/external/wpa_supplicant_8/src/rsn_supp/ |
tdls.c | 52 u8 ie_type; /* FTIE */ 460 * wpa_tdls_ftie_mic - Calculate TDLS FTIE MIC 465 * @ftie: Pointer to the beginning of FT IE 472 const u8 *ftie, u8 *mic) 479 2 + timeoutie[1] + 2 + ftie[1]; 505 /* 7) FTIE, with the MIC field of the FTIE set to 0 */ 506 os_memcpy(pos, ftie, 2 + ftie[1]); 509 pos += 2 + ftie[1] 750 struct wpa_tdls_ftie *ftie; local 935 struct wpa_tdls_ftie *ftie; local 1067 struct wpa_tdls_ftie *ftie; local 1251 struct wpa_tdls_ftie *ftie; local 1340 struct wpa_tdls_ftie *ftie; local 1792 struct wpa_tdls_ftie *ftie = NULL; local 2180 struct wpa_tdls_ftie *ftie; local 2467 struct wpa_tdls_ftie *ftie; local [all...] |
wpa_ft.c | 111 if (ft.ftie) { 112 os_memcpy(pos, ft.ftie - 2, ft.ftie_len + 2); 116 wpa_hexdump(MSG_DEBUG, "FT: Stored MDIE and FTIE from " 151 struct rsn_ftie *ftie; local 259 /* FTIE[SNonce, [R1KH-ID,] R0KH-ID ] */ 263 ftie = (struct rsn_ftie *) pos; 264 pos += sizeof(*ftie); 265 os_memcpy(ftie->snonce, sm->snonce, WPA_NONCE_LEN); 267 os_memcpy(ftie->anonce, anonce, WPA_NONCE_LEN); 297 * FTIE (with MIC field set to 0 384 struct rsn_ftie *ftie; local 679 struct rsn_ftie *ftie; local [all...] |
wpa_ie.h | 30 const u8 *ftie; member in struct:wpa_eapol_ie_parse
|
wpa_ie.c | 504 ie->ftie = pos; 506 wpa_hexdump(MSG_DEBUG, "WPA: FTIE in EAPOL-Key", 507 ie->ftie, ie->ftie_len);
|
wpa.c | 447 * FTIE from (Re)Association Response. 1126 if (ie->ftie == NULL) { 1128 "FT: No FTIE in EAPOL-Key msg 3/4"); 1135 if (assoc_resp_ftie[1] != ie->ftie[1] || 1136 os_memcmp(assoc_resp_ftie, ie->ftie, 2 + ie->ftie[1]) != 0) { 1137 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, "FT: FTIE mismatch"); 1138 wpa_hexdump(MSG_DEBUG, "FT: FTIE in EAPOL-Key msg 3/4", 1139 ie->ftie, 2 + ie->ftie[1]) 1189 const u8 *pos, *end, *mdie = NULL, *ftie = NULL; local [all...] |
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_ie.h | 29 const u8 *ftie; member in struct:wpa_eapol_ie_parse
|
wpa_auth_ft.c | 1796 u8 *end, *mdie, *ftie, *rsnie = NULL, *r0kh_id, *subelem = NULL; local 2058 struct rsn_ftie *ftie; local 2250 struct rsn_ftie *ftie; local [all...] |
wpa_auth.c | 782 if (!kde->mdie || !kde->ftie) { 784 "message 2/4", kde->mdie ? "FTIE" : "MDIE"); 797 (kde->ftie[1] != sm->assoc_resp_ftie[1] || 798 os_memcmp(kde->ftie, sm->assoc_resp_ftie, 800 wpa_printf(MSG_DEBUG, "FT: FTIE mismatch"); 801 wpa_hexdump(MSG_DEBUG, "FT: FTIE in EAPOL-Key msg 2/4", 802 kde->ftie, kde->ftie_len); 803 wpa_hexdump(MSG_DEBUG, "FT: FTIE in (Re)AssocResp", [all...] |
wpa_auth_ie.c | 988 ie->ftie = pos;
|
/external/wpa_supplicant_8/src/common/ |
wpa_common.c | 621 const u8 *ftie, size_t ftie_len, 658 if (ftie) { 663 addr[num_elem] = ftie; 673 /* Rest of FTIE */ 674 addr[num_elem] = ftie + 2 + 2 + 16; 698 parse->ftie = ie; 716 "FT: Invalid R1KH-ID length in FTIE: %d", 729 "FT: Invalid R0KH-ID length in FTIE: %d", 757 const struct rsn_ftie *ftie; local 798 if (len < sizeof(*ftie)) [all...] |
ieee802_11_common.h | 39 const u8 *ftie; member in struct:ieee802_11_elems
|
wpa_common.h | 358 const u8 *ftie, size_t ftie_len, 427 const u8 *ftie; member in struct:wpa_ft_ies
|
ieee802_11_common.c | 369 elems->ftie = pos; [all...] |