Home | History | Annotate | Download | only in ap

Lines Matching refs:key_info

791 	u16 key_info, key_data_length;
808 key_info = WPA_GET_BE16(key->key_info);
811 " key_info=0x%x type=%u key_data_length=%u",
812 MAC2STR(sm->addr), key_info, key->type, key_data_length);
853 if ((key_info & (WPA_KEY_INFO_SMK_MESSAGE | WPA_KEY_INFO_REQUEST)) ==
855 if (key_info & WPA_KEY_INFO_ERROR) {
862 } else if (key_info & WPA_KEY_INFO_SMK_MESSAGE) {
865 } else if (key_info & WPA_KEY_INFO_REQUEST) {
868 } else if (!(key_info & WPA_KEY_INFO_KEY_TYPE)) {
879 /* TODO: key_info type validation for PeerKey */
882 u16 ver = key_info & WPA_KEY_INFO_TYPE_MASK;
907 if (key_info & WPA_KEY_INFO_REQUEST) {
918 if (!(key_info & WPA_KEY_INFO_REQUEST) &&
1112 if (key_info & WPA_KEY_INFO_ACK) {
1118 if (!(key_info & WPA_KEY_INFO_MIC)) {
1136 if (key_info & WPA_KEY_INFO_REQUEST) {
1158 } else if (key_info & WPA_KEY_INFO_ERROR) {
1161 !(key_info & WPA_KEY_INFO_KEY_TYPE)) > 0)
1163 } else if (key_info & WPA_KEY_INFO_KEY_TYPE) {
1224 sm->rx_eapol_key_secure = !!(key_info & WPA_KEY_INFO_SECURE);
1226 sm->EAPOLKeyPairwise = !!(key_info & WPA_KEY_INFO_KEY_TYPE);
1227 sm->EAPOLKeyRequest = !!(key_info & WPA_KEY_INFO_REQUEST);
1280 struct wpa_state_machine *sm, int key_info,
1307 pairwise = !!(key_info & WPA_KEY_INFO_KEY_TYPE);
1313 (key_info & WPA_KEY_INFO_SECURE) ? 1 : 0,
1314 (key_info & WPA_KEY_INFO_MIC) ? 1 : 0,
1315 (key_info & WPA_KEY_INFO_ACK) ? 1 : 0,
1316 (key_info & WPA_KEY_INFO_INSTALL) ? 1 : 0,
1342 key_info |= version;
1344 key_info |= WPA_KEY_INFO_ENCR_KEY_DATA;
1346 key_info |= keyidx << WPA_KEY_INFO_KEY_INDEX_SHIFT;
1347 WPA_PUT_BE16(key->key_info, key_info);
1351 if (key_info & WPA_KEY_INFO_SMK_MESSAGE)
1415 if (key_info & WPA_KEY_INFO_MIC) {
1446 struct wpa_state_machine *sm, int key_info,
1452 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE;
1458 __wpa_send_eapol(wpa_auth, sm, key_info, key_rsc, nonce, kde, kde_len,
1467 if (pairwise && ctr == 1 && !(key_info & WPA_KEY_INFO_MIC))
1480 u16 key_info;
1489 key_info = WPA_GET_BE16(key->key_info);
1492 if (wpa_eapol_key_mic(PTK->kck, key_info & WPA_KEY_INFO_TYPE_MASK,