HomeSort by: relevance | last modified time | path
    Searched defs:pmksa (Results 1 - 17 of 17) sorted by relevancy

  /src/external/bsd/wpa/dist/src/rsn_supp/
preauth.c 34 * pmksa_candidate_free - Free all entries in PMKSA candidate list
107 pmksa_cache_add(sm->pmksa, pmk, pmk_len, NULL,
177 * address. This is usually called for PMKSA candidates found from scan results
304 * rsn_preauth_candidate_process - Process PMKSA candidates
307 * Go through the PMKSA candidates and start pre-authentication if a candidate
308 * without an existing PMKSA cache entry is found. Processed candidates will be
320 wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: processing PMKSA candidate "
334 p = pmksa_cache_get(sm->pmksa, candidate->bssid, sm->own_addr,
338 wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: PMKSA "
348 wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: PMKSA candidate
484 struct rsn_pmksa_cache_entry *pmksa; local
    [all...]
pmksa_cache.c 2 * WPA Supplicant - RSN PMKSA cache
23 struct rsn_pmksa_cache_entry *pmksa; /* PMKSA cache */ member in struct:rsn_pmksa_cache
24 int pmksa_count; /* number of entries in PMKSA cache */
36 static void pmksa_cache_set_expiration(struct rsn_pmksa_cache *pmksa);
45 static void pmksa_cache_free_entry(struct rsn_pmksa_cache *pmksa,
49 if (pmksa->sm)
50 wpa_sm_remove_pmkid(pmksa->sm, entry->network_ctx, entry->aa,
54 pmksa->pmksa_count--;
55 if (pmksa->free_cb
91 struct rsn_pmksa_cache *pmksa = eloop_ctx; local
130 struct rsn_pmksa_cache *pmksa = eloop_ctx; local
648 struct rsn_pmksa_cache *pmksa = sm->pmksa; local
808 struct rsn_pmksa_cache *pmksa; local
    [all...]
wpa_i.h 47 struct rsn_pmksa_cache *pmksa; /* PMKSA cache */ member in struct:wpa_sm
48 struct rsn_pmksa_cache_entry *cur_pmksa; /* current PMKSA entry */
  /src/external/bsd/wpa/dist/src/ap/
pmksa_cache_auth.c 2 * hostapd - PMKSA cache for IEEE 802.11i RSN
28 struct rsn_pmksa_cache_entry *pmksa; member in struct:rsn_pmksa_cache
36 static void pmksa_cache_set_expiration(struct rsn_pmksa_cache *pmksa);
52 void pmksa_cache_free_entry(struct rsn_pmksa_cache *pmksa,
58 pmksa->pmksa_count--;
60 if (pmksa->free_cb)
61 pmksa->free_cb(entry, pmksa->ctx);
65 pos = pmksa->pmkid[hash];
72 pmksa->pmkid[hash] = entry->hnext
114 struct rsn_pmksa_cache *pmksa = eloop_ctx; local
560 struct rsn_pmksa_cache *pmksa; local
    [all...]
wpa_auth_ie.c 594 struct rsn_pmksa_cache_entry *pmksa; member in struct:wpa_auth_okc_iter_data
604 data->pmksa = pmksa_cache_get_okc(a->pmksa, data->aa, data->spa,
606 if (data->pmksa)
991 sm->pmksa = NULL;
995 sm->pmksa = pmksa_cache_auth_get(wpa_auth->pmksa, sm->addr,
997 if (sm->pmksa) {
998 pmkid = sm->pmksa->pmkid;
1002 for (i = 0; sm->pmksa == NULL && wpa_auth->conf.okc &
    [all...]
ieee802_1x.c 1125 struct rsn_pmksa_cache_entry *pmksa; local
1256 pmksa = wpa_auth_sta_get_pmksa(sta->wpa_sm);
1257 if (pmksa) {
1260 "cached PMKSA available - ignore it since STA sent EAPOL-Start");
1261 wpa_auth_sta_clear_pmksa(sta->wpa_sm, pmksa);
1322 struct rsn_pmksa_cache_entry *pmksa; local
1439 pmksa = wpa_auth_sta_get_pmksa(sta->wpa_sm);
1440 if (pmksa) {
1443 "PMK from PMKSA cache - skip IEEE 802.1X/EAP");
1445 * because of existing PMKSA information in the cache. *
    [all...]
wpa_auth_i.h 122 struct rsn_pmksa_cache_entry *pmksa; member in struct:wpa_state_machine
254 struct rsn_pmksa_cache *pmksa; member in struct:wpa_authenticator
ieee802_11.c 67 struct rsn_pmksa_cache_entry *pmksa,
1364 "SAE: Cancel use of mesh PMKSA caching because peer starts SAE authentication");
1827 struct rsn_pmksa_cache_entry *pmksa = NULL; local
1969 pmksa = wpa_auth_pmksa_get(hapd->wpa_auth, sta->addr,
1971 if (pmksa)
1973 pmksa = wpa_auth_pmksa_get_fils_cache_id(hapd->wpa_auth,
1976 if (pmksa)
1982 if (pmksa && wpa_auth_sta_key_mgmt(sta->wpa_sm) != pmksa->akmp) {
1984 "FILS: Matching PMKSA cache entry has different AKMP (0x%x != 0x%x) - ignore"
    [all...]
wpa_auth.c 628 if (sm->pmksa == ctx)
629 sm->pmksa = NULL;
770 wpa_auth->pmksa = pmksa_cache_auth_init(wpa_auth_pmksa_free_cb,
772 if (!wpa_auth->pmksa) {
773 wpa_printf(MSG_ERROR, "PMKSA cache initialization failed.");
786 pmksa_cache_auth_deinit(wpa_auth->pmksa);
874 pmksa_cache_auth_deinit(wpa_auth->pmksa);
2600 if (sm->pmksa) {
2601 wpa_printf(MSG_DEBUG, "WPA: PMK from PMKSA cache");
2602 os_memcpy(sm->PMK, sm->pmksa->pmk, sm->pmksa->pmk_len)
6321 struct rsn_pmksa_cache_entry *pmksa; local
6735 struct rsn_pmksa_cache_entry *pmksa; member in struct:wpa_auth_fils_iter_data
    [all...]
