/freebsd-src/contrib/wpa/src/eap_server/ |
H A D | eap_server_gpsk.c | 2 * hostapd / EAP-GPSK (RFC 5433) server 3 * Copyright (c) 2006-2007, Jouni Malinen <j@w1.fi> 43 return "GPSK-1"; in eap_gpsk_state_txt() 45 return "GPSK-3"; in eap_gpsk_state_txt() 58 wpa_printf(MSG_DEBUG, "EAP-GPSK: %s -> %s", in eap_gpsk_state() 59 eap_gpsk_state_txt(data->state), in eap_gpsk_state() 61 data->state = state; in eap_gpsk_state() 72 data->state = GPSK_1; in eap_gpsk_init() 74 data->csuite_count = 0; in eap_gpsk_init() 77 WPA_PUT_BE32(data->csuite_list[data->csuite_count].vendor, in eap_gpsk_init() [all …]
|
H A D | eap_server_sake.c | 2 * hostapd / EAP-SAKE (RFC 4763) server 3 * Copyright (c) 2006-2007, Jouni Malinen <j@w1.fi> 54 wpa_printf(MSG_DEBUG, "EAP-SAKE: %s -> %s", in eap_sake_state() 55 eap_sake_state_txt(data->state), in eap_sake_state() 57 data->state = state; in eap_sake_state() 68 data->state = CHALLENGE; in eap_sake_init() 70 if (os_get_random(&data->session_id, 1)) { in eap_sake_init() 71 wpa_printf(MSG_ERROR, "EAP-SAKE: Failed to get random data"); in eap_sake_init() 75 wpa_printf(MSG_DEBUG, "EAP-SAKE: Initialized Session ID %d", in eap_sake_init() 76 data->session_id); in eap_sake_init() [all …]
|
/freebsd-src/contrib/wpa/src/common/ |
H A D | wpa_common.c | 2 * WPA/RSN - Shared functions for supplicant and authenticator 3 * Copyright (c) 2002-2018, Jouni Malinen <j@w1.fi> 131 * wpa_use_akm_defined - Is AKM-defined Key Descriptor Version used in wpa_use_akm_defined() 133 * Returns: 1 if AKM-defined Key Descriptor Version is used; 0 otherwise 149 * wpa_use_cmac - Is CMAC integrity algorithm used for EAPOL-Key MIC 167 * wpa_use_aes_key_wrap - Is AES Keywrap algorithm used for EAPOL-Ke in wpa_use_aes_key_wrap() 193 wpa_eapol_key_mic(const u8 * key,size_t key_len,int akmp,int ver,const u8 * buf,size_t len,u8 * mic) wpa_eapol_key_mic() argument 597 u8 *data, *pos; fils_pmk_to_ptk() local 826 wpa_ft_mic(const u8 * kck,size_t kck_len,const u8 * sta_addr,const u8 * ap_addr,u8 transaction_seqnum,const u8 * mdie,size_t mdie_len,const u8 * ftie,size_t ftie_len,const u8 * rsnie,size_t rsnie_len,const u8 * ric,size_t ric_len,const u8 * rsnxe,size_t rsnxe_len,u8 * mic) wpa_ft_mic() argument 924 const u8 *end, *pos; wpa_ft_parse_ftie() local 997 const u8 *end, *pos; wpa_ft_parse_ies() local 1343 pasn_mic(const u8 * kck,int akmp,int cipher,const u8 * addr1,const u8 * addr2,const u8 * data,size_t data_len,const u8 * frame,size_t frame_len,u8 * mic) pasn_mic() argument 1542 const u8 *pos; wpa_parse_wpa_ie_rsn() local 1736 const u8 *pos; wpa_parse_wpa_ie_wpa() local 1862 u8 *pos, r0_key_data[64], hash[48]; wpa_derive_pmk_r0() local 1996 u8 *pos; wpa_derive_pmk_r1() local 2046 u8 *pos, hash[32]; wpa_pmk_r1_to_ptk() local 2695 u8 *pos = start; rsn_cipher_put_suites() local 2728 u8 *pos = start; wpa_cipher_put_suites() local 2850 char *pos = start; wpa_write_ciphers() local 