Home | History | Annotate | Download | only in ap

Lines Matching refs:kde

651 			       struct wpa_eapol_ie_parse *kde)
656 if (wpa_parse_wpa_ie_rsn(kde->rsn_ie, kde->rsn_ie_len, &ie) < 0 ||
667 if (!kde->mdie || !kde->ftie) {
669 "message 2/4", kde->mdie ? "FTIE" : "MDIE");
673 mdie = (struct rsn_mdie *) (kde->mdie + 2);
674 if (kde->mdie[1] < sizeof(struct rsn_mdie) ||
682 (kde->ftie[1] != sm->assoc_resp_ftie[1] ||
683 os_memcmp(kde->ftie, sm->assoc_resp_ftie,
687 kde->ftie, kde->ftie_len);
708 struct wpa_eapol_ie_parse kde;
868 &kde) < 0) {
874 if (kde.rsn_ie) {
875 eapol_key_ie = kde.rsn_ie;
876 eapol_key_ie_len = kde.rsn_ie_len;
878 eapol_key_ie = kde.wpa_ie;
879 eapol_key_ie_len = kde.wpa_ie_len;
901 if (ft && ft_check_msg_2_of_4(wpa_auth, sm, &kde) < 0) {
994 * even though MAC address KDE is not normally encrypted,
1025 key_data_length, &kde) == 0 &&
1026 kde.mac_addr) {
1117 const u8 *kde, size_t kde_len,
1217 if (kde && !encr) {
1218 os_memcpy(key + 1, kde, kde_len);
1220 } else if (encr && kde) {
1227 os_memcpy(pos, kde, kde_len);
1281 const u8 *kde, size_t kde_len,
1291 __wpa_send_eapol(wpa_auth, sm, key_info, key_rsc, nonce, kde, kde_len,
1799 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos;
1858 kde = os_malloc(kde_len);
1859 if (kde == NULL)
1862 pos = kde;
1867 int res = wpa_insert_pmkid(kde, pos - kde, sm->pmk_r1_name);
1871 os_free(kde);
1894 NULL, NULL, pos, kde + kde_len - pos,
1899 os_free(kde);
1924 _rsc, sm->ANonce, kde, pos - kde, keyidx, encr);
1925 os_free(kde);
2115 u8 *kde, *pos, hdr[2];
2140 kde = os_malloc(kde_len);
2141 if (kde == NULL)
2144 pos = kde;
2151 kde = gsm->GTK[gsm->GN - 1];
2152 pos = kde + gsm->GTK_len;
2159 rsc, gsm->GNonce, kde, pos - kde, gsm->GN, 1);
2161 os_free(kde);