/dragonfly/contrib/wpa_supplicant/src/rsn_supp/ |
H A D | wpa_ft.c | 91 if (ft.mdie) { in wpa_sm_set_ft_params() 127 if (ft.mdie) { in wpa_sm_set_ft_params() 170 struct rsn_mdie *mdie; in wpa_ft_gen_req_ies() local 382 ((u8 *) mdie) - 2, 2 + sizeof(*mdie), in wpa_ft_gen_req_ies() 458 struct rsn_mdie *mdie; in wpa_ft_add_mdie() local 530 mdie = (struct rsn_mdie *) parse.mdie; in wpa_ft_process_response() 531 if (mdie == NULL || parse.mdie_len < sizeof(*mdie) || in wpa_ft_process_response() 633 parse.mdie ? parse.mdie - 2 : NULL); in wpa_ft_process_response() 872 mdie = (struct rsn_mdie *) parse.mdie; in wpa_ft_validate_reassoc_resp() 873 if (mdie == NULL || parse.mdie_len < sizeof(*mdie) || in wpa_ft_validate_reassoc_resp() [all …]
|
H A D | wpa.h | 364 int wpa_ft_prepare_auth_request(struct wpa_sm *sm, const u8 *mdie); 366 const u8 *mdie); 376 const u8 *mdie); 387 const u8 *mdie) in wpa_ft_prepare_auth_request() argument 393 const u8 *mdie) in wpa_ft_add_mdie() argument
|
H A D | wpa.c | 1196 struct rsn_mdie *mdie; in ft_validate_mdie() local 1198 mdie = (struct rsn_mdie *) (ie->mdie + 2); in ft_validate_mdie() 1199 if (ie->mdie == NULL || ie->mdie_len < 2 + sizeof(*mdie) || in ft_validate_mdie() 1209 os_memcmp(assoc_resp_mdie, ie->mdie, 2 + ie->mdie[1]) != 0)) { in ft_validate_mdie() 1212 ie->mdie, 2 + ie->mdie[1]); in ft_validate_mdie() 1300 mdie = pos; in wpa_supplicant_validate_ie_ft() 3623 struct rsn_mdie *mdie; in fils_build_auth() local 3626 wpabuf_put_u8(buf, sizeof(*mdie)); in fils_build_auth() 3627 mdie = wpabuf_put(buf, sizeof(*mdie)); in fils_build_auth() 3629 mdie->ft_capab = 0; in fils_build_auth() [all …]
|
H A D | wpa_ie.h | 28 const u8 *mdie; member
|
H A D | wpa_ie.c | 519 ie->mdie = pos; in wpa_supplicant_parse_ies() 522 ie->mdie, ie->mdie_len); in wpa_supplicant_parse_ies()
|
/dragonfly/contrib/wpa_supplicant/src/ap/ |
H A D | wpa_auth_ie.c | 535 const u8 *mdie, size_t mdie_len, in wpa_validate_wpa_ie() argument 568 if (wpa_key_mgmt_ft(data.key_mgmt) && !mdie && in wpa_validate_wpa_ie() 814 if (mdie == NULL || mdie_len < MOBILITY_DOMAIN_ID_LEN + 1) { in wpa_validate_wpa_ie() 819 if (os_memcmp(mdie, wpa_auth->conf.mobility_domain, in wpa_validate_wpa_ie() 822 "MDIE", mdie, MOBILITY_DOMAIN_ID_LEN); in wpa_validate_wpa_ie() 825 } else if (mdie != NULL) { in wpa_validate_wpa_ie() 1101 ie->mdie = pos; in wpa_parse_kde_ies()
|
H A D | wpa_auth_ie.h | 27 const u8 *mdie; member
|
