Home | History | Annotate | Download | only in rsn_supp

Lines Matching defs:ftie

48 	u8 ie_type; /* FTIE */
416 * wpa_tdls_ftie_mic - Calculate TDLS FTIE MIC
421 * @ftie: Pointer to the beginning of FT IE
428 const u8 *ftie, u8 *mic)
435 2 + timeoutie[1] + 2 + ftie[1];
461 /* 7) FTIE, with the MIC field of the FTIE set to 0 */
462 os_memcpy(pos, ftie, 2 + ftie[1]);
465 pos += 2 + ftie[1];
467 wpa_hexdump(MSG_DEBUG, "TDLS: Data for FTIE MIC", buf, pos - buf);
471 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE MIC", mic, 16);
477 * wpa_tdls_key_mic_teardown - Calculate TDLS FTIE MIC for Teardown frame
483 * @ftie: Pointer to the beginning of FT IE
490 const u8 *ftie, u8 *mic)
501 sizeof(trans_seq) + 2 + ftie[1];
520 /* 7) FTIE, with the MIC field of the FTIE set to 0 */
521 os_memcpy(pos, ftie, 2 + ftie[1]);
524 pos += 2 + ftie[1];
526 wpa_hexdump(MSG_DEBUG, "TDLS: Data for FTIE MIC", buf, pos - buf);
530 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE MIC", mic, 16);
538 const struct wpa_tdls_ftie *ftie)
544 peer->rsnie_p, timeoutie, (u8 *) ftie,
546 if (os_memcmp(mic, ftie->mic, 16) != 0) {
547 wpa_printf(MSG_INFO, "TDLS: Invalid MIC in FTIE - "
550 ftie->mic, 16);
566 const u8 *lnkid, const struct wpa_tdls_ftie *ftie)
572 dtoken, lnkid, (u8 *) ftie, mic);
573 if (os_memcmp(mic, ftie->mic, 16) != 0) {
656 struct wpa_tdls_ftie *ftie;
684 /* To add FTIE for Teardown request and compute MIC */
685 ielen += sizeof(*ftie);
705 ftie = (struct wpa_tdls_ftie *) pos;
706 ftie->ie_type = WLAN_EID_FAST_BSS_TRANSITION;
708 os_memcpy(ftie->Anonce, peer->rnonce, WPA_NONCE_LEN);
709 os_memcpy(ftie->Snonce, peer->inonce, WPA_NONCE_LEN);
710 ftie->ie_len = sizeof(struct wpa_tdls_ftie) - 2;
711 pos = (u8 *) (ftie + 1);
715 "FTIE");
716 ftie->ie_len += 170;
717 *pos++ = 255; /* FTIE subelem */
718 *pos++ = 168; /* FTIE subelem length */
722 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE for TDLS Teardown handshake",
723 (u8 *) ftie, pos - (u8 *) ftie);
728 dialog_token, (u8 *) &lnkid, (u8 *) ftie,
729 ftie->mic);
735 /* request driver to send Teardown using this FTIE */
795 struct wpa_tdls_ftie *ftie;
839 if (kde.ftie == NULL || kde.ftie_len < sizeof(*ftie)) {
840 wpa_printf(MSG_INFO, "TDLS: No FTIE in TDLS Teardown");
844 ftie = (struct wpa_tdls_ftie *) kde.ftie;
849 (u8 *) lnkid, ftie) < 0) {
924 struct wpa_tdls_ftie *ftie;
937 * FTIE: ANonce=0, SNonce=initiator nonce MIC=0, DataKDs=(RSNIE_I,
1022 ftie = (struct wpa_tdls_ftie *) pos;
1023 ftie->ie_type = WLAN_EID_FAST_BSS_TRANSITION;
1024 ftie->ie_len = sizeof(struct wpa_tdls_ftie) - 2;
1035 os_memcpy(ftie->Snonce, peer->inonce, WPA_NONCE_LEN);
1037 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE for TPK Handshake M1",
1038 (u8 *) ftie, sizeof(struct wpa_tdls_ftie));
1040 pos = (u8 *) (ftie + 1);
1045 "FTIE");
1046 ftie->ie_len += 170;
1047 *pos++ = 255; /* FTIE subelem */
1048 *pos++ = 168; /* FTIE subelem length */
