/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/ |
H A D | wpa.c | 55 size_t mic_len = wpa_mic_len(sm->key_mgmt, sm->pmk_len); in wpa_eapol_key_send() local 58 " ver=%d mic_len=%d key_mgmt=0x%x", in wpa_eapol_key_send() 59 MAC2STR(dest), ver, (int) mic_len, sm->key_mgmt); in wpa_eapol_key_send() 78 if (mic_len) { in wpa_eapol_key_send() 94 key_mic, mic_len); in wpa_eapol_key_send() 181 size_t mic_len, hdrlen, rlen; in wpa_sm_key_request() local 202 mic_len = wpa_mic_len(sm->key_mgmt, sm->pmk_len); in wpa_sm_key_request() 203 hdrlen = sizeof(*reply) + mic_len + 2; in wpa_sm_key_request() 215 if (sm->ptk_set && mic_len) in wpa_sm_key_request() 228 WPA_PUT_BE16(mic + mic_len, in wpa_sm_key_request() 475 size_t mic_len, hdrlen, rlen; wpa_supplicant_send_2_of_4() local 1399 size_t mic_len, hdrlen, rlen; wpa_supplicant_send_4_of_4() local 1761 size_t mic_len, hdrlen, rlen; wpa_supplicant_send_2_of_2() local 1902 size_t mic_len = wpa_mic_len(sm->key_mgmt, sm->pmk_len); wpa_supplicant_verify_eapol_key_mic() local 1976 wpa_supplicant_decrypt_key_data(struct wpa_sm *sm, struct wpa_eapol_key *key, size_t mic_len, u16 ver, u8 *key_data, size_t *key_data_len) wpa_supplicant_decrypt_key_data() argument 2079 wpa_eapol_key_dump(struct wpa_sm *sm, const struct wpa_eapol_key *key, unsigned int key_data_len, const u8 *mic, unsigned int mic_len) wpa_eapol_key_dump() argument 2212 size_t mic_len, keyhdrlen; wpa_sm_rx_eapol() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | pasn_supplicant.c | 785 u8 mic_len, data_len; in wpas_pasn_build_auth_3() local 820 mic_len = pasn_mic_len(pasn->akmp, pasn->cipher); in wpas_pasn_build_auth_3() 822 wpabuf_put_u8(buf, mic_len); in wpas_pasn_build_auth_3() 823 ptr = wpabuf_put(buf, mic_len); in wpas_pasn_build_auth_3() 825 os_memset(ptr, 0, mic_len); in wpas_pasn_build_auth_3() 832 pasn->hash, mic_len * 2, data, data_len, mic); in wpas_pasn_build_auth_3() 845 os_memcpy(ptr, mic, mic_len); in wpas_pasn_build_auth_3() 1352 u8 mic_len; in wpas_pasn_auth_rx() local 1406 mic_len = pasn_mic_len(pasn->akmp, pasn->cipher); in wpas_pasn_auth_rx() 1408 if (!elems.mic || elems.mic_len ! in wpas_pasn_auth_rx() [all...] |
H A D | mesh_rsn.c | 676 if (!elems->mic || elems->mic_len < AES_BLOCK_SIZE) { in mesh_rsn_process_ampe() 681 ampe_buf = (u8 *) elems->mic + elems->mic_len; in mesh_rsn_process_ampe()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | wpa_auth.c | 1050 size_t keyhdrlen, mic_len; in wpa_receive() local 1057 mic_len = wpa_mic_len(sm->wpa_key_mgmt, sm->pmk_len); in wpa_receive() 1058 keyhdrlen = sizeof(*key) + mic_len + 2; in wpa_receive() 1069 key_data = mic + mic_len + 2; in wpa_receive() 1070 key_data_length = WPA_GET_BE16(mic + mic_len); in wpa_receive() 1072 " key_info=0x%x type=%u mic_len=%zu key_data_length=%u", in wpa_receive() 1074 mic_len, key_data_length); in wpa_receive() 1079 mic, mic_len); in wpa_receive() 1131 (mic_len == 0 && (key_info & WPA_KEY_INFO_ENCR_KEY_DATA) && in wpa_receive() 1250 if (sm->wpa == WPA_VERSION_WPA2 && mic_len in wpa_receive() 1523 size_t len, mic_len, keyhdrlen; __wpa_send_eapol() local 1778 size_t mic_len = wpa_mic_len(akmp, pmk_len); wpa_verify_key_mic() local 2968 size_t mic_len, eapol_key_ie_len; SM_STATE() local 3967 size_t mic_len; SM_STATE() local [all...] |
H A D | ieee802_11.c | 2974 u8 mic_len; in handle_auth_pasn_resp() local 3046 mic_len = pasn_mic_len(sta->pasn->akmp, sta->pasn->cipher); in handle_auth_pasn_resp() 3048 wpabuf_put_u8(buf, mic_len); in handle_auth_pasn_resp() 3049 ptr = wpabuf_put(buf, mic_len); in handle_auth_pasn_resp() 3051 os_memset(ptr, 0, mic_len); in handle_auth_pasn_resp() 3095 os_memcpy(ptr, mic, mic_len); in handle_auth_pasn_resp() 3410 u8 mic_len; in handle_auth_pasn_3() local 3423 mic_len = pasn_mic_len(sta->pasn->akmp, sta->pasn->cipher); in handle_auth_pasn_3() 3424 if (!elems.mic || elems.mic_len != mic_len) { in handle_auth_pasn_3() [all...] |
