/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/ |
H A D | tdls.c | 954 struct wpa_eapol_ie_parse kde; 987 if (wpa_supplicant_parse_ies((const u8 *) pos, ielen, &kde) < 0) 991 if (kde.lnkid == NULL || kde.lnkid_len < 3 * ETH_ALEN) { 996 lnkid = (struct wpa_tdls_lnkid *) kde.lnkid; 1001 if (kde.ftie == NULL || kde.ftie_len < sizeof(*ftie)) { 1006 ftie = (struct wpa_tdls_ftie *) kde.ftie; 1540 struct wpa_eapol_ie_parse kde; 1565 &kde) < [all...] |
H A D | wpa.c | 681 struct wpa_eapol_ie_parse *kde) in wpa_handle_ext_key_id() 686 if (!kde->key_id) { in wpa_handle_ext_key_id() 694 key_id = kde->key_id[0] & 0x03; in wpa_handle_ext_key_id() 705 if (kde->key_id && (kde->key_id[0] & 0x03)) { in wpa_handle_ext_key_id() 711 if (kde->key_id) { in wpa_handle_ext_key_id() 725 static u8 * rsn_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len) in rsn_add_kde() argument 729 RSN_SELECTOR_PUT(pos, kde); in rsn_add_kde() 787 u8 *kde, *kde_buf = NULL; in wpa_supplicant_process_1_of_4() local 879 kde in wpa_supplicant_process_1_of_4() 680 wpa_handle_ext_key_id(struct wpa_sm *sm, struct wpa_eapol_ie_parse *kde) wpa_handle_ext_key_id() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/ |
H A D | tdls.c | 938 struct wpa_eapol_ie_parse kde; in wpa_tdls_recv_teardown() local 971 if (wpa_supplicant_parse_ies((const u8 *) pos, ielen, &kde) < 0) in wpa_tdls_recv_teardown() 975 if (kde.lnkid == NULL || kde.lnkid_len < 3 * ETH_ALEN) { in wpa_tdls_recv_teardown() 980 lnkid = (struct wpa_tdls_lnkid *) kde.lnkid; in wpa_tdls_recv_teardown() 985 if (kde.ftie == NULL || kde.ftie_len < sizeof(*ftie)) { in wpa_tdls_recv_teardown() 990 ftie = (struct wpa_tdls_ftie *) kde.ftie; in wpa_tdls_recv_teardown() 1522 struct wpa_eapol_ie_parse kde; in wpa_tdls_process_discovery_request() local 1547 &kde) < in wpa_tdls_process_discovery_request() 1586 copy_supp_rates(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) copy_supp_rates() argument 1602 copy_peer_ht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) copy_peer_ht_capab() argument 1628 copy_peer_vht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) copy_peer_vht_capab() argument 1654 copy_peer_ext_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) copy_peer_ext_capab() argument 1678 copy_peer_wmm_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) copy_peer_wmm_capab() argument 1703 copy_peer_supp_channels(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) copy_peer_supp_channels() argument 1729 copy_peer_supp_oper_classes(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) copy_peer_supp_oper_classes() argument 1789 struct wpa_eapol_ie_parse kde; wpa_tdls_process_tpk_m1() local 2185 struct wpa_eapol_ie_parse kde; wpa_tdls_process_tpk_m2() local 2474 struct wpa_eapol_ie_parse kde; wpa_tdls_process_tpk_m3() local [all...] |
H A D | wpa.c | 594 u8 *kde, *kde_buf = NULL; in wpa_supplicant_process_1_of_4() local 656 kde = sm->assoc_wpa_ie; in wpa_supplicant_process_1_of_4() 677 os_memcpy(kde_buf, kde, kde_len); in wpa_supplicant_process_1_of_4() 678 kde = kde_buf; in wpa_supplicant_process_1_of_4() 679 pos = kde + kde_len; in wpa_supplicant_process_1_of_4() 682 kde_len = pos - kde; in wpa_supplicant_process_1_of_4() 693 os_memcpy(kde_buf, kde, kde_len); in wpa_supplicant_process_1_of_4() 694 kde = kde_buf; in wpa_supplicant_process_1_of_4() 695 pos = kde + kde_len; in wpa_supplicant_process_1_of_4() 701 kde_len = pos - kde; in wpa_supplicant_process_1_of_4() 