Searched refs:kde (Results 1 - 25 of 35) sorted by relevance

12

/external/wpa_supplicant_8/hostapd/src/ap/
H A Dpeerkey_auth.c54 u8 kde[2 + RSN_SELECTOR_LEN + ETH_ALEN + local
62 pos = kde;
77 NULL, NULL, kde, pos - kde, 0, 0, 0);
84 struct wpa_eapol_ie_parse kde; local
90 WPA_GET_BE16(key->key_data_length), &kde) < 0) {
95 if (kde.rsn_ie == NULL || kde.mac_addr == NULL ||
96 kde.mac_addr_len < ETH_ALEN) {
102 /* Initiator = sm->addr; Peer = kde
145 wpa_send_smk_m4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk) argument
198 wpa_send_smk_m5(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk, const u8 *peer) argument
258 struct wpa_eapol_ie_parse kde; local
329 struct wpa_eapol_ie_parse kde; local
[all...]
H A Dwpa_auth.c705 struct wpa_eapol_ie_parse *kde)
710 if (wpa_parse_wpa_ie_rsn(kde->rsn_ie, kde->rsn_ie_len, &ie) < 0 ||
721 if (!kde->mdie || !kde->ftie) {
723 "message 2/4", kde->mdie ? "FTIE" : "MDIE");
727 mdie = (struct rsn_mdie *) (kde->mdie + 2);
728 if (kde->mdie[1] < sizeof(struct rsn_mdie) ||
736 (kde->ftie[1] != sm->assoc_resp_ftie[1] ||
737 os_memcmp(kde
703 ft_check_msg_2_of_4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_ie_parse *kde) argument
795 struct wpa_eapol_ie_parse kde; local
1279 __wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr, int force_version) argument
1444 wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr) argument
1984 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos, dummy_gtk[32]; local
2333 u8 *kde, *pos, hdr[2]; local
[all...]
H A Dwpa_auth_ie.h53 u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len,
H A Dwpa_auth_i.h217 const u8 *kde, size_t kde_len,
/external/wpa_supplicant_8/src/ap/
H A Dpeerkey_auth.c54 u8 kde[2 + RSN_SELECTOR_LEN + ETH_ALEN + local
62 pos = kde;
77 NULL, NULL, kde, pos - kde, 0, 0, 0);
84 struct wpa_eapol_ie_parse kde; local
90 WPA_GET_BE16(key->key_data_length), &kde) < 0) {
95 if (kde.rsn_ie == NULL || kde.mac_addr == NULL ||
96 kde.mac_addr_len < ETH_ALEN) {
102 /* Initiator = sm->addr; Peer = kde
145 wpa_send_smk_m4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk) argument
198 wpa_send_smk_m5(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk, const u8 *peer) argument
258 struct wpa_eapol_ie_parse kde; local
329 struct wpa_eapol_ie_parse kde; local
[all...]
H A Dwpa_auth.c705 struct wpa_eapol_ie_parse *kde)
710 if (wpa_parse_wpa_ie_rsn(kde->rsn_ie, kde->rsn_ie_len, &ie) < 0 ||
721 if (!kde->mdie || !kde->ftie) {
723 "message 2/4", kde->mdie ? "FTIE" : "MDIE");
727 mdie = (struct rsn_mdie *) (kde->mdie + 2);
728 if (kde->mdie[1] < sizeof(struct rsn_mdie) ||
736 (kde->ftie[1] != sm->assoc_resp_ftie[1] ||
737 os_memcmp(kde
703 ft_check_msg_2_of_4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_ie_parse *kde) argument
795 struct wpa_eapol_ie_parse kde; local
1279 __wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr, int force_version) argument
1444 wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr) argument
1984 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos, dummy_gtk[32]; local
2333 u8 *kde, *pos, hdr[2]; local
[all...]
H A Dwpa_auth_ie.h53 u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len,
H A Dwpa_auth_i.h217 const u8 *kde, size_t kde_len,
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dpeerkey_auth.c54 u8 kde[2 + RSN_SELECTOR_LEN + ETH_ALEN + local
62 pos = kde;
77 NULL, NULL, kde, pos - kde, 0, 0, 0);
84 struct wpa_eapol_ie_parse kde; local
90 WPA_GET_BE16(key->key_data_length), &kde) < 0) {
95 if (kde.rsn_ie == NULL || kde.mac_addr == NULL ||
96 kde.mac_addr_len < ETH_ALEN) {
102 /* Initiator = sm->addr; Peer = kde
145 wpa_send_smk_m4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk) argument
198 wpa_send_smk_m5(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk, const u8 *peer) argument
258 struct wpa_eapol_ie_parse kde; local
329 struct wpa_eapol_ie_parse kde; local
[all...]