2956 const char *pos = domain; fils_domain_name_hash() local 2984 wpa_parse_vendor_specific(const u8 * pos,const u8 * end,struct wpa_eapol_ie_parse * ie) wpa_parse_vendor_specific() argument 3019 wpa_parse_generic(const u8 * pos,struct wpa_eapol_ie_parse * ie) wpa_parse_generic() argument 3151 const u8 *pos, *end; wpa_parse_kde_ies() local 3331 u8 *pos; wpa_pasn_add_rsne() local 3634 const u8 *pos = (const u8 *) (params + 1); wpa_pasn_parse_parameter_ie() local [all...] |
H A D | wpa_common.h | 3 * Copyright (c) 2002-2018, Jouni Malinen <j@w1.fi> 123 /* EAPOL-Key Key Data Encapsulation 172 /* B2-B3: PTKSA Replay Counter */ 173 /* B4-B5: GTKSA Replay Counter */ 192 /* FTE - MIC Control - RSNXE Used */ 197 /* FTE - MIC Length subfield values */ 205 /* IEEE 802.11, 8.5.2 EAPOL-Ke 343 u8 mic[16]; global() member 351 u8 mic[24]; global() member [all...] |
H A D | ieee802_11_common.c | 3 * Copyright (c) 2002-2019, Jouni Malinen <j@w1.fi> 15 #include "qca-vendor.h" 20 static int ieee802_11_parse_vendor_specific(const u8 *pos, size_t elen, in ieee802_11_parse_vendor_specific() argument 28 * sub-type. */ in ieee802_11_parse_vendor_specific() 35 return -1; in ieee802_11_parse_vendor_specific() 38 oui = WPA_GET_BE24(pos); in ieee802_11_parse_vendor_specific() 41 /* Microsoft/Wi-Fi information elements are further typed and in ieee802_11_parse_vendor_specific() 43 switch (pos[3]) { in ieee802_11_parse_vendor_specific() 47 elems->wpa_ie = pos; in ieee802_11_parse_vendor_specific() 202 ieee802_11_parse_extension(const u8 * pos,size_t elen,struct ieee802_11_elems * elems,int show_errors) ieee802_11_parse_extension() argument 327 ieee802_11_parse_fragment(struct frag_ies_info * frag_ies,const u8 * pos,u8 elen) ieee802_11_parse_fragment() argument 374 const u8 *pos = elem->data; ieee802_11_parse_elems() local 711 const char *pos; hostapd_config_wmm_ac() local 785 char *pos; hostapd_config_read_int10() local 813 const char *pos; hostapd_config_tx_queue() local 2058 u8 *pos = buf; add_multi_ap_ie() local 2330 ieee802_11_parse_candidate_list(const char * pos,u8 * nei_rep,size_t nei_rep_len) ieee802_11_parse_candidate_list() argument [all...] |
/freebsd-src/contrib/wpa/src/eap_common/ |
H A D | eap_gpsk_common.c | 2 * EAP server/peer: EAP-GPSK shared routines 3 * Copyright (c) 2006-2007, Jouni Malinen <j@w1.fi> 19 * eap_gpsk_supported_ciphersuite - Check whether ciphersuite is supported 49 /* M_i = MAC_Y (i || Z); (MAC = AES-CMAC-128) */ in eap_gpsk_gkdf_cmac() 57 n = (len + hashlen - 1) / hashlen; in eap_gpsk_gkdf_cmac() 61 return -1; in eap_gpsk_gkdf_cmac() 65 left -= clen; in eap_gpsk_gkdf_cmac() 84 /* M_i = MAC_Y (i || Z); (MAC = HMAC-SHA256) */ in eap_gpsk_gkdf_sha256() 92 n = (len + hashlen - 1) / hashlen; in eap_gpsk_gkdf_sha256() 96 return -1; in eap_gpsk_gkdf_sha256() [all …]
|
