Searched refs:FT_R1KH_ID_LEN (Results 1 – 9 of 9) sorted by relevance
/external/wpa_supplicant_8/src/ap/ |
D | wpa_auth.h | 47 WPA_PMK_NAME_LEN + FT_R1KH_ID_LEN + \ 59 u8 r1kh_id[FT_R1KH_ID_LEN]; 66 FT_R1KH_ID_LEN + ETH_ALEN + PMK_LEN + \ 76 u8 r1kh_id[FT_R1KH_ID_LEN]; /* copied from pull */ 85 #define FT_R0KH_R1KH_PUSH_DATA_LEN (4 + FT_R1KH_ID_LEN + ETH_ALEN + \ 98 u8 r1kh_id[FT_R1KH_ID_LEN]; 133 u8 id[FT_R1KH_ID_LEN]; 168 u8 r1_key_holder[FT_R1KH_ID_LEN];
|
D | wpa_auth_ft.c | 116 if (len < 2 + sizeof(*hdr) + 2 + FT_R1KH_ID_LEN + 2 + r0kh_id_len + in wpa_write_ftie() 134 *pos++ = FT_R1KH_ID_LEN; in wpa_write_ftie() 135 os_memcpy(pos, conf->r1_key_holder, FT_R1KH_ID_LEN); in wpa_write_ftie() 136 pos += FT_R1KH_ID_LEN; in wpa_write_ftie() 355 os_memcpy(f.r1kh_id, sm->wpa_auth->conf.r1_key_holder, FT_R1KH_ID_LEN); in wpa_ft_pull_pmk_r1() 1022 2 + FT_R1KH_ID_LEN + 200; in wpa_ft_process_auth_req() 1192 FT_R1KH_ID_LEN) != 0) { in wpa_ft_validate_reassoc() 1196 parse.r1kh_id, FT_R1KH_ID_LEN); in wpa_ft_validate_reassoc() 1198 sm->wpa_auth->conf.r1_key_holder, FT_R1KH_ID_LEN); in wpa_ft_validate_reassoc() 1485 os_memcpy(r.r1kh_id, f.r1kh_id, FT_R1KH_ID_LEN); in wpa_ft_rrb_rx_pull() [all …]
|
D | ap_config.h | 343 u8 r1_key_holder[FT_R1KH_ID_LEN];
|
D | wpa_auth_glue.c | 71 os_memcpy(wconf->r1_key_holder, conf->r1_key_holder, FT_R1KH_ID_LEN); in hostapd_wpa_auth_conf()
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | wpa_ft.c | 98 ft.r1kh_id, FT_R1KH_ID_LEN); in wpa_sm_set_ft_params() 99 os_memcpy(sm->r1kh_id, ft.r1kh_id, FT_R1KH_ID_LEN); in wpa_sm_set_ft_params() 101 os_memset(sm->r1kh_id, 0, FT_R1KH_ID_LEN); in wpa_sm_set_ft_params() 265 *pos++ = FT_R1KH_ID_LEN; in wpa_ft_gen_req_ies() 266 os_memcpy(pos, sm->r1kh_id, FT_R1KH_ID_LEN); in wpa_ft_gen_req_ies() 267 pos += FT_R1KH_ID_LEN; in wpa_ft_gen_req_ies() 465 os_memcpy(sm->r1kh_id, parse.r1kh_id, FT_R1KH_ID_LEN); in wpa_ft_process_response() 466 wpa_hexdump(MSG_DEBUG, "FT: R1KH-ID", sm->r1kh_id, FT_R1KH_ID_LEN); in wpa_ft_process_response() 749 if (os_memcmp_const(parse.r1kh_id, sm->r1kh_id, FT_R1KH_ID_LEN) != 0) { in wpa_ft_validate_reassoc_resp()
|
D | wpa_i.h | 129 u8 r1kh_id[FT_R1KH_ID_LEN];
|
/external/wpa_supplicant_8/src/common/ |
D | wpa_common.c | 550 if (len != FT_R1KH_ID_LEN) { in wpa_ft_parse_ftie() 1181 len[2] = FT_R1KH_ID_LEN; in wpa_derive_pmk_r1_name() 1201 u8 buf[FT_R1KH_ID_LEN + ETH_ALEN]; in wpa_derive_pmk_r1() 1206 os_memcpy(pos, r1kh_id, FT_R1KH_ID_LEN); in wpa_derive_pmk_r1() 1207 pos += FT_R1KH_ID_LEN; in wpa_derive_pmk_r1()
|
D | wpa_common.h | 157 #define FT_R1KH_ID_LEN 6 macro
|
/external/wpa_supplicant_8/hostapd/ |
D | config_file.c | 2607 if (os_strlen(pos) != 2 * FT_R1KH_ID_LEN || in hostapd_config_fill() 2608 hexstr2bin(pos, bss->r1_key_holder, FT_R1KH_ID_LEN) != 0) { in hostapd_config_fill()
|