/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_ft.c | 116 if (ft.ftie) { 117 os_memcpy(pos, ft.ftie - 2, ft.ftie_len + 2); 121 wpa_hexdump(MSG_DEBUG, "FT: Stored MDIE and FTIE from " 154 struct rsn_ftie *ftie; local 257 /* FTIE[SNonce, [R1KH-ID,] R0KH-ID ] */ 261 ftie = (struct rsn_ftie *) pos; 262 pos += sizeof(*ftie); 263 os_memcpy(ftie->snonce, sm->snonce, WPA_NONCE_LEN); 265 os_memcpy(ftie->anonce, anonce, WPA_NONCE_LEN); 295 * FTIE (with MIC field set to 0 382 struct rsn_ftie *ftie; local 677 struct rsn_ftie *ftie; local [all...] |
tdls.c | 51 u8 ie_type; /* FTIE */ 437 * wpa_tdls_ftie_mic - Calculate TDLS FTIE MIC 442 * @ftie: Pointer to the beginning of FT IE 449 const u8 *ftie, u8 *mic) 456 2 + timeoutie[1] + 2 + ftie[1]; 482 /* 7) FTIE, with the MIC field of the FTIE set to 0 */ 483 os_memcpy(pos, ftie, 2 + ftie[1]); 486 pos += 2 + ftie[1] 720 struct wpa_tdls_ftie *ftie; local 896 struct wpa_tdls_ftie *ftie; local 1021 struct wpa_tdls_ftie *ftie; local 1203 struct wpa_tdls_ftie *ftie; local 1291 struct wpa_tdls_ftie *ftie; local 1659 struct wpa_tdls_ftie *ftie = NULL; local 2030 struct wpa_tdls_ftie *ftie; local 2303 struct wpa_tdls_ftie *ftie; local [all...] |
wpa_ie.h | 40 const u8 *ftie; member in struct:wpa_eapol_ie_parse
|
wpa_ie.c | 513 ie->ftie = pos; 515 wpa_hexdump(MSG_DEBUG, "WPA: FTIE in EAPOL-Key", 516 ie->ftie, ie->ftie_len);
|
wpa.c | 298 * FTIE from (Re)Association Response. 866 if (ie->ftie == NULL) { 868 "FT: No FTIE in EAPOL-Key msg 3/4"); 875 if (assoc_resp_ftie[1] != ie->ftie[1] || 876 os_memcmp(assoc_resp_ftie, ie->ftie, 2 + ie->ftie[1]) != 0) { 877 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, "FT: FTIE mismatch"); 878 wpa_hexdump(MSG_DEBUG, "FT: FTIE in EAPOL-Key msg 3/4", 879 ie->ftie, 2 + ie->ftie[1]) 929 const u8 *pos, *end, *mdie = NULL, *ftie = NULL; local [all...] |
wpa_i.h | 123 u8 *assoc_resp_ies; /* MDIE and FTIE from (Re)Association Response */
|
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_ie.h | 39 const u8 *ftie; member in struct:wpa_eapol_ie_parse
|
wpa_auth_ft.c | 640 u8 *end, *mdie, *ftie, *rsnie = NULL, *r0kh_id, *subelem = NULL; local 720 ftie = pos; 727 os_memcpy(sm->assoc_resp_ftie, ftie, ftie_len); 729 _ftie = (struct rsn_ftie *) (ftie + 2); 747 mdie, mdie_len, ftie, ftie_len, 803 struct rsn_ftie *ftie; local 836 ftie = (struct rsn_ftie *) parse.ftie; 837 if (ftie == NULL || parse.ftie_len < sizeof(*ftie)) { 993 struct rsn_ftie *ftie; local [all...] |
wpa_auth.c | 721 if (!kde->mdie || !kde->ftie) { 723 "message 2/4", kde->mdie ? "FTIE" : "MDIE"); 736 (kde->ftie[1] != sm->assoc_resp_ftie[1] || 737 os_memcmp(kde->ftie, sm->assoc_resp_ftie, 739 wpa_printf(MSG_DEBUG, "FT: FTIE mismatch"); 740 wpa_hexdump(MSG_DEBUG, "FT: FTIE in EAPOL-Key msg 2/4", 741 kde->ftie, kde->ftie_len); 742 wpa_hexdump(MSG_DEBUG, "FT: FTIE in (Re)AssocResp", [all...] |
wpa_auth_ie.c | 877 ie->ftie = pos;
|
/external/wpa_supplicant_8/src/common/ |
ieee802_11_common.h | 27 const u8 *ftie; member in struct:ieee802_11_elems
|
wpa_common.c | 141 const u8 *ftie, size_t ftie_len, 167 if (ftie) { 169 os_memcpy(pos, ftie, ftie_len); 200 parse->ftie = ie; 211 "length in FTIE: %d", pos[1]); 223 "length in FTIE: %d", pos[1]); 250 const struct rsn_ftie *ftie; local 280 if (pos[1] < sizeof(*ftie)) 282 ftie = (const struct rsn_ftie *) (pos + 2); 283 prot_ie_count = ftie->mic_control[1] [all...] |
wpa_common.h | 340 const u8 *ftie, size_t ftie_len, 389 const u8 *ftie; member in struct:wpa_ft_ies
|
ieee802_11_common.c | 237 elems->ftie = pos;
|
/external/wpa_supplicant_8/src/drivers/ |
driver.h | [all...] |
nl80211_copy.h | [all...] |
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/ |
802.11.h | [all...] |
/external/kernel-headers/original/uapi/linux/ |
nl80211.h | [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
ChangeLog | [all...] |