/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | peerkey_auth.c | 54 u8 kde[2 + RSN_SELECTOR_LEN + ETH_ALEN + local 62 pos = kde; 77 NULL, NULL, kde, pos - kde, 0, 0, 0); 84 struct wpa_eapol_ie_parse kde; local 90 WPA_GET_BE16(key->key_data_length), &kde) < 0) { 95 if (kde.rsn_ie == NULL || kde.mac_addr == NULL || 96 kde.mac_addr_len < ETH_ALEN) { 102 /* Initiator = sm->addr; Peer = kde 145 wpa_send_smk_m4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk) argument 198 wpa_send_smk_m5(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk, const u8 *peer) argument 258 struct wpa_eapol_ie_parse kde; local 329 struct wpa_eapol_ie_parse kde; local [all...] |
H A D | wpa_auth_ie.h | 46 u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len,
|
H A D | wpa_auth.c | 665 struct wpa_eapol_ie_parse *kde) 670 if (wpa_parse_wpa_ie_rsn(kde->rsn_ie, kde->rsn_ie_len, &ie) < 0 || 681 if (!kde->mdie || !kde->ftie) { 683 "message 2/4", kde->mdie ? "FTIE" : "MDIE"); 687 mdie = (struct rsn_mdie *) (kde->mdie + 2); 688 if (kde->mdie[1] < sizeof(struct rsn_mdie) || 696 (kde->ftie[1] != sm->assoc_resp_ftie[1] || 697 os_memcmp(kde 663 ft_check_msg_2_of_4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_ie_parse *kde) argument 755 struct wpa_eapol_ie_parse kde; local 1215 __wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr, int force_version) argument 1376 wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr) argument 1908 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos, dummy_gtk[32]; local 2243 u8 *kde, *pos, hdr[2]; local [all...] |
H A D | wpa_auth_i.h | 199 const u8 *kde, size_t kde_len,
|
H A D | wpa_auth_ie.c | 340 u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len, argument 345 RSN_SELECTOR_PUT(pos, kde);
|
/external/wpa_supplicant_8/src/ap/ |
H A D | peerkey_auth.c | 54 u8 kde[2 + RSN_SELECTOR_LEN + ETH_ALEN + local 62 pos = kde; 77 NULL, NULL, kde, pos - kde, 0, 0, 0); 84 struct wpa_eapol_ie_parse kde; local 90 WPA_GET_BE16(key->key_data_length), &kde) < 0) { 95 if (kde.rsn_ie == NULL || kde.mac_addr == NULL || 96 kde.mac_addr_len < ETH_ALEN) { 102 /* Initiator = sm->addr; Peer = kde 145 wpa_send_smk_m4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk) argument 198 wpa_send_smk_m5(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk, const u8 *peer) argument 258 struct wpa_eapol_ie_parse kde; local 329 struct wpa_eapol_ie_parse kde; local [all...] |
H A D | wpa_auth_ie.h | 46 u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len,
|
H A D | wpa_auth.c | 665 struct wpa_eapol_ie_parse *kde) 670 if (wpa_parse_wpa_ie_rsn(kde->rsn_ie, kde->rsn_ie_len, &ie) < 0 || 681 if (!kde->mdie || !kde->ftie) { 683 "message 2/4", kde->mdie ? "FTIE" : "MDIE"); 687 mdie = (struct rsn_mdie *) (kde->mdie + 2); 688 if (kde->mdie[1] < sizeof(struct rsn_mdie) || 696 (kde->ftie[1] != sm->assoc_resp_ftie[1] || 697 os_memcmp(kde 663 ft_check_msg_2_of_4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_ie_parse *kde) argument 755 struct wpa_eapol_ie_parse kde; local 1215 __wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr, int force_version) argument 1376 wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr) argument 1908 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos, dummy_gtk[32]; local 2243 u8 *kde, *pos, hdr[2]; local [all...] |
H A D | wpa_auth_i.h | 199 const u8 *kde, size_t kde_len,
|
H A D | wpa_auth_ie.c | 340 u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len, argument 345 RSN_SELECTOR_PUT(pos, kde);
