Searched defs:kde (Results 1 - 20 of 20) sorted by relevance

/external/wpa_supplicant_8/hostapd/src/ap/
H A Dpeerkey_auth.c54 u8 kde[2 + RSN_SELECTOR_LEN + ETH_ALEN + local
62 pos = kde;
77 NULL, NULL, kde, pos - kde, 0, 0, 0);
84 struct wpa_eapol_ie_parse kde; local
90 WPA_GET_BE16(key->key_data_length), &kde) < 0) {
95 if (kde.rsn_ie == NULL || kde.mac_addr == NULL ||
96 kde.mac_addr_len < ETH_ALEN) {
102 /* Initiator = sm->addr; Peer = kde
145 wpa_send_smk_m4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk) argument
198 wpa_send_smk_m5(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk, const u8 *peer) argument
258 struct wpa_eapol_ie_parse kde; local
329 struct wpa_eapol_ie_parse kde; local
[all...]
H A Dwpa_auth_ie.c328 u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len, argument
333 RSN_SELECTOR_PUT(pos, kde);
H A Dwpa_auth.c656 struct wpa_eapol_ie_parse *kde)
661 if (wpa_parse_wpa_ie_rsn(kde->rsn_ie, kde->rsn_ie_len, &ie) < 0 ||
672 if (!kde->mdie || !kde->ftie) {
674 "message 2/4", kde->mdie ? "FTIE" : "MDIE");
678 mdie = (struct rsn_mdie *) (kde->mdie + 2);
679 if (kde->mdie[1] < sizeof(struct rsn_mdie) ||
687 (kde->ftie[1] != sm->assoc_resp_ftie[1] ||
688 os_memcmp(kde
654 ft_check_msg_2_of_4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_ie_parse *kde) argument
744 struct wpa_eapol_ie_parse kde; local
1203 __wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr, int force_version) argument
1354 wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr) argument
1885 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos, dummy_gtk[32]; local
2219 u8 *kde, *pos, hdr[2]; local
[all...]
/external/wpa_supplicant_8/src/ap/
H A Dpeerkey_auth.c54 u8 kde[2 + RSN_SELECTOR_LEN + ETH_ALEN + local
62 pos = kde;
77 NULL, NULL, kde, pos - kde, 0, 0, 0);
84 struct wpa_eapol_ie_parse kde; local
90 WPA_GET_BE16(key->key_data_length), &kde) < 0) {
95 if (kde.rsn_ie == NULL || kde.mac_addr == NULL ||
96 kde.mac_addr_len < ETH_ALEN) {
102 /* Initiator = sm->addr; Peer = kde
145 wpa_send_smk_m4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk) argument
198 wpa_send_smk_m5(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk, const u8 *peer) argument
258 struct wpa_eapol_ie_parse kde; local
329 struct wpa_eapol_ie_parse kde; local
[all...]
H A Dwpa_auth_ie.c328 u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len, argument
333 RSN_SELECTOR_PUT(pos, kde);
H A Dwpa_auth.c656 struct wpa_eapol_ie_parse *kde)
661 if (wpa_parse_wpa_ie_rsn(kde->rsn_ie, kde->rsn_ie_len, &ie) < 0 ||
672 if (!kde->mdie || !kde->ftie) {
674 "message 2/4", kde->mdie ? "FTIE" : "MDIE");
678 mdie = (struct rsn_mdie *) (kde->mdie + 2);
679 if (kde->mdie[1] < sizeof(struct rsn_mdie) ||
687 (kde->ftie[1] != sm->assoc_resp_ftie[1] ||
688 os_memcmp(kde
654 ft_check_msg_2_of_4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_ie_parse *kde) argument
744 struct wpa_eapol_ie_parse kde; local
1203 __wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr, int force_version) argument
1354 wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr) argument
1885 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos, dummy_gtk[32]; local
2219 u8 *kde, *pos, hdr[2]; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dpeerkey_auth.c54 u8 kde[2 + RSN_SELECTOR_LEN + ETH_ALEN + local
62 pos = kde;
77 NULL, NULL, kde, pos - kde, 0, 0, 0);
84 struct wpa_eapol_ie_parse kde; local
90 WPA_GET_BE16(key->key_data_length), &kde) < 0) {
95 if (kde.rsn_ie == NULL || kde.mac_addr == NULL ||
96 kde.mac_addr_len < ETH_ALEN) {
102 /* Initiator = sm->addr; Peer = kde
145 wpa_send_smk_m4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk) argument
198 wpa_send_smk_m5(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk, const u8 *peer) argument
258 struct wpa_eapol_ie_parse kde; local
329 struct wpa_eapol_ie_parse kde; local
[all...]
