Lines Matching defs:ver

30  * @ver: Version field from Key Info
38 int ver, const u8 *dest, u16 proto,
59 wpa_eapol_key_mic(kck, ver, msg, msg_len, key_mic)) {
62 "version %d MIC", ver);
89 int key_info, ver;
93 ver = WPA_KEY_INFO_TYPE_AKM_DEFINED;
96 ver = WPA_KEY_INFO_TYPE_AES_128_CMAC;
98 ver = WPA_KEY_INFO_TYPE_HMAC_SHA1_AES;
100 ver = WPA_KEY_INFO_TYPE_HMAC_MD5_RC4;
116 key_info = WPA_KEY_INFO_REQUEST | ver;
135 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL,
268 * @ver: Version bits from EAPOL-Key Key Info
277 int ver, const u8 *nonce,
337 ver | WPA_KEY_INFO_KEY_TYPE | WPA_KEY_INFO_MIC);
354 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL,
382 u16 ver, const u8 *key_data,
399 "Handshake from " MACSTR " (ver=%d)", MAC2STR(src_addr), ver);
472 if (wpa_supplicant_send_2_of_4(sm, sm->bssid, key, ver, sm->snonce,
1028 * @ver: Version bits from EAPOL-Key Key Info
1035 u16 ver, u16 key_info,
1051 key_info |= ver | WPA_KEY_INFO_KEY_TYPE | WPA_KEY_INFO_MIC;
1063 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL,
1072 u16 ver, const u8 *key_data,
1080 "Handshake from " MACSTR " (ver=%d)", MAC2STR(sm->bssid), ver);
1138 if (wpa_supplicant_send_4_of_4(sm, sm->bssid, key, ver, key_info,
1242 u16 ver, struct wpa_gtk_data *gd)
1248 if (ver == WPA_KEY_INFO_TYPE_HMAC_SHA1_AES) {
1265 if (ver == WPA_KEY_INFO_TYPE_HMAC_MD5_RC4) {
1283 } else if (ver == WPA_KEY_INFO_TYPE_HMAC_SHA1_AES) {
1307 "WPA: Unsupported key_info type %d", ver);
1318 int ver, u16 key_info)
1333 key_info |= ver | WPA_KEY_INFO_MIC | WPA_KEY_INFO_SECURE;
1345 wpa_eapol_key_send(sm, sm->ptk.kck, ver, sm->bssid, ETH_P_EAPOL,
1356 size_t key_data_len, u16 ver)
1366 "Handshake from " MACSTR " (ver=%d)", MAC2STR(src_addr), ver);
1377 key_info, ver, &gd);
1386 wpa_supplicant_send_2_of_2(sm, key, ver, key_info))
1412 u16 ver,
1421 wpa_eapol_key_mic(sm->tptk.kck, ver, buf, len,
1438 wpa_eapol_key_mic(sm->ptk.kck, ver, buf, len,
1465 struct wpa_eapol_key *key, u16 ver,
1479 if (ver == WPA_KEY_INFO_TYPE_HMAC_MD5_RC4) {
1490 } else if (ver == WPA_KEY_INFO_TYPE_HMAC_SHA1_AES ||
1491 ver == WPA_KEY_INFO_TYPE_AES_128_CMAC ||
1520 "WPA: Unsupported key_info type %d", ver);
1551 " key_info 0x%x (ver=%d keyidx=%d rsvd=%d %s%s%s%s%s%s%s%s)",
1601 u16 key_info, ver;
1684 ver = key_info & WPA_KEY_INFO_TYPE_MASK;
1685 if (ver != WPA_KEY_INFO_TYPE_HMAC_MD5_RC4 &&
1687 ver != WPA_KEY_INFO_TYPE_AES_128_CMAC &&
1689 ver != WPA_KEY_INFO_TYPE_HMAC_SHA1_AES &&
1693 ver);
1698 ver != WPA_KEY_INFO_TYPE_AKM_DEFINED) {
1701 ver);
1708 if (ver != WPA_KEY_INFO_TYPE_AES_128_CMAC) {
1717 if (ver != WPA_KEY_INFO_TYPE_AES_128_CMAC &&
1727 ver != WPA_KEY_INFO_TYPE_HMAC_SHA1_AES) {
1730 "descriptor version (%d) is not 2", ver);
1740 } else if (ver == WPA_KEY_INFO_TYPE_AES_128_CMAC) {
1746 ver != WPA_KEY_INFO_TYPE_HMAC_SHA1_AES) {
1749 "descriptor version (%d) is not 2", ver);
1816 wpa_supplicant_verify_eapol_key_mic(sm, key, ver, tmp, data_len))
1821 peerkey_verify_eapol_key_mic(sm, peerkey, key, ver, tmp, data_len))
1827 if (wpa_supplicant_decrypt_key_data(sm, key, ver, key_data,
1841 peerkey_rx_eapol_4way(sm, peerkey, key, key_info, ver,
1845 wpa_supplicant_process_3_of_4(sm, key, ver, key_data,
1850 ver, key_data,
1856 ver);
1862 ver);