Home
last modified time | relevance | path

Searched +full:mic +full:- +full:pos (Results 1 – 25 of 43) sorted by relevance

12

/freebsd-src/contrib/wpa/src/eap_server/
H A Deap_server_gpsk.c2 * hostapd / EAP-GPSK (RFC 5433) server
3 * Copyright (c) 2006-2007, Jouni Malinen <j@w1.fi>
43 return "GPSK-1"; in eap_gpsk_state_txt()
45 return "GPSK-3"; in eap_gpsk_state_txt()
58 wpa_printf(MSG_DEBUG, "EAP-GPSK: %s -> %s", in eap_gpsk_state()
59 eap_gpsk_state_txt(data->state), in eap_gpsk_state()
61 data->state = state; in eap_gpsk_state()
72 data->state = GPSK_1; in eap_gpsk_init()
74 data->csuite_count = 0; in eap_gpsk_init()
77 WPA_PUT_BE32(data->csuite_list[data->csuite_count].vendor, in eap_gpsk_init()
[all …]
H A Deap_server_sake.c2 * hostapd / EAP-SAKE (RFC 4763) server
3 * Copyright (c) 2006-2007, Jouni Malinen <j@w1.fi>
54 wpa_printf(MSG_DEBUG, "EAP-SAKE: %s -> %s", in eap_sake_state()
55 eap_sake_state_txt(data->state), in eap_sake_state()
57 data->state = state; in eap_sake_state()
68 data->state = CHALLENGE; in eap_sake_init()
70 if (os_get_random(&data->session_id, 1)) { in eap_sake_init()
71 wpa_printf(MSG_ERROR, "EAP-SAKE: Failed to get random data"); in eap_sake_init()
75 wpa_printf(MSG_DEBUG, "EAP-SAKE: Initialized Session ID %d", in eap_sake_init()
76 data->session_id); in eap_sake_init()
[all …]
/freebsd-src/contrib/wpa/src/common/
H A Dwpa_common.c2 * WPA/RSN - Shared functions for supplicant and authenticator
3 * Copyright (c) 2002-2018, Jouni Malinen <j@w1.fi>
131 * wpa_use_akm_defined - Is AKM-defined Key Descriptor Version used in wpa_use_akm_defined()
133 * Returns: 1 if AKM-defined Key Descriptor Version is used; 0 otherwise
149 * wpa_use_cmac - Is CMAC integrity algorithm used for EAPOL-Key MIC
167 * wpa_use_aes_key_wrap - Is AES Keywrap algorithm used for EAPOL-Ke in wpa_use_aes_key_wrap()
193 wpa_eapol_key_mic(const u8 * key,size_t key_len,int akmp,int ver,const u8 * buf,size_t len,u8 * mic) wpa_eapol_key_mic() argument
597 u8 *data, *pos; fils_pmk_to_ptk() local
826 wpa_ft_mic(const u8 * kck,size_t kck_len,const u8 * sta_addr,const u8 * ap_addr,u8 transaction_seqnum,const u8 * mdie,size_t mdie_len,const u8 * ftie,size_t ftie_len,const u8 * rsnie,size_t rsnie_len,const u8 * ric,size_t ric_len,const u8 * rsnxe,size_t rsnxe_len,u8 * mic) wpa_ft_mic() argument
924 const u8 *end, *pos; wpa_ft_parse_ftie() local
997 const u8 *end, *pos; wpa_ft_parse_ies() local
1343 pasn_mic(const u8 * kck,int akmp,int cipher,const u8 * addr1,const u8 * addr2,const u8 * data,size_t data_len,const u8 * frame,size_t frame_len,u8 * mic) pasn_mic() argument
1542 const u8 *pos; wpa_parse_wpa_ie_rsn() local
1736 const u8 *pos; wpa_parse_wpa_ie_wpa() local
1862 u8 *pos, r0_key_data[64], hash[48]; wpa_derive_pmk_r0() local
1996 u8 *pos; wpa_derive_pmk_r1() local
2046 u8 *pos, hash[32]; wpa_pmk_r1_to_ptk() local
2695 u8 *pos = start; rsn_cipher_put_suites() local
2728 u8 *pos = start; wpa_cipher_put_suites() local
2850 char *pos = start; wpa_write_ciphers() local
2956 const char *pos = domain; fils_domain_name_hash() local
2984 wpa_parse_vendor_specific(const u8 * pos,const u8 * end,struct wpa_eapol_ie_parse * ie) wpa_parse_vendor_specific() argument
3019 wpa_parse_generic(const u8 * pos,struct wpa_eapol_ie_parse * ie) wpa_parse_generic() argument
3151 const u8 *pos, *end; wpa_parse_kde_ies() local
3331 u8 *pos; wpa_pasn_add_rsne() local
3634 const u8 *pos = (const u8 *) (params + 1); wpa_pasn_parse_parameter_ie() local
[all...]
