/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | peerkey.c | 22 #include "peerkey.h" 48 struct wpa_peerkey *peerkey = timeout_ctx; 55 struct wpa_peerkey *peerkey) 57 eloop_cancel_timeout(wpa_supplicant_smk_timeout, sm, peerkey); 58 os_free(peerkey); 125 int ver, struct wpa_peerkey *peerkey) 134 kde_len = peerkey->rsnie_p_len + 152 os_memcpy(reply->key_nonce, peerkey->pnonce, WPA_NONCE_LEN); 158 pos = wpa_add_ie(pos, peerkey->rsnie_p, peerkey 54 wpa_supplicant_peerkey_free(struct wpa_sm *sm, struct wpa_peerkey *peerkey) argument 122 wpa_supplicant_send_smk_m3(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, int ver, struct wpa_peerkey *peerkey) argument 178 struct wpa_peerkey *peerkey; local 322 wpa_supplicant_send_stk_1_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey) argument 379 wpa_supplicant_send_stk_3_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey) argument 434 wpa_supplicant_process_smk_m4(struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 457 wpa_supplicant_process_smk_m5(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, int ver, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 516 struct wpa_peerkey *peerkey; local 637 struct wpa_peerkey *peerkey; local 656 wpa_supplicant_process_stk_1_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver) argument 734 wpa_supplicant_update_smk_lifetime(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 766 wpa_supplicant_process_stk_2_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver) argument 815 wpa_supplicant_process_stk_3_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver) argument 891 wpa_supplicant_process_stk_4_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver) argument 922 peerkey_verify_eapol_key_mic(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 ver, const u8 *buf, size_t len) argument 998 struct wpa_peerkey *peerkey; local 1115 struct wpa_peerkey *prev, *peerkey = sm->peerkey; local 1125 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver) argument [all...] |
H A D | peerkey.h | 41 struct wpa_peerkey *peerkey, 44 void peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, 55 struct wpa_peerkey *peerkey, 63 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, argument 54 peerkey_verify_eapol_key_mic(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 ver, const u8 *buf, size_t len) argument
|
H A D | wpa.c | 23 #include "peerkey.h" 1555 struct wpa_peerkey *peerkey = NULL; local 1678 for (peerkey = sm->peerkey; peerkey; peerkey = peerkey->next) { 1679 if (os_memcmp(peerkey->addr, src_addr, ETH_ALEN) == 0) 1683 if (!(key_info & WPA_KEY_INFO_SMK_MESSAGE) && peerkey) { 1684 if (!peerkey [all...] |
H A D | wpa_i.h | 89 struct wpa_peerkey *peerkey; member in struct:wpa_sm
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | peerkey.c | 22 #include "peerkey.h" 48 struct wpa_peerkey *peerkey = timeout_ctx; 55 struct wpa_peerkey *peerkey) 57 eloop_cancel_timeout(wpa_supplicant_smk_timeout, sm, peerkey); 58 os_free(peerkey); 125 int ver, struct wpa_peerkey *peerkey) 134 kde_len = peerkey->rsnie_p_len + 152 os_memcpy(reply->key_nonce, peerkey->pnonce, WPA_NONCE_LEN); 158 pos = wpa_add_ie(pos, peerkey->rsnie_p, peerkey 54 wpa_supplicant_peerkey_free(struct wpa_sm *sm, struct wpa_peerkey *peerkey) argument 122 wpa_supplicant_send_smk_m3(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, int ver, struct wpa_peerkey *peerkey) argument 178 struct wpa_peerkey *peerkey; local 322 wpa_supplicant_send_stk_1_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey) argument 379 wpa_supplicant_send_stk_3_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey) argument 434 wpa_supplicant_process_smk_m4(struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 457 wpa_supplicant_process_smk_m5(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, int ver, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 516 struct wpa_peerkey *peerkey; local 637 struct wpa_peerkey *peerkey; local 656 wpa_supplicant_process_stk_1_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver) argument 734 wpa_supplicant_update_smk_lifetime(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 766 wpa_supplicant_process_stk_2_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver) argument 815 wpa_supplicant_process_stk_3_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver) argument 891 wpa_supplicant_process_stk_4_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver) argument 922 peerkey_verify_eapol_key_mic(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 ver, const u8 *buf, size_t len) argument 998 struct wpa_peerkey *peerkey; local 1115 struct wpa_peerkey *prev, *peerkey = sm->peerkey; local 1125 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver) argument [all...] |
H A D | peerkey.h | 41 struct wpa_peerkey *peerkey, 44 void peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, 55 struct wpa_peerkey *peerkey, 63 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, argument 54 peerkey_verify_eapol_key_mic(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 ver, const u8 *buf, size_t len) argument
|
