/external/wpa_supplicant_8/src/rsn_supp/ |
tdls.c | 52 u8 ie_type; /* FTIE */ 463 * wpa_tdls_ftie_mic - Calculate TDLS FTIE MIC 468 * @ftie: Pointer to the beginning of FT IE 475 const u8 *ftie, u8 *mic) 482 2 + timeoutie[1] + 2 + ftie[1]; 508 /* 7) FTIE, with the MIC field of the FTIE set to 0 */ 509 os_memcpy(pos, ftie, 2 + ftie[1]); 512 pos += 2 + ftie[1] 753 struct wpa_tdls_ftie *ftie; local 938 struct wpa_tdls_ftie *ftie; local 1070 struct wpa_tdls_ftie *ftie; local 1254 struct wpa_tdls_ftie *ftie; local 1343 struct wpa_tdls_ftie *ftie; local 1795 struct wpa_tdls_ftie *ftie = NULL; local 2183 struct wpa_tdls_ftie *ftie; local 2470 struct wpa_tdls_ftie *ftie; local [all...] |
wpa_ft.c | 111 if (ft.ftie) { 112 os_memcpy(pos, ft.ftie - 2, ft.ftie_len + 2); 116 wpa_hexdump(MSG_DEBUG, "FT: Stored MDIE and FTIE from " 151 struct rsn_ftie *ftie; local 253 /* FTIE[SNonce, [R1KH-ID,] R0KH-ID ] */ 257 ftie = (struct rsn_ftie *) pos; 258 pos += sizeof(*ftie); 259 os_memcpy(ftie->snonce, sm->snonce, WPA_NONCE_LEN); 261 os_memcpy(ftie->anonce, anonce, WPA_NONCE_LEN); 291 * FTIE (with MIC field set to 0 378 struct rsn_ftie *ftie; local 673 struct rsn_ftie *ftie; local [all...] |
wpa_ie.h | 40 const u8 *ftie; member in struct:wpa_eapol_ie_parse
|
wpa_ie.c | 534 ie->ftie = pos; 536 wpa_hexdump(MSG_DEBUG, "WPA: FTIE in EAPOL-Key", 537 ie->ftie, ie->ftie_len);
|
wpa.c | 434 * FTIE from (Re)Association Response. 1104 if (ie->ftie == NULL) { 1106 "FT: No FTIE in EAPOL-Key msg 3/4"); 1113 if (assoc_resp_ftie[1] != ie->ftie[1] || 1114 os_memcmp(assoc_resp_ftie, ie->ftie, 2 + ie->ftie[1]) != 0) { 1115 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, "FT: FTIE mismatch"); 1116 wpa_hexdump(MSG_DEBUG, "FT: FTIE in EAPOL-Key msg 3/4", 1117 ie->ftie, 2 + ie->ftie[1]) 1167 const u8 *pos, *end, *mdie = NULL, *ftie = NULL; local [all...] |
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_ie.h | 39 const u8 *ftie; member in struct:wpa_eapol_ie_parse
|
wpa_auth_ft.c | 656 u8 *end, *mdie, *ftie, *rsnie = NULL, *r0kh_id, *subelem = NULL; local 736 ftie = pos; 740 _ftie = (struct rsn_ftie *) (ftie + 2); 759 mdie, mdie_len, ftie, ftie_len, 768 os_memcpy(sm->assoc_resp_ftie, ftie, ftie_len); 912 struct rsn_ftie *ftie; local 945 ftie = (struct rsn_ftie *) parse.ftie; 946 if (ftie == NULL || parse.ftie_len < sizeof(*ftie)) { 1103 struct rsn_ftie *ftie; local [all...] |
wpa_auth.c | 775 if (!kde->mdie || !kde->ftie) { 777 "message 2/4", kde->mdie ? "FTIE" : "MDIE"); 790 (kde->ftie[1] != sm->assoc_resp_ftie[1] || 791 os_memcmp(kde->ftie, sm->assoc_resp_ftie, 793 wpa_printf(MSG_DEBUG, "FT: FTIE mismatch"); 794 wpa_hexdump(MSG_DEBUG, "FT: FTIE in EAPOL-Key msg 2/4", 795 kde->ftie, kde->ftie_len); 796 wpa_hexdump(MSG_DEBUG, "FT: FTIE in (Re)AssocResp", [all...] |
wpa_auth_ie.c | 968 ie->ftie = pos;
|
/external/wpa_supplicant_8/src/common/ |
wpa_common.c | 457 const u8 *ftie, size_t ftie_len, 494 if (ftie) { 499 addr[num_elem] = ftie; 509 /* Rest of FTIE */ 510 addr[num_elem] = ftie + 2 + 2 + 16; 534 parse->ftie = ie; 552 "FT: Invalid R1KH-ID length in FTIE: %d", 565 "FT: Invalid R0KH-ID length in FTIE: %d", 593 const struct rsn_ftie *ftie; local 634 if (len < sizeof(*ftie)) [all...] |
ieee802_11_common.h | 39 const u8 *ftie; member in struct:ieee802_11_elems
|
wpa_common.h | 370 const u8 *ftie, size_t ftie_len, 439 const u8 *ftie; member in struct:wpa_ft_ies
|
ieee802_11_common.c | 363 elems->ftie = pos; [all...] |