H A Dwpa_auth.c705 struct wpa_eapol_ie_parse *kde)
710 if (wpa_parse_wpa_ie_rsn(kde->rsn_ie, kde->rsn_ie_len, &ie) < 0 ||
721 if (!kde->mdie || !kde->ftie) {
723 "message 2/4", kde->mdie ? "FTIE" : "MDIE");
727 mdie = (struct rsn_mdie *) (kde->mdie + 2);
728 if (kde->mdie[1] < sizeof(struct rsn_mdie) ||
736 (kde->ftie[1] != sm->assoc_resp_ftie[1] ||
737 os_memcmp(kde
703 ft_check_msg_2_of_4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_ie_parse *kde) argument
795 struct wpa_eapol_ie_parse kde; local
1279 __wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr, int force_version) argument
1444 wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr) argument
1984 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos, dummy_gtk[32]; local
2333 u8 *kde, *pos, hdr[2]; local
[all...]
H A Dwpa_auth_ie.h53 u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len,
H A Dwpa_auth_i.h217 const u8 *kde, size_t kde_len,
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dpeerkey.c32 static u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len) argument
36 RSN_SELECTOR_PUT(pos, kde);
179 struct wpa_eapol_ie_parse kde; local
193 if (wpa_supplicant_parse_ies((const u8 *) (key + 1), extra_len, &kde) <
199 if (kde.rsn_ie == NULL || kde.mac_addr == NULL ||
200 kde.mac_addr_len < ETH_ALEN) {
207 MAC2STR(kde.mac_addr));
209 if (kde.rsn_ie_len > PEERKEY_MAX_IE_LEN) {
215 if (wpa_parse_wpa_ie_rsn(kde
434 wpa_supplicant_process_smk_m4(struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument
457 wpa_supplicant_process_smk_m5(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, int ver, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument
517 struct wpa_eapol_ie_parse kde; local
595 struct wpa_eapol_ie_parse kde; local
730 wpa_supplicant_update_smk_lifetime(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument
765 struct wpa_eapol_ie_parse kde; local
811 struct wpa_eapol_ie_parse kde; local
[all...]
H A Dtdls.c898 struct wpa_eapol_ie_parse kde; local
925 if (wpa_supplicant_parse_ies((const u8 *) pos, ielen, &kde) < 0) {
930 if (kde.lnkid == NULL || kde.lnkid_len < 3 * ETH_ALEN) {
935 lnkid = (struct wpa_tdls_lnkid *) kde.lnkid;
940 if (kde.ftie == NULL || kde.ftie_len < sizeof(*ftie)) {
945 ftie = (struct wpa_tdls_ftie *) kde.ftie;
1397 struct wpa_eapol_ie_parse kde; local
1422 &kde) <
1461 copy_supp_rates(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1477 copy_peer_ht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1505 copy_peer_vht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1533 copy_peer_ext_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1557 copy_peer_wmm_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1582 copy_peer_supp_channels(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1608 copy_peer_supp_oper_classes(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1655 struct wpa_eapol_ie_parse kde; local
2027 struct wpa_eapol_ie_parse kde; local
2302 struct wpa_eapol_ie_parse kde; local
[all...]
H A Dwpa.c388 u8 *kde, *kde_buf = NULL; local
449 kde = sm->assoc_wpa_ie;
459 os_memcpy(kde_buf, kde, kde_len);
460 kde = kde_buf;
461 pos = kde + kde_len;
467 kde_len = pos - kde;
473 kde, kde_len, ptk))
/external/wpa_supplicant_8/src/rsn_supp/
H A Dpeerkey.c32 static u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len) argument
36 RSN_SELECTOR_PUT(pos, kde);
179 struct wpa_eapol_ie_parse kde; local
193 if (wpa_supplicant_parse_ies((const u8 *) (key + 1), extra_len, &kde) <
199 if (kde.rsn_ie == NULL || kde.mac_addr == NULL ||
200 kde.mac_addr_len < ETH_ALEN) {
207 MAC2STR(kde.mac_addr));
209 if (kde.rsn_ie_len > PEERKEY_MAX_IE_LEN) {
215 if (wpa_parse_wpa_ie_rsn(kde
434 wpa_supplicant_process_smk_m4(struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument
457 wpa_supplicant_process_smk_m5(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, int ver, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument
517 struct wpa_eapol_ie_parse kde; local
595 struct wpa_eapol_ie_parse kde; local
730 wpa_supplicant_update_smk_lifetime(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument
765 struct wpa_eapol_ie_parse kde; local
811 struct wpa_eapol_ie_parse kde; local
[all...]
