Lines Matching defs:akmp
25 static unsigned int wpa_kck_len(int akmp, size_t pmk_len)
27 switch (akmp) {
51 static unsigned int wpa_kck2_len(int akmp)
53 switch (akmp) {
65 static unsigned int wpa_kek_len(int akmp, size_t pmk_len)
67 switch (akmp) {
91 static unsigned int wpa_kek2_len(int akmp)
93 switch (akmp) {
105 unsigned int wpa_mic_len(int akmp, size_t pmk_len)
107 switch (akmp) {
132 * @akmp: WPA_KEY_MGMT_* used in key derivation
135 int wpa_use_akm_defined(int akmp)
137 return akmp == WPA_KEY_MGMT_OSEN ||
138 akmp == WPA_KEY_MGMT_OWE ||
139 akmp == WPA_KEY_MGMT_DPP ||
140 akmp == WPA_KEY_MGMT_FT_IEEE8021X_SHA384 ||
141 akmp == WPA_KEY_MGMT_IEEE8021X_SHA384 ||
142 wpa_key_mgmt_sae(akmp) ||
143 wpa_key_mgmt_suite_b(akmp) ||
144 wpa_key_mgmt_fils(akmp);
150 * @akmp: WPA_KEY_MGMT_* used in key derivation
153 int wpa_use_cmac(int akmp)
155 return akmp == WPA_KEY_MGMT_OSEN ||
156 akmp == WPA_KEY_MGMT_OWE ||
157 akmp == WPA_KEY_MGMT_DPP ||
158 wpa_key_mgmt_ft(akmp) ||
159 wpa_key_mgmt_sha256(akmp) ||
160 (wpa_key_mgmt_sae(akmp) &&
161 !wpa_key_mgmt_sae_ext_key(akmp)) ||
162 wpa_key_mgmt_suite_b(akmp);
168 * @akmp: WPA_KEY_MGMT_* used in key derivation
175 int wpa_use_aes_key_wrap(int akmp)
177 return akmp == WPA_KEY_MGMT_OSEN ||
178 akmp == WPA_KEY_MGMT_OWE ||
179 akmp == WPA_KEY_MGMT_DPP ||
180 akmp == WPA_KEY_MGMT_IEEE8021X_SHA384 ||
181 wpa_key_mgmt_ft(akmp) ||
182 wpa_key_mgmt_sha256(akmp) ||
183 wpa_key_mgmt_sae(akmp) ||
184 wpa_key_mgmt_suite_b(akmp);
192 * @akmp: WPA_KEY_MGMT_* used in key derivation
208 int wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver,
235 switch (akmp) {
353 "WPA: EAPOL-Key MIC algorithm not known (AKM-defined - akmp=0x%x)",
354 akmp);
379 * @akmp: Negotiated AKM
396 struct wpa_ptk *ptk, int akmp, int cipher,
408 if (akmp == (WPA_KEY_MGMT_OWE | WPA_KEY_MGMT_PSK_SHA256)) {
410 akmp = WPA_KEY_MGMT_OWE;
452 ptk->kck_len = wpa_kck_len(akmp, pmk_len);
453 ptk->kek_len = wpa_kek_len(akmp, pmk_len);
464 if (wpa_key_mgmt_sha384(akmp)) {
473 } else if (wpa_key_mgmt_sha256(akmp)) {
479 } else if (akmp == WPA_KEY_MGMT_OWE && (pmk_len == 32 ||
485 } else if (akmp == WPA_KEY_MGMT_OWE && pmk_len == 48) {
490 } else if (akmp == WPA_KEY_MGMT_OWE && pmk_len == 64) {
495 } else if (akmp == WPA_KEY_MGMT_OWE) {
501 } else if (akmp == WPA_KEY_MGMT_DPP && pmk_len == 32) {
506 } else if (akmp == WPA_KEY_MGMT_DPP && pmk_len == 48) {
511 } else if (akmp == WPA_KEY_MGMT_DPP && pmk_len == 64) {
