/external/wpa_supplicant_8/src/rsn_supp/ |
D | tdls.c | 434 const u8 *ftie, u8 *mic) in wpa_tdls_ftie_mic() argument 441 2 + timeoutie[1] + 2 + ftie[1]; in wpa_tdls_ftie_mic() 468 os_memcpy(pos, ftie, 2 + ftie[1]); in wpa_tdls_ftie_mic() 471 pos += 2 + ftie[1]; in wpa_tdls_ftie_mic() 496 const u8 *ftie, u8 *mic) in wpa_tdls_key_mic_teardown() argument 507 sizeof(trans_seq) + 2 + ftie[1]; in wpa_tdls_key_mic_teardown() 527 os_memcpy(pos, ftie, 2 + ftie[1]); in wpa_tdls_key_mic_teardown() 530 pos += 2 + ftie[1]; in wpa_tdls_key_mic_teardown() 544 const struct wpa_tdls_ftie *ftie) in wpa_supplicant_verify_tdls_mic() argument 550 peer->rsnie_p, timeoutie, (u8 *) ftie, in wpa_supplicant_verify_tdls_mic() [all …]
|
D | wpa_ft.c | 116 if (ft.ftie) { in wpa_sm_set_ft_params() 117 os_memcpy(pos, ft.ftie - 2, ft.ftie_len + 2); in wpa_sm_set_ft_params() 154 struct rsn_ftie *ftie; in wpa_ft_gen_req_ies() local 259 ftie = (struct rsn_ftie *) pos; in wpa_ft_gen_req_ies() 260 pos += sizeof(*ftie); in wpa_ft_gen_req_ies() 261 os_memcpy(ftie->snonce, sm->snonce, WPA_NONCE_LEN); in wpa_ft_gen_req_ies() 263 os_memcpy(ftie->anonce, anonce, WPA_NONCE_LEN); in wpa_ft_gen_req_ies() 297 ftie->mic_control[1] = 3 + ieee802_11_ie_count(ric_ies, in wpa_ft_gen_req_ies() 303 ric_ies_len, ftie->mic) < 0) { in wpa_ft_gen_req_ies() 380 struct rsn_ftie *ftie; in wpa_ft_process_response() local [all …]
|
D | wpa_ie.h | 40 const u8 *ftie; member
|
D | wpa_ie.c | 392 ie->ftie = pos; in wpa_supplicant_parse_ies() 395 ie->ftie, ie->ftie_len); in wpa_supplicant_parse_ies()
|
D | wpa.c | 822 if (ie->ftie == NULL) { in ft_validate_ftie() 831 if (assoc_resp_ftie[1] != ie->ftie[1] || in ft_validate_ftie() 832 os_memcmp(assoc_resp_ftie, ie->ftie, 2 + ie->ftie[1]) != 0) { in ft_validate_ftie() 835 ie->ftie, 2 + ie->ftie[1]); in ft_validate_ftie() 884 const u8 *pos, *end, *mdie = NULL, *ftie = NULL; in wpa_supplicant_validate_ie_ft() local 897 ftie = pos; in wpa_supplicant_validate_ie_ft() 905 ft_validate_ftie(sm, src_addr, ie, ftie) < 0 || in wpa_supplicant_validate_ie_ft()
|
/external/wpa_supplicant_8/src/ap/ |
D | wpa_auth_ft.c | 622 u8 *end, *mdie, *ftie, *rsnie = NULL, *r0kh_id, *subelem = NULL; in wpa_sm_write_assoc_resp_ies() local 703 ftie = pos; in wpa_sm_write_assoc_resp_ies() 710 os_memcpy(sm->assoc_resp_ftie, ftie, ftie_len); in wpa_sm_write_assoc_resp_ies() 712 _ftie = (struct rsn_ftie *) (ftie + 2); in wpa_sm_write_assoc_resp_ies() 730 mdie, mdie_len, ftie, ftie_len, in wpa_sm_write_assoc_resp_ies() 786 struct rsn_ftie *ftie; in wpa_ft_process_auth_req() local 819 ftie = (struct rsn_ftie *) parse.ftie; in wpa_ft_process_auth_req() 820 if (ftie == NULL || parse.ftie_len < sizeof(*ftie)) { in wpa_ft_process_auth_req() 825 os_memcpy(sm->SNonce, ftie->snonce, WPA_NONCE_LEN); in wpa_ft_process_auth_req() 972 struct rsn_ftie *ftie; in wpa_ft_validate_reassoc() local [all …]
|
D | wpa_auth_ie.h | 39 const u8 *ftie; member
|
D | wpa_auth.c | 681 if (!kde->mdie || !kde->ftie) { in ft_check_msg_2_of_4() 696 (kde->ftie[1] != sm->assoc_resp_ftie[1] || in ft_check_msg_2_of_4() 697 os_memcmp(kde->ftie, sm->assoc_resp_ftie, in ft_check_msg_2_of_4() 701 kde->ftie, kde->ftie_len); in ft_check_msg_2_of_4()
|
D | wpa_auth_ie.c | 751 ie->ftie = pos; in wpa_parse_kde_ies()
|
/external/wpa_supplicant_8/src/common/ |
D | wpa_common.c | 135 const u8 *ftie, size_t ftie_len, in wpa_ft_mic() argument 161 if (ftie) { in wpa_ft_mic() 163 os_memcpy(pos, ftie, ftie_len); in wpa_ft_mic() 194 parse->ftie = ie; in wpa_ft_parse_ftie() 244 const struct rsn_ftie *ftie; in wpa_ft_parse_ies() local 274 if (pos[1] < sizeof(*ftie)) in wpa_ft_parse_ies() 276 ftie = (const struct rsn_ftie *) (pos + 2); in wpa_ft_parse_ies() 277 prot_ie_count = ftie->mic_control[1]; in wpa_ft_parse_ies() 305 if (parse->ftie) in wpa_ft_parse_ies()
|
D | wpa_common.h | 324 const u8 *ftie, size_t ftie_len, 372 const u8 *ftie; member
|
D | ieee802_11_common.h | 32 const u8 *ftie; member
|
D | ieee802_11_common.c | 247 elems->ftie = pos; in ieee802_11_parse_elems()
|