Home
last modified time | relevance | path

Searched refs:kde (Results 1 - 12 of 12) sorted by relevance

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/
H A Dtdls.c954 struct wpa_eapol_ie_parse kde;
987 if (wpa_supplicant_parse_ies((const u8 *) pos, ielen, &kde) < 0)
991 if (kde.lnkid == NULL || kde.lnkid_len < 3 * ETH_ALEN) {
996 lnkid = (struct wpa_tdls_lnkid *) kde.lnkid;
1001 if (kde.ftie == NULL || kde.ftie_len < sizeof(*ftie)) {
1006 ftie = (struct wpa_tdls_ftie *) kde.ftie;
1540 struct wpa_eapol_ie_parse kde;
1565 &kde) <
[all...]
H A Dwpa.c681 struct wpa_eapol_ie_parse *kde) in wpa_handle_ext_key_id()
686 if (!kde->key_id) { in wpa_handle_ext_key_id()
694 key_id = kde->key_id[0] & 0x03; in wpa_handle_ext_key_id()
705 if (kde->key_id && (kde->key_id[0] & 0x03)) { in wpa_handle_ext_key_id()
711 if (kde->key_id) { in wpa_handle_ext_key_id()
725 static u8 * rsn_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len) in rsn_add_kde() argument
729 RSN_SELECTOR_PUT(pos, kde); in rsn_add_kde()
787 u8 *kde, *kde_buf = NULL; in wpa_supplicant_process_1_of_4() local
879 kde in wpa_supplicant_process_1_of_4()
680 wpa_handle_ext_key_id(struct wpa_sm *sm, struct wpa_eapol_ie_parse *kde) wpa_handle_ext_key_id() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/
H A Dtdls.c938 struct wpa_eapol_ie_parse kde; in wpa_tdls_recv_teardown() local
971 if (wpa_supplicant_parse_ies((const u8 *) pos, ielen, &kde) < 0) in wpa_tdls_recv_teardown()
975 if (kde.lnkid == NULL || kde.lnkid_len < 3 * ETH_ALEN) { in wpa_tdls_recv_teardown()
980 lnkid = (struct wpa_tdls_lnkid *) kde.lnkid; in wpa_tdls_recv_teardown()
985 if (kde.ftie == NULL || kde.ftie_len < sizeof(*ftie)) { in wpa_tdls_recv_teardown()
990 ftie = (struct wpa_tdls_ftie *) kde.ftie; in wpa_tdls_recv_teardown()
1522 struct wpa_eapol_ie_parse kde; in wpa_tdls_process_discovery_request() local
1547 &kde) < in wpa_tdls_process_discovery_request()
1586 copy_supp_rates(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) copy_supp_rates() argument
1602 copy_peer_ht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) copy_peer_ht_capab() argument
1628 copy_peer_vht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) copy_peer_vht_capab() argument
1654 copy_peer_ext_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) copy_peer_ext_capab() argument
1678 copy_peer_wmm_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) copy_peer_wmm_capab() argument
1703 copy_peer_supp_channels(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) copy_peer_supp_channels() argument
1729 copy_peer_supp_oper_classes(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) copy_peer_supp_oper_classes() argument
1789 struct wpa_eapol_ie_parse kde; wpa_tdls_process_tpk_m1() local
2185 struct wpa_eapol_ie_parse kde; wpa_tdls_process_tpk_m2() local
2474 struct wpa_eapol_ie_parse kde; wpa_tdls_process_tpk_m3() local
[all...]
H A Dwpa.c594 u8 *kde, *kde_buf = NULL; in wpa_supplicant_process_1_of_4() local
656 kde = sm->assoc_wpa_ie; in wpa_supplicant_process_1_of_4()
677 os_memcpy(kde_buf, kde, kde_len); in wpa_supplicant_process_1_of_4()
678 kde = kde_buf; in wpa_supplicant_process_1_of_4()
679 pos = kde + kde_len; in wpa_supplicant_process_1_of_4()
682 kde_len = pos - kde; in wpa_supplicant_process_1_of_4()
693 os_memcpy(kde_buf, kde, kde_len); in wpa_supplicant_process_1_of_4()
694 kde = kde_buf; in wpa_supplicant_process_1_of_4()
695 pos = kde + kde_len; in wpa_supplicant_process_1_of_4()