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | peerkey_auth.c | 54 u8 kde[2 + RSN_SELECTOR_LEN + ETH_ALEN + local 62 pos = kde; 77 NULL, NULL, kde, pos - kde, 0, 0, 0); 84 struct wpa_eapol_ie_parse kde; local 90 WPA_GET_BE16(key->key_data_length), &kde) < 0) { 95 if (kde.rsn_ie == NULL || kde.mac_addr == NULL || 96 kde.mac_addr_len < ETH_ALEN) { 102 /* Initiator = sm->addr; Peer = kde 145 wpa_send_smk_m4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk) argument 198 wpa_send_smk_m5(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk, const u8 *peer) argument 258 struct wpa_eapol_ie_parse kde; local 329 struct wpa_eapol_ie_parse kde; local [all...] |
H A D | wpa_auth_ie.h | 46 u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len,
|
H A D | wpa_auth.c | 665 struct wpa_eapol_ie_parse *kde) 670 if (wpa_parse_wpa_ie_rsn(kde->rsn_ie, kde->rsn_ie_len, &ie) < 0 || 681 if (!kde->mdie || !kde->ftie) { 683 "message 2/4", kde->mdie ? "FTIE" : "MDIE"); 687 mdie = (struct rsn_mdie *) (kde->mdie + 2); 688 if (kde->mdie[1] < sizeof(struct rsn_mdie) || 696 (kde->ftie[1] != sm->assoc_resp_ftie[1] || 697 os_memcmp(kde 663 ft_check_msg_2_of_4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_ie_parse *kde) argument 755 struct wpa_eapol_ie_parse kde; local 1215 __wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr, int force_version) argument 1376 wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr) argument 1908 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos, dummy_gtk[32]; local 2243 u8 *kde, *pos, hdr[2]; local [all...] |
H A D | wpa_auth_i.h | 199 const u8 *kde, size_t kde_len,
|
H A D | wpa_auth_ie.c | 340 u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len, argument 345 RSN_SELECTOR_PUT(pos, kde);
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | peerkey.c | 32 static u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len) argument 36 RSN_SELECTOR_PUT(pos, kde); 179 struct wpa_eapol_ie_parse kde; local 193 if (wpa_supplicant_parse_ies((const u8 *) (key + 1), extra_len, &kde) < 199 if (kde.rsn_ie == NULL || kde.mac_addr == NULL || 200 kde.mac_addr_len < ETH_ALEN) { 207 MAC2STR(kde.mac_addr)); 209 if (kde.rsn_ie_len > PEERKEY_MAX_IE_LEN) { 215 if (wpa_parse_wpa_ie_rsn(kde 434 wpa_supplicant_process_smk_m4(struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 457 wpa_supplicant_process_smk_m5(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, int ver, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 517 struct wpa_eapol_ie_parse kde; local 598 struct wpa_eapol_ie_parse kde; local 662 const u8 *kde; local 734 wpa_supplicant_update_smk_lifetime(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 771 struct wpa_eapol_ie_parse kde; local 820 struct wpa_eapol_ie_parse kde; local [all...] |
H A D | tdls.c | 806 struct wpa_eapol_ie_parse kde; local 833 if (wpa_supplicant_parse_ies((const u8 *) pos, ielen, &kde) < 0) { 838 if (kde.lnkid == NULL || kde.lnkid_len < 3 * ETH_ALEN) { 843 lnkid = (struct wpa_tdls_lnkid *) kde.lnkid; 848 if (kde.ftie == NULL || kde.ftie_len < sizeof(*ftie)) { 853 ftie = (struct wpa_tdls_ftie *) kde.ftie; 1284 struct wpa_eapol_ie_parse kde; local 1304 &kde) < 1341 copy_supp_rates(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1357 copy_peer_ht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1385 copy_peer_vht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1413 copy_peer_ext_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1441 struct wpa_eapol_ie_parse kde; local 1809 struct wpa_eapol_ie_parse kde; local 2057 struct wpa_eapol_ie_parse kde; local [all...] |
H A D | wpa_i.h | 312 const u8 *kde, size_t kde_len,