H A Dwpa_common.h3 * Copyright (c) 2002-2018, Jouni Malinen <j@w1.fi>
123 /* EAPOL-Key Key Data Encapsulation
172 /* B2-B3: PTKSA Replay Counter */
173 /* B4-B5: GTKSA Replay Counter */
192 /* FTE - MIC Control - RSNXE Used */
197 /* FTE - MIC Length subfield values */
205 /* IEEE 802.11, 8.5.2 EAPOL-Ke
343 u8 mic[16]; global() member
351 u8 mic[24]; global() member
[all...]
H A Dieee802_11_common.c3 * Copyright (c) 2002-2019, Jouni Malinen <j@w1.fi>
15 #include "qca-vendor.h"
20 static int ieee802_11_parse_vendor_specific(const u8 *pos, size_t elen, in ieee802_11_parse_vendor_specific() argument
28 * sub-type. */ in ieee802_11_parse_vendor_specific()
35 return -1; in ieee802_11_parse_vendor_specific()
38 oui = WPA_GET_BE24(pos); in ieee802_11_parse_vendor_specific()
41 /* Microsoft/Wi-Fi information elements are further typed and in ieee802_11_parse_vendor_specific()
43 switch (pos[3]) { in ieee802_11_parse_vendor_specific()
47 elems->wpa_ie = pos; in ieee802_11_parse_vendor_specific()
202 ieee802_11_parse_extension(const u8 * pos,size_t elen,struct ieee802_11_elems * elems,int show_errors) ieee802_11_parse_extension() argument
327 ieee802_11_parse_fragment(struct frag_ies_info * frag_ies,const u8 * pos,u8 elen) ieee802_11_parse_fragment() argument
374 const u8 *pos = elem->data; ieee802_11_parse_elems() local
711 const char *pos; hostapd_config_wmm_ac() local
785 char *pos; hostapd_config_read_int10() local
813 const char *pos; hostapd_config_tx_queue() local
2058 u8 *pos = buf; add_multi_ap_ie() local
2330 ieee802_11_parse_candidate_list(const char * pos,u8 * nei_rep,size_t nei_rep_len) ieee802_11_parse_candidate_list() argument
[all...]
/freebsd-src/contrib/wpa/src/eap_common/
H A Deap_gpsk_common.c2 * EAP server/peer: EAP-GPSK shared routines
3 * Copyright (c) 2006-2007, Jouni Malinen <j@w1.fi>
19 * eap_gpsk_supported_ciphersuite - Check whether ciphersuite is supported
49 /* M_i = MAC_Y (i || Z); (MAC = AES-CMAC-128) */ in eap_gpsk_gkdf_cmac()
57 n = (len + hashlen - 1) / hashlen; in eap_gpsk_gkdf_cmac()
61 return -1; in eap_gpsk_gkdf_cmac()
65 left -= clen; in eap_gpsk_gkdf_cmac()
84 /* M_i = MAC_Y (i || Z); (MAC = HMAC-SHA256) */ in eap_gpsk_gkdf_sha256()
92 n = (len + hashlen - 1) / hashlen; in eap_gpsk_gkdf_sha256()
96 return -1; in eap_gpsk_gkdf_sha256()
[all …]
H A Deap_sake_common.c2 * EAP server/peer: EAP-SAKE shared routines
3 * Copyright (c) 2006-2019, Jouni Malinen <j@w1.fi>
25 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_S"); in eap_sake_parse_add_attr()
27 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_S with " in eap_sake_parse_add_attr()
29 return -1; in eap_sake_parse_add_attr()
31 attr->rand_s = data; in eap_sake_parse_add_attr()
34 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_P"); in eap_sake_parse_add_attr()
36 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_P with " in eap_sake_parse_add_attr()
38 return -1; in eap_sake_parse_add_attr()
40 attr->rand_ in eap_sake_parse_add_attr()
163 const u8 *pos = buf, *end = buf + len; eap_sake_parse_attributes() local
215 size_t pos, plen; eap_sake_kdf() local
333 eap_sake_compute_mic(const u8 * tek_auth,const u8 * rand_s,const u8 * rand_p,const u8 * serverid,size_t serverid_len,const u8 * peerid,size_t peerid_len,int peer,const u8 * eap,size_t eap_len,const u8 * mic_pos,u8 * mic) eap_sake_compute_mic() argument
336 u8 *tmp, *pos; eap_sake_compute_mic() local
[all...]
