HomeSort by relevance Sort by last modified time
    Searched refs:ftie (Results 1 - 13 of 13) sorted by null

  /external/wpa_supplicant_8/src/rsn_supp/
tdls.c 51 u8 ie_type; /* FTIE */
441 * wpa_tdls_ftie_mic - Calculate TDLS FTIE MIC
446 * @ftie: Pointer to the beginning of FT IE
453 const u8 *ftie, u8 *mic)
460 2 + timeoutie[1] + 2 + ftie[1];
486 /* 7) FTIE, with the MIC field of the FTIE set to 0 */
487 os_memcpy(pos, ftie, 2 + ftie[1]);
490 pos += 2 + ftie[1]
724 struct wpa_tdls_ftie *ftie; local
900 struct wpa_tdls_ftie *ftie; local
1027 struct wpa_tdls_ftie *ftie; local
1209 struct wpa_tdls_ftie *ftie; local
1298 struct wpa_tdls_ftie *ftie; local
1741 struct wpa_tdls_ftie *ftie = NULL; local
2122 struct wpa_tdls_ftie *ftie; local
2395 struct wpa_tdls_ftie *ftie; local
    [all...]
wpa_ft.c 116 if (ft.ftie) {
117 os_memcpy(pos, ft.ftie - 2, ft.ftie_len + 2);
121 wpa_hexdump(MSG_DEBUG, "FT: Stored MDIE and FTIE from "
154 struct rsn_ftie *ftie; local
257 /* FTIE[SNonce, [R1KH-ID,] R0KH-ID ] */
261 ftie = (struct rsn_ftie *) pos;
262 pos += sizeof(*ftie);
263 os_memcpy(ftie->snonce, sm->snonce, WPA_NONCE_LEN);
265 os_memcpy(ftie->anonce, anonce, WPA_NONCE_LEN);
295 * FTIE (with MIC field set to 0
382 struct rsn_ftie *ftie; local
678 struct rsn_ftie *ftie; local
    [all...]
wpa_ie.h 40 const u8 *ftie; member in struct:wpa_eapol_ie_parse
wpa_ie.c 513 ie->ftie = pos;
515 wpa_hexdump(MSG_DEBUG, "WPA: FTIE in EAPOL-Key",
516 ie->ftie, ie->ftie_len);
wpa.c 298 * FTIE from (Re)Association Response.
866 if (ie->ftie == NULL) {
868 "FT: No FTIE in EAPOL-Key msg 3/4");
875 if (assoc_resp_ftie[1] != ie->ftie[1] ||
876 os_memcmp(assoc_resp_ftie, ie->ftie, 2 + ie->ftie[1]) != 0) {
877 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, "FT: FTIE mismatch");
878 wpa_hexdump(MSG_DEBUG, "FT: FTIE in EAPOL-Key msg 3/4",
879 ie->ftie, 2 + ie->ftie[1])
929 const u8 *pos, *end, *mdie = NULL, *ftie = NULL; local
    [all...]
  /external/wpa_supplicant_8/src/ap/
wpa_auth_ie.h 39 const u8 *ftie; member in struct:wpa_eapol_ie_parse
wpa_auth_ft.c 641 u8 *end, *mdie, *ftie, *rsnie = NULL, *r0kh_id, *subelem = NULL; local
721 ftie = pos;
728 os_memcpy(sm->assoc_resp_ftie, ftie, ftie_len);
730 _ftie = (struct rsn_ftie *) (ftie + 2);
748 mdie, mdie_len, ftie, ftie_len,
804 struct rsn_ftie *ftie; local
837 ftie = (struct rsn_ftie *) parse.ftie;
838 if (ftie == NULL || parse.ftie_len < sizeof(*ftie)) {
994 struct rsn_ftie *ftie; local
    [all...]
wpa_auth.c 721 if (!kde->mdie || !kde->ftie) {
723 "message 2/4", kde->mdie ? "FTIE" : "MDIE");
736 (kde->ftie[1] != sm->assoc_resp_ftie[1] ||
737 os_memcmp(kde->ftie, sm->assoc_resp_ftie,
739 wpa_printf(MSG_DEBUG, "FT: FTIE mismatch");
740 wpa_hexdump(MSG_DEBUG, "FT: FTIE in EAPOL-Key msg 2/4",
741 kde->ftie, kde->ftie_len);
742 wpa_hexdump(MSG_DEBUG, "FT: FTIE in (Re)AssocResp",
    [all...]
wpa_auth_ie.c 877 ie->ftie = pos;
  /external/wpa_supplicant_8/src/common/
ieee802_11_common.h 27 const u8 *ftie; member in struct:ieee802_11_elems
wpa_common.c 141 const u8 *ftie, size_t ftie_len,
167 if (ftie) {
169 os_memcpy(pos, ftie, ftie_len);
200 parse->ftie = ie;
211 "length in FTIE: %d", pos[1]);
223 "length in FTIE: %d", pos[1]);
250 const struct rsn_ftie *ftie; local
280 if (pos[1] < sizeof(*ftie))
282 ftie = (const struct rsn_ftie *) (pos + 2);
283 prot_ie_count = ftie->mic_control[1]
    [all...]
wpa_common.h 340 const u8 *ftie, size_t ftie_len,
389 const u8 *ftie; member in struct:wpa_ft_ies
ieee802_11_common.c 237 elems->ftie = pos;

Completed in 170 milliseconds