H A D | eap_sake_common.c | 2 * EAP server/peer: EAP-SAKE shared routines 3 * Copyright (c) 2006-2019, Jouni Malinen <j@w1.fi> 25 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_S"); in eap_sake_parse_add_attr() 27 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_S with " in eap_sake_parse_add_attr() 29 return -1; in eap_sake_parse_add_attr() 31 attr->rand_s = data; in eap_sake_parse_add_attr() 34 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_P"); in eap_sake_parse_add_attr() 36 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_P with " in eap_sake_parse_add_attr() 38 return -1; in eap_sake_parse_add_attr() 40 attr->rand_ in eap_sake_parse_add_attr() 163 const u8 *pos = buf, *end = buf + len; eap_sake_parse_attributes() local 215 size_t pos, plen; eap_sake_kdf() local 333 eap_sake_compute_mic(const u8 * tek_auth,const u8 * rand_s,const u8 * rand_p,const u8 * serverid,size_t serverid_len,const u8 * peerid,size_t peerid_len,int peer,const u8 * eap,size_t eap_len,const u8 * mic_pos,u8 * mic) eap_sake_compute_mic() argument 336 u8 *tmp, *pos; eap_sake_compute_mic() local [all...] |
/freebsd-src/contrib/wpa/src/rsn_supp/ |
H A D | tdls.c | 2 * wpa_supplicant - TDLS 3 * Copyright (c) 2010-2011, Atheros Communications 56 u8 mic[TDLS_MIC_LEN]; member 77 /* TDLS frame headers as per IEEE Std 802.11z-2010 */ 84 static u8 * wpa_add_tdls_timeoutie(u8 *pos, u8 *ie, size_t ie_len, u32 tsecs); 112 u8 kck[16]; /* TPK-KCK */ 113 u8 tk[16]; /* TPK-TK; assuming only CCMP will be used */ 116 int tk_set; /* TPK-TK configured to the driver */ 172 return sm->mlo.links[link_id].bssid; 173 return sm->bssi 174 wpa_add_ie(u8 * pos,const u8 * ie,size_t ie_len) wpa_add_ie() argument 477 wpa_tdls_ftie_mic(const u8 * kck,u8 trans_seq,const u8 * lnkid,const u8 * rsnie,const u8 * timeoutie,const u8 * ftie,u8 * mic) wpa_tdls_ftie_mic() argument 479 u8 *buf, *pos; wpa_tdls_ftie_mic() local 539 wpa_tdls_key_mic_teardown(const u8 * kck,u8 trans_seq,u16 rcode,u8 dtoken,const u8 * lnkid,const u8 * ftie,u8 * mic) wpa_tdls_key_mic_teardown() argument 541 u8 *buf, *pos; wpa_tdls_key_mic_teardown() local 589 u8 mic[16]; wpa_supplicant_verify_tdls_mic() local 617 u8 mic[16]; wpa_supplicant_verify_tdls_mic_teardown() local 762 u8 *rbuf, *pos; wpa_tdls_send_teardown() local 948 const u8 *pos; wpa_tdls_recv_teardown() local 1077 u8 *rbuf, *pos, *count_pos; wpa_tdls_send_tpk_m1() local 1256 u8 *rbuf, *pos; wpa_tdls_send_tpk_m2() local 1347 u8 *rbuf, *pos; wpa_tdls_send_tpk_m3() local 1449 u8 *rbuf, *pos, *count_pos; wpa_tdls_send_discovery_response() local 2264 const u8 *pos; wpa_tdls_process_tpk_m2() local 2551 const u8 *pos; wpa_tdls_process_tpk_m3() local 2700 wpa_add_tdls_timeoutie(u8 * pos,u8 * ie,size_t ie_len,u32 tsecs) wpa_add_tdls_timeoutie() argument [all...] |