/freebsd-src/contrib/wpa/src/rsn_supp/
H A Dtdls.c2 * wpa_supplicant - TDLS
3 * Copyright (c) 2010-2011, Atheros Communications
56 u8 mic[TDLS_MIC_LEN]; member
77 /* TDLS frame headers as per IEEE Std 802.11z-2010 */
84 static u8 * wpa_add_tdls_timeoutie(u8 *pos, u8 *ie, size_t ie_len, u32 tsecs);
112 u8 kck[16]; /* TPK-KCK */
113 u8 tk[16]; /* TPK-TK; assuming only CCMP will be used */
116 int tk_set; /* TPK-TK configured to the driver */
172 return sm->mlo.links[link_id].bssid;
173 return sm->bssi
174 wpa_add_ie(u8 * pos,const u8 * ie,size_t ie_len) wpa_add_ie() argument
477 wpa_tdls_ftie_mic(const u8 * kck,u8 trans_seq,const u8 * lnkid,const u8 * rsnie,const u8 * timeoutie,const u8 * ftie,u8 * mic) wpa_tdls_ftie_mic() argument
479 u8 *buf, *pos; wpa_tdls_ftie_mic() local
539 wpa_tdls_key_mic_teardown(const u8 * kck,u8 trans_seq,u16 rcode,u8 dtoken,const u8 * lnkid,const u8 * ftie,u8 * mic) wpa_tdls_key_mic_teardown() argument
541 u8 *buf, *pos; wpa_tdls_key_mic_teardown() local
589 u8 mic[16]; wpa_supplicant_verify_tdls_mic() local
617 u8 mic[16]; wpa_supplicant_verify_tdls_mic_teardown() local
762 u8 *rbuf, *pos; wpa_tdls_send_teardown() local
948 const u8 *pos; wpa_tdls_recv_teardown() local
1077 u8 *rbuf, *pos, *count_pos; wpa_tdls_send_tpk_m1() local
1256 u8 *rbuf, *pos; wpa_tdls_send_tpk_m2() local
1347 u8 *rbuf, *pos; wpa_tdls_send_tpk_m3() local
1449 u8 *rbuf, *pos, *count_pos; wpa_tdls_send_discovery_response() local
2264 const u8 *pos; wpa_tdls_process_tpk_m2() local
2551 const u8 *pos; wpa_tdls_process_tpk_m3() local
2700 wpa_add_tdls_timeoutie(u8 * pos,u8 * ie,size_t ie_len,u32 tsecs) wpa_add_tdls_timeoutie() argument
[all...]