H A D | wpa_auth_ft.c | 2474 mdie = pos; in wpa_sm_write_assoc_resp_ies() 2596 mdie, mdie_len, ftie, ftie_len, in wpa_sm_write_assoc_resp_ies() 2865 struct rsn_mdie *mdie; in wpa_ft_process_auth_req() local 2896 mdie = (struct rsn_mdie *) parse.mdie; in wpa_ft_process_auth_req() 2897 if (mdie == NULL || parse.mdie_len < sizeof(*mdie) || in wpa_ft_process_auth_req() 2898 os_memcmp(mdie->mobility_domain, in wpa_ft_process_auth_req() 3117 struct rsn_mdie *mdie; in wpa_ft_validate_reassoc() local 3156 mdie = (struct rsn_mdie *) parse.mdie; in wpa_ft_validate_reassoc() 3157 if (mdie == NULL || parse.mdie_len < sizeof(*mdie) || in wpa_ft_validate_reassoc() 3158 os_memcmp(mdie->mobility_domain, in wpa_ft_validate_reassoc() [all …]
|
H A D | wpa_auth.c | 797 struct rsn_mdie *mdie; in ft_check_msg_2_of_4() local 810 if (!kde->mdie || !kde->ftie) { in ft_check_msg_2_of_4() 812 "message 2/4", kde->mdie ? "FTIE" : "MDIE"); in ft_check_msg_2_of_4() 816 mdie = (struct rsn_mdie *) (kde->mdie + 2); in ft_check_msg_2_of_4() 817 if (kde->mdie[1] < sizeof(struct rsn_mdie) || in ft_check_msg_2_of_4() 818 os_memcmp(wpa_auth->conf.mobility_domain, mdie->mobility_domain, in ft_check_msg_2_of_4()
|
H A D | wpa_auth.h | 323 const u8 *mdie, size_t mdie_len,
|
H A D | drv_callbacks.c | 311 elems.mdie, elems.mdie_len, in hostapd_notif_assoc()
|
H A D | ieee802_11.c | 1557 elems.mdie, elems.mdie_len, NULL, 0); in handle_auth_fils() 3076 elems.mdie, elems.mdie_len, in check_assoc_ies()
|
/dragonfly/contrib/wpa_supplicant/src/common/ |
H A D | wpa_common.h | 372 const u8 *mdie, size_t mdie_len, 445 const u8 *mdie; member
|
H A D | wpa_common.c | 756 const u8 *mdie, size_t mdie_len, in wpa_ft_mic() argument 798 if (mdie) { in wpa_ft_mic() 799 addr[num_elem] = mdie; in wpa_ft_mic() 975 parse->mdie = pos; in wpa_ft_parse_ies() 1045 if (parse->mdie) in wpa_ft_parse_ies()
|
H A D | ieee802_11_common.h | 47 const u8 *mdie; member
|
H A D | ieee802_11_common.c | 381 elems->mdie = pos; in ieee802_11_parse_elems()
|
/dragonfly/contrib/wpa_supplicant/wpa_supplicant/ |
H A D | sme.c | 471 struct rsn_mdie *mdie; in sme_send_authentication() local 475 *pos++ = sizeof(*mdie); in sme_send_authentication() 476 mdie = (struct rsn_mdie *) pos; in sme_send_authentication() 477 os_memcpy(mdie->mobility_domain, md, in sme_send_authentication() 479 mdie->ft_capab = md[MOBILITY_DOMAIN_ID_LEN]; in sme_send_authentication()
|
H A D | wpa_supplicant.c | 2906 const u8 *mdie = wpa_bss_get_ie(bss, WLAN_EID_MOBILITY_DOMAIN); in wpas_populate_assoc_ies() local 2908 if (mdie && mdie[1] >= MOBILITY_DOMAIN_ID_LEN) { in wpas_populate_assoc_ies() 2910 const u8 *md = mdie + 2; in wpas_populate_assoc_ies() 2918 max_wpa_ie_len - wpa_ie_len, mdie); in wpas_populate_assoc_ies()
|
H A D | ctrl_iface.c | 1139 const u8 *mdie; in wpa_supplicant_ctrl_iface_ft_ds() local 1151 mdie = wpa_bss_get_ie(bss, WLAN_EID_MOBILITY_DOMAIN); in wpa_supplicant_ctrl_iface_ft_ds() 1153 mdie = NULL; in wpa_supplicant_ctrl_iface_ft_ds() 1155 return wpa_ft_start_over_ds(wpa_s->wpa, target_ap, mdie); in wpa_supplicant_ctrl_iface_ft_ds()
|