Lines Matching refs:ver
38 int ver, const u8 *dest, u16 proto, in wpa_eapol_key_send() argument
59 wpa_eapol_key_mic(kck, ver, msg, msg_len, key_mic)) { in wpa_eapol_key_send()
62 "version %d MIC", ver); in wpa_eapol_key_send()
89 int key_info, ver; in wpa_sm_key_request() local
93 ver = WPA_KEY_INFO_TYPE_AES_128_CMAC; in wpa_sm_key_request()
95 ver = WPA_KEY_INFO_TYPE_HMAC_SHA1_AES; in wpa_sm_key_request()
97 ver = WPA_KEY_INFO_TYPE_HMAC_MD5_RC4; in wpa_sm_key_request()
112 key_info = WPA_KEY_INFO_REQUEST | ver; in wpa_sm_key_request()
131 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL, in wpa_sm_key_request()
272 int ver, const u8 *nonce, in wpa_supplicant_send_2_of_4() argument
331 ver | WPA_KEY_INFO_KEY_TYPE | WPA_KEY_INFO_MIC); in wpa_supplicant_send_2_of_4()
348 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL, in wpa_supplicant_send_2_of_4()
376 u16 ver) in wpa_supplicant_process_1_of_4() argument
391 "Handshake from " MACSTR " (ver=%d)", MAC2STR(src_addr), ver); in wpa_supplicant_process_1_of_4()
440 if (wpa_supplicant_send_2_of_4(sm, sm->bssid, key, ver, sm->snonce, in wpa_supplicant_process_1_of_4()
998 u16 ver, u16 key_info, in wpa_supplicant_send_4_of_4() argument
1018 key_info |= ver | WPA_KEY_INFO_KEY_TYPE | WPA_KEY_INFO_MIC; in wpa_supplicant_send_4_of_4()
1032 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL, in wpa_supplicant_send_4_of_4()
1041 u16 ver) in wpa_supplicant_process_3_of_4() argument
1049 "Handshake from " MACSTR " (ver=%d)", MAC2STR(sm->bssid), ver); in wpa_supplicant_process_3_of_4()
1098 if (wpa_supplicant_send_4_of_4(sm, sm->bssid, key, ver, key_info, in wpa_supplicant_process_3_of_4()
1197 size_t extra_len, u16 ver, in wpa_supplicant_process_1_of_2_wpa() argument
1212 if (ver == WPA_KEY_INFO_TYPE_HMAC_SHA1_AES) { in wpa_supplicant_process_1_of_2_wpa()
1229 if (ver == WPA_KEY_INFO_TYPE_HMAC_MD5_RC4) { in wpa_supplicant_process_1_of_2_wpa()
1244 } else if (ver == WPA_KEY_INFO_TYPE_HMAC_SHA1_AES) { in wpa_supplicant_process_1_of_2_wpa()
1268 "WPA: Unsupported key_info type %d", ver); in wpa_supplicant_process_1_of_2_wpa()
1279 int ver, u16 key_info) in wpa_supplicant_send_2_of_2() argument
1293 key_info |= ver | WPA_KEY_INFO_MIC | WPA_KEY_INFO_SECURE; in wpa_supplicant_send_2_of_2()
1305 wpa_eapol_key_send(sm, sm->ptk.kck, ver, sm->bssid, ETH_P_EAPOL, in wpa_supplicant_send_2_of_2()
1315 int extra_len, u16 ver) in wpa_supplicant_process_1_of_2() argument
1325 "Handshake from " MACSTR " (ver=%d)", MAC2STR(src_addr), ver); in wpa_supplicant_process_1_of_2()
1338 ver, &gd); in wpa_supplicant_process_1_of_2()
1347 wpa_supplicant_send_2_of_2(sm, key, ver, key_info)) in wpa_supplicant_process_1_of_2()
1372 u16 ver, in wpa_supplicant_verify_eapol_key_mic() argument
1381 wpa_eapol_key_mic(sm->tptk.kck, ver, buf, len, in wpa_supplicant_verify_eapol_key_mic()
1397 wpa_eapol_key_mic(sm->ptk.kck, ver, buf, len, in wpa_supplicant_verify_eapol_key_mic()
1424 struct wpa_eapol_key *key, u16 ver) in wpa_supplicant_decrypt_key_data() argument
1439 if (ver == WPA_KEY_INFO_TYPE_HMAC_MD5_RC4) { in wpa_supplicant_decrypt_key_data()
1448 } else if (ver == WPA_KEY_INFO_TYPE_HMAC_SHA1_AES || in wpa_supplicant_decrypt_key_data()
1449 ver == WPA_KEY_INFO_TYPE_AES_128_CMAC) { in wpa_supplicant_decrypt_key_data()
1477 "WPA: Unsupported key_info type %d", ver); in wpa_supplicant_decrypt_key_data()
1558 u16 key_info, ver; in wpa_sm_rx_eapol() local
1626 ver = key_info & WPA_KEY_INFO_TYPE_MASK; in wpa_sm_rx_eapol()
1627 if (ver != WPA_KEY_INFO_TYPE_HMAC_MD5_RC4 && in wpa_sm_rx_eapol()
1629 ver != WPA_KEY_INFO_TYPE_AES_128_CMAC && in wpa_sm_rx_eapol()
1631 ver != WPA_KEY_INFO_TYPE_HMAC_SHA1_AES) { in wpa_sm_rx_eapol()
1634 ver); in wpa_sm_rx_eapol()
1641 if (ver != WPA_KEY_INFO_TYPE_AES_128_CMAC) { in wpa_sm_rx_eapol()
1650 if (ver != WPA_KEY_INFO_TYPE_AES_128_CMAC) { in wpa_sm_rx_eapol()
1659 ver != WPA_KEY_INFO_TYPE_HMAC_SHA1_AES) { in wpa_sm_rx_eapol()
1662 "descriptor version (%d) is not 2", ver); in wpa_sm_rx_eapol()
1676 ver != WPA_KEY_INFO_TYPE_HMAC_SHA1_AES) { in wpa_sm_rx_eapol()
1679 "descriptor version (%d) is not 2", ver); in wpa_sm_rx_eapol()
1746 wpa_supplicant_verify_eapol_key_mic(sm, key, ver, tmp, data_len)) in wpa_sm_rx_eapol()
1751 peerkey_verify_eapol_key_mic(sm, peerkey, key, ver, tmp, data_len)) in wpa_sm_rx_eapol()
1768 if (wpa_supplicant_decrypt_key_data(sm, key, ver)) in wpa_sm_rx_eapol()
1782 peerkey_rx_eapol_4way(sm, peerkey, key, key_info, ver); in wpa_sm_rx_eapol()
1785 wpa_supplicant_process_3_of_4(sm, key, ver); in wpa_sm_rx_eapol()
1789 ver); in wpa_sm_rx_eapol()
1794 ver); in wpa_sm_rx_eapol()
1799 extra_len, ver); in wpa_sm_rx_eapol()