Home | History | Annotate | Download | only in rsn_supp

Lines Matching refs:keydatalen

1186 					     size_t keydatalen,
1193 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/2 key data", keydata, keydatalen);
1194 wpa_supplicant_parse_ies(keydata, keydatalen, &ie);
1235 size_t keydatalen, int key_info,
1243 maxkeylen = keydatalen;
1244 if (keydatalen > extra_len) {
1248 (unsigned long) keydatalen, (unsigned long) extra_len);
1271 if (keydatalen > sizeof(gd->gtk)) {
1274 (unsigned long) keydatalen);
1277 os_memcpy(gd->gtk, key + 1, keydatalen);
1278 if (rc4_skip(ek, 32, 256, gd->gtk, keydatalen)) {
1284 if (keydatalen % 8) {
1287 (unsigned long) keydatalen);
1293 "too long (keydatalen=%lu maxkeylen=%lu)",
1294 (unsigned long) keydatalen,
1356 u16 key_info, keydatalen;
1367 keydatalen = WPA_GET_BE16(key->key_data_length);
1372 keydatalen, key_info,
1375 ret = wpa_supplicant_process_1_of_2_wpa(sm, key, keydatalen,
1463 u16 keydatalen = WPA_GET_BE16(key->key_data_length);
1466 (u8 *) (key + 1), keydatalen);
1480 if (rc4_skip(ek, 32, 256, (u8 *) (key + 1), keydatalen)) {
1488 if (keydatalen % 8) {
1491 keydatalen);
1494 keydatalen -= 8; /* AES-WRAP adds 8 bytes */
1495 buf = os_malloc(keydatalen);
1501 if (aes_unwrap(sm->ptk.kek, keydatalen / 8,
1509 os_memcpy(key + 1, buf, keydatalen);
1511 WPA_PUT_BE16(key->key_data_length, keydatalen);
1518 (u8 *) (key + 1), keydatalen);