/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ieee802_1x.c | 315 int ver, val; local 317 ver = wpa_auth_sta_wpa_version(sta->wpa_sm); 319 suite = wpa_cipher_to_suite(ver, val); 624 u8 ver = 1; /* Release 2 */ local 627 &ver, 1)) {
|
H A D | wpa_auth.c | 882 u16 ver = key_info & WPA_KEY_INFO_TYPE_MASK; local 887 ver != WPA_KEY_INFO_TYPE_AES_128_CMAC) { 897 ver != WPA_KEY_INFO_TYPE_HMAC_SHA1_AES) {
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | wpa_common.c | 26 * @ver: Key descriptor version (WPA_KEY_INFO_TYPE_*) 41 int wpa_eapol_key_mic(const u8 *key, int ver, const u8 *buf, size_t len, argument 46 switch (ver) {
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_gnutls.c | 137 const char *ver; local 155 ver = gnutls_check_version(NULL); 156 if (ver == NULL) { 160 wpa_printf(MSG_DEBUG, "%s - gnutls version %s", __func__, ver); 162 if (strcmp(ok_ver[i], ver) == 0) 167 "to be tested and enabled in tls_gnutls.c", ver);
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_hostap.c | 145 int ver; local 166 ver = fc & WLAN_FC_PVER; 171 if (ver == 3) { 180 } else if (ver == 1 || ver == 2) { 181 handle_tx_callback(drv, buf, data_len, ver == 2 ? 1 : 0); 183 } else if (ver != 0) { 184 printf("unknown protocol version %d\n", ver);
|
H A D | driver_nl80211.c | 7394 u32 ver; local 7462 ver = 0; 7464 ver |= NL80211_WPA_VERSION_1; 7466 ver |= NL80211_WPA_VERSION_2; 7467 if (ver) 7468 NLA_PUT_U32(msg, NL80211_ATTR_WPA_VERSIONS, ver); 8922 enum nl80211_wpa_versions ver = 0; local 8925 ver |= NL80211_WPA_VERSION_1; 8927 ver |= NL80211_WPA_VERSION_2; 8929 wpa_printf(MSG_DEBUG, " * WPA Versions 0x%x", ver); [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_sim.c | 647 int ver = pos[0] * 256 + pos[1]; local 649 if (eap_sim_supported_ver(ver)) { 650 selected_version = ver;
|
H A D | tncc.c | 1169 static struct wpabuf * tncc_build_soh(int ver) argument 1197 wpabuf_put_be16(buf, ver); /* Inner Type */ 1200 if (ver == 2) { 1282 struct wpabuf * tncc_process_soh_request(int ver, const u8 *data, size_t len) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_sim.c | 105 u8 ver[2]; local 139 ver[0] = 0; 140 ver[1] = EAP_SIM_VERSION; 141 eap_sim_msg_add(msg, EAP_SIM_AT_VERSION_LIST, sizeof(ver), 142 ver, sizeof(ver));
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | peerkey.c | 64 u16 mui, u16 error_type, int ver) 84 key_info = ver | WPA_KEY_INFO_SMK_MESSAGE | WPA_KEY_INFO_MIC | 115 wpa_eapol_key_send(sm, sm->ptk.kck, ver, dst, ETH_P_EAPOL, 125 int ver, struct wpa_peerkey *peerkey) 145 key_info = ver | WPA_KEY_INFO_SMK_MESSAGE | WPA_KEY_INFO_MIC | 167 wpa_eapol_key_send(sm, sm->ptk.kck, ver, src_addr, ETH_P_EAPOL, 176 const struct wpa_eapol_key *key, size_t extra_len, int ver) 226 ver); 275 wpa_supplicant_send_smk_m3(sm, src_addr, key, ver, peerkey); 329 u16 key_info, ver; local 62 wpa_supplicant_send_smk_error(struct wpa_sm *sm, const u8 *dst, const u8 *peer, u16 mui, u16 error_type, int ver) argument 122 wpa_supplicant_send_smk_m3(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, int ver, struct wpa_peerkey *peerkey) argument 174 wpa_supplicant_process_smk_m2( struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, size_t extra_len, int ver) argument 386 u16 key_info, ver; local 457 wpa_supplicant_process_smk_m5(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, int ver, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 512 wpa_supplicant_process_smk_m45( struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, size_t extra_len, int ver) argument 653 wpa_supplicant_process_stk_1_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 759 wpa_supplicant_process_stk_2_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 805 wpa_supplicant_process_stk_3_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 879 wpa_supplicant_process_stk_4_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver) argument 910 peerkey_verify_eapol_key_mic(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 ver, const u8 *buf, size_t len) argument 982 int key_info, ver; local 1113 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver, const u8 *key_data, size_t key_data_len) argument 1137 peerkey_rx_eapol_smk(struct wpa_sm *sm, const u8 *src_addr, struct wpa_eapol_key *key, size_t extra_len, u16 key_info, u16 ver) argument [all...] |