701 kde_len = pos - kde; in wpa_supplicant_process_1_of_4()
4274 struct wpa_eapol_ie_parse kde; fils_process_assoc_resp() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
H A Dwpa_auth.c878 struct wpa_eapol_ie_parse *kde) in ft_check_msg_2_of_4()
883 if (wpa_parse_wpa_ie_rsn(kde->rsn_ie, kde->rsn_ie_len, &ie) < 0 || in ft_check_msg_2_of_4()
894 if (!kde->mdie || !kde->ftie) { in ft_check_msg_2_of_4()
897 kde->mdie ? "FTIE" : "MDIE"); in ft_check_msg_2_of_4()
901 mdie = (struct rsn_mdie *) (kde->mdie + 2); in ft_check_msg_2_of_4()
902 if (kde->mdie[1] < sizeof(struct rsn_mdie) || in ft_check_msg_2_of_4()
910 (kde->ftie[1] != sm->assoc_resp_ftie[1] || in ft_check_msg_2_of_4()
911 os_memcmp(kde in ft_check_msg_2_of_4()
876 ft_check_msg_2_of_4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_ie_parse *kde) ft_check_msg_2_of_4() argument
1048 struct wpa_eapol_ie_parse kde; wpa_receive() local
1514 __wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr, int force_version) __wpa_send_eapol() argument
1727 wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr) wpa_send_eapol() argument
2971 struct wpa_eapol_ie_parse kde; SM_STATE() local
3406 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde = NULL, *pos, stub_gtk[32]; SM_STATE() local
3884 const u8 *kde; SM_STATE() local
3966 struct wpa_eapol_ie_parse kde; SM_STATE() local
5428 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos; wpa_auth_resend_m3() local
5611 const u8 *kde; wpa_auth_resend_group_m1() local
[all...]
H A Dwpa_auth_ie.h12 u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len,
H A Dwpa_auth_i.h286 const u8 *kde, size_t kde_len,
H A Dwpa_auth_ie.c555 u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len, in wpa_add_kde() argument
560 RSN_SELECTOR_PUT(pos, kde); in wpa_add_kde()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
H A Dwpa_auth.c800 struct wpa_eapol_ie_parse *kde) in ft_check_msg_2_of_4()
805 if (wpa_parse_wpa_ie_rsn(kde->rsn_ie, kde->rsn_ie_len, &ie) < 0 || in ft_check_msg_2_of_4()
816 if (!kde->mdie || !kde->ftie) { in ft_check_msg_2_of_4()
818 "message 2/4", kde->mdie ? "FTIE" : "MDIE"); in ft_check_msg_2_of_4()
822 mdie = (struct rsn_mdie *) (kde->mdie + 2); in ft_check_msg_2_of_4()
823 if (kde->mdie[1] < sizeof(struct rsn_mdie) || in ft_check_msg_2_of_4()
831 (kde->ftie[1] != sm->assoc_resp_ftie[1] || in ft_check_msg_2_of_4()
832 os_memcmp(kde in ft_check_msg_2_of_4()
798 ft_check_msg_2_of_4(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_ie_parse *kde) ft_check_msg_2_of_4() argument
959 struct wpa_eapol_ie_parse kde; wpa_receive() local
1435 __wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr, int force_version) __wpa_send_eapol() argument
1651 wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr) wpa_send_eapol() argument
2829 struct wpa_eapol_ie_parse kde; SM_STATE() local
3153 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos, dummy_gtk[32]; SM_STATE() local
3547 const u8 *kde; SM_STATE() local
3629 struct wpa_eapol_ie_parse kde; SM_STATE() local
4990 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos; wpa_auth_resend_m3() local
5167 const u8 *kde; wpa_auth_resend_group_m1() local
[all...]
H A Dwpa_auth_ie.h47 u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len,
H A Dwpa_auth_i.h279 const u8 *kde, size_t kde_len,
H A Dwpa_auth_ie.c496 u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len, in wpa_add_kde() argument
501 RSN_SELECTOR_PUT(pos, kde); in wpa_add_kde()

Completed in 19 milliseconds