H A D | wpa_ft.c | 2 * WPA Supplicant - IEEE 802.11r - Fast BSS Transition 3 * Copyright (c) 2006-2018, Jouni Malinen <j@w1.fi> 41 const u8 *anonce = key->key_nonce; in wpa_derive_ptk_ft() 42 int use_sha384 = wpa_key_mgmt_sha384(sm->key_mgmt); in wpa_derive_ptk_ft() 47 if (sm->xxkey_len > 0) { in wpa_derive_ptk_ft() 48 mpmk = sm->xxkey; in wpa_derive_ptk_ft() 49 mpmk_len = sm->xxkey_len; in wpa_derive_ptk_ft() 50 } else if (sm->cur_pmksa) { in wpa_derive_ptk_ft() 51 mpmk = sm->cur_pmks in wpa_derive_ptk_ft() 149 u8 *pos = sm->assoc_resp_ies; wpa_sm_set_ft_params() local 193 u8 *buf, *pos, *ftie_len, *ftie_pos, *fte_mic, *elem_count; wpa_ft_gen_req_ies() local 509 u8 *pos = buf; wpa_ft_add_mdie() local 982 u8 mic[WPA_EAPOL_KEY_MIC_MAX_LEN]; wpa_ft_validate_reassoc_resp() local [all...] |
H A D | wpa.c | 2 * WPA Supplicant - WPA state machine and EAPOL-Key processing 3 * Copyright (c) 2003-2018, Jouni Malinen <j@w1.fi> 80 * wpa_eapol_key_send - Send WPA/RSN EAPOL-Key message in wpa_eapol_key_send() 86 * @msg: EAPOL-Key message in wpa_eapol_key_send() 88 * @key_mic: Pointer to the buffer to which the EAPOL-Key MIC is written in wpa_eapol_key_send() 95 int ret = -1; in wpa_eapol_key_send() 96 size_t mic_len = wpa_mic_len(sm->key_mgm in wpa_eapol_key_send() 186 u8 bssid[ETH_ALEN], *rbuf, *key_mic, *mic; wpa_sm_key_request() local 765 u8 *pos; wpa_supplicant_process_1_of_4() local 795 u8 *pos; wpa_supplicant_process_1_of_4() local 811 u8 *pos; wpa_supplicant_process_1_of_4() local 1496 const u8 *pos, *end, *mdie = NULL, *ftie = NULL; wpa_supplicant_validate_ie_ft() local 2061 u8 *pos; wpa_supplicant_send_2_of_2() local 2169 u8 mic[WPA_EAPOL_KEY_MIC_MAX_LEN]; wpa_supplicant_verify_eapol_key_mic() local 2361 wpa_eapol_key_dump(struct wpa_sm * sm,const struct wpa_eapol_key * key,unsigned int key_data_len,const u8 * mic,unsigned int mic_len) wpa_eapol_key_dump() argument 2402 u8 *pos, *tmp; wpa_supp_aead_decrypt() local 2490 u8 *mic, *key_data; wpa_sm_rx_eapol() local 3412 char *pos = buf, *end = buf + buflen; wpa_sm_get_status() local 4167 const u8 *pos, *end; fils_process_auth() local 4473 u8 *pos; fils_ft_build_assoc_req_rsne() local 4629 const u8 *pos = wpabuf_head(hlp[i]); fils_build_assoc_req() local 4661 u8 *pos; fils_build_assoc_req() local 4705 const u8 *pos, *end; fils_process_hlp_resp() local 4719 fils_process_hlp_container(struct wpa_sm * sm,const u8 * pos,size_t len) fils_process_hlp_container() argument [all...] |
/freebsd-src/contrib/wpa/src/eap_peer/ |
H A D | eap_gpsk.c | 2 * EAP peer method: EAP-GPSK (RFC 5433) 3 * Copyright (c) 2006-2014, Jouni Malinen <j@w1.fi> 53 return "GPSK-1"; in eap_gpsk_state_txt() 55 return "GPSK-3"; in eap_gpsk_state_txt() 69 wpa_printf(MSG_DEBUG, "EAP-GPSK: %s -> %s", in eap_gpsk_state() 70 eap_gpsk_state_txt(data->state), in eap_gpsk_state() 72 data->state = state; in eap_gpsk_state() 88 wpa_printf(MSG_INFO, "EAP-GPSK: No key (password) configured"); in eap_gpsk_init() 95 data->state = GPSK_1; in eap_gpsk_init() 99 data->id_peer = os_memdup(identity, identity_len); in eap_gpsk_init() [all …]