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | peerkey.c | 32 static u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len) argument 36 RSN_SELECTOR_PUT(pos, kde); 179 struct wpa_eapol_ie_parse kde; local 193 if (wpa_supplicant_parse_ies((const u8 *) (key + 1), extra_len, &kde) < 199 if (kde.rsn_ie == NULL || kde.mac_addr == NULL || 200 kde.mac_addr_len < ETH_ALEN) { 207 MAC2STR(kde.mac_addr)); 209 if (kde.rsn_ie_len > PEERKEY_MAX_IE_LEN) { 215 if (wpa_parse_wpa_ie_rsn(kde 434 wpa_supplicant_process_smk_m4(struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 457 wpa_supplicant_process_smk_m5(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, int ver, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 517 struct wpa_eapol_ie_parse kde; local 598 struct wpa_eapol_ie_parse kde; local 662 const u8 *kde; local 734 wpa_supplicant_update_smk_lifetime(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 771 struct wpa_eapol_ie_parse kde; local 820 struct wpa_eapol_ie_parse kde; local [all...] |
H A D | tdls.c | 806 struct wpa_eapol_ie_parse kde; local 833 if (wpa_supplicant_parse_ies((const u8 *) pos, ielen, &kde) < 0) { 838 if (kde.lnkid == NULL || kde.lnkid_len < 3 * ETH_ALEN) { 843 lnkid = (struct wpa_tdls_lnkid *) kde.lnkid; 848 if (kde.ftie == NULL || kde.ftie_len < sizeof(*ftie)) { 853 ftie = (struct wpa_tdls_ftie *) kde.ftie; 1284 struct wpa_eapol_ie_parse kde; local 1304 &kde) < 1341 copy_supp_rates(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1357 copy_peer_ht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1385 copy_peer_vht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1413 copy_peer_ext_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1441 struct wpa_eapol_ie_parse kde; local 1809 struct wpa_eapol_ie_parse kde; local 2057 struct wpa_eapol_ie_parse kde; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | peerkey.c | 32 static u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len) argument 36 RSN_SELECTOR_PUT(pos, kde); 179 struct wpa_eapol_ie_parse kde; local 193 if (wpa_supplicant_parse_ies((const u8 *) (key + 1), extra_len, &kde) < 199 if (kde.rsn_ie == NULL || kde.mac_addr == NULL || 200 kde.mac_addr_len < ETH_ALEN) { 207 MAC2STR(kde.mac_addr)); 209 if (kde.rsn_ie_len > PEERKEY_MAX_IE_LEN) { 215 if (wpa_parse_wpa_ie_rsn(kde 434 wpa_supplicant_process_smk_m4(struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 457 wpa_supplicant_process_smk_m5(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, int ver, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 517 struct wpa_eapol_ie_parse kde; local 598 struct wpa_eapol_ie_parse kde; local 662 const u8 *kde; local 734 wpa_supplicant_update_smk_lifetime(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 771 struct wpa_eapol_ie_parse kde; local 820 struct wpa_eapol_ie_parse kde; local [all...] |
H A D | tdls.c | 806 struct wpa_eapol_ie_parse kde; local 833 if (wpa_supplicant_parse_ies((const u8 *) pos, ielen, &kde) < 0) { 838 if (kde.lnkid == NULL || kde.lnkid_len < 3 * ETH_ALEN) { 843 lnkid = (struct wpa_tdls_lnkid *) kde.lnkid; 848 if (kde.ftie == NULL || kde.ftie_len < sizeof(*ftie)) { 853 ftie = (struct wpa_tdls_ftie *) kde.ftie; 1284 struct wpa_eapol_ie_parse kde; local 1304 &kde) < 1341 copy_supp_rates(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1357 copy_peer_ht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1385 copy_peer_vht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1413 copy_peer_ext_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1441 struct wpa_eapol_ie_parse kde; local 1809 struct wpa_eapol_ie_parse kde; local 2057 struct wpa_eapol_ie_parse kde; local [all...] |
/external/chromium_org/third_party/icu/source/data/lang/ |
H A D | resfiles.mk | 60 jmc.txt ka.txt kab.txt kam.txt kde.txt\
|
/external/chromium_org/third_party/icu/source/data/region/ |
H A D | resfiles.mk | 60 kab.txt kam.txt kde.txt kea.txt khq.txt\
|
/external/chromium_org/third_party/icu/source/data/zone/ |
H A D | resfiles.mk | 61 kam.txt kde.txt kea.txt khq.txt ki.txt\
|