Home | History | Annotate | Download | only in rsn_supp

Lines Matching refs:keydatalen

1140 					     size_t keydatalen,
1147 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/2 key data", keydata, keydatalen);
1148 if (wpa_supplicant_parse_ies(keydata, keydatalen, &ie) < 0)
1190 size_t keydatalen, int key_info,
1198 maxkeylen = keydatalen;
1199 if (keydatalen > extra_len) {
1203 (unsigned long) keydatalen, (unsigned long) extra_len);
1226 if (keydatalen > sizeof(gd->gtk)) {
1229 (unsigned long) keydatalen);
1232 os_memcpy(gd->gtk, key + 1, keydatalen);
1233 if (rc4_skip(ek, 32, 256, gd->gtk, keydatalen)) {
1239 if (keydatalen % 8) {
1242 (unsigned long) keydatalen);
1248 "too long (keydatalen=%lu maxkeylen=%lu)",
1249 (unsigned long) keydatalen,
1311 u16 key_info, keydatalen;
1322 keydatalen = WPA_GET_BE16(key->key_data_length);
1327 keydatalen, key_info,
1330 ret = wpa_supplicant_process_1_of_2_wpa(sm, key, keydatalen,
1420 u16 keydatalen = WPA_GET_BE16(key->key_data_length);
1423 (u8 *) (key + 1), keydatalen);
1437 if (rc4_skip(ek, 32, 256, (u8 *) (key + 1), keydatalen)) {
1445 if (keydatalen % 8) {
1448 keydatalen);
1451 keydatalen -= 8; /* AES-WRAP adds 8 bytes */
1452 buf = os_malloc(keydatalen);
1458 if (aes_unwrap(sm->ptk.kek, keydatalen / 8,
1466 os_memcpy(key + 1, buf, keydatalen);
1468 WPA_PUT_BE16(key->key_data_length, keydatalen);
1475 (u8 *) (key + 1), keydatalen);