H A D | peerkey.h | 41 struct wpa_eapol_key *key, u16 ver, 44 struct wpa_eapol_key *key, u16 key_info, u16 ver, 48 u16 key_info, u16 ver); 56 struct wpa_eapol_key *key, u16 ver, 64 struct wpa_eapol_key *key, u16 key_info, u16 ver, 72 u16 key_info, u16 ver) 54 peerkey_verify_eapol_key_mic(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 ver, const u8 *buf, size_t len) argument 63 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver, const u8 *key_data, size_t key_data_len) argument 70 peerkey_rx_eapol_smk(struct wpa_sm *sm, const u8 *src_addr, struct wpa_eapol_key *key, size_t extra_len, u16 key_info, u16 ver) argument
|
H A D | wpa.c | 30 * @ver: Version field from Key Info 38 int ver, const u8 *dest, u16 proto, 59 wpa_eapol_key_mic(kck, ver, msg, msg_len, key_mic)) { 62 "version %d MIC", ver); 89 int key_info, ver; local 93 ver = WPA_KEY_INFO_TYPE_AKM_DEFINED; 96 ver = WPA_KEY_INFO_TYPE_AES_128_CMAC; 98 ver = WPA_KEY_INFO_TYPE_HMAC_SHA1_AES; 100 ver = WPA_KEY_INFO_TYPE_HMAC_MD5_RC4; 116 key_info = WPA_KEY_INFO_REQUEST | ver; 37 wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, int ver, const u8 *dest, u16 proto, u8 *msg, size_t msg_len, u8 *key_mic) argument 275 wpa_supplicant_send_2_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, int ver, const u8 *nonce, const u8 *wpa_ie, size_t wpa_ie_len, struct wpa_ptk *ptk) argument 379 wpa_supplicant_process_1_of_4(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 1033 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, struct wpa_ptk *ptk) argument 1070 wpa_supplicant_process_3_of_4(struct wpa_sm *sm, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 1238 wpa_supplicant_process_1_of_2_wpa(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 key_info, u16 ver, struct wpa_gtk_data *gd) argument 1316 wpa_supplicant_send_2_of_2(struct wpa_sm *sm, const struct wpa_eapol_key *key, int ver, u16 key_info) argument 1352 wpa_supplicant_process_1_of_2(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 ver) argument 1410 wpa_supplicant_verify_eapol_key_mic(struct wpa_sm *sm, struct wpa_eapol_key *key, u16 ver, const u8 *buf, size_t len) argument 1464 wpa_supplicant_decrypt_key_data(struct wpa_sm *sm, struct wpa_eapol_key *key, u16 ver, u8 *key_data, size_t *key_data_len) argument 1601 u16 key_info, ver; local [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_common.c | 289 int tls_version_ok(u16 ver) argument 291 if (ver == TLS_VERSION_1) 294 if (ver == TLS_VERSION_1_1) 298 if (ver == TLS_VERSION_1_2) 306 const char * tls_version_str(u16 ver) argument 308 switch (ver) { 321 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, argument 325 if (ver >= TLS_VERSION_1_2) {
|
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | wps_dev_attr.c | 379 int wps_process_os_version(struct wps_device_data *dev, const u8 *ver) argument 381 if (ver == NULL) { 386 dev->os_version = WPA_GET_BE32(ver);
|
/external/wpa_supplicant_8/src/ap/ |
H A D | ieee802_1x.c | 315 int ver, val; local 317 ver = wpa_auth_sta_wpa_version(sta->wpa_sm); 319 suite = wpa_cipher_to_suite(ver, val); 624 u8 ver = 1; /* Release 2 */ local 627 &ver, 1)) {
|
H A D | wpa_auth.c | 882 u16 ver = key_info & WPA_KEY_INFO_TYPE_MASK; local 887 ver != WPA_KEY_INFO_TYPE_AES_128_CMAC) { 897 ver != WPA_KEY_INFO_TYPE_HMAC_SHA1_AES) {
|
/external/wpa_supplicant_8/src/common/ |
H A D | wpa_common.c | 26 * @ver: Key descriptor version (WPA_KEY_INFO_TYPE_*) 41 int wpa_eapol_key_mic(const u8 *key, int ver, const u8 *buf, size_t len, argument 46 switch (ver) {
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_gnutls.c | 137 const char *ver; local 155 ver = gnutls_check_version(NULL); 156 if (ver == NULL) { 160 wpa_printf(MSG_DEBUG, "%s - gnutls version %s", __func__, ver); 162 if (strcmp(ok_ver[i], ver) == 0) 167 "to be tested and enabled in tls_gnutls.c", ver);
