/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/ |
H A D | wpa_ft.c | 118 ft.r1kh_id, FT_R1KH_ID_LEN); in wpa_sm_set_ft_params() 119 os_memcpy(sm->r1kh_id, ft.r1kh_id, FT_R1KH_ID_LEN); in wpa_sm_set_ft_params() 121 os_memset(sm->r1kh_id, 0, FT_R1KH_ID_LEN); in wpa_sm_set_ft_params() 330 *pos++ = FT_R1KH_ID_LEN; in wpa_ft_gen_req_ies() 331 os_memcpy(pos, sm->r1kh_id, FT_R1KH_ID_LEN); in wpa_ft_gen_req_ies() 332 pos += FT_R1KH_ID_LEN; in wpa_ft_gen_req_ies() 601 os_memcpy(sm->r1kh_id, parse.r1kh_id, FT_R1KH_ID_LEN); in wpa_ft_process_response() 602 wpa_hexdump(MSG_DEBUG, "FT: R1KH-ID", sm->r1kh_id, FT_R1KH_ID_LEN); in wpa_ft_process_response() 948 if (os_memcmp_const(parse.r1kh_id, sm->r1kh_id, FT_R1KH_ID_LEN) != 0) { in wpa_ft_validate_reassoc_resp()
|
H A D | wpa_i.h | 128 u8 r1kh_id[FT_R1KH_ID_LEN];
|
H A D | wpa.c | 3794 os_memcpy(sm->r1kh_id, parse.r1kh_id, FT_R1KH_ID_LEN); in fils_process_auth() 3796 sm->r1kh_id, FT_R1KH_ID_LEN); in fils_process_auth()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/ |
H A D | wpa_ft.c | 111 os_memset(sm->r1kh_id, 0, FT_R1KH_ID_LEN); in wpa_sm_set_ft_params() 145 ft.r1kh_id, FT_R1KH_ID_LEN); in wpa_sm_set_ft_params() 146 os_memcpy(sm->r1kh_id, ft.r1kh_id, FT_R1KH_ID_LEN); in wpa_sm_set_ft_params() 148 os_memset(sm->r1kh_id, 0, FT_R1KH_ID_LEN); in wpa_sm_set_ft_params() 360 *pos++ = FT_R1KH_ID_LEN; in wpa_ft_gen_req_ies() 361 os_memcpy(pos, sm->r1kh_id, FT_R1KH_ID_LEN); in wpa_ft_gen_req_ies() 362 pos += FT_R1KH_ID_LEN; in wpa_ft_gen_req_ies() 667 os_memcpy(sm->r1kh_id, parse.r1kh_id, FT_R1KH_ID_LEN); 668 wpa_hexdump(MSG_DEBUG, "FT: R1KH-ID", sm->r1kh_id, FT_R1KH_ID_LEN); 1106 if (os_memcmp_const(parse.r1kh_id, sm->r1kh_id, FT_R1KH_ID_LEN) ! [all...] |
H A D | wpa_i.h | 19 u8 r1kh_id[FT_R1KH_ID_LEN]; 157 u8 r1kh_id[FT_R1KH_ID_LEN];
|
H A D | wpa.c | 5496 os_memcpy(sm->r1kh_id, parse.r1kh_id, FT_R1KH_ID_LEN); 5498 sm->r1kh_id, FT_R1KH_ID_LEN);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | wpa_auth_ft.c | 818 if (len < 2 + hdrlen + 2 + FT_R1KH_ID_LEN + 2 + r0kh_id_len + in wpa_write_ftie() 849 *pos++ = FT_R1KH_ID_LEN; in wpa_write_ftie() 850 os_memcpy(pos, conf->r1_key_holder, FT_R1KH_ID_LEN); in wpa_write_ftie() 851 pos += FT_R1KH_ID_LEN; in wpa_write_ftie() 945 { .type = FT_RRB_R1KH_ID, .len = FT_R1KH_ID_LEN, in wpa_ft_rrb_seq_req() 1608 os_memcmp_const(r1kh->id, f_r1kh_id, FT_R1KH_ID_LEN) == 0) in wpa_ft_rrb_lookup_r1kh() 1636 FT_R1KH_ID_LEN) != 0) in wpa_ft_rrb_check_r1kh() 1956 { .type = FT_RRB_R1KH_ID, .len = FT_R1KH_ID_LEN, in wpa_ft_pull_pmk_r1() 3231 2 + FT_R1KH_ID_LEN + 200; in wpa_ft_process_auth_req() 3436 FT_R1KH_ID_LEN) ! in wpa_ft_validate_reassoc() [all...] |
H A D | wpa_auth.h | 73 #define FT_RRB_R1KH_ID 5 /* FT_R1KH_ID_LEN */ 164 u8 id[FT_R1KH_ID_LEN]; 206 u8 r1_key_holder[FT_R1KH_ID_LEN];
