/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | peerkey_auth.c | 54 u8 kde[2 + RSN_SELECTOR_LEN + ETH_ALEN + local 62 pos = kde; 77 NULL, NULL, kde, pos - kde, 0, 0, 0); 84 struct wpa_eapol_ie_parse kde; local 90 WPA_GET_BE16(key->key_data_length), &kde) < 0) { 95 if (kde.rsn_ie == NULL || kde.mac_addr == NULL || 96 kde.mac_addr_len < ETH_ALEN) { 102 /* Initiator = sm->addr; Peer = kde 145 wpa_send_smk_m4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk) argument 198 wpa_send_smk_m5(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk, const u8 *peer) argument 258 struct wpa_eapol_ie_parse kde; local 329 struct wpa_eapol_ie_parse kde; local [all...] |
H A D | wpa_auth_ie.c | 328 u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len, argument 333 RSN_SELECTOR_PUT(pos, kde);
|
H A D | wpa_auth.c | 656 struct wpa_eapol_ie_parse *kde) 661 if (wpa_parse_wpa_ie_rsn(kde->rsn_ie, kde->rsn_ie_len, &ie) < 0 || 672 if (!kde->mdie || !kde->ftie) { 674 "message 2/4", kde->mdie ? "FTIE" : "MDIE"); 678 mdie = (struct rsn_mdie *) (kde->mdie + 2); 679 if (kde->mdie[1] < sizeof(struct rsn_mdie) || 687 (kde->ftie[1] != sm->assoc_resp_ftie[1] || 688 os_memcmp(kde 654 ft_check_msg_2_of_4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_ie_parse *kde) argument 744 struct wpa_eapol_ie_parse kde; local 1203 __wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr, int force_version) argument 1354 wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr) argument 1885 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos, dummy_gtk[32]; local 2219 u8 *kde, *pos, hdr[2]; local [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | peerkey_auth.c | 54 u8 kde[2 + RSN_SELECTOR_LEN + ETH_ALEN + local 62 pos = kde; 77 NULL, NULL, kde, pos - kde, 0, 0, 0); 84 struct wpa_eapol_ie_parse kde; local 90 WPA_GET_BE16(key->key_data_length), &kde) < 0) { 95 if (kde.rsn_ie == NULL || kde.mac_addr == NULL || 96 kde.mac_addr_len < ETH_ALEN) { 102 /* Initiator = sm->addr; Peer = kde 145 wpa_send_smk_m4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk) argument 198 wpa_send_smk_m5(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk, const u8 *peer) argument 258 struct wpa_eapol_ie_parse kde; local 329 struct wpa_eapol_ie_parse kde; local [all...] |
H A D | wpa_auth_ie.c | 328 u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len, argument 333 RSN_SELECTOR_PUT(pos, kde);
|
H A D | wpa_auth.c | 656 struct wpa_eapol_ie_parse *kde) 661 if (wpa_parse_wpa_ie_rsn(kde->rsn_ie, kde->rsn_ie_len, &ie) < 0 || 672 if (!kde->mdie || !kde->ftie) { 674 "message 2/4", kde->mdie ? "FTIE" : "MDIE"); 678 mdie = (struct rsn_mdie *) (kde->mdie + 2); 679 if (kde->mdie[1] < sizeof(struct rsn_mdie) || 687 (kde->ftie[1] != sm->assoc_resp_ftie[1] || 688 os_memcmp(kde 654 ft_check_msg_2_of_4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_ie_parse *kde) argument 744 struct wpa_eapol_ie_parse kde; local 1203 __wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr, int force_version) argument 1354 wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr) argument 1885 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos, dummy_gtk[32]; local 2219 u8 *kde, *pos, hdr[2]; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | peerkey_auth.c | 54 u8 kde[2 + RSN_SELECTOR_LEN + ETH_ALEN + local 62 pos = kde; 77 NULL, NULL, kde, pos - kde, 0, 0, 0); 84 struct wpa_eapol_ie_parse kde; local 90 WPA_GET_BE16(key->key_data_length), &kde) < 0) { 95 if (kde.rsn_ie == NULL || kde.mac_addr == NULL || 96 kde.mac_addr_len < ETH_ALEN) { 102 /* Initiator = sm->addr; Peer = kde 145 wpa_send_smk_m4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk) argument 198 wpa_send_smk_m5(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk, const u8 *peer) argument 258 struct wpa_eapol_ie_parse kde; local 329 struct wpa_eapol_ie_parse kde; local [all...] |
H A D | wpa_auth_ie.c | 328 u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len, argument 333 RSN_SELECTOR_PUT(pos, kde);
|