H A Dwpa_ft.c2 * WPA Supplicant - IEEE 802.11r - Fast BSS Transition
3 * Copyright (c) 2006-2018, Jouni Malinen <j@w1.fi>
41 const u8 *anonce = key->key_nonce; in wpa_derive_ptk_ft()
42 int use_sha384 = wpa_key_mgmt_sha384(sm->key_mgmt); in wpa_derive_ptk_ft()
47 if (sm->xxkey_len > 0) { in wpa_derive_ptk_ft()
48 mpmk = sm->xxkey; in wpa_derive_ptk_ft()
49 mpmk_len = sm->xxkey_len; in wpa_derive_ptk_ft()
50 } else if (sm->cur_pmksa) { in wpa_derive_ptk_ft()
51 mpmk = sm->cur_pmks in wpa_derive_ptk_ft()
149 u8 *pos = sm->assoc_resp_ies; wpa_sm_set_ft_params() local
193 u8 *buf, *pos, *ftie_len, *ftie_pos, *fte_mic, *elem_count; wpa_ft_gen_req_ies() local
509 u8 *pos = buf; wpa_ft_add_mdie() local
982 u8 mic[WPA_EAPOL_KEY_MIC_MAX_LEN]; wpa_ft_validate_reassoc_resp() local
[all...]
H A Dwpa.c2 * WPA Supplicant - WPA state machine and EAPOL-Key processing
3 * Copyright (c) 2003-2018, Jouni Malinen <j@w1.fi>
80 * wpa_eapol_key_send - Send WPA/RSN EAPOL-Key message in wpa_eapol_key_send()
86 * @msg: EAPOL-Key message in wpa_eapol_key_send()
88 * @key_mic: Pointer to the buffer to which the EAPOL-Key MIC is written in wpa_eapol_key_send()
95 int ret = -1; in wpa_eapol_key_send()
96 size_t mic_len = wpa_mic_len(sm->key_mgm in wpa_eapol_key_send()
186 u8 bssid[ETH_ALEN], *rbuf, *key_mic, *mic; wpa_sm_key_request() local
765 u8 *pos; wpa_supplicant_process_1_of_4() local
795 u8 *pos; wpa_supplicant_process_1_of_4() local
811 u8 *pos; wpa_supplicant_process_1_of_4() local
1496 const u8 *pos, *end, *mdie = NULL, *ftie = NULL; wpa_supplicant_validate_ie_ft() local
2061 u8 *pos; wpa_supplicant_send_2_of_2() local
2169 u8 mic[WPA_EAPOL_KEY_MIC_MAX_LEN]; wpa_supplicant_verify_eapol_key_mic() local
2361 wpa_eapol_key_dump(struct wpa_sm * sm,const struct wpa_eapol_key * key,unsigned int key_data_len,const u8 * mic,unsigned int mic_len) wpa_eapol_key_dump() argument
2402 u8 *pos, *tmp; wpa_supp_aead_decrypt() local
2490 u8 *mic, *key_data; wpa_sm_rx_eapol() local
3412 char *pos = buf, *end = buf + buflen; wpa_sm_get_status() local
4167 const u8 *pos, *end; fils_process_auth() local
4473 u8 *pos; fils_ft_build_assoc_req_rsne() local
4629 const u8 *pos = wpabuf_head(hlp[i]); fils_build_assoc_req() local
4661 u8 *pos; fils_build_assoc_req() local
4705 const u8 *pos, *end; fils_process_hlp_resp() local
4719 fils_process_hlp_container(struct wpa_sm * sm,const u8 * pos,size_t len) fils_process_hlp_container() argument
[all...]
/freebsd-src/contrib/wpa/src/eap_peer/
H A Deap_gpsk.c2 * EAP peer method: EAP-GPSK (RFC 5433)
3 * Copyright (c) 2006-2014, Jouni Malinen <j@w1.fi>
53 return "GPSK-1"; in eap_gpsk_state_txt()
55 return "GPSK-3"; in eap_gpsk_state_txt()
69 wpa_printf(MSG_DEBUG, "EAP-GPSK: %s -> %s", in eap_gpsk_state()
70 eap_gpsk_state_txt(data->state), in eap_gpsk_state()
72 data->state = state; in eap_gpsk_state()
88 wpa_printf(MSG_INFO, "EAP-GPSK: No key (password) configured"); in eap_gpsk_init()
95 data->state = GPSK_1; in eap_gpsk_init()
99 data->id_peer = os_memdup(identity, identity_len); in eap_gpsk_init()
[all …]
H A Deap_sake.c2 * EAP peer method: EAP-SAKE (RFC 4763)
3 * Copyright (c) 2006-2019, Jouni Malinen <j@w1.fi>
58 wpa_printf(MSG_DEBUG, "EAP-SAKE: %s -> %s", in eap_sake_state()
59 eap_sake_state_txt(data->state), in eap_sake_state()
61 data->state = state; in eap_sake_state()
76 wpa_printf(MSG_INFO, "EAP-SAKE: No key of correct length " in eap_sake_init()
84 data->state = IDENTITY; in eap_sake_init()
88 data->peerid = os_memdup(identity, identity_len); in eap_sake_init()
89 if (data->peerid == NULL) { in eap_sake_init()
93 data->peerid_len = identity_len; in eap_sake_init()
[all …]
/freebsd-src/contrib/wpa/wpa_supplicant/
H A Dmesh_rsn.c2 * WPA Supplicant - Mesh RSN routines
3 * Copyright (c) 2013-2014, cozybit, Inc. All rights reserved.
