Lines Matching defs:kde
665 struct wpa_eapol_ie_parse *kde)
670 if (wpa_parse_wpa_ie_rsn(kde->rsn_ie, kde->rsn_ie_len, &ie) < 0 ||
681 if (!kde->mdie || !kde->ftie) {
683 "message 2/4", kde->mdie ? "FTIE" : "MDIE");
687 mdie = (struct rsn_mdie *) (kde->mdie + 2);
688 if (kde->mdie[1] < sizeof(struct rsn_mdie) ||
696 (kde->ftie[1] != sm->assoc_resp_ftie[1] ||
697 os_memcmp(kde->ftie, sm->assoc_resp_ftie,
701 kde->ftie, kde->ftie_len);
755 struct wpa_eapol_ie_parse kde;
960 &kde) < 0) {
966 if (kde.rsn_ie) {
967 eapol_key_ie = kde.rsn_ie;
968 eapol_key_ie_len = kde.rsn_ie_len;
970 eapol_key_ie = kde.wpa_ie;
971 eapol_key_ie_len = kde.wpa_ie_len;
993 if (ft && ft_check_msg_2_of_4(wpa_auth, sm, &kde) < 0) {
1086 * even though MAC address KDE is not normally encrypted,
1110 key_data_length, &kde) == 0 &&
1111 kde.mac_addr) {
1218 const u8 *kde, size_t kde_len,
1305 if (kde && !encr) {
1306 os_memcpy(key + 1, kde, kde_len);
1308 } else if (encr && kde) {
1315 os_memcpy(pos, kde, kde_len);
1379 const u8 *kde, size_t kde_len,
1389 __wpa_send_eapol(wpa_auth, sm, key_info, key_rsc, nonce, kde, kde_len,
1908 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos, dummy_gtk[32];
1990 kde = os_malloc(kde_len);
1991 if (kde == NULL)
1994 pos = kde;
1999 int res = wpa_insert_pmkid(kde, pos - kde, sm->pmk_r1_name);
2003 os_free(kde);
2026 NULL, NULL, pos, kde + kde_len - pos,
2031 os_free(kde);
2056 _rsc, sm->ANonce, kde, pos - kde, keyidx, encr);
2057 os_free(kde);
2243 u8 *kde, *pos, hdr[2];
2279 kde = os_malloc(kde_len);
2280 if (kde == NULL)
2283 pos = kde;
2290 kde = gtk;
2291 pos = kde + gsm->GTK_len;
2298 rsc, gsm->GNonce, kde, pos - kde, gsm->GN, 1);
2300 os_free(kde);