H A Dwpa_auth_ie.c328 u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len, argument
333 RSN_SELECTOR_PUT(pos, kde);
H A Dwpa_auth.c656 struct wpa_eapol_ie_parse *kde)
661 if (wpa_parse_wpa_ie_rsn(kde->rsn_ie, kde->rsn_ie_len, &ie) < 0 ||
672 if (!kde->mdie || !kde->ftie) {
674 "message 2/4", kde->mdie ? "FTIE" : "MDIE");
678 mdie = (struct rsn_mdie *) (kde->mdie + 2);
679 if (kde->mdie[1] < sizeof(struct rsn_mdie) ||
687 (kde->ftie[1] != sm->assoc_resp_ftie[1] ||
688 os_memcmp(kde
654 ft_check_msg_2_of_4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_ie_parse *kde) argument
744 struct wpa_eapol_ie_parse kde; local
1203 __wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr, int force_version) argument
1354 wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr) argument
1885 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos, dummy_gtk[32]; local
2219 u8 *kde, *pos, hdr[2]; local
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
H A Dpeerkey.c37 static u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len) argument
41 RSN_SELECTOR_PUT(pos, kde);
184 struct wpa_eapol_ie_parse kde; local
198 if (wpa_supplicant_parse_ies((const u8 *) (key + 1), extra_len, &kde) <
204 if (kde.rsn_ie == NULL || kde.mac_addr == NULL ||
205 kde.mac_addr_len < ETH_ALEN) {
212 MAC2STR(kde.mac_addr));
214 if (kde.rsn_ie_len > PEERKEY_MAX_IE_LEN) {
220 if (wpa_parse_wpa_ie_rsn(kde
445 wpa_supplicant_process_smk_m4(struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument
468 wpa_supplicant_process_smk_m5(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, int ver, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument
530 struct wpa_eapol_ie_parse kde; local
611 struct wpa_eapol_ie_parse kde; local
673 const u8 *kde; local
745 wpa_supplicant_update_smk_lifetime(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument
782 struct wpa_eapol_ie_parse kde; local
831 struct wpa_eapol_ie_parse kde; local
[all...]
H A Dwpa.c894 * @kde: KDEs to include the EAPOL-Key frame
902 const u8 *kde, size_t kde_len,
909 if (kde)
910 wpa_hexdump(MSG_DEBUG, "WPA: KDE for msg 4/4", kde, kde_len);
931 if (kde)
932 os_memcpy(reply + 1, kde, kde_len);
899 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, const u8 *kde, size_t kde_len, struct wpa_ptk *ptk) argument
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dpeerkey.c32 static u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len) argument
36 RSN_SELECTOR_PUT(pos, kde);
179 struct wpa_eapol_ie_parse kde; local
193 if (wpa_supplicant_parse_ies((const u8 *) (key + 1), extra_len, &kde) <
199 if (kde.rsn_ie == NULL || kde.mac_addr == NULL ||
200 kde.mac_addr_len < ETH_ALEN) {
207 MAC2STR(kde.mac_addr));
209 if (kde.rsn_ie_len > PEERKEY_MAX_IE_LEN) {
215 if (wpa_parse_wpa_ie_rsn(kde
440 wpa_supplicant_process_smk_m4(struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument
463 wpa_supplicant_process_smk_m5(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, int ver, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument
528 struct wpa_eapol_ie_parse kde; local
609 struct wpa_eapol_ie_parse kde; local
673 const u8 *kde; local
745 wpa_supplicant_update_smk_lifetime(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument
782 struct wpa_eapol_ie_parse kde; local
831 struct wpa_eapol_ie_parse kde; local
[all...]
H A Dtdls.c779 struct wpa_eapol_ie_parse kde; local
806 if (wpa_supplicant_parse_ies((const u8 *) pos, ielen, &kde) < 0) {
811 if (kde.lnkid == NULL || kde.lnkid_len < 3 * ETH_ALEN) {
816 lnkid = (struct wpa_tdls_lnkid *) kde.lnkid;
821 if (kde.ftie == NULL || kde.ftie_len < sizeof(*ftie)) {
826 ftie = (struct wpa_tdls_ftie *) kde.ftie;
1248 struct wpa_eapol_ie_parse kde; local
1268 &kde) <
1305 copy_supp_rates(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1335 struct wpa_eapol_ie_parse kde; local
1690 struct wpa_eapol_ie_parse kde; local
1898 struct wpa_eapol_ie_parse kde; local
[all...]