H A D | wpa_auth.c | 656 struct wpa_eapol_ie_parse *kde) 661 if (wpa_parse_wpa_ie_rsn(kde->rsn_ie, kde->rsn_ie_len, &ie) < 0 || 672 if (!kde->mdie || !kde->ftie) { 674 "message 2/4", kde->mdie ? "FTIE" : "MDIE"); 678 mdie = (struct rsn_mdie *) (kde->mdie + 2); 679 if (kde->mdie[1] < sizeof(struct rsn_mdie) || 687 (kde->ftie[1] != sm->assoc_resp_ftie[1] || 688 os_memcmp(kde 654 ft_check_msg_2_of_4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_ie_parse *kde) argument 744 struct wpa_eapol_ie_parse kde; local 1203 __wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr, int force_version) argument 1354 wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr) argument 1885 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos, dummy_gtk[32]; local 2219 u8 *kde, *pos, hdr[2]; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
H A D | peerkey.c | 37 static u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len) argument 41 RSN_SELECTOR_PUT(pos, kde); 184 struct wpa_eapol_ie_parse kde; local 198 if (wpa_supplicant_parse_ies((const u8 *) (key + 1), extra_len, &kde) < 204 if (kde.rsn_ie == NULL || kde.mac_addr == NULL || 205 kde.mac_addr_len < ETH_ALEN) { 212 MAC2STR(kde.mac_addr)); 214 if (kde.rsn_ie_len > PEERKEY_MAX_IE_LEN) { 220 if (wpa_parse_wpa_ie_rsn(kde 445 wpa_supplicant_process_smk_m4(struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 468 wpa_supplicant_process_smk_m5(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, int ver, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 530 struct wpa_eapol_ie_parse kde; local 611 struct wpa_eapol_ie_parse kde; local 673 const u8 *kde; local 745 wpa_supplicant_update_smk_lifetime(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 782 struct wpa_eapol_ie_parse kde; local 831 struct wpa_eapol_ie_parse kde; local [all...] |
H A D | wpa.c | 894 * @kde: KDEs to include the EAPOL-Key frame 902 const u8 *kde, size_t kde_len, 909 if (kde) 910 wpa_hexdump(MSG_DEBUG, "WPA: KDE for msg 4/4", kde, kde_len); 931 if (kde) 932 os_memcpy(reply + 1, kde, kde_len); 899 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, const u8 *kde, size_t kde_len, struct wpa_ptk *ptk) argument
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | peerkey.c | 32 static u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len) argument 36 RSN_SELECTOR_PUT(pos, kde); 179 struct wpa_eapol_ie_parse kde; local 193 if (wpa_supplicant_parse_ies((const u8 *) (key + 1), extra_len, &kde) < 199 if (kde.rsn_ie == NULL || kde.mac_addr == NULL || 200 kde.mac_addr_len < ETH_ALEN) { 207 MAC2STR(kde.mac_addr)); 209 if (kde.rsn_ie_len > PEERKEY_MAX_IE_LEN) { 215 if (wpa_parse_wpa_ie_rsn(kde 440 wpa_supplicant_process_smk_m4(struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 463 wpa_supplicant_process_smk_m5(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, int ver, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 528 struct wpa_eapol_ie_parse kde; local 609 struct wpa_eapol_ie_parse kde; local 673 const u8 *kde; local 745 wpa_supplicant_update_smk_lifetime(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 782 struct wpa_eapol_ie_parse kde; local 831 struct wpa_eapol_ie_parse kde; local [all...] |
H A D | tdls.c | 779 struct wpa_eapol_ie_parse kde; local 806 if (wpa_supplicant_parse_ies((const u8 *) pos, ielen, &kde) < 0) { 811 if (kde.lnkid == NULL || kde.lnkid_len < 3 * ETH_ALEN) { 816 lnkid = (struct wpa_tdls_lnkid *) kde.lnkid; 821 if (kde.ftie == NULL || kde.ftie_len < sizeof(*ftie)) { 826 ftie = (struct wpa_tdls_ftie *) kde.ftie; 1248 struct wpa_eapol_ie_parse kde; local 1268 &kde) < 1305 copy_supp_rates(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1335 struct wpa_eapol_ie_parse kde; local 1690 struct wpa_eapol_ie_parse kde; local 1898 struct wpa_eapol_ie_parse kde; local [all...] |
H A D | wpa.c | 991 * @kde: KDEs to include the EAPOL-Key frame 999 const u8 *kde, size_t kde_len, 1006 if (kde) 1007 wpa_hexdump(MSG_DEBUG, "WPA: KDE for msg 4/4", kde, kde_len); 1028 if (kde) 1029 os_memcpy(reply + 1, kde, kde_len); 996 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, const u8 *kde, size_t kde_len, struct wpa_ptk *ptk) argument
