA entry */
|
| /src/external/bsd/wpa/dist/src/ap/ |
| pmksa_cache_auth.c | 2 * hostapd - PMKSA cache for IEEE 802.11i RSN 28 struct rsn_pmksa_cache_entry *pmksa; member in struct:rsn_pmksa_cache 36 static void pmksa_cache_set_expiration(struct rsn_pmksa_cache *pmksa); 52 void pmksa_cache_free_entry(struct rsn_pmksa_cache *pmksa, 58 pmksa->pmksa_count--; 60 if (pmksa->free_cb) 61 pmksa->free_cb(entry, pmksa->ctx); 65 pos = pmksa->pmkid[hash]; 72 pmksa->pmkid[hash] = entry->hnext 114 struct rsn_pmksa_cache *pmksa = eloop_ctx; local 560 struct rsn_pmksa_cache *pmksa; local [all...] |
| wpa_auth_ie.c | 594 struct rsn_pmksa_cache_entry *pmksa; member in struct:wpa_auth_okc_iter_data 604 data->pmksa = pmksa_cache_get_okc(a->pmksa, data->aa, data->spa, 606 if (data->pmksa) 991 sm->pmksa = NULL; 995 sm->pmksa = pmksa_cache_auth_get(wpa_auth->pmksa, sm->addr, 997 if (sm->pmksa) { 998 pmkid = sm->pmksa->pmkid; 1002 for (i = 0; sm->pmksa == NULL && wpa_auth->conf.okc & [all...] |
| ieee802_1x.c | 1125 struct rsn_pmksa_cache_entry *pmksa; local 1256 pmksa = wpa_auth_sta_get_pmksa(sta->wpa_sm); 1257 if (pmksa) { 1260 "cached PMKSA available - ignore it since STA sent EAPOL-Start"); 1261 wpa_auth_sta_clear_pmksa(sta->wpa_sm, pmksa); 1322 struct rsn_pmksa_cache_entry *pmksa; local 1439 pmksa = wpa_auth_sta_get_pmksa(sta->wpa_sm); 1440 if (pmksa) { 1443 "PMK from PMKSA cache - skip IEEE 802.1X/EAP"); 1445 * because of existing PMKSA information in the cache. * [all...] |
| wpa_auth_i.h | 122 struct rsn_pmksa_cache_entry *pmksa; member in struct:wpa_state_machine 254 struct rsn_pmksa_cache *pmksa; member in struct:wpa_authenticator
|
| ieee802_11.c | 67 struct rsn_pmksa_cache_entry *pmksa, 1364 "SAE: Cancel use of mesh PMKSA caching because peer starts SAE authentication"); 1827 struct rsn_pmksa_cache_entry *pmksa = NULL; local 1969 pmksa = wpa_auth_pmksa_get(hapd->wpa_auth, sta->addr, 1971 if (pmksa) 1973 pmksa = wpa_auth_pmksa_get_fils_cache_id(hapd->wpa_auth, 1976 if (pmksa) 1982 if (pmksa && wpa_auth_sta_key_mgmt(sta->wpa_sm) != pmksa->akmp) { 1984 "FILS: Matching PMKSA cache entry has different AKMP (0x%x != 0x%x) - ignore" [all...] |
| wpa_auth.c | 628 if (sm->pmksa == ctx) 629 sm->pmksa = NULL; 770 wpa_auth->pmksa = pmksa_cache_auth_init(wpa_auth_pmksa_free_cb, 772 if (!wpa_auth->pmksa) { 773 wpa_printf(MSG_ERROR, "PMKSA cache initialization failed."); 786 pmksa_cache_auth_deinit(wpa_auth->pmksa); 874 pmksa_cache_auth_deinit(wpa_auth->pmksa); 2600 if (sm->pmksa) { 2601 wpa_printf(MSG_DEBUG, "WPA: PMK from PMKSA cache"); 2602 os_memcpy(sm->PMK, sm->pmksa->pmk, sm->pmksa->pmk_len) 6321 struct rsn_pmksa_cache_entry *pmksa; local 6735 struct rsn_pmksa_cache_entry *pmksa; member in struct:wpa_auth_fils_iter_data [all...] |
| /src/external/bsd/wpa/dist/src/pasn/ |
| pasn_initiator.c | 30 struct rsn_pmksa_cache *pmksa) 33 pasn->pmksa = pmksa; 438 pasn->pmksa_entry = pmksa_cache_add(pasn->pmksa, pasn->pmk, 561 struct rsn_pmksa_cache_entry *pmksa; local 563 pmksa = pmksa_cache_get(pasn->pmksa, pasn->peer_addr, 565 if (pmksa && pasn->custom_pmkid_valid) 567 else if (pmksa) 568 pmkid = pmksa->pmkid 794 struct rsn_pmksa_cache_entry *pmksa; local [all...] |
