/external/wpa_supplicant_8/src/rsn_supp/ |
D | wpa_ft.c | 682 int keyidx; in wpa_ft_process_gtk_subelem() local 733 keyidx = WPA_GET_LE16(gtk_elem) & 0x03; in wpa_ft_process_gtk_subelem() 750 if (wpa_sm_set_key(sm, alg, broadcast_ether_addr, keyidx, 0, in wpa_ft_process_gtk_subelem() 767 u16 keyidx; in wpa_ft_process_igtk_subelem() local 813 keyidx = WPA_GET_LE16(igtk_elem); in wpa_ft_process_igtk_subelem() 818 broadcast_ether_addr, keyidx, 0, in wpa_ft_process_igtk_subelem()
|
D | wpa.c | 856 int tx, key_rsc_len, keyidx; member 877 gd->keyidx, gd->tx, gd->gtk_len); in wpa_supplicant_install_gtk() 884 gd->keyidx, gd->tx, gd->gtk_len); in wpa_supplicant_install_gtk() 895 gd->keyidx, 1, key_rsc, gd->key_rsc_len, in wpa_supplicant_install_gtk() 904 gd->keyidx, gd->tx, key_rsc, gd->key_rsc_len, in wpa_supplicant_install_gtk() 909 gd->alg, gd->gtk_len, gd->keyidx); in wpa_supplicant_install_gtk() 999 gd.keyidx = gtk[0] & 0x3; in wpa_supplicant_pairwise_gtk() 1034 u16 keyidx = WPA_GET_LE16(igtk->keyid); in wpa_supplicant_install_igtk() local 1044 keyidx); in wpa_supplicant_install_igtk() 1050 keyidx, MAC2STR(igtk->pn)); in wpa_supplicant_install_igtk() [all …]
|
/external/perfetto/src/traced/probes/ftrace/test/data/android_flounder_lte_LRX16F_3.10.40/events/mac80211/drv_set_key/ |
D | format | 18 field:s8 keyidx; offset:78; size:1; signed:1;
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | todo.txt | 11 - Cisco AP and non-zero keyidx for unicast -> map to broadcast 13 driver_*.c to do the mapping for drivers that cannot handle non-zero keyidx
|
D | wpas_glue.c | 231 static int wpa_eapol_set_wep_key(void *ctx, int unicast, int keyidx, in wpa_eapol_set_wep_key() argument 245 keyidx, unicast, NULL, 0, key, keylen); in wpa_eapol_set_wep_key()
|
/external/wpa_supplicant_8/hostapd/ |
D | config_file.c | 875 static int hostapd_config_read_wep(struct hostapd_wep_keys *wep, int keyidx, in hostapd_config_read_wep() argument 880 if (keyidx < 0 || keyidx > 3) in hostapd_config_read_wep() 886 bin_clear_free(wep->key[keyidx], wep->len[keyidx]); in hostapd_config_read_wep() 887 wep->key[keyidx] = NULL; in hostapd_config_read_wep() 888 wep->len[keyidx] = 0; in hostapd_config_read_wep() 898 if (wep->key[keyidx] != NULL) in hostapd_config_read_wep() 905 wep->key[keyidx] = os_memdup(val + 1, len); in hostapd_config_read_wep() 906 if (wep->key[keyidx] == NULL) in hostapd_config_read_wep() 908 wep->len[keyidx] = len; in hostapd_config_read_wep() 913 wep->key[keyidx] = os_malloc(len); in hostapd_config_read_wep() [all …]
|
/external/wpa_supplicant_8/src/ap/ |
D | wpa_auth.c | 1417 int keyidx, int encr, int force_version) in __wpa_send_eapol() argument 1455 pairwise, (unsigned long) kde_len, keyidx, encr); in __wpa_send_eapol() 1488 key_info |= keyidx << WPA_KEY_INFO_KEY_INDEX_SHIFT; in __wpa_send_eapol() 1633 int keyidx, int encr) in wpa_send_eapol() argument 1643 keyidx, encr, 0); in wpa_send_eapol() 3087 int wpa_ie_len, secure, keyidx, encr = 0; in SM_STATE() local 3138 keyidx = gsm->GN; in SM_STATE() 3146 keyidx = 0; in SM_STATE() 3203 hdr[0] = keyidx & 0x03; in SM_STATE() 3275 _rsc, sm->ANonce, kde, pos - kde, keyidx, encr); in SM_STATE() [all …]
|
D | wpa_auth_i.h | 278 int keyidx, int encr, int force_version);
|
/external/wpa_supplicant_8/src/eapol_supp/ |
D | eapol_supp_sm.h | 161 int (*set_wep_key)(void *ctx, int unicast, int keyidx,
|