|
H A D | eap_sake.c | 2 * EAP peer method: EAP-SAKE (RFC 4763) 3 * Copyright (c) 2006-2019, Jouni Malinen <j@w1.fi> 58 wpa_printf(MSG_DEBUG, "EAP-SAKE: %s -> %s", in eap_sake_state() 59 eap_sake_state_txt(data->state), in eap_sake_state() 61 data->state = state; in eap_sake_state() 76 wpa_printf(MSG_INFO, "EAP-SAKE: No key of correct length " in eap_sake_init() 84 data->state = IDENTITY; in eap_sake_init() 88 data->peerid = os_memdup(identity, identity_len); in eap_sake_init() 89 if (data->peerid == NULL) { in eap_sake_init() 93 data->peerid_len = identity_len; in eap_sake_init() [all …]
|
/freebsd-src/contrib/wpa/wpa_supplicant/ |
H A D | mesh_rsn.c | 2 * WPA Supplicant - Mesh RSN routines 3 * Copyright (c) 2013-2014, cozybit, Inc. All rights reserved. 37 if (sta->sae->state != SAE_ACCEPTED) { in mesh_auth_timer() 38 wpa_printf(MSG_DEBUG, "AUTH: Re-authenticate with " MACSTR in mesh_auth_timer() 40 MAC2STR(sta->addr), sta->sae_auth_retry); in mesh_auth_timer() 42 MAC2STR(sta->addr)); in mesh_auth_timer() 43 if (sta->sae_auth_retry < MESH_AUTH_RETRY) { in mesh_auth_timer() 46 hapd = wpa_s->ifms in mesh_auth_timer() 538 u8 *ampe_ie, *pos, *mic_payload; mesh_rsn_protect_frame() local 637 u8 *ampe_buf, *crypt = NULL, *pos, *end; mesh_rsn_process_ampe() local [all...] |
H A D | mesh_mpm.c | 2 * WPA Supplicant - Basic mesh peer management 3 * Copyright (c) 2013-2014, cozybit, Inc. All rights reserved. 79 mpm_ie->chosen_pmk = ie + len - SAE_PMKID_LEN; in mesh_mpm_parse_peer_mgmt() 80 len -= SAE_PMKID_LEN; in mesh_mpm_parse_peer_mgmt() 87 return -1; in mesh_mpm_parse_peer_mgmt() 92 return -1; in mesh_mpm_parse_peer_mgmt() 93 mpm_ie->proto_id = ie; in mesh_mpm_parse_peer_mgmt() 94 mpm_ie->llid = ie + 2; in mesh_mpm_parse_peer_mgmt() 96 len - in mesh_mpm_parse_peer_mgmt() 217 u8 *pos, *cat; mesh_mpm_send_plink_action() local [all...] |
/freebsd-src/sys/net80211/ |
H A D | ieee80211_crypto_ccmp.c | 1 /*- 2 * SPDX-License-Identifier: BSD-2-Clause 4 * Copyright (c) 2002-2008 Sam Leffler, Errno Consulting 30 * IEEE 802.11i AES-CCMP crypto support. 73 .ic_name = "AES-CCM", 104 vap->iv_stats.is_crypto_nomem++; in ccmp_attach() 107 ctx->cc_vap = vap; in ccmp_attach() 108 ctx->cc_ic = vap->iv_ic; in ccmp_attach() 116 struct ccmp_ctx *ctx = k->wk_private; in ccmp_detach() 120 nrefs--; /* NB: we assume caller locking */ in ccmp_detach() [all …]
|
H A D | ieee80211_crypto_tkip.c | 1 /*- 2 * SPDX-License-Identifier: BSD-2-Clause 4 * Copyright (c) 2002-2008 Sam Leffler, Errno Consulting 94 uint64_t rx_rsc; /* held until MIC verified */ 99 u8 mic[IEEE80211_WEP_MICLEN]); 116 vap->iv_stats.is_crypto_nomem++; in tkip_attach() 120 ctx->tc_va in tkip_attach() 260 uint8_t mic[IEEE80211_WEP_MICLEN]; tkip_enmic() local 414 u8 mic[IEEE80211_WEP_MICLEN]; tkip_demic() local 672 u8 *pos; wep_encrypt() local 731 u8 *pos, icv[4]; wep_decrypt() local [all...] |