  /src/external/bsd/wpa/dist/src/pasn/
pasn_initiator.c 30 struct rsn_pmksa_cache *pmksa)
33 pasn->pmksa = pmksa;
438 pasn->pmksa_entry = pmksa_cache_add(pasn->pmksa, pasn->pmk,
561 struct rsn_pmksa_cache_entry *pmksa; local
563 pmksa = pmksa_cache_get(pasn->pmksa, pasn->peer_addr,
565 if (pmksa && pasn->custom_pmkid_valid)
567 else if (pmksa)
568 pmkid = pmksa->pmkid
794 struct rsn_pmksa_cache_entry *pmksa; local
    [all...]
pasn_responder.c 30 struct rsn_pmksa_cache *pmksa)
33 pasn->pmksa = pmksa;
156 * TODO: Based on on IEEE P802.11az/D2.6, the PMKSA derived with
168 pmksa_cache_auth_add(pasn->pmksa, pasn->sae.pmk, pasn->sae.pmk_len,
316 wpa_printf(MSG_DEBUG, "PASN: No valid PMKSA entry");
324 wpa_printf(MSG_DEBUG, "PASN: Using PMKSA entry");
427 struct rsn_pmksa_cache_entry *pmksa, u16 status)
452 if (pmksa && pasn->custom_pmkid_valid)
454 else if (pmksa) {
605 struct rsn_pmksa_cache_entry *pmksa = NULL; local
    [all...]
pasn_common.h 43 struct rsn_pmksa_cache *pmksa; member in struct:pasn_data
104 /* Note that this pointers to RSN PMKSA cache are actually defined
183 struct rsn_pmksa_cache_entry *pmksa, u16 status);
204 struct rsn_pmksa_cache *pmksa);
206 struct rsn_pmksa_cache *pmksa);
  /src/external/bsd/wpa/dist/wpa_supplicant/
mesh_rsn.c 375 struct rsn_pmksa_cache_entry *pmksa; local
391 pmksa = wpa_auth_pmksa_get(hapd->wpa_auth, sta->addr, NULL);
392 if (pmksa) {
403 "AUTH: Mesh PMKSA cache entry found for " MACSTR
404 " - try to use PMKSA caching instead of new SAE authentication",
406 wpa_auth_pmksa_set_to_sm(pmksa, sta->wpa_sm, hapd->wpa_auth,
sme.c 719 /* No PMKSA caching, but otherwise similar to RSN/WPA */
1026 "PMKSA cache entry found - try to use PMKSA caching instead of new SAE authentication");
1125 "SME: Try to use FILS with PMKSA caching");
1917 * and added a PMKSA cache entry based on the successfully
2380 struct rsn_pmksa_cache_entry *pmksa; local
2382 pmksa = pmksa_cache_get_current(wpa_s->wpa);
2383 if (!pmksa || !pmksa->dpp_pfs)
2866 "PMKSA caching attempt rejected - drop PMKSA cache entry and fall back to SAE authentication")
2888 struct rsn_pmksa_cache_entry *pmksa; local
    [all...]
wpa_supplicant.c 1902 /* PMKSA caching with FT may have interoperability
1905 "WPA: Disable PMKSA caching for FT/802.1X connection");
1953 /* PMKSA caching with FT may have interoperability
1956 "WPA: Disable PMKSA caching for FT/802.1X connection");
2155 /* Use PMK from DPP network introduction (PMKSA entry) */
3501 /* No PMKSA caching, but otherwise similar to RSN/WPA */
3609 "SAE: Use WPA_AUTH_ALG_OPEN for PMKSA caching attempt");
3812 struct rsn_pmksa_cache_entry *pmksa; local
3814 pmksa = pmksa_cache_get_current(wpa_s->wpa);
3815 if (!pmksa || !pmksa->dpp_pfs
    [all...]
  /src/external/bsd/wpa/dist/src/drivers/
driver_wext.c 2316 struct iw_pmksa pmksa; local
2321 os_memset(&pmksa, 0, sizeof(pmksa));
2322 pmksa.cmd = cmd;
2323 pmksa.bssid.sa_family = ARPHRD_ETHER;
2325 os_memcpy(pmksa.bssid.sa_data, bssid, ETH_ALEN);
2327 os_memcpy(pmksa.pmkid, pmkid, IW_PMKID_LEN);
2328 iwr.u.data.pointer = (caddr_t) &pmksa;
2329 iwr.u.data.length = sizeof(pmksa);
  /src/external/bsd/wpa/dist/hostapd/
ctrl_iface.c 2388 struct rsn_pmksa_cache_entry *pmksa; local
2390 pmksa = wpa_auth_pmksa_get(hapd->wpa_auth, addr, NULL);
2391 if (!pmksa)
2394 return wpa_snprintf_hex(buf, buflen, pmksa->pmk, pmksa->pmk_len);
4295 } else if (os_strcmp(buf, "PMKSA") == 0) {

Completed in 23 milliseconds