HomeSort by relevance Sort by last modified time
    Searched refs:ftie (Results 1 - 13 of 13) sorted by null

  /external/wpa_supplicant_8/src/rsn_supp/
tdls.c 52 u8 ie_type; /* FTIE */
463 * wpa_tdls_ftie_mic - Calculate TDLS FTIE MIC
468 * @ftie: Pointer to the beginning of FT IE
475 const u8 *ftie, u8 *mic)
482 2 + timeoutie[1] + 2 + ftie[1];
508 /* 7) FTIE, with the MIC field of the FTIE set to 0 */
509 os_memcpy(pos, ftie, 2 + ftie[1]);
512 pos += 2 + ftie[1]
753 struct wpa_tdls_ftie *ftie; local
938 struct wpa_tdls_ftie *ftie; local
1070 struct wpa_tdls_ftie *ftie; local
1254 struct wpa_tdls_ftie *ftie; local
1343 struct wpa_tdls_ftie *ftie; local
1795 struct wpa_tdls_ftie *ftie = NULL; local
2183 struct wpa_tdls_ftie *ftie; local
2470 struct wpa_tdls_ftie *ftie; local
    [all...]
wpa_ft.c 111 if (ft.ftie) {
112 os_memcpy(pos, ft.ftie - 2, ft.ftie_len + 2);
116 wpa_hexdump(MSG_DEBUG, "FT: Stored MDIE and FTIE from "
151 struct rsn_ftie *ftie; local
253 /* FTIE[SNonce, [R1KH-ID,] R0KH-ID ] */
257 ftie = (struct rsn_ftie *) pos;
258 pos += sizeof(*ftie);
259 os_memcpy(ftie->snonce, sm->snonce, WPA_NONCE_LEN);
261 os_memcpy(ftie->anonce, anonce, WPA_NONCE_LEN);
291 * FTIE (with MIC field set to 0
378 struct rsn_ftie *ftie; local
673 struct rsn_ftie *ftie; local
    [all...]
wpa_ie.h 40 const u8 *ftie; member in struct:wpa_eapol_ie_parse
wpa_ie.c 534 ie->ftie = pos;
536 wpa_hexdump(MSG_DEBUG, "WPA: FTIE in EAPOL-Key",
537 ie->ftie, ie->ftie_len);
wpa.c 434 * FTIE from (Re)Association Response.
1104 if (ie->ftie == NULL) {
1106 "FT: No FTIE in EAPOL-Key msg 3/4");
1113 if (assoc_resp_ftie[1] != ie->ftie[1] ||
1114 os_memcmp(assoc_resp_ftie, ie->ftie, 2 + ie->ftie[1]) != 0) {
1115 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, "FT: FTIE mismatch");
1116 wpa_hexdump(MSG_DEBUG, "FT: FTIE in EAPOL-Key msg 3/4",
1117 ie->ftie, 2 + ie->ftie[1])
1167 const u8 *pos, *end, *mdie = NULL, *ftie = NULL; local
    [all...]
  /external/wpa_supplicant_8/src/ap/
wpa_auth_ie.h 39 const u8 *ftie; member in struct:wpa_eapol_ie_parse
wpa_auth_ft.c 656 u8 *end, *mdie, *ftie, *rsnie = NULL, *r0kh_id, *subelem = NULL; local
736 ftie = pos;
740 _ftie = (struct rsn_ftie *) (ftie + 2);
759 mdie, mdie_len, ftie, ftie_len,
768 os_memcpy(sm->assoc_resp_ftie, ftie, ftie_len);
912 struct rsn_ftie *ftie; local
945 ftie = (struct rsn_ftie *) parse.ftie;
946 if (ftie == NULL || parse.ftie_len < sizeof(*ftie)) {
1103 struct rsn_ftie *ftie; local
    [all...]
wpa_auth.c 775 if (!kde->mdie || !kde->ftie) {
777 "message 2/4", kde->mdie ? "FTIE" : "MDIE");
790 (kde->ftie[1] != sm->assoc_resp_ftie[1] ||
791 os_memcmp(kde->ftie, sm->assoc_resp_ftie,
793 wpa_printf(MSG_DEBUG, "FT: FTIE mismatch");
794 wpa_hexdump(MSG_DEBUG, "FT: FTIE in EAPOL-Key msg 2/4",
795 kde->ftie, kde->ftie_len);
796 wpa_hexdump(MSG_DEBUG, "FT: FTIE in (Re)AssocResp",
    [all...]
wpa_auth_ie.c 968 ie->ftie = pos;
  /external/wpa_supplicant_8/src/common/
wpa_common.c 457 const u8 *ftie, size_t ftie_len,
494 if (ftie) {
499 addr[num_elem] = ftie;
509 /* Rest of FTIE */
510 addr[num_elem] = ftie + 2 + 2 + 16;
534 parse->ftie = ie;
552 "FT: Invalid R1KH-ID length in FTIE: %d",
565 "FT: Invalid R0KH-ID length in FTIE: %d",
593 const struct rsn_ftie *ftie; local
634 if (len < sizeof(*ftie))
    [all...]
ieee802_11_common.h 39 const u8 *ftie; member in struct:ieee802_11_elems
wpa_common.h 370 const u8 *ftie, size_t ftie_len,
439 const u8 *ftie; member in struct:wpa_ft_ies
ieee802_11_common.c 363 elems->ftie = pos;
    [all...]

Completed in 125 milliseconds