Searched refs:key_data_len (Results 1 – 6 of 6) sorted by relevance
/external/wpa_supplicant_8/src/rsn_supp/ |
D | wpa.c | 427 size_t key_data_len) in wpa_supplicant_process_1_of_4() argument 450 key_data, key_data_len); in wpa_supplicant_process_1_of_4() 451 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0) in wpa_supplicant_process_1_of_4() 1128 size_t key_data_len) in wpa_supplicant_process_3_of_4() argument 1139 wpa_hexdump(MSG_DEBUG, "WPA: IE KeyData", key_data, key_data_len); in wpa_supplicant_process_3_of_4() 1140 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0) in wpa_supplicant_process_3_of_4() 1308 size_t key_data_len, u16 key_info, in wpa_supplicant_process_1_of_2_wpa() argument 1315 maxkeylen = key_data_len; in wpa_supplicant_process_1_of_2_wpa() 1337 if (key_data_len > sizeof(gd->gtk)) { in wpa_supplicant_process_1_of_2_wpa() 1340 (unsigned long) key_data_len); in wpa_supplicant_process_1_of_2_wpa() [all …]
|
D | peerkey.c | 658 size_t key_data_len) in wpa_supplicant_process_stk_1_of_4() argument 672 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data", key_data, key_data_len); in wpa_supplicant_process_stk_1_of_4() 673 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0 || in wpa_supplicant_process_stk_1_of_4() 763 size_t key_data_len) in wpa_supplicant_process_stk_2_of_4() argument 774 wpa_hexdump(MSG_DEBUG, "RSN: msg 2/4 key data", key_data, key_data_len); in wpa_supplicant_process_stk_2_of_4() 775 if (wpa_supplicant_parse_ies(key_data, key_data_len, &kde) < 0 || in wpa_supplicant_process_stk_2_of_4() 809 size_t key_data_len) in wpa_supplicant_process_stk_3_of_4() argument 823 wpa_hexdump(MSG_DEBUG, "RSN: msg 3/4 key data", key_data, key_data_len); in wpa_supplicant_process_stk_3_of_4() 824 if (wpa_supplicant_parse_ies(key_data, key_data_len, &kde) < 0) { in wpa_supplicant_process_stk_3_of_4() 1115 const u8 *key_data, size_t key_data_len) in peerkey_rx_eapol_4way() argument [all …]
|
D | peerkey.h | 45 const u8 *key_data, size_t key_data_len); 65 const u8 *key_data, size_t key_data_len) in peerkey_rx_eapol_4way() argument
|
/external/wpa_supplicant_8/src/ap/ |
D | peerkey_auth.c | 83 const u8 *key_data, size_t key_data_len) in wpa_smk_m1() argument 90 if (wpa_parse_kde_ies(key_data, key_data_len, &kde) < 0) { in wpa_smk_m1() 257 const u8 *key_data, size_t key_data_len) in wpa_smk_m3() argument 263 if (wpa_parse_kde_ies(key_data, key_data_len, &kde) < 0) { in wpa_smk_m3() 328 const u8 *key_data, size_t key_data_len) in wpa_smk_error() argument 335 if (wpa_parse_kde_ies(key_data, key_data_len, &kde) < 0) { in wpa_smk_error()
|
D | wpa_auth_i.h | 236 const u8 *key_data, size_t key_data_len); 239 const u8 *key_data, size_t key_data_len); 242 const u8 *key_data, size_t key_data_len);
|
D | wpa_auth.c | 1413 int key_data_len, pad_len = 0; in __wpa_send_eapol() local 1448 key_data_len = kde_len; in __wpa_send_eapol() 1454 pad_len = key_data_len % 8; in __wpa_send_eapol() 1457 key_data_len += pad_len + 8; in __wpa_send_eapol() 1460 len += key_data_len; in __wpa_send_eapol() 1513 buf = os_zalloc(key_data_len); in __wpa_send_eapol() 1526 buf, key_data_len); in __wpa_send_eapol() 1532 (key_data_len - 8) / 8, buf, key_data)) { in __wpa_send_eapol() 1539 key_data_len); in __wpa_send_eapol() 1542 key_data_len); in __wpa_send_eapol() [all …]
|