516 } else if (akmp == WPA_KEY_MGMT_DPP) {
522 } else if (wpa_key_mgmt_sae_ext_key(akmp)) {
592 int fils_rmsk_to_pmk(int akmp, const u8 *rmsk, size_t rmsk_len,
605 if (wpa_key_mgmt_sha384(akmp))
607 else if (wpa_key_mgmt_sha256(akmp))
627 if (wpa_key_mgmt_sha384(akmp))
641 int fils_pmkid_erp(int akmp, const u8 *reauth, size_t reauth_len,
652 if (wpa_key_mgmt_sha384(akmp))
654 else if (wpa_key_mgmt_sha256(akmp))
669 u8 *ick, size_t *ick_len, int akmp, int cipher,
711 ptk->kek_len = wpa_kek_len(akmp, pmk_len);
713 if (wpa_key_mgmt_sha384(akmp))
715 else if (wpa_key_mgmt_sha256(akmp))
735 if (akmp == WPA_KEY_MGMT_FT_FILS_SHA256) {
737 } else if (akmp == WPA_KEY_MGMT_FT_FILS_SHA384) {
746 if (wpa_key_mgmt_sha384(akmp)) {
806 int akmp, u8 *key_auth_sta, u8 *key_auth_ap,
843 if (wpa_key_mgmt_sha384(akmp)) {
847 } else if (wpa_key_mgmt_sha256(akmp)) {
873 if (wpa_key_mgmt_sha384(akmp))
876 else if (wpa_key_mgmt_sha256(akmp))
1428 * @akmp: Authentication and key management protocol
1438 bool pasn_use_sha384(int akmp, int cipher)
1440 return (akmp == WPA_KEY_MGMT_PASN && (cipher == WPA_CIPHER_CCMP_256 ||
1442 wpa_key_mgmt_sha384(akmp);
1456 * @akmp: Negotiated AKM
1464 struct wpa_ptk *ptk, int akmp, int cipher,
1517 if (pasn_use_sha384(akmp, cipher)) {
1563 u8 pasn_mic_len(int akmp, int cipher)
1565 if (pasn_use_sha384(akmp, cipher))
1575 * @akmp: Negotiated AKM
1579 int wpa_ltf_keyseed(struct wpa_ptk *ptk, int akmp, int cipher)
1596 if (pasn_use_sha384(akmp, cipher)) {
1631 * @akmp: Negotiated AKM
1648 int pasn_mic(const u8 *kck, int akmp, int cipher,
1689 if (pasn_use_sha384(akmp, cipher)) {
1716 * @akmp: Negotiated AKM
1724 int pasn_auth_frame_hash(int akmp, int cipher, const u8 *data, size_t len,
1727 if (pasn_use_sha384(akmp, cipher)) {
2422 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher,
2442 if (akmp == WPA_KEY_MGMT_FT_SAE_EXT_KEY &&
2446 else if (wpa_key_mgmt_sha384(akmp))
2471 ptk->kck_len = wpa_kck_len(akmp, key_len);
2472 ptk->kck2_len = wpa_kck2_len(akmp);
2473 ptk->kek_len = wpa_kek_len(akmp, key_len);
2474 ptk->kek2_len = wpa_kek2_len(akmp);
2582 * @akmp: Negotiated key management protocol
2597 u8 *pmkid, int akmp)
2610 } else if (wpa_key_mgmt_sha384(akmp)) {
2614 } else if (wpa_key_mgmt_sha256(akmp)) {
3821 * @akmp: Authentication and key management protocol
3824 int wpa_pasn_add_rsne(struct wpabuf *buf, const u8 *pmkid, int akmp, int cipher)
3861 switch (akmp) {
3893 wpa_printf(MSG_ERROR, "PASN: Invalid AKMP=0x%x", akmp);