H A D | wpa_auth_ft.c | 3316 size_t mic_len = 16; in wpa_ft_validate_reassoc() local 3485 if (os_memcmp_const(mic, fte_mic, mic_len) != 0) { in wpa_ft_validate_reassoc() 3490 fte_mic, mic_len); in wpa_ft_validate_reassoc() 3491 wpa_hexdump(MSG_MSGDUMP, "FT: Calculated MIC", mic, mic_len); in wpa_ft_validate_reassoc()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | wpa_auth.c | 961 size_t keyhdrlen, mic_len; in wpa_receive() local 968 mic_len = wpa_mic_len(sm->wpa_key_mgmt, sm->pmk_len); in wpa_receive() 969 keyhdrlen = sizeof(*key) + mic_len + 2; in wpa_receive() 980 key_data = mic + mic_len + 2; in wpa_receive() 981 key_data_length = WPA_GET_BE16(mic + mic_len); in wpa_receive() 983 " key_info=0x%x type=%u mic_len=%u key_data_length=%u", in wpa_receive() 985 (unsigned int) mic_len, key_data_length); in wpa_receive() 990 mic, mic_len); in wpa_receive() 1043 (mic_len == 0 && (key_info & WPA_KEY_INFO_ENCR_KEY_DATA) && in wpa_receive() 1168 if (sm->wpa == WPA_VERSION_WPA2 && mic_len in wpa_receive() 1443 size_t len, mic_len, keyhdrlen; __wpa_send_eapol() local 1696 size_t mic_len = wpa_mic_len(akmp, pmk_len); wpa_verify_key_mic() local 2826 size_t mic_len, eapol_key_ie_len; SM_STATE() local 3630 size_t mic_len; SM_STATE() local [all...] |
H A D | wpa_auth_ft.c | 3119 size_t mic_len = 16; in wpa_ft_validate_reassoc() local 3280 if (os_memcmp_const(mic, fte_mic, mic_len) != 0) { in wpa_ft_validate_reassoc() 3285 fte_mic, mic_len); in wpa_ft_validate_reassoc() 3286 wpa_hexdump(MSG_MSGDUMP, "FT: Calculated MIC", mic, mic_len); in wpa_ft_validate_reassoc()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/ |
H A D | wpa.c | 102 size_t mic_len = wpa_mic_len(sm->key_mgmt, sm->pmk_len); in wpa_eapol_key_send() local 105 " ver=%d mic_len=%d key_mgmt=0x%x", in wpa_eapol_key_send() 106 MAC2STR_SEC(dest), ver, (int) mic_len, sm->key_mgmt); in wpa_eapol_key_send() 128 if (mic_len) { in wpa_eapol_key_send() 144 key_mic, mic_len); in wpa_eapol_key_send() 231 size_t mic_len, hdrlen, rlen; in wpa_sm_key_request() local 260 mic_len = wpa_mic_len(sm->key_mgmt, sm->pmk_len); in wpa_sm_key_request() 261 hdrlen = sizeof(*reply) + mic_len + 2; in wpa_sm_key_request() 273 if (sm->ptk_set && mic_len) in wpa_sm_key_request() 286 WPA_PUT_BE16(mic + mic_len, in wpa_sm_key_request() 537 size_t mic_len, hdrlen, rlen; wpa_supplicant_send_2_of_4() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/ |
H A D | wpa_common.c | 765 size_t mic_len, fte_fixed_len; in wpa_ft_mic() local 768 mic_len = 16; in wpa_ft_mic() 771 mic_len = 24; in wpa_ft_mic() 779 fte_fixed_len = sizeof(struct rsn_ftie) - 16 + mic_len; in wpa_ft_mic() 813 os_memset(zero_mic, 0, mic_len); in wpa_ft_mic() 815 len[num_elem] = mic_len; in wpa_ft_mic() 819 addr[num_elem] = ftie + 2 + 2 + mic_len; in wpa_ft_mic() 820 len[num_elem] = ftie_len - (2 + 2 + mic_len); in wpa_ft_mic()
|
H A D | ieee802_11_common.h | 126 u8 mic_len; member
|
H A D | ieee802_11_common.c | 466 elems->mic_len = elen; in ieee802_11_parse_elems()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | wpa_common.c | 898 size_t mic_len, fte_fixed_len; in wpa_ft_mic() local 901 mic_len = 16; in wpa_ft_mic() 904 mic_len = 24; in wpa_ft_mic() 912 fte_fixed_len = sizeof(struct rsn_ftie) - 16 + mic_len; in wpa_ft_mic() 946 os_memset(zero_mic, 0, mic_len); in wpa_ft_mic() 948 len[num_elem] = mic_len; in wpa_ft_mic() 952 addr[num_elem] = ftie + 2 + 2 + mic_len; in wpa_ft_mic() 953 len[num_elem] = ftie_len - (2 + 2 + mic_len); in wpa_ft_mic()
|
H A D | ieee802_11_common.h | 172 u8 mic_len; member
|
H A D | ieee802_11_common.c | 656 elems->mic_len = elen; in ieee802_11_parse_elems()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | mesh_rsn.c | 668 if (!elems->mic || elems->mic_len < AES_BLOCK_SIZE) { in mesh_rsn_process_ampe() 673 ampe_buf = (u8 *) elems->mic + elems->mic_len; in mesh_rsn_process_ampe()
|