Searched defs:ver (Results 1 - 25 of 168) sorted by last modified time

1234567

/external/wpa_supplicant_8/hostapd/src/ap/
H A Dieee802_1x.c315 int ver, val; local
317 ver = wpa_auth_sta_wpa_version(sta->wpa_sm);
319 suite = wpa_cipher_to_suite(ver, val);
624 u8 ver = 1; /* Release 2 */ local
627 &ver, 1)) {
H A Dwpa_auth.c882 u16 ver = key_info & WPA_KEY_INFO_TYPE_MASK; local
887 ver != WPA_KEY_INFO_TYPE_AES_128_CMAC) {
897 ver != WPA_KEY_INFO_TYPE_HMAC_SHA1_AES) {
/external/wpa_supplicant_8/hostapd/src/common/
H A Dwpa_common.c26 * @ver: Key descriptor version (WPA_KEY_INFO_TYPE_*)
41 int wpa_eapol_key_mic(const u8 *key, int ver, const u8 *buf, size_t len, argument
46 switch (ver) {
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dtls_gnutls.c137 const char *ver; local
155 ver = gnutls_check_version(NULL);
156 if (ver == NULL) {
160 wpa_printf(MSG_DEBUG, "%s - gnutls version %s", __func__, ver);
162 if (strcmp(ok_ver[i], ver) == 0)
167 "to be tested and enabled in tls_gnutls.c", ver);
/external/wpa_supplicant_8/hostapd/src/drivers/
H A Ddriver_hostap.c145 int ver; local
166 ver = fc & WLAN_FC_PVER;
171 if (ver == 3) {
180 } else if (ver == 1 || ver == 2) {
181 handle_tx_callback(drv, buf, data_len, ver == 2 ? 1 : 0);
183 } else if (ver != 0) {
184 printf("unknown protocol version %d\n", ver);
H A Ddriver_nl80211.c7394 u32 ver; local
7462 ver = 0;
7464 ver |= NL80211_WPA_VERSION_1;
7466 ver |= NL80211_WPA_VERSION_2;
7467 if (ver)
7468 NLA_PUT_U32(msg, NL80211_ATTR_WPA_VERSIONS, ver);
8922 enum nl80211_wpa_versions ver = 0; local
8925 ver |= NL80211_WPA_VERSION_1;
8927 ver |= NL80211_WPA_VERSION_2;
8929 wpa_printf(MSG_DEBUG, " * WPA Versions 0x%x", ver);
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_sim.c647 int ver = pos[0] * 256 + pos[1]; local
649 if (eap_sim_supported_ver(ver)) {
650 selected_version = ver;
H A Dtncc.c1169 static struct wpabuf * tncc_build_soh(int ver) argument
1197 wpabuf_put_be16(buf, ver); /* Inner Type */
1200 if (ver == 2) {
1282 struct wpabuf * tncc_process_soh_request(int ver, const u8 *data, size_t len) argument
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_sim.c105 u8 ver[2]; local
139 ver[0] = 0;
140 ver[1] = EAP_SIM_VERSION;
141 eap_sim_msg_add(msg, EAP_SIM_AT_VERSION_LIST, sizeof(ver),
142 ver, sizeof(ver));
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dpeerkey.c64 u16 mui, u16 error_type, int ver)
84 key_info = ver | WPA_KEY_INFO_SMK_MESSAGE | WPA_KEY_INFO_MIC |
115 wpa_eapol_key_send(sm, sm->ptk.kck, ver, dst, ETH_P_EAPOL,
125 int ver, struct wpa_peerkey *peerkey)
145 key_info = ver | WPA_KEY_INFO_SMK_MESSAGE | WPA_KEY_INFO_MIC |
167 wpa_eapol_key_send(sm, sm->ptk.kck, ver, src_addr, ETH_P_EAPOL,
176 const struct wpa_eapol_key *key, size_t extra_len, int ver)
226 ver);
275 wpa_supplicant_send_smk_m3(sm, src_addr, key, ver, peerkey);
329 u16 key_info, ver; local
62 wpa_supplicant_send_smk_error(struct wpa_sm *sm, const u8 *dst, const u8 *peer, u16 mui, u16 error_type, int ver) argument
122 wpa_supplicant_send_smk_m3(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, int ver, struct wpa_peerkey *peerkey) argument
174 wpa_supplicant_process_smk_m2( struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, size_t extra_len, int ver) argument
386 u16 key_info, ver; local
457 wpa_supplicant_process_smk_m5(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, int ver, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument
512 wpa_supplicant_process_smk_m45( struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, size_t extra_len, int ver) argument
653 wpa_supplicant_process_stk_1_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
759 wpa_supplicant_process_stk_2_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
805 wpa_supplicant_process_stk_3_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
879 wpa_supplicant_process_stk_4_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver) argument
910 peerkey_verify_eapol_key_mic(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 ver, const u8 *buf, size_t len) argument
982 int key_info, ver; local
1113 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver, const u8 *key_data, size_t key_data_len) argument
1137 peerkey_rx_eapol_smk(struct wpa_sm *sm, const u8 *src_addr, struct wpa_eapol_key *key, size_t extra_len, u16 key_info, u16 ver) argument
[all...]
