/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | peerkey_auth.c | 54 u8 kde[2 + RSN_SELECTOR_LEN + ETH_ALEN + local 62 pos = kde; 77 NULL, NULL, kde, pos - kde, 0, 0, 0); 84 struct wpa_eapol_ie_parse kde; local 90 WPA_GET_BE16(key->key_data_length), &kde) < 0) { 95 if (kde.rsn_ie == NULL || kde.mac_addr == NULL || 96 kde.mac_addr_len < ETH_ALEN) { 102 /* Initiator = sm->addr; Peer = kde 145 wpa_send_smk_m4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk) argument 198 wpa_send_smk_m5(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk, const u8 *peer) argument 258 struct wpa_eapol_ie_parse kde; local 329 struct wpa_eapol_ie_parse kde; local [all...] |
H A D | wpa_auth_ie.c | 410 u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len, argument 415 RSN_SELECTOR_PUT(pos, kde);
|
H A D | wpa_auth.c | 705 struct wpa_eapol_ie_parse *kde) 710 if (wpa_parse_wpa_ie_rsn(kde->rsn_ie, kde->rsn_ie_len, &ie) < 0 || 721 if (!kde->mdie || !kde->ftie) { 723 "message 2/4", kde->mdie ? "FTIE" : "MDIE"); 727 mdie = (struct rsn_mdie *) (kde->mdie + 2); 728 if (kde->mdie[1] < sizeof(struct rsn_mdie) || 736 (kde->ftie[1] != sm->assoc_resp_ftie[1] || 737 os_memcmp(kde 703 ft_check_msg_2_of_4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_ie_parse *kde) argument 795 struct wpa_eapol_ie_parse kde; local 1279 __wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr, int force_version) argument 1445 wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr) argument 1985 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos, dummy_gtk[32]; local 2334 u8 *kde, *pos, hdr[2]; local [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | peerkey_auth.c | 54 u8 kde[2 + RSN_SELECTOR_LEN + ETH_ALEN + local 62 pos = kde; 77 NULL, NULL, kde, pos - kde, 0, 0, 0); 84 struct wpa_eapol_ie_parse kde; local 90 WPA_GET_BE16(key->key_data_length), &kde) < 0) { 95 if (kde.rsn_ie == NULL || kde.mac_addr == NULL || 96 kde.mac_addr_len < ETH_ALEN) { 102 /* Initiator = sm->addr; Peer = kde 145 wpa_send_smk_m4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk) argument 198 wpa_send_smk_m5(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk, const u8 *peer) argument 258 struct wpa_eapol_ie_parse kde; local 329 struct wpa_eapol_ie_parse kde; local [all...] |
H A D | wpa_auth_ie.c | 410 u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len, argument 415 RSN_SELECTOR_PUT(pos, kde);
|
H A D | wpa_auth.c | 705 struct wpa_eapol_ie_parse *kde) 710 if (wpa_parse_wpa_ie_rsn(kde->rsn_ie, kde->rsn_ie_len, &ie) < 0 || 721 if (!kde->mdie || !kde->ftie) { 723 "message 2/4", kde->mdie ? "FTIE" : "MDIE"); 727 mdie = (struct rsn_mdie *) (kde->mdie + 2); 728 if (kde->mdie[1] < sizeof(struct rsn_mdie) || 736 (kde->ftie[1] != sm->assoc_resp_ftie[1] || 737 os_memcmp(kde 703 ft_check_msg_2_of_4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_ie_parse *kde) argument 795 struct wpa_eapol_ie_parse kde; local 1279 __wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr, int force_version) argument 1445 wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr) argument 1985 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos, dummy_gtk[32]; local 2334 u8 *kde, *pos, hdr[2]; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | peerkey_auth.c | 54 u8 kde[2 + RSN_SELECTOR_LEN + ETH_ALEN + local 62 pos = kde; 77 NULL, NULL, kde, pos - kde, 0, 0, 0); 84 struct wpa_eapol_ie_parse kde; local 90 WPA_GET_BE16(key->key_data_length), &kde) < 0) { 95 if (kde.rsn_ie == NULL || kde.mac_addr == NULL || 96 kde.mac_addr_len < ETH_ALEN) { 102 /* Initiator = sm->addr; Peer = kde 145 wpa_send_smk_m4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk) argument 198 wpa_send_smk_m5(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk, const u8 *peer) argument 258 struct wpa_eapol_ie_parse kde; local 329 struct wpa_eapol_ie_parse kde; local [all...] |