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | peerkey.c | 32 static u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len) argument 36 RSN_SELECTOR_PUT(pos, kde); 179 struct wpa_eapol_ie_parse kde; local 193 if (wpa_supplicant_parse_ies((const u8 *) (key + 1), extra_len, &kde) < 199 if (kde.rsn_ie == NULL || kde.mac_addr == NULL || 200 kde.mac_addr_len < ETH_ALEN) { 207 MAC2STR(kde.mac_addr)); 209 if (kde.rsn_ie_len > PEERKEY_MAX_IE_LEN) { 215 if (wpa_parse_wpa_ie_rsn(kde 440 wpa_supplicant_process_smk_m4(struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 463 wpa_supplicant_process_smk_m5(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, int ver, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 528 struct wpa_eapol_ie_parse kde; local 609 struct wpa_eapol_ie_parse kde; local 673 const u8 *kde; local 745 wpa_supplicant_update_smk_lifetime(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 782 struct wpa_eapol_ie_parse kde; local 831 struct wpa_eapol_ie_parse kde; local [all...] |
H A D | tdls.c | 779 struct wpa_eapol_ie_parse kde; local 806 if (wpa_supplicant_parse_ies((const u8 *) pos, ielen, &kde) < 0) { 811 if (kde.lnkid == NULL || kde.lnkid_len < 3 * ETH_ALEN) { 816 lnkid = (struct wpa_tdls_lnkid *) kde.lnkid; 821 if (kde.ftie == NULL || kde.ftie_len < sizeof(*ftie)) { 826 ftie = (struct wpa_tdls_ftie *) kde.ftie; 1248 struct wpa_eapol_ie_parse kde; local 1268 &kde) < 1305 copy_supp_rates(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1335 struct wpa_eapol_ie_parse kde; local 1690 struct wpa_eapol_ie_parse kde; local 1898 struct wpa_eapol_ie_parse kde; local [all...] |
H A D | wpa.c | 991 * @kde: KDEs to include the EAPOL-Key frame 999 const u8 *kde, size_t kde_len, 1006 if (kde) 1007 wpa_hexdump(MSG_DEBUG, "WPA: KDE for msg 4/4", kde, kde_len); 1028 if (kde) 1029 os_memcpy(reply + 1, kde, kde_len); 996 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, const u8 *kde, size_t kde_len, struct wpa_ptk *ptk) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | peerkey.c | 32 static u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len) argument 36 RSN_SELECTOR_PUT(pos, kde); 179 struct wpa_eapol_ie_parse kde; local 193 if (wpa_supplicant_parse_ies((const u8 *) (key + 1), extra_len, &kde) < 199 if (kde.rsn_ie == NULL || kde.mac_addr == NULL || 200 kde.mac_addr_len < ETH_ALEN) { 207 MAC2STR(kde.mac_addr)); 209 if (kde.rsn_ie_len > PEERKEY_MAX_IE_LEN) { 215 if (wpa_parse_wpa_ie_rsn(kde 440 wpa_supplicant_process_smk_m4(struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 463 wpa_supplicant_process_smk_m5(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, int ver, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 528 struct wpa_eapol_ie_parse kde; local 609 struct wpa_eapol_ie_parse kde; local 673 const u8 *kde; local 745 wpa_supplicant_update_smk_lifetime(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 782 struct wpa_eapol_ie_parse kde; local 831 struct wpa_eapol_ie_parse kde; local [all...] |
H A D | tdls.c | 779 struct wpa_eapol_ie_parse kde; local 806 if (wpa_supplicant_parse_ies((const u8 *) pos, ielen, &kde) < 0) { 811 if (kde.lnkid == NULL || kde.lnkid_len < 3 * ETH_ALEN) { 816 lnkid = (struct wpa_tdls_lnkid *) kde.lnkid; 821 if (kde.ftie == NULL || kde.ftie_len < sizeof(*ftie)) { 826 ftie = (struct wpa_tdls_ftie *) kde.ftie; 1248 struct wpa_eapol_ie_parse kde; local 1268 &kde) < 1305 copy_supp_rates(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1335 struct wpa_eapol_ie_parse kde; local 1690 struct wpa_eapol_ie_parse kde; local 1898 struct wpa_eapol_ie_parse kde; local [all...] |
H A D | wpa.c | 991 * @kde: KDEs to include the EAPOL-Key frame 999 const u8 *kde, size_t kde_len, 1006 if (kde) 1007 wpa_hexdump(MSG_DEBUG, "WPA: KDE for msg 4/4", kde, kde_len); 1028 if (kde) 1029 os_memcpy(reply + 1, kde, kde_len); 996 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, const u8 *kde, size_t kde_len, struct wpa_ptk *ptk) argument
|