• Home
  • Raw
  • Download

Lines Matching refs:ver

64 					 u16 mui, u16 error_type, int ver)  in wpa_supplicant_send_smk_error()  argument
84 key_info = ver | WPA_KEY_INFO_SMK_MESSAGE | WPA_KEY_INFO_MIC | in wpa_supplicant_send_smk_error()
115 wpa_eapol_key_send(sm, sm->ptk.kck, ver, dst, ETH_P_EAPOL, in wpa_supplicant_send_smk_error()
125 int ver, struct wpa_peerkey *peerkey) in wpa_supplicant_send_smk_m3() argument
145 key_info = ver | WPA_KEY_INFO_SMK_MESSAGE | WPA_KEY_INFO_MIC | in wpa_supplicant_send_smk_m3()
167 wpa_eapol_key_send(sm, sm->ptk.kck, ver, src_addr, ETH_P_EAPOL, in wpa_supplicant_send_smk_m3()
176 const struct wpa_eapol_key *key, size_t extra_len, int ver) in wpa_supplicant_process_smk_m2() argument
234 ver); in wpa_supplicant_process_smk_m2()
281 wpa_supplicant_send_smk_m3(sm, src_addr, key, ver, peerkey); in wpa_supplicant_process_smk_m2()
335 u16 key_info, ver; in wpa_supplicant_send_stk_1_of_4() local
348 ver = WPA_KEY_INFO_TYPE_HMAC_SHA1_AES; in wpa_supplicant_send_stk_1_of_4()
350 ver = WPA_KEY_INFO_TYPE_HMAC_MD5_RC4; in wpa_supplicant_send_stk_1_of_4()
352 key_info = ver | WPA_KEY_INFO_KEY_TYPE | WPA_KEY_INFO_ACK; in wpa_supplicant_send_stk_1_of_4()
380 wpa_eapol_key_send(sm, NULL, ver, peerkey->addr, ETH_P_EAPOL, in wpa_supplicant_send_stk_1_of_4()
392 u16 key_info, ver; in wpa_supplicant_send_stk_3_of_4() local
407 ver = WPA_KEY_INFO_TYPE_HMAC_SHA1_AES; in wpa_supplicant_send_stk_3_of_4()
409 ver = WPA_KEY_INFO_TYPE_HMAC_MD5_RC4; in wpa_supplicant_send_stk_3_of_4()
411 key_info = ver | WPA_KEY_INFO_KEY_TYPE | WPA_KEY_INFO_ACK | in wpa_supplicant_send_stk_3_of_4()
435 wpa_eapol_key_send(sm, peerkey->stk.kck, ver, peerkey->addr, in wpa_supplicant_send_stk_3_of_4()
466 int ver, in wpa_supplicant_process_smk_m5() argument
514 ver); in wpa_supplicant_process_smk_m5()
525 const struct wpa_eapol_key *key, size_t extra_len, int ver) in wpa_supplicant_process_smk_m45() argument
568 if (wpa_supplicant_process_smk_m5(sm, src_addr, key, ver, in wpa_supplicant_process_smk_m45()
670 u16 ver) in wpa_supplicant_process_stk_1_of_4() argument
680 MACSTR " (ver=%d)", MAC2STR(peerkey->addr), ver); in wpa_supplicant_process_stk_1_of_4()
733 if (wpa_supplicant_send_2_of_4(sm, peerkey->addr, key, ver, in wpa_supplicant_process_stk_1_of_4()
780 u16 ver) in wpa_supplicant_process_stk_2_of_4() argument
787 MACSTR " (ver=%d)", MAC2STR(peerkey->addr), ver); in wpa_supplicant_process_stk_2_of_4()
829 u16 ver) in wpa_supplicant_process_stk_3_of_4() argument
838 MACSTR " (ver=%d)", MAC2STR(peerkey->addr), ver); in wpa_supplicant_process_stk_3_of_4()
876 if (wpa_supplicant_send_4_of_4(sm, peerkey->addr, key, ver, in wpa_supplicant_process_stk_3_of_4()
905 u16 ver) in wpa_supplicant_process_stk_4_of_4() argument
910 MACSTR " (ver=%d)", MAC2STR(peerkey->addr), ver); in wpa_supplicant_process_stk_4_of_4()
935 struct wpa_eapol_key *key, u16 ver, in peerkey_verify_eapol_key_mic() argument
953 wpa_eapol_key_mic(peerkey->tstk.kck, ver, buf, len, in peerkey_verify_eapol_key_mic()
969 wpa_eapol_key_mic(peerkey->stk.kck, ver, buf, len, in peerkey_verify_eapol_key_mic()
1005 int key_info, ver; in wpa_sm_stkstart() local
1023 ver = WPA_KEY_INFO_TYPE_HMAC_SHA1_AES; in wpa_sm_stkstart()
1025 ver = WPA_KEY_INFO_TYPE_HMAC_MD5_RC4; in wpa_sm_stkstart()
1082 WPA_KEY_INFO_SECURE | WPA_KEY_INFO_REQUEST | ver; in wpa_sm_stkstart()
1110 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL, in wpa_sm_stkstart()
1137 struct wpa_eapol_key *key, u16 key_info, u16 ver) in peerkey_rx_eapol_4way() argument
1142 wpa_supplicant_process_stk_3_of_4(sm, peerkey, key, ver); in peerkey_rx_eapol_4way()
1145 wpa_supplicant_process_stk_1_of_4(sm, peerkey, key, ver); in peerkey_rx_eapol_4way()
1148 wpa_supplicant_process_stk_4_of_4(sm, peerkey, key, ver); in peerkey_rx_eapol_4way()
1151 wpa_supplicant_process_stk_2_of_4(sm, peerkey, key, ver); in peerkey_rx_eapol_4way()
1158 u16 key_info, u16 ver) in peerkey_rx_eapol_smk() argument
1166 ver); in peerkey_rx_eapol_smk()
1170 ver); in peerkey_rx_eapol_smk()