H A D | wpa_auth_ie.c | 410 u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len, argument 415 RSN_SELECTOR_PUT(pos, kde);
|
H A D | wpa_auth.c | 705 struct wpa_eapol_ie_parse *kde) 710 if (wpa_parse_wpa_ie_rsn(kde->rsn_ie, kde->rsn_ie_len, &ie) < 0 || 721 if (!kde->mdie || !kde->ftie) { 723 "message 2/4", kde->mdie ? "FTIE" : "MDIE"); 727 mdie = (struct rsn_mdie *) (kde->mdie + 2); 728 if (kde->mdie[1] < sizeof(struct rsn_mdie) || 736 (kde->ftie[1] != sm->assoc_resp_ftie[1] || 737 os_memcmp(kde 703 ft_check_msg_2_of_4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_ie_parse *kde) argument 795 struct wpa_eapol_ie_parse kde; local 1279 __wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr, int force_version) argument 1445 wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr) argument 1985 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos, dummy_gtk[32]; local 2334 u8 *kde, *pos, hdr[2]; local [all...] |
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | peerkey.c | 32 static u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len) argument 36 RSN_SELECTOR_PUT(pos, kde); 179 struct wpa_eapol_ie_parse kde; local 193 if (wpa_supplicant_parse_ies((const u8 *) (key + 1), extra_len, &kde) < 199 if (kde.rsn_ie == NULL || kde.mac_addr == NULL || 200 kde.mac_addr_len < ETH_ALEN) { 207 MAC2STR(kde.mac_addr)); 209 if (kde.rsn_ie_len > PEERKEY_MAX_IE_LEN) { 215 if (wpa_parse_wpa_ie_rsn(kde 434 wpa_supplicant_process_smk_m4(struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 457 wpa_supplicant_process_smk_m5(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, int ver, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 517 struct wpa_eapol_ie_parse kde; local 595 struct wpa_eapol_ie_parse kde; local 730 wpa_supplicant_update_smk_lifetime(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 765 struct wpa_eapol_ie_parse kde; local 811 struct wpa_eapol_ie_parse kde; local [all...] |
H A D | tdls.c | 902 struct wpa_eapol_ie_parse kde; local 929 if (wpa_supplicant_parse_ies((const u8 *) pos, ielen, &kde) < 0) { 934 if (kde.lnkid == NULL || kde.lnkid_len < 3 * ETH_ALEN) { 939 lnkid = (struct wpa_tdls_lnkid *) kde.lnkid; 944 if (kde.ftie == NULL || kde.ftie_len < sizeof(*ftie)) { 949 ftie = (struct wpa_tdls_ftie *) kde.ftie; 1479 struct wpa_eapol_ie_parse kde; local 1504 &kde) < 1543 copy_supp_rates(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1559 copy_peer_ht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1587 copy_peer_vht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1615 copy_peer_ext_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1639 copy_peer_wmm_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1664 copy_peer_supp_channels(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1690 copy_peer_supp_oper_classes(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1737 struct wpa_eapol_ie_parse kde; local 2119 struct wpa_eapol_ie_parse kde; local 2394 struct wpa_eapol_ie_parse kde; local [all...] |
H A D | wpa.c | 388 u8 *kde, *kde_buf = NULL; local 449 kde = sm->assoc_wpa_ie; 459 os_memcpy(kde_buf, kde, kde_len); 460 kde = kde_buf; 461 pos = kde + kde_len; 467 kde_len = pos - kde; 473 kde, kde_len, ptk))
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | peerkey.c | 32 static u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len) argument 36 RSN_SELECTOR_PUT(pos, kde); 179 struct wpa_eapol_ie_parse kde; local 193 if (wpa_supplicant_parse_ies((const u8 *) (key + 1), extra_len, &kde) < 199 if (kde.rsn_ie == NULL || kde.mac_addr == NULL || 200 kde.mac_addr_len < ETH_ALEN) { 207 MAC2STR(kde.mac_addr)); 209 if (kde.rsn_ie_len > PEERKEY_MAX_IE_LEN) { 215 if (wpa_parse_wpa_ie_rsn(kde 434 wpa_supplicant_process_smk_m4(struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 457 wpa_supplicant_process_smk_m5(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, int ver, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 517 struct wpa_eapol_ie_parse kde; local 595 struct wpa_eapol_ie_parse kde; local 730 wpa_supplicant_update_smk_lifetime(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 765 struct wpa_eapol_ie_parse kde; local 811 struct wpa_eapol_ie_parse kde; local [all...] |