37 if (sta->sae->state != SAE_ACCEPTED) { in mesh_auth_timer()
38 wpa_printf(MSG_DEBUG, "AUTH: Re-authenticate with " MACSTR in mesh_auth_timer()
40 MAC2STR(sta->addr), sta->sae_auth_retry); in mesh_auth_timer()
42 MAC2STR(sta->addr)); in mesh_auth_timer()
43 if (sta->sae_auth_retry < MESH_AUTH_RETRY) { in mesh_auth_timer()
46 hapd = wpa_s->ifms in mesh_auth_timer()
538 u8 *ampe_ie, *pos, *mic_payload; mesh_rsn_protect_frame() local
637 u8 *ampe_buf, *crypt = NULL, *pos, *end; mesh_rsn_process_ampe() local
[all...]
H A Dmesh_mpm.c2 * WPA Supplicant - Basic mesh peer management
3 * Copyright (c) 2013-2014, cozybit, Inc. All rights reserved.
79 mpm_ie->chosen_pmk = ie + len - SAE_PMKID_LEN; in mesh_mpm_parse_peer_mgmt()
80 len -= SAE_PMKID_LEN; in mesh_mpm_parse_peer_mgmt()
87 return -1; in mesh_mpm_parse_peer_mgmt()
92 return -1; in mesh_mpm_parse_peer_mgmt()
93 mpm_ie->proto_id = ie; in mesh_mpm_parse_peer_mgmt()
94 mpm_ie->llid = ie + 2; in mesh_mpm_parse_peer_mgmt()
96 len - in mesh_mpm_parse_peer_mgmt()
217 u8 *pos, *cat; mesh_mpm_send_plink_action() local
[all...]
/freebsd-src/sys/net80211/
H A Dieee80211_crypto_ccmp.c1 /*-
2 * SPDX-License-Identifier: BSD-2-Clause
4 * Copyright (c) 2002-2008 Sam Leffler, Errno Consulting
30 * IEEE 802.11i AES-CCMP crypto support.
73 .ic_name = "AES-CCM",
104 vap->iv_stats.is_crypto_nomem++; in ccmp_attach()
107 ctx->cc_vap = vap; in ccmp_attach()
108 ctx->cc_ic = vap->iv_ic; in ccmp_attach()
116 struct ccmp_ctx *ctx = k->wk_private; in ccmp_detach()
120 nrefs--; /* NB: we assume caller locking */ in ccmp_detach()
[all …]
H A Dieee80211_crypto_tkip.c1 /*-
2 * SPDX-License-Identifier: BSD-2-Clause
4 * Copyright (c) 2002-2008 Sam Leffler, Errno Consulting
94 uint64_t rx_rsc; /* held until MIC verified */
99 u8 mic[IEEE80211_WEP_MICLEN]);
116 vap->iv_stats.is_crypto_nomem++; in tkip_attach()
120 ctx->tc_va in tkip_attach()
260 uint8_t mic[IEEE80211_WEP_MICLEN]; tkip_enmic() local
414 u8 mic[IEEE80211_WEP_MICLEN]; tkip_demic() local
672 u8 *pos; wep_encrypt() local
731 u8 *pos, icv[4]; wep_decrypt() local
[all...]
