/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
D | peerkey.c | 75 size_t kde_len; in wpa_supplicant_send_smk_error() local 78 kde_len = 2 + RSN_SELECTOR_LEN + sizeof(error); in wpa_supplicant_send_smk_error() 80 kde_len += 2 + RSN_SELECTOR_LEN + ETH_ALEN; in wpa_supplicant_send_smk_error() 83 NULL, sizeof(*err) + kde_len, &rlen, in wpa_supplicant_send_smk_error() 98 WPA_PUT_BE16(err->key_data_length, (u16) kde_len); in wpa_supplicant_send_smk_error() 135 size_t kde_len; in wpa_supplicant_send_smk_m3() local 139 kde_len = peerkey->rsnie_p_len + in wpa_supplicant_send_smk_m3() 144 NULL, sizeof(*reply) + kde_len, &rlen, in wpa_supplicant_send_smk_m3() 159 WPA_PUT_BE16(reply->key_data_length, (u16) kde_len); in wpa_supplicant_send_smk_m3() 339 size_t kde_len; in wpa_supplicant_send_stk_1_of_4() local [all …]
|
D | wpa_i.h | 238 const u8 *kde, size_t kde_len,
|
D | wpa.c | 902 const u8 *kde, size_t kde_len, in wpa_supplicant_send_4_of_4() argument 910 wpa_hexdump(MSG_DEBUG, "WPA: KDE for msg 4/4", kde, kde_len); in wpa_supplicant_send_4_of_4() 913 sizeof(*reply) + kde_len, in wpa_supplicant_send_4_of_4() 930 WPA_PUT_BE16(reply->key_data_length, kde_len); in wpa_supplicant_send_4_of_4() 932 os_memcpy(reply + 1, kde, kde_len); in wpa_supplicant_send_4_of_4()
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | peerkey.c | 70 size_t kde_len; in wpa_supplicant_send_smk_error() local 73 kde_len = 2 + RSN_SELECTOR_LEN + sizeof(error); in wpa_supplicant_send_smk_error() 75 kde_len += 2 + RSN_SELECTOR_LEN + ETH_ALEN; in wpa_supplicant_send_smk_error() 78 NULL, sizeof(*err) + kde_len, &rlen, in wpa_supplicant_send_smk_error() 93 WPA_PUT_BE16(err->key_data_length, (u16) kde_len); in wpa_supplicant_send_smk_error() 130 size_t kde_len; in wpa_supplicant_send_smk_m3() local 134 kde_len = peerkey->rsnie_p_len + in wpa_supplicant_send_smk_m3() 139 NULL, sizeof(*reply) + kde_len, &rlen, in wpa_supplicant_send_smk_m3() 154 WPA_PUT_BE16(reply->key_data_length, (u16) kde_len); in wpa_supplicant_send_smk_m3() 334 size_t kde_len; in wpa_supplicant_send_stk_1_of_4() local [all …]
|
D | wpa_i.h | 313 const u8 *kde, size_t kde_len,
|
D | wpa.c | 999 const u8 *kde, size_t kde_len, in wpa_supplicant_send_4_of_4() argument 1007 wpa_hexdump(MSG_DEBUG, "WPA: KDE for msg 4/4", kde, kde_len); in wpa_supplicant_send_4_of_4() 1010 sizeof(*reply) + kde_len, in wpa_supplicant_send_4_of_4() 1027 WPA_PUT_BE16(reply->key_data_length, kde_len); in wpa_supplicant_send_4_of_4() 1029 os_memcpy(reply + 1, kde, kde_len); in wpa_supplicant_send_4_of_4()
|
/external/wpa_supplicant_8/src/ap/ |
D | wpa_auth.c | 1206 const u8 *kde, size_t kde_len, in __wpa_send_eapol() argument 1239 pairwise, (unsigned long) kde_len, keyidx, encr); in __wpa_send_eapol() 1241 key_data_len = kde_len; in __wpa_send_eapol() 1294 os_memcpy(key + 1, kde, kde_len); in __wpa_send_eapol() 1295 WPA_PUT_BE16(key->key_data_length, kde_len); in __wpa_send_eapol() 1303 os_memcpy(pos, kde, kde_len); in __wpa_send_eapol() 1304 pos += kde_len; in __wpa_send_eapol() 1357 const u8 *kde, size_t kde_len, in wpa_send_eapol() argument 1367 __wpa_send_eapol(wpa_auth, sm, key_info, key_rsc, nonce, kde, kde_len, in wpa_send_eapol() 1886 size_t gtk_len, kde_len; in SM_STATE() local [all …]
|
D | wpa_auth_i.h | 200 const u8 *kde, size_t kde_len,
|