H A D | tdls.c | 902 struct wpa_eapol_ie_parse kde; local 929 if (wpa_supplicant_parse_ies((const u8 *) pos, ielen, &kde) < 0) { 934 if (kde.lnkid == NULL || kde.lnkid_len < 3 * ETH_ALEN) { 939 lnkid = (struct wpa_tdls_lnkid *) kde.lnkid; 944 if (kde.ftie == NULL || kde.ftie_len < sizeof(*ftie)) { 949 ftie = (struct wpa_tdls_ftie *) kde.ftie; 1479 struct wpa_eapol_ie_parse kde; local 1504 &kde) < 1543 copy_supp_rates(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1559 copy_peer_ht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1587 copy_peer_vht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1615 copy_peer_ext_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1639 copy_peer_wmm_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1664 copy_peer_supp_channels(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1690 copy_peer_supp_oper_classes(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1737 struct wpa_eapol_ie_parse kde; local 2119 struct wpa_eapol_ie_parse kde; local 2394 struct wpa_eapol_ie_parse kde; local [all...] |
H A D | wpa.c | 388 u8 *kde, *kde_buf = NULL; local 449 kde = sm->assoc_wpa_ie; 459 os_memcpy(kde_buf, kde, kde_len); 460 kde = kde_buf; 461 pos = kde + kde_len; 467 kde_len = pos - kde; 473 kde, kde_len, ptk))
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | peerkey.c | 32 static u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len) argument 36 RSN_SELECTOR_PUT(pos, kde); 179 struct wpa_eapol_ie_parse kde; local 193 if (wpa_supplicant_parse_ies((const u8 *) (key + 1), extra_len, &kde) < 199 if (kde.rsn_ie == NULL || kde.mac_addr == NULL || 200 kde.mac_addr_len < ETH_ALEN) { 207 MAC2STR(kde.mac_addr)); 209 if (kde.rsn_ie_len > PEERKEY_MAX_IE_LEN) { 215 if (wpa_parse_wpa_ie_rsn(kde 434 wpa_supplicant_process_smk_m4(struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 457 wpa_supplicant_process_smk_m5(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, int ver, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 517 struct wpa_eapol_ie_parse kde; local 595 struct wpa_eapol_ie_parse kde; local 730 wpa_supplicant_update_smk_lifetime(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 765 struct wpa_eapol_ie_parse kde; local 811 struct wpa_eapol_ie_parse kde; local [all...] |
H A D | tdls.c | 902 struct wpa_eapol_ie_parse kde; local 929 if (wpa_supplicant_parse_ies((const u8 *) pos, ielen, &kde) < 0) { 934 if (kde.lnkid == NULL || kde.lnkid_len < 3 * ETH_ALEN) { 939 lnkid = (struct wpa_tdls_lnkid *) kde.lnkid; 944 if (kde.ftie == NULL || kde.ftie_len < sizeof(*ftie)) { 949 ftie = (struct wpa_tdls_ftie *) kde.ftie; 1479 struct wpa_eapol_ie_parse kde; local 1504 &kde) < 1543 copy_supp_rates(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1559 copy_peer_ht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1587 copy_peer_vht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1615 copy_peer_ext_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1639 copy_peer_wmm_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1664 copy_peer_supp_channels(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1690 copy_peer_supp_oper_classes(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1737 struct wpa_eapol_ie_parse kde; local 2119 struct wpa_eapol_ie_parse kde; local 2394 struct wpa_eapol_ie_parse kde; local [all...] |
H A D | wpa.c | 388 u8 *kde, *kde_buf = NULL; local 449 kde = sm->assoc_wpa_ie; 459 os_memcpy(kde_buf, kde, kde_len); 460 kde = kde_buf; 461 pos = kde + kde_len; 467 kde_len = pos - kde; 473 kde, kde_len, ptk))
|