/external/wpa_supplicant_8/src/rsn_supp/ |
D | wpa_ft.c | 111 if (ft.ftie) { in wpa_sm_set_ft_params() 112 os_memcpy(pos, ft.ftie - 2, ft.ftie_len + 2); in wpa_sm_set_ft_params() 151 struct rsn_ftie *ftie; in wpa_ft_gen_req_ies() local 258 ftie = (struct rsn_ftie *) pos; in wpa_ft_gen_req_ies() 259 pos += sizeof(*ftie); in wpa_ft_gen_req_ies() 260 os_memcpy(ftie->snonce, sm->snonce, WPA_NONCE_LEN); in wpa_ft_gen_req_ies() 262 os_memcpy(ftie->anonce, anonce, WPA_NONCE_LEN); in wpa_ft_gen_req_ies() 296 ftie->mic_control[1] = 3 + ieee802_11_ie_count(ric_ies, in wpa_ft_gen_req_ies() 302 ric_ies_len, ftie->mic) < 0) { in wpa_ft_gen_req_ies() 379 struct rsn_ftie *ftie; in wpa_ft_process_response() local [all …]
|
D | tdls.c | 456 const u8 *ftie, u8 *mic) in wpa_tdls_ftie_mic() argument 463 2 + timeoutie[1] + 2 + ftie[1]; in wpa_tdls_ftie_mic() 490 os_memcpy(pos, ftie, 2 + ftie[1]); in wpa_tdls_ftie_mic() 493 pos += 2 + ftie[1]; in wpa_tdls_ftie_mic() 518 const u8 *ftie, u8 *mic) in wpa_tdls_key_mic_teardown() argument 529 sizeof(trans_seq) + 2 + ftie[1]; in wpa_tdls_key_mic_teardown() 549 os_memcpy(pos, ftie, 2 + ftie[1]); in wpa_tdls_key_mic_teardown() 552 pos += 2 + ftie[1]; in wpa_tdls_key_mic_teardown() 566 const struct wpa_tdls_ftie *ftie) in wpa_supplicant_verify_tdls_mic() argument 572 peer->rsnie_p, timeoutie, (u8 *) ftie, in wpa_supplicant_verify_tdls_mic() [all …]
|
D | wpa_ie.h | 40 const u8 *ftie; member
|
D | wpa.c | 913 if (ie->ftie == NULL) { in ft_validate_ftie() 922 if (assoc_resp_ftie[1] != ie->ftie[1] || in ft_validate_ftie() 923 os_memcmp(assoc_resp_ftie, ie->ftie, 2 + ie->ftie[1]) != 0) { in ft_validate_ftie() 926 ie->ftie, 2 + ie->ftie[1]); in ft_validate_ftie() 976 const u8 *pos, *end, *mdie = NULL, *ftie = NULL; in wpa_supplicant_validate_ie_ft() local 989 ftie = pos; in wpa_supplicant_validate_ie_ft() 997 ft_validate_ftie(sm, src_addr, ie, ftie) < 0 || in wpa_supplicant_validate_ie_ft()
|
D | wpa_ie.c | 522 ie->ftie = pos; in wpa_supplicant_parse_ies() 525 ie->ftie, ie->ftie_len); in wpa_supplicant_parse_ies()
|
/external/wpa_supplicant_8/src/ap/ |
D | wpa_auth_ft.c | 639 u8 *end, *mdie, *ftie, *rsnie = NULL, *r0kh_id, *subelem = NULL; in wpa_sm_write_assoc_resp_ies() local 719 ftie = pos; in wpa_sm_write_assoc_resp_ies() 726 os_memcpy(sm->assoc_resp_ftie, ftie, ftie_len); in wpa_sm_write_assoc_resp_ies() 728 _ftie = (struct rsn_ftie *) (ftie + 2); in wpa_sm_write_assoc_resp_ies() 747 mdie, mdie_len, ftie, ftie_len, in wpa_sm_write_assoc_resp_ies() 803 struct rsn_ftie *ftie; in wpa_ft_process_auth_req() local 836 ftie = (struct rsn_ftie *) parse.ftie; in wpa_ft_process_auth_req() 837 if (ftie == NULL || parse.ftie_len < sizeof(*ftie)) { in wpa_ft_process_auth_req() 842 os_memcpy(sm->SNonce, ftie->snonce, WPA_NONCE_LEN); in wpa_ft_process_auth_req() 991 struct rsn_ftie *ftie; in wpa_ft_validate_reassoc() local [all …]
|
D | wpa_auth_ie.h | 39 const u8 *ftie; member
|
D | wpa_auth.c | 760 if (!kde->mdie || !kde->ftie) { in ft_check_msg_2_of_4() 775 (kde->ftie[1] != sm->assoc_resp_ftie[1] || in ft_check_msg_2_of_4() 776 os_memcmp(kde->ftie, sm->assoc_resp_ftie, in ft_check_msg_2_of_4() 780 kde->ftie, kde->ftie_len); in ft_check_msg_2_of_4()
|
D | wpa_auth_ie.c | 895 ie->ftie = pos; in wpa_parse_kde_ies()
|
/external/wpa_supplicant_8/src/common/ |
D | wpa_common.c | 206 const u8 *ftie, size_t ftie_len, in wpa_ft_mic() argument 243 if (ftie) { in wpa_ft_mic() 248 addr[num_elem] = ftie; in wpa_ft_mic() 259 addr[num_elem] = ftie + 2 + 2 + 16; in wpa_ft_mic() 283 parse->ftie = ie; in wpa_ft_parse_ftie() 333 const struct rsn_ftie *ftie; in wpa_ft_parse_ies() local 365 if (pos[1] < sizeof(*ftie)) in wpa_ft_parse_ies() 367 ftie = (const struct rsn_ftie *) (pos + 2); in wpa_ft_parse_ies() 368 prot_ie_count = ftie->mic_control[1]; in wpa_ft_parse_ies() 398 if (parse->ftie) in wpa_ft_parse_ies()
|
D | ieee802_11_common.h | 27 const u8 *ftie; member
|
D | wpa_common.h | 346 const u8 *ftie, size_t ftie_len, 415 const u8 *ftie; member
|
D | ieee802_11_common.c | 259 elems->ftie = pos; in ieee802_11_parse_elems()
|