|
H A D | ap_config.h | 388 u8 r1_key_holder[FT_R1KH_ID_LEN];
|
H A D | wpa_auth_glue.c | 90 os_memcpy(wconf->r1_key_holder, conf->r1_key_holder, FT_R1KH_ID_LEN); in hostapd_wpa_auth_conf()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | wpa_auth_ft.c | 817 if (len < 2 + hdrlen + 2 + FT_R1KH_ID_LEN + 2 + r0kh_id_len + in wpa_write_ftie() 848 *pos++ = FT_R1KH_ID_LEN; in wpa_write_ftie() 849 os_memcpy(pos, conf->r1_key_holder, FT_R1KH_ID_LEN); in wpa_write_ftie() 850 pos += FT_R1KH_ID_LEN; in wpa_write_ftie() 944 { .type = FT_RRB_R1KH_ID, .len = FT_R1KH_ID_LEN, in wpa_ft_rrb_seq_req() 1606 os_memcmp_const(r1kh->id, f_r1kh_id, FT_R1KH_ID_LEN) == 0) in wpa_ft_rrb_lookup_r1kh() 1634 FT_R1KH_ID_LEN) != 0) in wpa_ft_rrb_check_r1kh() 1954 { .type = FT_RRB_R1KH_ID, .len = FT_R1KH_ID_LEN, in wpa_ft_pull_pmk_r1() 3035 2 + FT_R1KH_ID_LEN + 200; in wpa_ft_process_auth_req() 3235 FT_R1KH_ID_LEN) ! in wpa_ft_validate_reassoc() [all...] |
H A D | wpa_auth.h | 73 #define FT_RRB_R1KH_ID 5 /* FT_R1KH_ID_LEN */ 164 u8 id[FT_R1KH_ID_LEN]; 204 u8 r1_key_holder[FT_R1KH_ID_LEN];
|
H A D | ap_config.h | 384 u8 r1_key_holder[FT_R1KH_ID_LEN];
|
H A D | wpa_auth_glue.c | 85 os_memcpy(wconf->r1_key_holder, conf->r1_key_holder, FT_R1KH_ID_LEN); in hostapd_wpa_auth_conf()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/ |
H A D | wpa_common.c | 873 if (len != FT_R1KH_ID_LEN) { in wpa_ft_parse_ftie() 1628 len[2] = FT_R1KH_ID_LEN; in wpa_derive_pmk_r1_name() 1653 u8 buf[FT_R1KH_ID_LEN + ETH_ALEN]; in wpa_derive_pmk_r1() 1660 wpa_hexdump(MSG_DEBUG, "FT: R1KH-ID", r1kh_id, FT_R1KH_ID_LEN); in wpa_derive_pmk_r1() 1663 os_memcpy(pos, r1kh_id, FT_R1KH_ID_LEN); in wpa_derive_pmk_r1() 1664 pos += FT_R1KH_ID_LEN; in wpa_derive_pmk_r1()
|
H A D | wpa_common.h | 159 #define FT_R1KH_ID_LEN 6 macro
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | wpa_common.c | 1012 if (len != FT_R1KH_ID_LEN) { in wpa_ft_parse_ftie() 2037 len[2] = FT_R1KH_ID_LEN; in wpa_derive_pmk_r1_name() 2063 u8 buf[FT_R1KH_ID_LEN + ETH_ALEN]; in wpa_derive_pmk_r1() 2070 wpa_hexdump(MSG_DEBUG, "FT: R1KH-ID", r1kh_id, FT_R1KH_ID_LEN); in wpa_derive_pmk_r1() 2073 os_memcpy(pos, r1kh_id, FT_R1KH_ID_LEN); in wpa_derive_pmk_r1() 2074 pos += FT_R1KH_ID_LEN; in wpa_derive_pmk_r1()
|
H A D | wpa_common.h | 193 #define FT_R1KH_ID_LEN 6 macro
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hostapd/ |
H A D | ap_config_file.c | 3125 if (os_strlen(pos) != 2 * FT_R1KH_ID_LEN || in hostapd_config_fill() 3126 hexstr2bin(pos, bss->r1_key_holder, FT_R1KH_ID_LEN) != 0) { in hostapd_config_fill()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/hostapd/ |
H A D | ap_config_file.c | 3012 if (os_strlen(pos) != 2 * FT_R1KH_ID_LEN || 3013 hexstr2bin(pos, bss->r1_key_holder, FT_R1KH_ID_LEN) != 0) {
|