H A D | ieee80211_crypto_wep.c | 1 /*- 2 * SPDX-License-Identifier: BSD-2-Clause 4 * Copyright (c) 2002-2008 Sam Leffler, Errno Consulting 95 vap->iv_stats.is_crypto_nomem++; in wep_attach() 99 ctx->wc_vap = vap; in wep_attach() 100 ctx->wc_ic = vap->iv_ic; in wep_attach() 101 net80211_get_random_bytes(&ctx->wc_iv, sizeof(ctx->wc_iv)); in wep_attach() 109 struct wep_ctx *ctx = k->wk_private; in wep_detach() 113 nrefs--; /* NB: we assume caller locking */ in wep_detach() 119 return k->wk_keylen >= 40/NBBY; in wep_setkey() [all …]
|
/freebsd-src/sys/contrib/device-tree/Bindings/sound/ |
H A D | microchip,pdmc.yaml | 1 # SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause) 3 --- 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Codrin Ciubotariu <codrin.ciubotariu@microchip.com> 17 - $ref: dai-common.yaml# 21 const: microchip,sama7g5-pdmc 26 "#sound-dai-cells": 34 - description: Peripheral Bus Clock 35 - description: Generic Clock 37 clock-names: [all …]
|
H A D | microchip,sama7g5-pdmc.yaml | 1 # SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/sound/microchip,sama7g5-pdmc.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Codrin Ciubotariu <codrin.ciubotariu@microchip.com> 17 - $ref: dai-common.yaml# 21 const: microchip,sama7g5-pdmc 26 "#sound-dai-cells": 34 - description: Peripheral Bus Clock 35 - description: Generic Clock [all …]
|
/freebsd-src/contrib/wpa/src/ap/ |
H A D | wpa_auth.c | 3 * Copyright (c) 2004-2022, Jouni Malinen <j@w1.fi> 73 static u8 * ieee80211w_kde_add(struct wpa_state_machine *sm, u8 *pos); 92 if (sm->mld_assoc_link_id >= 0) in wpa_auth_psk_failure_report() 93 return sm->wpa_auth->mld_addr; in wpa_auth_psk_failure_report() 95 return sm->wpa_auth->addr; in wpa_auth_psk_failure_report() 102 if (sm->mld_assoc_link_id >= 0) in wpa_auth_set_eapol() 103 return sm->peer_mld_addr; in wpa_auth_set_eapol() 105 return sm->add in wpa_auth_set_eapol() 1028 u8 *mic; wpa_receive() local 1435 u8 *pos; wpa_gmk_to_gtk() local 1503 u8 *buf, *pos; __wpa_send_eapol() local 1749 u8 mic[WPA_EAPOL_KEY_MIC_MAX_LEN], *mic_pos; wpa_verify_key_mic() local 2426 u8 *pos; wpa_aead_decrypt() local 2575 fils_decrypt_assoc(struct wpa_state_machine * sm,const u8 * fils_session,const struct ieee80211_mgmt * mgmt,size_t frame_len,u8 * pos,size_t left) fils_decrypt_assoc() argument 2666 u8 *pos = buf + current_len; fils_encrypt_assoc() local 2818 u8 *pos; fils_prepare_plainbuf() local 2884 u8 *pos = buf; hostapd_eid_assoc_fils_session() local 2935 const u8 *eapol_key_ie, *key_data, *mic; SM_STATE() local 3242 ieee80211w_kde_add(struct wpa_state_machine * sm,u8 * pos) ieee80211w_kde_add() argument 3375 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde = NULL, *pos, stub_gtk[32]; SM_STATE() local 3854 u8 *kde_buf = NULL, *pos, hdr[2]; SM_STATE() local 3932 const u8 *key_data, *mic; SM_STATE() local 4175 wpa_wnmsleep_gtk_subelem(struct wpa_state_machine * sm,u8 * pos) wpa_wnmsleep_gtk_subelem() argument 4215 wpa_wnmsleep_igtk_subelem(struct wpa_state_machine * sm,u8 * pos) wpa_wnmsleep_igtk_subelem() argument 4254 wpa_wnmsleep_bigtk_subelem(struct wpa_state_machine * sm,u8 * pos) wpa_wnmsleep_bigtk_subelem() argument 5395 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos; wpa_auth_resend_m3() local 5579 u8 *kde_buf = NULL, *pos, hdr[2]; wpa_auth_resend_group_m1() local [all...] |
H A D | wpa_auth_ft.c | 2 * hostapd - IEEE 802.11r - Fast BSS Transition 3 * Copyright (c) 2004-2018, Jouni Malinen <j@w1.fi> 58 * wpa_ft_rrb_decrypt - Decrypt FT RRB message 59 * @key: AES-SIV key for AEAD 66 * @type: Vendor-specific subtype of the RRB frame (FT_PACKET_*) 72 * Returns: 0 on success, -1 on error in wpa_ft_rrb_decrypt() 105 *plain = os_zalloc(enc_len - AES_BLOCK_SIZE); in wpa_ft_rrb_decrypt() 117 enc_len -= 2; in wpa_ft_rrb_decrypt() 123 *plain_size = enc_len - AES_BLOCK_SIZ in wpa_ft_rrb_decrypt() 329 u8 *pos; wpa_ft_tlv_lin() local 385 u8 *pos = start; wpa_ft_vlan_lin() local 438 u8 *pos, *endpos; wpa_ft_rrb_lin() local 527 u8 *plain = NULL, *auth = NULL, *pos, *tmp; wpa_ft_rrb_build() local 790 u8 *pos = buf; wpa_write_mdie() local 814 u8 *pos = buf, *ielen; wpa_write_ftie() local 2255 u8 *subelem, *pos; wpa_ft_igtk_subelem() local 2316 u8 *subelem, *pos; wpa_ft_bigtk_subelem() local 2375 wpa_ft_process_rdie(struct wpa_state_machine * sm,u8 * pos,u8 * end,u8 id,u8 descr_count,const u8 * ies,size_t ies_len) wpa_ft_process_rdie() argument 2473 wpa_ft_process_ric(struct wpa_state_machine * sm,u8 * pos,u8 * end,const u8 * ric,size_t ric_len) wpa_ft_process_ric() argument 2505 wpa_sm_write_assoc_resp_ies(struct wpa_state_machine * sm,u8 * pos,size_t max_len,int auth_alg,const u8 * req_ies,size_t req_ies_len,int omit_rsnxe) wpa_sm_write_assoc_resp_ies() argument 3063 u8 *pos, *end; wpa_ft_process_auth_req() local 3315 u8 mic[WPA_EAPOL_KEY_MIC_MAX_LEN]; wpa_ft_validate_reassoc() local 3687 u8 *pos; wpa_ft_send_rrb_auth_resp() local 4553 const u8 *pos, *end, *start; wpa_ft_rrb_rx() local [all...] |
H A D | ieee802_11.c | 3 * Copyright (c) 2002-2017, Jouni Malinen <j@w1.fi> 95 if (!hapd->conf->multi_ap) in hostapd_eid_multi_ap() 98 if (hapd->conf->multi_ap & BACKHAUL_BSS) in hostapd_eid_multi_ap() 100 if (hapd->conf->multi_ap & FRONTHAUL_BSS) in hostapd_eid_multi_ap() 103 if (hapd->conf->multi_ap_client_disallow & in hostapd_eid_multi_ap() 107 if (hapd->con in hostapd_eid_supp_rates() 108 u8 *pos = eid; hostapd_eid_supp_rates() local 164 u8 *pos = eid; hostapd_eid_ext_supp_rates() local 1262 const u8 *pos; check_sae_rejected_groups() local 1297 const u8 *pos, *end; handle_auth_sae() local 1773 handle_auth_fils(struct hostapd_data * hapd,struct sta_info * sta,const u8 * pos,size_t len,u16 auth_alg,u16 auth_transaction,u16 status_code,void (* cb)(struct hostapd_data * hapd,struct sta_info * sta,u16 