H A Dwpa.c991 * @kde: KDEs to include the EAPOL-Key frame
999 const u8 *kde, size_t kde_len,
1006 if (kde)
1007 wpa_hexdump(MSG_DEBUG, "WPA: KDE for msg 4/4", kde, kde_len);
1028 if (kde)
1029 os_memcpy(reply + 1, kde, kde_len);
996 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, const u8 *kde, size_t kde_len, struct wpa_ptk *ptk) argument
/external/wpa_supplicant_8/src/rsn_supp/
H A Dpeerkey.c32 static u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len) argument
36 RSN_SELECTOR_PUT(pos, kde);
179 struct wpa_eapol_ie_parse kde; local
193 if (wpa_supplicant_parse_ies((const u8 *) (key + 1), extra_len, &kde) <
199 if (kde.rsn_ie == NULL || kde.mac_addr == NULL ||
200 kde.mac_addr_len < ETH_ALEN) {
207 MAC2STR(kde.mac_addr));
209 if (kde.rsn_ie_len > PEERKEY_MAX_IE_LEN) {
215 if (wpa_parse_wpa_ie_rsn(kde
440 wpa_supplicant_process_smk_m4(struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument
463 wpa_supplicant_process_smk_m5(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, int ver, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument
528 struct wpa_eapol_ie_parse kde; local
609 struct wpa_eapol_ie_parse kde; local
673 const u8 *kde; local
745 wpa_supplicant_update_smk_lifetime(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument
782 struct wpa_eapol_ie_parse kde; local
831 struct wpa_eapol_ie_parse kde; local
[all...]
H A Dtdls.c779 struct wpa_eapol_ie_parse kde; local
806 if (wpa_supplicant_parse_ies((const u8 *) pos, ielen, &kde) < 0) {
811 if (kde.lnkid == NULL || kde.lnkid_len < 3 * ETH_ALEN) {
816 lnkid = (struct wpa_tdls_lnkid *) kde.lnkid;
821 if (kde.ftie == NULL || kde.ftie_len < sizeof(*ftie)) {
826 ftie = (struct wpa_tdls_ftie *) kde.ftie;
1248 struct wpa_eapol_ie_parse kde; local
1268 &kde) <
1305 copy_supp_rates(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1335 struct wpa_eapol_ie_parse kde; local
1690 struct wpa_eapol_ie_parse kde; local
1898 struct wpa_eapol_ie_parse kde; local
[all...]
H A Dwpa.c991 * @kde: KDEs to include the EAPOL-Key frame
999 const u8 *kde, size_t kde_len,
1006 if (kde)
1007 wpa_hexdump(MSG_DEBUG, "WPA: KDE for msg 4/4", kde, kde_len);
1028 if (kde)
1029 os_memcpy(reply + 1, kde, kde_len);
996 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, const u8 *kde, size_t kde_len, struct wpa_ptk *ptk) argument
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dpeerkey.c32 static u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len) argument
36 RSN_SELECTOR_PUT(pos, kde);
179 struct wpa_eapol_ie_parse kde; local
193 if (wpa_supplicant_parse_ies((const u8 *) (key + 1), extra_len, &kde) <
199 if (kde.rsn_ie == NULL || kde.mac_addr == NULL ||
200 kde.mac_addr_len < ETH_ALEN) {
207 MAC2STR(kde.mac_addr));
209 if (kde.rsn_ie_len > PEERKEY_MAX_IE_LEN) {
215 if (wpa_parse_wpa_ie_rsn(kde
440 wpa_supplicant_process_smk_m4(struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument
463 wpa_supplicant_process_smk_m5(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, int ver, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument
528 struct wpa_eapol_ie_parse kde; local
609 struct wpa_eapol_ie_parse kde; local
673 const u8 *kde; local
745 wpa_supplicant_update_smk_lifetime(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument
782 struct wpa_eapol_ie_parse kde; local
831 struct wpa_eapol_ie_parse kde; local
[all...]
H A Dtdls.c779 struct wpa_eapol_ie_parse kde; local
806 if (wpa_supplicant_parse_ies((const u8 *) pos, ielen, &kde) < 0) {
811 if (kde.lnkid == NULL || kde.lnkid_len < 3 * ETH_ALEN) {
816 lnkid = (struct wpa_tdls_lnkid *) kde.lnkid;
821 if (kde.ftie == NULL || kde.ftie_len < sizeof(*ftie)) {
826 ftie = (struct wpa_tdls_ftie *) kde.ftie;
1248 struct wpa_eapol_ie_parse kde; local
1268 &kde) <
1305 copy_supp_rates(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1335 struct wpa_eapol_ie_parse kde; local
1690 struct wpa_eapol_ie_parse kde; local
1898 struct wpa_eapol_ie_parse kde; local
[all...]
H A Dwpa.c991 * @kde: KDEs to include the EAPOL-Key frame
999 const u8 *kde, size_t kde_len,
1006 if (kde)
1007 wpa_hexdump(MSG_DEBUG, "WPA: KDE for msg 4/4", kde, kde_len);
1028 if (kde)
1029 os_memcpy(reply + 1, kde, kde_len);
996 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, const u8 *kde, size_t kde_len, struct wpa_ptk *ptk) argument

Completed in 743 milliseconds