H A Dpeerkey.h41 struct wpa_eapol_key *key, u16 ver,
44 struct wpa_eapol_key *key, u16 key_info, u16 ver,
48 u16 key_info, u16 ver);
56 struct wpa_eapol_key *key, u16 ver,
64 struct wpa_eapol_key *key, u16 key_info, u16 ver,
72 u16 key_info, u16 ver)
54 peerkey_verify_eapol_key_mic(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 ver, const u8 *buf, size_t len) argument
63 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver, const u8 *key_data, size_t key_data_len) argument
70 peerkey_rx_eapol_smk(struct wpa_sm *sm, const u8 *src_addr, struct wpa_eapol_key *key, size_t extra_len, u16 key_info, u16 ver) argument
H A Dwpa.c30 * @ver: Version field from Key Info
38 int ver, const u8 *dest, u16 proto,
59 wpa_eapol_key_mic(kck, ver, msg, msg_len, key_mic)) {
62 "version %d MIC", ver);
89 int key_info, ver; local
93 ver = WPA_KEY_INFO_TYPE_AKM_DEFINED;
96 ver = WPA_KEY_INFO_TYPE_AES_128_CMAC;
98 ver = WPA_KEY_INFO_TYPE_HMAC_SHA1_AES;
100 ver = WPA_KEY_INFO_TYPE_HMAC_MD5_RC4;
116 key_info = WPA_KEY_INFO_REQUEST | ver;
37 wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, int ver, const u8 *dest, u16 proto, u8 *msg, size_t msg_len, u8 *key_mic) argument
275 wpa_supplicant_send_2_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, int ver, const u8 *nonce, const u8 *wpa_ie, size_t wpa_ie_len, struct wpa_ptk *ptk) argument
379 wpa_supplicant_process_1_of_4(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
1033 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, struct wpa_ptk *ptk) argument
1070 wpa_supplicant_process_3_of_4(struct wpa_sm *sm, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
1238 wpa_supplicant_process_1_of_2_wpa(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 key_info, u16 ver, struct wpa_gtk_data *gd) argument
1316 wpa_supplicant_send_2_of_2(struct wpa_sm *sm, const struct wpa_eapol_key *key, int ver, u16 key_info) argument
1352 wpa_supplicant_process_1_of_2(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 ver) argument
1410 wpa_supplicant_verify_eapol_key_mic(struct wpa_sm *sm, struct wpa_eapol_key *key, u16 ver, const u8 *buf, size_t len) argument
1464 wpa_supplicant_decrypt_key_data(struct wpa_sm *sm, struct wpa_eapol_key *key, u16 ver, u8 *key_data, size_t *key_data_len) argument
1601 u16 key_info, ver; local
[all...]
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_common.c289 int tls_version_ok(u16 ver) argument
291 if (ver == TLS_VERSION_1)
294 if (ver == TLS_VERSION_1_1)
298 if (ver == TLS_VERSION_1_2)
306 const char * tls_version_str(u16 ver) argument
308 switch (ver) {
321 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, argument
325 if (ver >= TLS_VERSION_1_2) {
/external/wpa_supplicant_8/hostapd/src/wps/
H A Dwps_dev_attr.c379 int wps_process_os_version(struct wps_device_data *dev, const u8 *ver) argument
381 if (ver == NULL) {
386 dev->os_version = WPA_GET_BE32(ver);
/external/wpa_supplicant_8/src/ap/
H A Dieee802_1x.c315 int ver, val; local
317 ver = wpa_auth_sta_wpa_version(sta->wpa_sm);
319 suite = wpa_cipher_to_suite(ver, val);
624 u8 ver = 1; /* Release 2 */ local
627 &ver, 1)) {
H A Dwpa_auth.c882 u16 ver = key_info & WPA_KEY_INFO_TYPE_MASK; local
887 ver != WPA_KEY_INFO_TYPE_AES_128_CMAC) {
897 ver != WPA_KEY_INFO_TYPE_HMAC_SHA1_AES) {
/external/wpa_supplicant_8/src/common/
H A Dwpa_common.c26 * @ver: Key descriptor version (WPA_KEY_INFO_TYPE_*)
41 int wpa_eapol_key_mic(const u8 *key, int ver, const u8 *buf, size_t len, argument
46 switch (ver) {
/external/wpa_supplicant_8/src/crypto/
H A Dtls_gnutls.c137 const char *ver; local
155 ver = gnutls_check_version(NULL);
156 if (ver == NULL) {
160 wpa_printf(MSG_DEBUG, "%s - gnutls version %s", __func__, ver);
162 if (strcmp(ok_ver[i], ver) == 0)
167 "to be tested and enabled in tls_gnutls.c", ver);
/external/wpa_supplicant_8/src/drivers/
H A Ddriver_hostap.c145 int ver; local
166 ver = fc & WLAN_FC_PVER;
171 if (ver == 3) {
180 } else if (ver == 1 || ver == 2) {
181 handle_tx_callback(drv, buf, data_len, ver == 2 ? 1 : 0);
183 } else if (ver != 0) {
184 printf("unknown protocol version %d\n", ver);
H A Ddriver_nl80211.c7394 u32 ver; local
7462 ver = 0;
7464 ver |= NL80211_WPA_VERSION_1;
7466 ver |= NL80211_WPA_VERSION_2;
7467 if (ver)
7468 NLA_PUT_U32(msg, NL80211_ATTR_WPA_VERSIONS, ver);
8922 enum nl80211_wpa_versions ver = 0; local
8925 ver |= NL80211_WPA_VERSION_1;
8927 ver |= NL80211_WPA_VERSION_2;
8929 wpa_printf(MSG_DEBUG, " * WPA Versions 0x%x", ver);
[all...]
