/external/wpa_supplicant_8/src/ap/ |
D | wpa_auth_ie.c | 601 const u8 *rsnxe, size_t rsnxe_len, in wpa_validate_wpa_ie() argument 1043 if (rsnxe && rsnxe_len) { in wpa_validate_wpa_ie() 1044 if (!sm->rsnxe || sm->rsnxe_len < rsnxe_len) { in wpa_validate_wpa_ie() 1046 sm->rsnxe = os_malloc(rsnxe_len); in wpa_validate_wpa_ie() 1050 os_memcpy(sm->rsnxe, rsnxe, rsnxe_len); in wpa_validate_wpa_ie() 1051 sm->rsnxe_len = rsnxe_len; in wpa_validate_wpa_ie() 1055 sm->rsnxe_len = 0; in wpa_validate_wpa_ie()
|
D | wpa_auth_i.h | 113 size_t rsnxe_len; member
|
D | wpa_auth_ft.c | 2566 size_t rsnxe_len; in wpa_sm_write_assoc_resp_ies() local 2820 rsnxe_len = 0; in wpa_sm_write_assoc_resp_ies() 2826 rsnxe_len = res; in wpa_sm_write_assoc_resp_ies() 2834 rsnxe_len = sm->wpa_auth->conf.rsnxe_override_ft_len; in wpa_sm_write_assoc_resp_ies() 2837 if (auth_alg == WLAN_AUTH_FT && rsnxe_len) in wpa_sm_write_assoc_resp_ies() 2853 rsnxe_len ? rsnxe : NULL, rsnxe_len, in wpa_sm_write_assoc_resp_ies() 3617 parse.rsnxe ? parse.rsnxe_len + 2 : 0, in wpa_ft_validate_reassoc() 3638 parse.rsnxe ? parse.rsnxe_len + 2 : 0); in wpa_ft_validate_reassoc()
|
D | wpa_auth.h | 383 const u8 *rsnxe, size_t rsnxe_len,
|
D | wpa_auth.c | 3284 (sm->rsnxe_len != kde.rsnxe_len || in SM_STATE() 3285 os_memcmp(sm->rsnxe, kde.rsnxe, sm->rsnxe_len) != 0))) { in SM_STATE() 3289 sm->rsnxe, sm->rsnxe_len); in SM_STATE() 3291 kde.rsnxe, kde.rsnxe_len); in SM_STATE()
|
D | drv_callbacks.c | 366 elems.rsnxe ? elems.rsnxe_len + 2 : 0, in hostapd_notif_assoc() 457 ieee802_11_rsnx_capab_len(elems.rsnxe, elems.rsnxe_len, in hostapd_notif_assoc()
|
D | ieee802_11.c | 1829 elems.rsnxe ? elems.rsnxe_len + 2 : 0, in handle_auth_fils() 3846 elems->rsnxe ? elems->rsnxe_len + 2 : in __check_assoc_ies() 3906 ieee802_11_rsnx_capab_len(elems->rsnxe, elems->rsnxe_len, in __check_assoc_ies()
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | wpa_ft.c | 216 size_t rsnxe_len; in wpa_ft_gen_req_ies() local 442 rsnxe_len = 0; in wpa_ft_gen_req_ies() 449 rsnxe_len = res; in wpa_ft_gen_req_ies() 467 if (rsnxe_len) in wpa_ft_gen_req_ies() 474 ric_ies_len, rsnxe_len ? rsnxe : NULL, rsnxe_len, in wpa_ft_gen_req_ies() 1165 parse.rsnxe ? parse.rsnxe_len + 2 : 0, in wpa_ft_validate_reassoc_resp() 1218 (sm->ap_rsnxe_len != 2 + parse.rsnxe_len || in wpa_ft_validate_reassoc_resp() 1228 parse.rsnxe ? parse.rsnxe_len + 2 : 0); in wpa_ft_validate_reassoc_resp()
|
D | wpa_ie.h | 15 int wpa_gen_rsnxe(struct wpa_sm *sm, u8 *rsnxe, size_t rsnxe_len);
|
D | wpa_ie.c | 362 int wpa_gen_rsnxe(struct wpa_sm *sm, u8 *rsnxe, size_t rsnxe_len) in wpa_gen_rsnxe() argument 388 if (rsnxe_len < 2 + flen) in wpa_gen_rsnxe()
|