H A D | wpa.c | 23 #include "peerkey.h" 1555 struct wpa_peerkey *peerkey = NULL; local 1678 for (peerkey = sm->peerkey; peerkey; peerkey = peerkey->next) { 1679 if (os_memcmp(peerkey->addr, src_addr, ETH_ALEN) == 0) 1683 if (!(key_info & WPA_KEY_INFO_SMK_MESSAGE) && peerkey) { 1684 if (!peerkey [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | peerkey.c | 22 #include "peerkey.h" 48 struct wpa_peerkey *peerkey = timeout_ctx; 55 struct wpa_peerkey *peerkey) 57 eloop_cancel_timeout(wpa_supplicant_smk_timeout, sm, peerkey); 58 os_free(peerkey); 125 int ver, struct wpa_peerkey *peerkey) 134 kde_len = peerkey->rsnie_p_len + 152 os_memcpy(reply->key_nonce, peerkey->pnonce, WPA_NONCE_LEN); 158 pos = wpa_add_ie(pos, peerkey->rsnie_p, peerkey 54 wpa_supplicant_peerkey_free(struct wpa_sm *sm, struct wpa_peerkey *peerkey) argument 122 wpa_supplicant_send_smk_m3(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, int ver, struct wpa_peerkey *peerkey) argument 178 struct wpa_peerkey *peerkey; local 322 wpa_supplicant_send_stk_1_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey) argument 379 wpa_supplicant_send_stk_3_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey) argument 434 wpa_supplicant_process_smk_m4(struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 457 wpa_supplicant_process_smk_m5(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, int ver, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 516 struct wpa_peerkey *peerkey; local 637 struct wpa_peerkey *peerkey; local 656 wpa_supplicant_process_stk_1_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver) argument 734 wpa_supplicant_update_smk_lifetime(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 766 wpa_supplicant_process_stk_2_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver) argument 815 wpa_supplicant_process_stk_3_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver) argument 891 wpa_supplicant_process_stk_4_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver) argument 922 peerkey_verify_eapol_key_mic(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 ver, const u8 *buf, size_t len) argument 998 struct wpa_peerkey *peerkey; local 1115 struct wpa_peerkey *prev, *peerkey = sm->peerkey; local 1125 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver) argument [all...] |
H A D | peerkey.h | 41 struct wpa_peerkey *peerkey, 44 void peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, 55 struct wpa_peerkey *peerkey, 63 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, argument 54 peerkey_verify_eapol_key_mic(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 ver, const u8 *buf, size_t len) argument
|
H A D | wpa.c | 23 #include "peerkey.h" 1555 struct wpa_peerkey *peerkey = NULL; local 1678 for (peerkey = sm->peerkey; peerkey; peerkey = peerkey->next) { 1679 if (os_memcmp(peerkey->addr, src_addr, ETH_ALEN) == 0) 1683 if (!(key_info & WPA_KEY_INFO_SMK_MESSAGE) && peerkey) { 1684 if (!peerkey [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
H A D | pmeth_fn.c | 335 if (ctx->peerkey) 336 EVP_PKEY_free(ctx->peerkey); 337 ctx->peerkey = peer; 343 ctx->peerkey = NULL;
|
H A D | pmeth_lib.c | 182 ret->peerkey = NULL; 334 if (pctx->peerkey) 335 CRYPTO_add(&pctx->peerkey->references,1,CRYPTO_LOCK_EVP_PKEY); 337 rctx->peerkey = pctx->peerkey; 373 if (ctx->peerkey) 374 EVP_PKEY_free(ctx->peerkey); 468 return ctx->peerkey;
|
/external/openssl/crypto/evp/ |
H A D | pmeth_fn.c | 335 if (ctx->peerkey) 336 EVP_PKEY_free(ctx->peerkey); 337 ctx->peerkey = peer; 343 ctx->peerkey = NULL;
|
H A D | pmeth_lib.c | 182 ret->peerkey = NULL; 334 if (pctx->peerkey) 335 CRYPTO_add(&pctx->peerkey->references,1,CRYPTO_LOCK_EVP_PKEY); 337 rctx->peerkey = pctx->peerkey; 373 if (ctx->peerkey) 374 EVP_PKEY_free(ctx->peerkey); 468 return ctx->peerkey;
|
/external/chromium_org/third_party/openssl/openssl/crypto/dh/ |
H A D | dh_pmeth.c | 207 if (!ctx->pkey || !ctx->peerkey) 212 ret = DH_compute_key(key, ctx->peerkey->pkey.dh->pub_key,
|
/external/openssl/crypto/dh/ |
H A D | dh_pmeth.c | 207 if (!ctx->pkey || !ctx->peerkey) 212 ret = DH_compute_key(key, ctx->peerkey->pkey.dh->pub_key,
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | config_ssid.h | 348 * peerkey - Whether PeerKey handshake for direct links is allowed 356 int peerkey; member in struct:wpa_ssid
|
/external/chromium_org/third_party/openssl/openssl/crypto/ec/ |
H A D | ec_pmeth.c | 175 if (!ctx->pkey || !ctx->peerkey) 189 pubkey = EC_KEY_get0_public_key(ctx->peerkey->pkey.ec);
|
/external/openssl/crypto/ec/ |
H A D | ec_pmeth.c | 175 if (!ctx->pkey || !ctx->peerkey) 189 pubkey = EC_KEY_get0_public_key(ctx->peerkey->pkey.ec);
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth_glue.c | 46 wconf->peerkey = conf->peerkey;
|
H A D | ap_config.h | 273 int peerkey; member in struct:hostapd_bss_config
|
H A D | wpa_auth.h | 137 int peerkey; member in struct:wpa_auth_config
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth_glue.c | 46 wconf->peerkey = conf->peerkey;
|
H A D | ap_config.h | 273 int peerkey; member in struct:hostapd_bss_config
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth_glue.c | 46 wconf->peerkey = conf->peerkey;
|