/external/wpa_supplicant_8/src/rsn_supp/ |
D | wpa.c | 448 size_t key_data_len) in wpa_supplicant_process_1_of_4() argument 471 key_data, key_data_len); in wpa_supplicant_process_1_of_4() 472 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0) in wpa_supplicant_process_1_of_4() 1189 size_t key_data_len) in wpa_supplicant_process_3_of_4() argument 1200 wpa_hexdump(MSG_DEBUG, "WPA: IE KeyData", key_data, key_data_len); in wpa_supplicant_process_3_of_4() 1201 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0) in wpa_supplicant_process_3_of_4() 1369 size_t key_data_len, u16 key_info, in wpa_supplicant_process_1_of_2_wpa() argument 1376 maxkeylen = key_data_len; in wpa_supplicant_process_1_of_2_wpa() 1403 if (key_data_len > sizeof(gd->gtk)) { in wpa_supplicant_process_1_of_2_wpa() 1406 (unsigned long) key_data_len); in wpa_supplicant_process_1_of_2_wpa() [all …]
|
D | peerkey.c | 658 size_t key_data_len) in wpa_supplicant_process_stk_1_of_4() argument 672 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data", key_data, key_data_len); in wpa_supplicant_process_stk_1_of_4() 673 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0 || in wpa_supplicant_process_stk_1_of_4() 763 size_t key_data_len) in wpa_supplicant_process_stk_2_of_4() argument 774 wpa_hexdump(MSG_DEBUG, "RSN: msg 2/4 key data", key_data, key_data_len); in wpa_supplicant_process_stk_2_of_4() 775 if (wpa_supplicant_parse_ies(key_data, key_data_len, &kde) < 0 || in wpa_supplicant_process_stk_2_of_4() 809 size_t key_data_len) in wpa_supplicant_process_stk_3_of_4() argument 823 wpa_hexdump(MSG_DEBUG, "RSN: msg 3/4 key data", key_data, key_data_len); in wpa_supplicant_process_stk_3_of_4() 824 if (wpa_supplicant_parse_ies(key_data, key_data_len, &kde) < 0) { in wpa_supplicant_process_stk_3_of_4() 1115 const u8 *key_data, size_t key_data_len) in peerkey_rx_eapol_4way() argument [all …]
|
D | peerkey.h | 45 const u8 *key_data, size_t key_data_len); 65 const u8 *key_data, size_t key_data_len) in peerkey_rx_eapol_4way() argument
|
/external/wpa_supplicant_8/src/ap/ |
D | peerkey_auth.c | 83 const u8 *key_data, size_t key_data_len) in wpa_smk_m1() argument 90 if (wpa_parse_kde_ies(key_data, key_data_len, &kde) < 0) { in wpa_smk_m1() 257 const u8 *key_data, size_t key_data_len) in wpa_smk_m3() argument 263 if (wpa_parse_kde_ies(key_data, key_data_len, &kde) < 0) { in wpa_smk_m3() 328 const u8 *key_data, size_t key_data_len) in wpa_smk_error() argument 335 if (wpa_parse_kde_ies(key_data, key_data_len, &kde) < 0) { in wpa_smk_error()
|
D | wpa_auth_i.h | 238 const u8 *key_data, size_t key_data_len); 241 const u8 *key_data, size_t key_data_len); 244 const u8 *key_data, size_t key_data_len);
|
D | wpa_auth.c | 1418 int key_data_len, pad_len = 0; in __wpa_send_eapol() local 1453 key_data_len = kde_len; in __wpa_send_eapol() 1459 pad_len = key_data_len % 8; in __wpa_send_eapol() 1462 key_data_len += pad_len + 8; in __wpa_send_eapol() 1465 len += key_data_len; in __wpa_send_eapol() 1518 buf = os_zalloc(key_data_len); in __wpa_send_eapol() 1531 buf, key_data_len); in __wpa_send_eapol() 1537 (key_data_len - 8) / 8, buf, key_data)) { in __wpa_send_eapol() 1544 key_data_len); in __wpa_send_eapol() 1547 key_data_len); in __wpa_send_eapol() [all …]
|
/external/c-ares/ |
D | ares_init.c | 92 static int init_id_key(rc4_key* key,int key_data_len); 1687 static void randomize_key(unsigned char* key,int key_data_len) in randomize_key() argument 1695 res = (*ares_fpSystemFunction036) (key, key_data_len); in randomize_key() 1703 counter = aresx_uztosi(fread(key, 1, key_data_len, f)); in randomize_key() 1710 for (;counter<key_data_len;counter++) in randomize_key() 1715 static int init_id_key(rc4_key* key,int key_data_len) in init_id_key() argument 1723 key_data_ptr = calloc(1,key_data_len); in init_id_key() 1731 randomize_key(key->state,key_data_len); in init_id_key() 1742 index1 = (unsigned char)((index1 + 1) % key_data_len); in init_id_key()
|