/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
H A D | peerkey.c | 75 size_t kde_len; local 78 kde_len = 2 + RSN_SELECTOR_LEN + sizeof(error); 80 kde_len += 2 + RSN_SELECTOR_LEN + ETH_ALEN; 83 NULL, sizeof(*err) + kde_len, &rlen, 98 WPA_PUT_BE16(err->key_data_length, (u16) kde_len); 135 size_t kde_len; local 139 kde_len = peerkey->rsnie_p_len + 144 NULL, sizeof(*reply) + kde_len, &rlen, 159 WPA_PUT_BE16(reply->key_data_length, (u16) kde_len); 339 size_t kde_len; local 396 size_t kde_len; local 1003 size_t rlen, kde_len; local [all...] |
H A D | wpa.c | 895 * @kde_len: Length of KDEs 902 const u8 *kde, size_t kde_len, 910 wpa_hexdump(MSG_DEBUG, "WPA: KDE for msg 4/4", kde, kde_len); 913 sizeof(*reply) + kde_len, 930 WPA_PUT_BE16(reply->key_data_length, kde_len); 932 os_memcpy(reply + 1, kde, kde_len); 899 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, const u8 *kde, size_t kde_len, struct wpa_ptk *ptk) argument
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | peerkey.c | 70 size_t kde_len; local 73 kde_len = 2 + RSN_SELECTOR_LEN + sizeof(error); 75 kde_len += 2 + RSN_SELECTOR_LEN + ETH_ALEN; 78 NULL, sizeof(*err) + kde_len, &rlen, 93 WPA_PUT_BE16(err->key_data_length, (u16) kde_len); 130 size_t kde_len; local 134 kde_len = peerkey->rsnie_p_len + 139 NULL, sizeof(*reply) + kde_len, &rlen, 154 WPA_PUT_BE16(reply->key_data_length, (u16) kde_len); 334 size_t kde_len; local 391 size_t kde_len; local 1003 size_t rlen, kde_len; local [all...] |
H A D | wpa.c | 992 * @kde_len: Length of KDEs 999 const u8 *kde, size_t kde_len, 1007 wpa_hexdump(MSG_DEBUG, "WPA: KDE for msg 4/4", kde, kde_len); 1010 sizeof(*reply) + kde_len, 1027 WPA_PUT_BE16(reply->key_data_length, kde_len); 1029 os_memcpy(reply + 1, kde, kde_len); 996 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, const u8 *kde, size_t kde_len, struct wpa_ptk *ptk) argument
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | peerkey.c | 70 size_t kde_len; local 73 kde_len = 2 + RSN_SELECTOR_LEN + sizeof(error); 75 kde_len += 2 + RSN_SELECTOR_LEN + ETH_ALEN; 78 NULL, sizeof(*err) + kde_len, &rlen, 93 WPA_PUT_BE16(err->key_data_length, (u16) kde_len); 130 size_t kde_len; local 134 kde_len = peerkey->rsnie_p_len + 139 NULL, sizeof(*reply) + kde_len, &rlen, 154 WPA_PUT_BE16(reply->key_data_length, (u16) kde_len); 334 size_t kde_len; local 391 size_t kde_len; local 1003 size_t rlen, kde_len; local [all...] |
H A D | wpa.c | 992 * @kde_len: Length of KDEs 999 const u8 *kde, size_t kde_len, 1007 wpa_hexdump(MSG_DEBUG, "WPA: KDE for msg 4/4", kde, kde_len); 1010 sizeof(*reply) + kde_len, 1027 WPA_PUT_BE16(reply->key_data_length, kde_len); 1029 os_memcpy(reply + 1, kde, kde_len); 996 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, const u8 *kde, size_t kde_len, struct wpa_ptk *ptk) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | peerkey.c | 70 size_t kde_len; local 73 kde_len = 2 + RSN_SELECTOR_LEN + sizeof(error); 75 kde_len += 2 + RSN_SELECTOR_LEN + ETH_ALEN; 78 NULL, sizeof(*err) + kde_len, &rlen, 93 WPA_PUT_BE16(err->key_data_length, (u16) kde_len); 130 size_t kde_len; local 134 kde_len = peerkey->rsnie_p_len + 139 NULL, sizeof(*reply) + kde_len, &rlen, 154 WPA_PUT_BE16(reply->key_data_length, (u16) kde_len); 334 size_t kde_len; local 391 size_t kde_len; local 1003 size_t rlen, kde_len; local [all...] |
H A D | wpa.c | 992 * @kde_len: Length of KDEs 999 const u8 *kde, size_t kde_len, 1007 wpa_hexdump(MSG_DEBUG, "WPA: KDE for msg 4/4", kde, kde_len); 1010 sizeof(*reply) + kde_len, 1027 WPA_PUT_BE16(reply->key_data_length, kde_len); 1029 os_memcpy(reply + 1, kde, kde_len); 996 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, const u8 *kde, size_t kde_len, struct wpa_ptk *ptk) argument
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth.c | 1206 const u8 *kde, size_t kde_len, 1232 "ack=%d install=%d pairwise=%d kde_len=%lu keyidx=%d " 1239 pairwise, (unsigned long) kde_len, keyidx, encr); 1241 key_data_len = kde_len; 1294 os_memcpy(key + 1, kde, kde_len); 1295 WPA_PUT_BE16(key->key_data_length, kde_len); 1303 os_memcpy(pos, kde, kde_len); 1304 pos += kde_len; 1357 const u8 *kde, size_t kde_len, 1367 __wpa_send_eapol(wpa_auth, sm, key_info, key_rsc, nonce, kde, kde_len, 1203 __wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr, int force_version) argument 1354 wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr) argument 1886 size_t gtk_len, kde_len; local 2220 size_t kde_len; local [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth.c | 1206 const u8 *kde, size_t kde_len, 1232 "ack=%d install=%d pairwise=%d kde_len=%lu keyidx=%d " 1239 pairwise, (unsigned long) kde_len, keyidx, encr); 1241 key_data_len = kde_len; 1294 os_memcpy(key + 1, kde, kde_len); 1295 WPA_PUT_BE16(key->key_data_length, kde_len); 1303 os_memcpy(pos, kde, kde_len); 1304 pos += kde_len; 1357 const u8 *kde, size_t kde_len, 1367 __wpa_send_eapol(wpa_auth, sm, key_info, key_rsc, nonce, kde, kde_len, 1203 __wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr, int force_version) argument 1354 wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr) argument 1886 size_t gtk_len, kde_len; local 2220 size_t kde_len; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth.c | 1206 const u8 *kde, size_t kde_len, 1232 "ack=%d install=%d pairwise=%d kde_len=%lu keyidx=%d " 1239 pairwise, (unsigned long) kde_len, keyidx, encr); 1241 key_data_len = kde_len; 1294 os_memcpy(key + 1, kde, kde_len); 1295 WPA_PUT_BE16(key->key_data_length, kde_len); 1303 os_memcpy(pos, kde, kde_len); 1304 pos += kde_len; 1357 const u8 *kde, size_t kde_len, 1367 __wpa_send_eapol(wpa_auth, sm, key_info, key_rsc, nonce, kde, kde_len, 1203 __wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr, int force_version) argument 1354 wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr) argument 1886 size_t gtk_len, kde_len; local 2220 size_t kde_len; local [all...] |