|
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_hostap.c | 145 int ver; local 166 ver = fc & WLAN_FC_PVER; 171 if (ver == 3) { 180 } else if (ver == 1 || ver == 2) { 181 handle_tx_callback(drv, buf, data_len, ver == 2 ? 1 : 0); 183 } else if (ver != 0) { 184 printf("unknown protocol version %d\n", ver);
|
H A D | driver_nl80211.c | 7394 u32 ver; local 7462 ver = 0; 7464 ver |= NL80211_WPA_VERSION_1; 7466 ver |= NL80211_WPA_VERSION_2; 7467 if (ver) 7468 NLA_PUT_U32(msg, NL80211_ATTR_WPA_VERSIONS, ver); 8922 enum nl80211_wpa_versions ver = 0; local 8925 ver |= NL80211_WPA_VERSION_1; 8927 ver |= NL80211_WPA_VERSION_2; 8929 wpa_printf(MSG_DEBUG, " * WPA Versions 0x%x", ver); [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_sim.c | 647 int ver = pos[0] * 256 + pos[1]; local 649 if (eap_sim_supported_ver(ver)) { 650 selected_version = ver;
|
H A D | tncc.c | 1169 static struct wpabuf * tncc_build_soh(int ver) argument 1197 wpabuf_put_be16(buf, ver); /* Inner Type */ 1200 if (ver == 2) { 1282 struct wpabuf * tncc_process_soh_request(int ver, const u8 *data, size_t len) argument
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_sim.c | 105 u8 ver[2]; local 139 ver[0] = 0; 140 ver[1] = EAP_SIM_VERSION; 141 eap_sim_msg_add(msg, EAP_SIM_AT_VERSION_LIST, sizeof(ver), 142 ver, sizeof(ver));
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | peerkey.c | 64 u16 mui, u16 error_type, int ver) 84 key_info = ver | WPA_KEY_INFO_SMK_MESSAGE | WPA_KEY_INFO_MIC | 115 wpa_eapol_key_send(sm, sm->ptk.kck, ver, dst, ETH_P_EAPOL, 125 int ver, struct wpa_peerkey *peerkey) 145 key_info = ver | WPA_KEY_INFO_SMK_MESSAGE | WPA_KEY_INFO_MIC | 167 wpa_eapol_key_send(sm, sm->ptk.kck, ver, src_addr, ETH_P_EAPOL, 176 const struct wpa_eapol_key *key, size_t extra_len, int ver) 226 ver); 275 wpa_supplicant_send_smk_m3(sm, src_addr, key, ver, peerkey); 329 u16 key_info, ver; local 62 wpa_supplicant_send_smk_error(struct wpa_sm *sm, const u8 *dst, const u8 *peer, u16 mui, u16 error_type, int ver) argument 122 wpa_supplicant_send_smk_m3(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, int ver, struct wpa_peerkey *peerkey) argument 174 wpa_supplicant_process_smk_m2( struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, size_t extra_len, int ver) argument 386 u16 key_info, ver; local 457 wpa_supplicant_process_smk_m5(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, int ver, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 512 wpa_supplicant_process_smk_m45( struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, size_t extra_len, int ver) argument 653 wpa_supplicant_process_stk_1_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 759 wpa_supplicant_process_stk_2_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 805 wpa_supplicant_process_stk_3_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 879 wpa_supplicant_process_stk_4_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver) argument 910 peerkey_verify_eapol_key_mic(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 ver, const u8 *buf, size_t len) argument 982 int key_info, ver; local 1113 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver, const u8 *key_data, size_t key_data_len) argument 1137 peerkey_rx_eapol_smk(struct wpa_sm *sm, const u8 *src_addr, struct wpa_eapol_key *key, size_t extra_len, u16 key_info, u16 ver) argument [all...] |
H A D | peerkey.h | 41 struct wpa_eapol_key *key, u16 ver, 44 struct wpa_eapol_key *key, u16 key_info, u16 ver, 48 u16 key_info, u16 ver); 56 struct wpa_eapol_key *key, u16 ver, 64 struct wpa_eapol_key *key, u16 key_info, u16 ver, 72 u16 key_info, u16 ver) 54 peerkey_verify_eapol_key_mic(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 ver, const u8 *buf, size_t len) argument 63 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver, const u8 *key_data, size_t key_data_len) argument 70 peerkey_rx_eapol_smk(struct wpa_sm *sm, const u8 *src_addr, struct wpa_eapol_key *key, size_t extra_len, u16 key_info, u16 ver) argument
|