1105 struct wpa_tdls_ftie *ftie;
1109 /* Peer RSN IE, FTIE(Initiator Nonce, Responder Nonce),
1130 ftie = (struct wpa_tdls_ftie *) pos;
1131 ftie->ie_type = WLAN_EID_FAST_BSS_TRANSITION;
1132 /* TODO: ftie->mic_control to set 2-RESPONSE */
1133 os_memcpy(ftie->Anonce, peer->rnonce, WPA_NONCE_LEN);
1134 os_memcpy(ftie->Snonce, peer->inonce, WPA_NONCE_LEN);
1135 ftie->ie_len = sizeof(struct wpa_tdls_ftie) - 2;
1136 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE for TPK M2",
1137 (u8 *) ftie, sizeof(*ftie));
1139 pos = (u8 *) (ftie + 1);
1144 "FTIE");
1145 ftie->ie_len += 170;
1146 *pos++ = 255; /* FTIE subelem */
1147 *pos++ = 168; /* FTIE subelem length */
1168 (u8 *) &timeoutie, (u8 *) ftie, ftie->mic);
1186 struct wpa_tdls_ftie *ftie;
1192 /* Peer RSN IE, FTIE(Initiator Nonce, Responder Nonce),
1213 ftie = (struct wpa_tdls_ftie *) pos;
1214 ftie->ie_type = WLAN_EID_FAST_BSS_TRANSITION;
1215 /*TODO: ftie->mic_control to set 3-CONFIRM */
1216 os_memcpy(ftie->Anonce, peer->rnonce, WPA_NONCE_LEN);
1217 os_memcpy(ftie->Snonce, peer->inonce, WPA_NONCE_LEN);
1218 ftie->ie_len = sizeof(struct wpa_tdls_ftie) - 2;
1220 pos = (u8 *) (ftie + 1);
1225 "FTIE");
1226 ftie->ie_len += 170;
1227 *pos++ = 255; /* FTIE subelem */
1228 *pos++ = 168; /* FTIE subelem length */
1249 (u8 *) &timeoutie, (u8 *) ftie, ftie->mic);
1436 struct wpa_tdls_ftie *ftie = NULL;
1594 if (kde.ftie == NULL || kde.ftie_len < sizeof(*ftie) ||
1596 wpa_printf(MSG_INFO, "TDLS: No FTIE or RSN IE in TPK M1");
1672 ftie = (struct wpa_tdls_ftie *) kde.ftie;
1673 os_memcpy(peer->inonce, ftie->Snonce, WPA_NONCE_LEN);
1795 struct wpa_tdls_ftie *ftie;
1905 if (kde.ftie == NULL || kde.ftie_len < sizeof(*ftie) ||
1907 wpa_printf(MSG_INFO, "TDLS: No FTIE or RSN IE in TPK M2");
1948 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE Received from TPK M2",
1949 kde.ftie, sizeof(*ftie));
1950 ftie = (struct wpa_tdls_ftie *) kde.ftie;
1952 if (!os_memcmp(peer->inonce, ftie->Snonce, WPA_NONCE_LEN) == 0) {
1953 wpa_printf(MSG_INFO, "TDLS: FTIE SNonce in TPK M2 does "
1954 "not match with FTIE SNonce used in TPK M1");
1960 os_memcpy(peer->rnonce, ftie->Anonce, WPA_NONCE_LEN);
1986 (u8 *) timeoutie, ftie) < 0) {
2022 struct wpa_tdls_ftie *ftie;
2081 if (kde.ftie == NULL || kde.ftie_len < sizeof(*ftie)) {
2082 wpa_printf(MSG_INFO, "TDLS: No FTIE in TPK M3");
2085 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE Received from TPK M3",
2086 kde.ftie, sizeof(*ftie));
2087 ftie = (struct wpa_tdls_ftie *) kde.ftie;
2102 if (!os_memcmp(peer->rnonce, ftie->Anonce, WPA_NONCE_LEN) == 0) {
2103 wpa_printf(MSG_INFO, "TDLS: FTIE ANonce in TPK M3 does "
2104 "not match with FTIE ANonce used in TPK M2");
2108 if (!os_memcmp(peer->inonce, ftie->Snonce, WPA_NONCE_LEN) == 0) {
2109 wpa_printf(MSG_INFO, "TDLS: FTIE SNonce in TPK M3 does not "
2110 "match with FTIE SNonce used in TPK M1");
2133 (u8 *) timeoutie, ftie) < 0) {