Lines Matching defs:ver
30 * @ver: Version field from Key Info
38 int ver, const u8 *dest, u16 proto,
59 wpa_eapol_key_mic(kck, ver, msg, msg_len, key_mic)) {
62 "version %d MIC", ver);
89 int key_info, ver;
93 ver = WPA_KEY_INFO_TYPE_AES_128_CMAC;
95 ver = WPA_KEY_INFO_TYPE_HMAC_SHA1_AES;
97 ver = WPA_KEY_INFO_TYPE_HMAC_MD5_RC4;
112 key_info = WPA_KEY_INFO_REQUEST | ver;
131 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL,
263 * @ver: Version bits from EAPOL-Key Key Info
272 int ver, const u8 *nonce,
331 ver | WPA_KEY_INFO_KEY_TYPE | WPA_KEY_INFO_MIC);
348 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL,
376 u16 ver)
391 "Handshake from " MACSTR " (ver=%d)", MAC2STR(src_addr), ver);
438 if (wpa_supplicant_send_2_of_4(sm, sm->bssid, key, ver, sm->snonce,
983 * @ver: Version bits from EAPOL-Key Key Info
992 u16 ver, u16 key_info,
1012 key_info |= ver | WPA_KEY_INFO_KEY_TYPE | WPA_KEY_INFO_MIC;
1026 wpa_eapol_key_send(sm, ptk->kck, ver, dst, ETH_P_EAPOL,
1035 u16 ver)
1043 "Handshake from " MACSTR " (ver=%d)", MAC2STR(sm->bssid), ver);
1092 if (wpa_supplicant_send_4_of_4(sm, sm->bssid, key, ver, key_info,
1191 size_t extra_len, u16 ver,
1206 if (ver == WPA_KEY_INFO_TYPE_HMAC_SHA1_AES) {
1223 if (ver == WPA_KEY_INFO_TYPE_HMAC_MD5_RC4) {
1238 } else if (ver == WPA_KEY_INFO_TYPE_HMAC_SHA1_AES) {
1262 "WPA: Unsupported key_info type %d", ver);
1273 int ver, u16 key_info)
1287 key_info |= ver | WPA_KEY_INFO_MIC | WPA_KEY_INFO_SECURE;
1299 wpa_eapol_key_send(sm, sm->ptk.kck, ver, sm->bssid, ETH_P_EAPOL,
1309 int extra_len, u16 ver)
1319 "Handshake from " MACSTR " (ver=%d)", MAC2STR(src_addr), ver);
1332 ver, &gd);
1341 wpa_supplicant_send_2_of_2(sm, key, ver, key_info))
1366 u16 ver,
1375 wpa_eapol_key_mic(sm->tptk.kck, ver, buf, len,
1391 wpa_eapol_key_mic(sm->ptk.kck, ver, buf, len,
1418 struct wpa_eapol_key *key, u16 ver)
1433 if (ver == WPA_KEY_INFO_TYPE_HMAC_MD5_RC4) {
1442 } else if (ver == WPA_KEY_INFO_TYPE_HMAC_SHA1_AES ||
1443 ver == WPA_KEY_INFO_TYPE_AES_128_CMAC) {
1471 "WPA: Unsupported key_info type %d", ver);
1502 " key_info 0x%x (ver=%d keyidx=%d rsvd=%d %s%s%s%s%s%s%s%s)",
1552 u16 key_info, ver;
1620 ver = key_info & WPA_KEY_INFO_TYPE_MASK;
1621 if (ver != WPA_KEY_INFO_TYPE_HMAC_MD5_RC4 &&
1623 ver != WPA_KEY_INFO_TYPE_AES_128_CMAC &&
1625 ver != WPA_KEY_INFO_TYPE_HMAC_SHA1_AES) {
1628 ver);
1635 if (ver != WPA_KEY_INFO_TYPE_AES_128_CMAC) {
1644 if (ver != WPA_KEY_INFO_TYPE_AES_128_CMAC) {
1653 ver != WPA_KEY_INFO_TYPE_HMAC_SHA1_AES) {
1656 "descriptor version (%d) is not 2", ver);
1670 ver != WPA_KEY_INFO_TYPE_HMAC_SHA1_AES) {
1673 "descriptor version (%d) is not 2", ver);
1740 wpa_supplicant_verify_eapol_key_mic(sm, key, ver, tmp, data_len))
1745 peerkey_verify_eapol_key_mic(sm, peerkey, key, ver, tmp, data_len))
1762 if (wpa_supplicant_decrypt_key_data(sm, key, ver))
1776 peerkey_rx_eapol_4way(sm, peerkey, key, key_info, ver);
1779 wpa_supplicant_process_3_of_4(sm, key, ver);
1783 ver);
1788 ver);
1793 extra_len, ver);