D | wpa.c | 2123 (sm->ap_rsnxe_len != ie->rsnxe_len || in wpa_supplicant_validate_ie() 2130 ie->rsnxe, ie->rsnxe_len); in wpa_supplicant_validate_ie() 2224 size_t rsne_len = 0, rsnxe_len = 0; in wpa_supplicant_validate_link_kde() local 2279 rsnxe_len = rsnxe[1] + 2; in wpa_supplicant_validate_link_kde() 2300 (sm->mlo.links[link_id].ap_rsnxe_len != rsnxe_len || in wpa_supplicant_validate_link_kde() 2310 rsnxe, rsnxe_len); in wpa_supplicant_validate_link_kde() 4773 size_t *rsnxe_len) in wpa_sm_set_assoc_rsnxe_default() argument 4780 res = wpa_gen_rsnxe(sm, rsnxe, *rsnxe_len); in wpa_sm_set_assoc_rsnxe_default() 4783 *rsnxe_len = res; in wpa_sm_set_assoc_rsnxe_default() 4785 wpa_hexdump(MSG_DEBUG, "RSN: Set own RSNXE default", rsnxe, *rsnxe_len); in wpa_sm_set_assoc_rsnxe_default() [all …]
|
D | wpa.h | 193 size_t *rsnxe_len);
|
/external/wpa_supplicant_8/src/common/ |
D | ieee802_11_common.h | 119 u8 rsnxe_len; member 288 bool ieee802_11_rsnx_capab_len(const u8 *rsnxe, size_t rsnxe_len,
|
D | wpa_common.h | 484 const u8 *rsnxe, size_t rsnxe_len, 591 size_t rsnxe_len; member 658 size_t rsnxe_len; member
|
D | ieee802_11_common.c | 492 elems->rsnxe_len = elen; in __ieee802_11_parse_elems() 735 elems->rsnxe_len = 0; in ieee802_11_elems_clear_ids() 2949 bool ieee802_11_rsnx_capab_len(const u8 *rsnxe, size_t rsnxe_len, in ieee802_11_rsnx_capab_len() argument 2956 if (!rsnxe || rsnxe_len == 0) in ieee802_11_rsnx_capab_len() 2958 end = rsnxe + rsnxe_len; in ieee802_11_rsnx_capab_len()
|
D | wpa_common.c | 891 const u8 *rsnxe, size_t rsnxe_len, in wpa_ft_mic() argument 969 len[num_elem] = rsnxe_len; in wpa_ft_mic() 1201 parse->rsnxe_len = len; in wpa_ft_parse_ies() 3524 ie->rsnxe_len = dlen; in wpa_parse_kde_ies() 3526 ie->rsnxe, ie->rsnxe_len); in wpa_parse_kde_ies()
|
/external/wpa_supplicant_8/src/pasn/ |
D | pasn_initiator.c | 1274 if (elems.rsnxe && elems.rsnxe_len) in wpa_pasn_auth_rx() 1275 rsne_rsnxe_len += elems.rsnxe_len + 2; in wpa_pasn_auth_rx() 1284 if (elems.rsnxe && elems.rsnxe_len) in wpa_pasn_auth_rx() 1286 elems.rsnxe - 2, elems.rsnxe_len + 2); in wpa_pasn_auth_rx()
|
D | pasn_responder.c | 650 ieee802_11_rsnx_capab_len(elems.rsnxe, elems.rsnxe_len, in handle_auth_pasn_1()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | sme.c | 947 if (wpa_s->rsnxe_len > 0 && in sme_send_authentication() 948 wpa_s->rsnxe_len <= in sme_send_authentication() 952 wpa_s->rsnxe, wpa_s->rsnxe_len); in sme_send_authentication() 953 wpa_s->sme.assoc_req_ie_len += wpa_s->rsnxe_len; in sme_send_authentication() 1274 wpa_s->rsnxe_len = 0; in sme_auth_start_cb() 2595 elems.rsnxe_len + 2); in sme_associate()
|
D | wpa_supplicant.c | 421 wpa_s->rsnxe_len = 0; in wpa_supplicant_set_non_wpa_policy() 1555 if (!wpa_s->rsnxe_len) { in wpas_update_allowed_key_mgmt() 1556 wpa_s->rsnxe_len = 3; in wpas_update_allowed_key_mgmt() 2011 wpa_s->rsnxe_len = sizeof(wpa_s->rsnxe); in wpa_supplicant_set_suites() 2013 &wpa_s->rsnxe_len)) { in wpa_supplicant_set_suites() 3690 if (wpa_s->rsnxe_len > 0 && in wpas_populate_assoc_ies() 3691 wpa_s->rsnxe_len <= max_wpa_ie_len - wpa_ie_len) { in wpas_populate_assoc_ies() 3692 os_memcpy(wpa_ie + wpa_ie_len, wpa_s->rsnxe, wpa_s->rsnxe_len); in wpas_populate_assoc_ies() 3693 wpa_ie_len += wpa_s->rsnxe_len; in wpas_populate_assoc_ies() 4013 wpa_s->rsnxe_len = 0;
|
D | wpa_supplicant_i.h | 803 size_t rsnxe_len; member
|