H A Dtdls.c898 struct wpa_eapol_ie_parse kde; local
925 if (wpa_supplicant_parse_ies((const u8 *) pos, ielen, &kde) < 0) {
930 if (kde.lnkid == NULL || kde.lnkid_len < 3 * ETH_ALEN) {
935 lnkid = (struct wpa_tdls_lnkid *) kde.lnkid;
940 if (kde.ftie == NULL || kde.ftie_len < sizeof(*ftie)) {
945 ftie = (struct wpa_tdls_ftie *) kde.ftie;
1397 struct wpa_eapol_ie_parse kde; local
1422 &kde) <
1461 copy_supp_rates(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1477 copy_peer_ht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1505 copy_peer_vht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1533 copy_peer_ext_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1557 copy_peer_wmm_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1582 copy_peer_supp_channels(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1608 copy_peer_supp_oper_classes(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1655 struct wpa_eapol_ie_parse kde; local
2027 struct wpa_eapol_ie_parse kde; local
2302 struct wpa_eapol_ie_parse kde; local
[all...]
H A Dwpa.c388 u8 *kde, *kde_buf = NULL; local
449 kde = sm->assoc_wpa_ie;
459 os_memcpy(kde_buf, kde, kde_len);
460 kde = kde_buf;
461 pos = kde + kde_len;
467 kde_len = pos - kde;
473 kde, kde_len, ptk))
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dpeerkey.c32 static u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len) argument
36 RSN_SELECTOR_PUT(pos, kde);
179 struct wpa_eapol_ie_parse kde; local
193 if (wpa_supplicant_parse_ies((const u8 *) (key + 1), extra_len, &kde) <
199 if (kde.rsn_ie == NULL || kde.mac_addr == NULL ||
200 kde.mac_addr_len < ETH_ALEN) {
207 MAC2STR(kde.mac_addr));
209 if (kde.rsn_ie_len > PEERKEY_MAX_IE_LEN) {
215 if (wpa_parse_wpa_ie_rsn(kde
434 wpa_supplicant_process_smk_m4(struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument
457 wpa_supplicant_process_smk_m5(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, int ver, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument
517 struct wpa_eapol_ie_parse kde; local
595 struct wpa_eapol_ie_parse kde; local
730 wpa_supplicant_update_smk_lifetime(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument
765 struct wpa_eapol_ie_parse kde; local
811 struct wpa_eapol_ie_parse kde; local
[all...]
H A Dtdls.c898 struct wpa_eapol_ie_parse kde; local
925 if (wpa_supplicant_parse_ies((const u8 *) pos, ielen, &kde) < 0) {
930 if (kde.lnkid == NULL || kde.lnkid_len < 3 * ETH_ALEN) {
935 lnkid = (struct wpa_tdls_lnkid *) kde.lnkid;
940 if (kde.ftie == NULL || kde.ftie_len < sizeof(*ftie)) {
945 ftie = (struct wpa_tdls_ftie *) kde.ftie;
1397 struct wpa_eapol_ie_parse kde; local
1422 &kde) <
1461 copy_supp_rates(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1477 copy_peer_ht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1505 copy_peer_vht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1533 copy_peer_ext_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1557 copy_peer_wmm_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1582 copy_peer_supp_channels(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1608 copy_peer_supp_oper_classes(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1655 struct wpa_eapol_ie_parse kde; local
2027 struct wpa_eapol_ie_parse kde; local
2302 struct wpa_eapol_ie_parse kde; local
[all...]
H A Dwpa.c388 u8 *kde, *kde_buf = NULL; local
449 kde = sm->assoc_wpa_ie;
459 os_memcpy(kde_buf, kde, kde_len);
460 kde = kde_buf;
461 pos = kde + kde_len;
467 kde_len = pos - kde;
473 kde, kde_len, ptk))
/external/chromium_org/third_party/icu/source/data/lang/
H A Dresfiles.mk60 jmc.txt ka.txt kab.txt kam.txt kde.txt\
/external/chromium_org/third_party/icu/source/data/region/
H A Dresfiles.mk60 kab.txt kam.txt kde.txt kea.txt khq.txt\
/external/chromium_org/third_party/icu/source/data/zone/
H A Dresfiles.mk61 kam.txt kde.txt kea.txt khq.txt ki.txt\
/external/chromium_org/third_party/icu/source/data/curr/
H A Dresfiles.mk65 ka.txt kab.txt kam.txt kde.txt kea.txt\

Completed in 303 milliseconds

12