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_sim.c647 int ver = pos[0] * 256 + pos[1]; local
649 if (eap_sim_supported_ver(ver)) {
650 selected_version = ver;
H A Dtncc.c1169 static struct wpabuf * tncc_build_soh(int ver) argument
1197 wpabuf_put_be16(buf, ver); /* Inner Type */
1200 if (ver == 2) {
1282 struct wpabuf * tncc_process_soh_request(int ver, const u8 *data, size_t len) argument
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_sim.c105 u8 ver[2]; local
139 ver[0] = 0;
140 ver[1] = EAP_SIM_VERSION;
141 eap_sim_msg_add(msg, EAP_SIM_AT_VERSION_LIST, sizeof(ver),
142 ver, sizeof(ver));
/external/wpa_supplicant_8/src/rsn_supp/
H A Dpeerkey.c64 u16 mui, u16 error_type, int ver)
84 key_info = ver | WPA_KEY_INFO_SMK_MESSAGE | WPA_KEY_INFO_MIC |
115 wpa_eapol_key_send(sm, sm->ptk.kck, ver, dst, ETH_P_EAPOL,
125 int ver, struct wpa_peerkey *peerkey)
145 key_info = ver | WPA_KEY_INFO_SMK_MESSAGE | WPA_KEY_INFO_MIC |
167 wpa_eapol_key_send(sm, sm->ptk.kck, ver, src_addr, ETH_P_EAPOL,
176 const struct wpa_eapol_key *key, size_t extra_len, int ver)
226 ver);
275 wpa_supplicant_send_smk_m3(sm, src_addr, key, ver, peerkey);
329 u16 key_info, ver; local
62 wpa_supplicant_send_smk_error(struct wpa_sm *sm, const u8 *dst, const u8 *peer, u16 mui, u16 error_type, int ver) argument
122 wpa_supplicant_send_smk_m3(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, int ver, struct wpa_peerkey *peerkey) argument
174 wpa_supplicant_process_smk_m2( struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, size_t extra_len, int ver) argument
386 u16 key_info, ver; local
457 wpa_supplicant_process_smk_m5(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, int ver, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument
512 wpa_supplicant_process_smk_m45( struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, size_t extra_len, int ver) argument
653 wpa_supplicant_process_stk_1_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
759 wpa_supplicant_process_stk_2_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
805 wpa_supplicant_process_stk_3_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
879 wpa_supplicant_process_stk_4_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver) argument
910 peerkey_verify_eapol_key_mic(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 ver, const u8 *buf, size_t len) argument
982 int key_info, ver; local
1113 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver, const u8 *key_data, size_t key_data_len) argument
1137 peerkey_rx_eapol_smk(struct wpa_sm *sm, const u8 *src_addr, struct wpa_eapol_key *key, size_t extra_len, u16 key_info, u16 ver) argument
[all...]
H A Dpeerkey.h41 struct wpa_eapol_key *key, u16 ver,
44 struct wpa_eapol_key *key, u16 key_info, u16 ver,
48 u16 key_info, u16 ver);
56 struct wpa_eapol_key *key, u16 ver,
64 struct wpa_eapol_key *key, u16 key_info, u16 ver,
72 u16 key_info, u16 ver)
54 peerkey_verify_eapol_key_mic(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 ver, const u8 *buf, size_t len) argument
63 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver, const u8 *key_data, size_t key_data_len) argument
70 peerkey_rx_eapol_smk(struct wpa_sm *sm, const u8 *src_addr, struct wpa_eapol_key *key, size_t extra_len, u16 key_info, u16 ver) argument

Completed in 1451 milliseconds

1234567