4274 struct wpa_eapol_ie_parse kde; fils_process_assoc_resp() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | wpa_auth.c | 878 struct wpa_eapol_ie_parse *kde) in ft_check_msg_2_of_4() 883 if (wpa_parse_wpa_ie_rsn(kde->rsn_ie, kde->rsn_ie_len, &ie) < 0 || in ft_check_msg_2_of_4() 894 if (!kde->mdie || !kde->ftie) { in ft_check_msg_2_of_4() 897 kde->mdie ? "FTIE" : "MDIE"); in ft_check_msg_2_of_4() 901 mdie = (struct rsn_mdie *) (kde->mdie + 2); in ft_check_msg_2_of_4() 902 if (kde->mdie[1] < sizeof(struct rsn_mdie) || in ft_check_msg_2_of_4() 910 (kde->ftie[1] != sm->assoc_resp_ftie[1] || in ft_check_msg_2_of_4() 911 os_memcmp(kde in ft_check_msg_2_of_4() 876 ft_check_msg_2_of_4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_ie_parse *kde) ft_check_msg_2_of_4() argument 1048 struct wpa_eapol_ie_parse kde; wpa_receive() local 1514 __wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr, int force_version) __wpa_send_eapol() argument 1727 wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr) wpa_send_eapol() argument 2971 struct wpa_eapol_ie_parse kde; SM_STATE() local 3406 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde = NULL, *pos, stub_gtk[32]; SM_STATE() local 3884 const u8 *kde; SM_STATE() local 3966 struct wpa_eapol_ie_parse kde; SM_STATE() local 5428 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos; wpa_auth_resend_m3() local 5611 const u8 *kde; wpa_auth_resend_group_m1() local [all...] |
H A D | wpa_auth_ie.h | 12 u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len,
|
H A D | wpa_auth_i.h | 286 const u8 *kde, size_t kde_len,
|
H A D | wpa_auth_ie.c | 555 u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len, in wpa_add_kde() argument 560 RSN_SELECTOR_PUT(pos, kde); in wpa_add_kde()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | wpa_auth.c | 800 struct wpa_eapol_ie_parse *kde) in ft_check_msg_2_of_4() 805 if (wpa_parse_wpa_ie_rsn(kde->rsn_ie, kde->rsn_ie_len, &ie) < 0 || in ft_check_msg_2_of_4() 816 if (!kde->mdie || !kde->ftie) { in ft_check_msg_2_of_4() 818 "message 2/4", kde->mdie ? "FTIE" : "MDIE"); in ft_check_msg_2_of_4() 822 mdie = (struct rsn_mdie *) (kde->mdie + 2); in ft_check_msg_2_of_4() 823 if (kde->mdie[1] < sizeof(struct rsn_mdie) || in ft_check_msg_2_of_4() 831 (kde->ftie[1] != sm->assoc_resp_ftie[1] || in ft_check_msg_2_of_4() 832 os_memcmp(kde in ft_check_msg_2_of_4() 798 ft_check_msg_2_of_4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_ie_parse *kde) ft_check_msg_2_of_4() argument 959 struct wpa_eapol_ie_parse kde; wpa_receive() local 1435 __wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr, int force_version) __wpa_send_eapol() argument 1651 wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr) wpa_send_eapol() argument 2829 struct wpa_eapol_ie_parse kde; SM_STATE() local 3153 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos, dummy_gtk[32]; SM_STATE() local 3547 const u8 *kde; SM_STATE() local 3629 struct wpa_eapol_ie_parse kde; SM_STATE() local 4990 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos; wpa_auth_resend_m3() local 5167 const u8 *kde; wpa_auth_resend_group_m1() local [all...] |
H A D | wpa_auth_ie.h | 47 u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len,
|
H A D | wpa_auth_i.h | 279 const u8 *kde, size_t kde_len,
|
H A D | wpa_auth_ie.c | 496 u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len, in wpa_add_kde() argument 501 RSN_SELECTOR_PUT(pos, kde); in wpa_add_kde()
|