| pasn_responder.c | 30 struct rsn_pmksa_cache *pmksa) 33 pasn->pmksa = pmksa; 156 * TODO: Based on on IEEE P802.11az/D2.6, the PMKSA derived with 168 pmksa_cache_auth_add(pasn->pmksa, pasn->sae.pmk, pasn->sae.pmk_len, 316 wpa_printf(MSG_DEBUG, "PASN: No valid PMKSA entry"); 324 wpa_printf(MSG_DEBUG, "PASN: Using PMKSA entry"); 427 struct rsn_pmksa_cache_entry *pmksa, u16 status) 452 if (pmksa && pasn->custom_pmkid_valid) 454 else if (pmksa) { 605 struct rsn_pmksa_cache_entry *pmksa = NULL; local [all...] |
| pasn_common.h | 43 struct rsn_pmksa_cache *pmksa; member in struct:pasn_data 104 /* Note that this pointers to RSN PMKSA cache are actually defined 183 struct rsn_pmksa_cache_entry *pmksa, u16 status); 204 struct rsn_pmksa_cache *pmksa); 206 struct rsn_pmksa_cache *pmksa);
|
| /src/external/bsd/wpa/dist/wpa_supplicant/ |
| mesh_rsn.c | 375 struct rsn_pmksa_cache_entry *pmksa; local 391 pmksa = wpa_auth_pmksa_get(hapd->wpa_auth, sta->addr, NULL); 392 if (pmksa) { 403 "AUTH: Mesh PMKSA cache entry found for " MACSTR 404 " - try to use PMKSA caching instead of new SAE authentication", 406 wpa_auth_pmksa_set_to_sm(pmksa, sta->wpa_sm, hapd->wpa_auth,
|
| sme.c | 719 /* No PMKSA caching, but otherwise similar to RSN/WPA */ 1026 "PMKSA cache entry found - try to use PMKSA caching instead of new SAE authentication"); 1125 "SME: Try to use FILS with PMKSA caching"); 1917 * and added a PMKSA cache entry based on the successfully 2380 struct rsn_pmksa_cache_entry *pmksa; local 2382 pmksa = pmksa_cache_get_current(wpa_s->wpa); 2383 if (!pmksa || !pmksa->dpp_pfs) 2866 "PMKSA caching attempt rejected - drop PMKSA cache entry and fall back to SAE authentication") 2888 struct rsn_pmksa_cache_entry *pmksa; local [all...] |
| wpa_supplicant.c | 1902 /* PMKSA caching with FT may have interoperability 1905 "WPA: Disable PMKSA caching for FT/802.1X connection"); 1953 /* PMKSA caching with FT may have interoperability 1956 "WPA: Disable PMKSA caching for FT/802.1X connection"); 2155 /* Use PMK from DPP network introduction (PMKSA entry) */ 3501 /* No PMKSA caching, but otherwise similar to RSN/WPA */ 3609 "SAE: Use WPA_AUTH_ALG_OPEN for PMKSA caching attempt"); 3812 struct rsn_pmksa_cache_entry *pmksa; local 3814 pmksa = pmksa_cache_get_current(wpa_s->wpa); 3815 if (!pmksa || !pmksa->dpp_pfs [all...] |
| /src/external/bsd/wpa/dist/src/drivers/ |
| driver_wext.c | 2316 struct iw_pmksa pmksa; local 2321 os_memset(&pmksa, 0, sizeof(pmksa)); 2322 pmksa.cmd = cmd; 2323 pmksa.bssid.sa_family = ARPHRD_ETHER; 2325 os_memcpy(pmksa.bssid.sa_data, bssid, ETH_ALEN); 2327 os_memcpy(pmksa.pmkid, pmkid, IW_PMKID_LEN); 2328 iwr.u.data.pointer = (caddr_t) &pmksa; 2329 iwr.u.data.length = sizeof(pmksa);
|
| /src/external/bsd/wpa/dist/hostapd/ |
| ctrl_iface.c | 2388 struct rsn_pmksa_cache_entry *pmksa; local 2390 pmksa = wpa_auth_pmksa_get(hapd->wpa_auth, addr, NULL); 2391 if (!pmksa) 2394 return wpa_snprintf_hex(buf, buflen, pmksa->pmk, pmksa->pmk_len); 4295 } else if (os_strcmp(buf, "PMKSA") == 0) {
|