resp,struct wpabuf * data,int pub)) handle_auth_fils() argument 2951 u8 mic[WPA_PASN_MAX_MIC_LEN]; handle_auth_pasn_resp() local 3387 u8 mic[WPA_PASN_MAX_MIC_LEN], out_mic[WPA_PASN_MAX_MIC_LEN]; handle_auth_pasn_3() local 3672 u8 *pos; handle_auth() local 5450 const u8 *pos; handle_assoc() local 6082 const u8 *pos, *end; handle_action() local 6095 const u8 *pos, *end; handle_action() local 6635 const u8 *pos, *end; handle_action_cb() local 6648 const u8 *pos, *end; handle_action_cb() local [all...] |
/freebsd-src/contrib/wpa/src/drivers/ |
H A D | driver_bsd.c | 2 * WPA Supplicant - driver interaction with BSD net80211 layer 85 dl_list_for_each(drv, &global->ifaces, struct bsd_driver_data, list) { in bsd_get_drvindex() 86 if (drv->ifindex == ifindex) in bsd_get_drvindex() 98 dl_list_for_each(drv, &global->ifaces, struct bsd_driver_data, list) { in bsd_get_drvname() 99 if (os_strcmp(drv->ifname, ifname) == 0) in bsd_get_drvname() 111 if (drv->ifindex == 0 || drv->if_removed) in bsd_set80211() 112 return -1; in bsd_set80211() 115 os_strlcpy(ireq.i_name, drv->ifname, sizeof(ireq.i_name)); in bsd_set80211() 121 if (ioctl(drv->globa in bsd_set80211() 761 struct ieee80211_michael_event *mic; bsd_wireless_event_receive() local 1431 u8 *pos; wpa_driver_bsd_add_scan_entry() local 1504 uint8_t buf[24*1024], *pos; wpa_driver_bsd_get_scan_results2() local [all...] |
H A D | driver_wext.c | 3 * Copyright (c) 2003-2015, Jouni Malinen <j@w1.fi> 9 * When used with WE-18 or newer, this interface can be used as-is with number 49 os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ); in wpa_driver_wext_set_auth_param() 53 if (ioctl(drv->ioctl_sock, SIOCSIWAUTH, &iwr) < 0) { in wpa_driver_wext_set_auth_param() 59 ret = errno == EOPNOTSUPP ? -2 : -1; in wpa_driver_wext_set_auth_param() 67 * wpa_driver_wext_get_bssid - Get BSSID, SIOCGIWAP 70 * Returns: 0 on success, -1 on failure 79 os_strlcpy(iwr.ifr_name, drv->ifnam in wpa_driver_wext_get_bssid() 300 const struct iw_michaelmicfailure *mic; wpa_driver_wext_event_wireless_michaelmicfailure() local 417 char *pos, *end, *custom, *buf; wpa_driver_wext_event_wireless() local 751 char buf[90], *pos; wext_get_phy_name() local 927 char path[200], buf[200], *pos; wext_check_hostap() local 1307 wext_get_scan_rate(struct iw_event * iwe,struct wext_scan_data * res,char * pos,char * end) wext_get_scan_rate() argument 1436 u8 *pos, *end, *ssid_ie = NULL, *rate_ie = NULL; wpa_driver_wext_add_scan_entry() local 1510 char *pos, *end, *custom; wpa_driver_wext_get_scan_results() local 2455 char *pos, *end; wpa_driver_wext_status() local [all...] |
/freebsd-src/sys/contrib/device-tree/src/arm/microchip/ |
H A D | at91-sama7g5ek.dts | 1 // SPDX-License-Identifier: (GPL-2.0+ OR MIT) 3 * at91-sama7g5ek.dts - Device Tree file for SAMA7G5-EK board 11 /dts-v1/; 12 #include "sama7g5-pinfunc.h" 14 #include <dt-bindings/mfd/atmel-flexco [all...] |