HomeSort by relevance Sort by last modified time
    Searched refs:ftie (Results 1 - 13 of 13) sorted by null

  /external/wpa_supplicant_8/src/rsn_supp/
tdls.c 50 u8 ie_type; /* FTIE */
422 * wpa_tdls_ftie_mic - Calculate TDLS FTIE MIC
427 * @ftie: Pointer to the beginning of FT IE
434 const u8 *ftie, u8 *mic)
441 2 + timeoutie[1] + 2 + ftie[1];
467 /* 7) FTIE, with the MIC field of the FTIE set to 0 */
468 os_memcpy(pos, ftie, 2 + ftie[1]);
471 pos += 2 + ftie[1]
664 struct wpa_tdls_ftie *ftie; local
804 struct wpa_tdls_ftie *ftie; local
929 struct wpa_tdls_ftie *ftie; local
1111 struct wpa_tdls_ftie *ftie; local
1193 struct wpa_tdls_ftie *ftie; local
1445 struct wpa_tdls_ftie *ftie = NULL; local
1812 struct wpa_tdls_ftie *ftie; local
2058 struct wpa_tdls_ftie *ftie; local
    [all...]
wpa_ft.c 116 if (ft.ftie) {
117 os_memcpy(pos, ft.ftie - 2, ft.ftie_len + 2);
121 wpa_hexdump(MSG_DEBUG, "FT: Stored MDIE and FTIE from "
154 struct rsn_ftie *ftie; local
255 /* FTIE[SNonce, [R1KH-ID,] R0KH-ID ] */
259 ftie = (struct rsn_ftie *) pos;
260 pos += sizeof(*ftie);
261 os_memcpy(ftie->snonce, sm->snonce, WPA_NONCE_LEN);
263 os_memcpy(ftie->anonce, anonce, WPA_NONCE_LEN);
293 * FTIE (with MIC field set to 0
380 struct rsn_ftie *ftie; local
675 struct rsn_ftie *ftie; local
    [all...]
wpa_ie.h 40 const u8 *ftie; member in struct:wpa_eapol_ie_parse
wpa_ie.c 392 ie->ftie = pos;
394 wpa_hexdump(MSG_DEBUG, "WPA: FTIE in EAPOL-Key",
395 ie->ftie, ie->ftie_len);
wpa.c 293 * FTIE from (Re)Association Response.
822 if (ie->ftie == NULL) {
824 "FT: No FTIE in EAPOL-Key msg 3/4");
831 if (assoc_resp_ftie[1] != ie->ftie[1] ||
832 os_memcmp(assoc_resp_ftie, ie->ftie, 2 + ie->ftie[1]) != 0) {
833 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, "FT: FTIE mismatch");
834 wpa_hexdump(MSG_DEBUG, "FT: FTIE in EAPOL-Key msg 3/4",
835 ie->ftie, 2 + ie->ftie[1])
884 const u8 *pos, *end, *mdie = NULL, *ftie = NULL; local
    [all...]
  /external/wpa_supplicant_8/src/ap/
wpa_auth_ie.h 39 const u8 *ftie; member in struct:wpa_eapol_ie_parse
wpa_auth_ft.c 622 u8 *end, *mdie, *ftie, *rsnie = NULL, *r0kh_id, *subelem = NULL; local
703 ftie = pos;
710 os_memcpy(sm->assoc_resp_ftie, ftie, ftie_len);
712 _ftie = (struct rsn_ftie *) (ftie + 2);
730 mdie, mdie_len, ftie, ftie_len,
786 struct rsn_ftie *ftie; local
819 ftie = (struct rsn_ftie *) parse.ftie;
820 if (ftie == NULL || parse.ftie_len < sizeof(*ftie)) {
972 struct rsn_ftie *ftie; local
    [all...]
wpa_auth.c 681 if (!kde->mdie || !kde->ftie) {
683 "message 2/4", kde->mdie ? "FTIE" : "MDIE");
696 (kde->ftie[1] != sm->assoc_resp_ftie[1] ||
697 os_memcmp(kde->ftie, sm->assoc_resp_ftie,
699 wpa_printf(MSG_DEBUG, "FT: FTIE mismatch");
700 wpa_hexdump(MSG_DEBUG, "FT: FTIE in EAPOL-Key msg 2/4",
701 kde->ftie, kde->ftie_len);
702 wpa_hexdump(MSG_DEBUG, "FT: FTIE in (Re)AssocResp",
    [all...]
wpa_auth_ie.c 751 ie->ftie = pos;
  /external/wpa_supplicant_8/src/common/
ieee802_11_common.h 32 const u8 *ftie; member in struct:ieee802_11_elems
wpa_common.c 135 const u8 *ftie, size_t ftie_len,
161 if (ftie) {
163 os_memcpy(pos, ftie, ftie_len);
194 parse->ftie = ie;
205 "length in FTIE: %d", pos[1]);
217 "length in FTIE: %d", pos[1]);
244 const struct rsn_ftie *ftie; local
274 if (pos[1] < sizeof(*ftie))
276 ftie = (const struct rsn_ftie *) (pos + 2);
277 prot_ie_count = ftie->mic_control[1]
    [all...]
wpa_common.h 324 const u8 *ftie, size_t ftie_len,
372 const u8 *ftie; member in struct:wpa_ft_ies
ieee802_11_common.c 247 elems->ftie = pos;

Completed in 201 milliseconds