HomeSort by relevance Sort by last modified time
    Searched refs:ftie (Results 1 - 13 of 13) sorted by null

  /external/wpa_supplicant_8/src/rsn_supp/
tdls.c 52 u8 ie_type; /* FTIE */
460 * wpa_tdls_ftie_mic - Calculate TDLS FTIE MIC
465 * @ftie: Pointer to the beginning of FT IE
472 const u8 *ftie, u8 *mic)
479 2 + timeoutie[1] + 2 + ftie[1];
505 /* 7) FTIE, with the MIC field of the FTIE set to 0 */
506 os_memcpy(pos, ftie, 2 + ftie[1]);
509 pos += 2 + ftie[1]
750 struct wpa_tdls_ftie *ftie; local
935 struct wpa_tdls_ftie *ftie; local
1067 struct wpa_tdls_ftie *ftie; local
1251 struct wpa_tdls_ftie *ftie; local
1340 struct wpa_tdls_ftie *ftie; local
1792 struct wpa_tdls_ftie *ftie = NULL; local
2180 struct wpa_tdls_ftie *ftie; local
2467 struct wpa_tdls_ftie *ftie; local
    [all...]
wpa_ft.c 111 if (ft.ftie) {
112 os_memcpy(pos, ft.ftie - 2, ft.ftie_len + 2);
116 wpa_hexdump(MSG_DEBUG, "FT: Stored MDIE and FTIE from "
151 struct rsn_ftie *ftie; local
259 /* FTIE[SNonce, [R1KH-ID,] R0KH-ID ] */
263 ftie = (struct rsn_ftie *) pos;
264 pos += sizeof(*ftie);
265 os_memcpy(ftie->snonce, sm->snonce, WPA_NONCE_LEN);
267 os_memcpy(ftie->anonce, anonce, WPA_NONCE_LEN);
297 * FTIE (with MIC field set to 0
384 struct rsn_ftie *ftie; local
679 struct rsn_ftie *ftie; local
    [all...]
wpa_ie.h 30 const u8 *ftie; member in struct:wpa_eapol_ie_parse
wpa_ie.c 504 ie->ftie = pos;
506 wpa_hexdump(MSG_DEBUG, "WPA: FTIE in EAPOL-Key",
507 ie->ftie, ie->ftie_len);
wpa.c 447 * FTIE from (Re)Association Response.
1126 if (ie->ftie == NULL) {
1128 "FT: No FTIE in EAPOL-Key msg 3/4");
1135 if (assoc_resp_ftie[1] != ie->ftie[1] ||
1136 os_memcmp(assoc_resp_ftie, ie->ftie, 2 + ie->ftie[1]) != 0) {
1137 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, "FT: FTIE mismatch");
1138 wpa_hexdump(MSG_DEBUG, "FT: FTIE in EAPOL-Key msg 3/4",
1139 ie->ftie, 2 + ie->ftie[1])
1189 const u8 *pos, *end, *mdie = NULL, *ftie = NULL; local
    [all...]
  /external/wpa_supplicant_8/src/ap/
wpa_auth_ie.h 29 const u8 *ftie; member in struct:wpa_eapol_ie_parse
wpa_auth_ft.c 1796 u8 *end, *mdie, *ftie, *rsnie = NULL, *r0kh_id, *subelem = NULL; local
2058 struct rsn_ftie *ftie; local
2250 struct rsn_ftie *ftie; local
    [all...]
wpa_auth.c 782 if (!kde->mdie || !kde->ftie) {
784 "message 2/4", kde->mdie ? "FTIE" : "MDIE");
797 (kde->ftie[1] != sm->assoc_resp_ftie[1] ||
798 os_memcmp(kde->ftie, sm->assoc_resp_ftie,
800 wpa_printf(MSG_DEBUG, "FT: FTIE mismatch");
801 wpa_hexdump(MSG_DEBUG, "FT: FTIE in EAPOL-Key msg 2/4",
802 kde->ftie, kde->ftie_len);
803 wpa_hexdump(MSG_DEBUG, "FT: FTIE in (Re)AssocResp",
    [all...]
wpa_auth_ie.c 988 ie->ftie = pos;
  /external/wpa_supplicant_8/src/common/
wpa_common.c 621 const u8 *ftie, size_t ftie_len,
658 if (ftie) {
663 addr[num_elem] = ftie;
673 /* Rest of FTIE */
674 addr[num_elem] = ftie + 2 + 2 + 16;
698 parse->ftie = ie;
716 "FT: Invalid R1KH-ID length in FTIE: %d",
729 "FT: Invalid R0KH-ID length in FTIE: %d",
757 const struct rsn_ftie *ftie; local
798 if (len < sizeof(*ftie))
    [all...]
ieee802_11_common.h 39 const u8 *ftie; member in struct:ieee802_11_elems
wpa_common.h 358 const u8 *ftie, size_t ftie_len,
427 const u8 *ftie; member in struct:wpa_ft_ies
ieee802_11_common.c 369 elems->ftie = pos;
    [all...]

Completed in 262 milliseconds