H A Dieee80211_crypto_wep.c1 /*-
2 * SPDX-License-Identifier: BSD-2-Clause
4 * Copyright (c) 2002-2008 Sam Leffler, Errno Consulting
95 vap->iv_stats.is_crypto_nomem++; in wep_attach()
99 ctx->wc_vap = vap; in wep_attach()
100 ctx->wc_ic = vap->iv_ic; in wep_attach()
101 net80211_get_random_bytes(&ctx->wc_iv, sizeof(ctx->wc_iv)); in wep_attach()
109 struct wep_ctx *ctx = k->wk_private; in wep_detach()
113 nrefs--; /* NB: we assume caller locking */ in wep_detach()
119 return k->wk_keylen >= 40/NBBY; in wep_setkey()
[all …]
/freebsd-src/sys/contrib/device-tree/Bindings/sound/
H A Dmicrochip,pdmc.yaml1 # SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause)
3 ---
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
10 - Codrin Ciubotariu <codrin.ciubotariu@microchip.com>
17 - $ref: dai-common.yaml#
21 const: microchip,sama7g5-pdmc
26 "#sound-dai-cells":
34 - description: Peripheral Bus Clock
35 - description: Generic Clock
37 clock-names:
[all …]
H A Dmicrochip,sama7g5-pdmc.yaml1 # SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause)
3 ---
4 $id: http://devicetree.org/schemas/sound/microchip,sama7g5-pdmc.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
10 - Codrin Ciubotariu <codrin.ciubotariu@microchip.com>
17 - $ref: dai-common.yaml#
21 const: microchip,sama7g5-pdmc
26 "#sound-dai-cells":
34 - description: Peripheral Bus Clock
35 - description: Generic Clock
[all …]
/freebsd-src/contrib/wpa/src/ap/
H A Dwpa_auth.c3 * Copyright (c) 2004-2022, Jouni Malinen <j@w1.fi>
73 static u8 * ieee80211w_kde_add(struct wpa_state_machine *sm, u8 *pos);
92 if (sm->mld_assoc_link_id >= 0) in wpa_auth_psk_failure_report()
93 return sm->wpa_auth->mld_addr; in wpa_auth_psk_failure_report()
95 return sm->wpa_auth->addr; in wpa_auth_psk_failure_report()
102 if (sm->mld_assoc_link_id >= 0) in wpa_auth_set_eapol()
103 return sm->peer_mld_addr; in wpa_auth_set_eapol()
105 return sm->add in wpa_auth_set_eapol()
1028 u8 *mic; wpa_receive() local
1435 u8 *pos; wpa_gmk_to_gtk() local
1503 u8 *buf, *pos; __wpa_send_eapol() local
1749 u8 mic[WPA_EAPOL_KEY_MIC_MAX_LEN], *mic_pos; wpa_verify_key_mic() local
2426 u8 *pos; wpa_aead_decrypt() local
2575 fils_decrypt_assoc(struct wpa_state_machine * sm,const u8 * fils_session,const struct ieee80211_mgmt * mgmt,size_t frame_len,u8 * pos,size_t left) fils_decrypt_assoc() argument
2666 u8 *pos = buf + current_len; fils_encrypt_assoc() local
2818 u8 *pos; fils_prepare_plainbuf() local
2884 u8 *pos = buf; hostapd_eid_assoc_fils_session() local
2935 const u8 *eapol_key_ie, *key_data, *mic; SM_STATE() local
3242 ieee80211w_kde_add(struct wpa_state_machine * sm,u8 * pos) ieee80211w_kde_add() argument
3375 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde = NULL, *pos, stub_gtk[32]; SM_STATE() local
3854 u8 *kde_buf = NULL, *pos, hdr[2]; SM_STATE() local
3932 const u8 *key_data, *mic; SM_STATE() local
4175 wpa_wnmsleep_gtk_subelem(struct wpa_state_machine * sm,u8 * pos) wpa_wnmsleep_gtk_subelem() argument
4215 wpa_wnmsleep_igtk_subelem(struct wpa_state_machine * sm,u8 * pos) wpa_wnmsleep_igtk_subelem() argument
4254 wpa_wnmsleep_bigtk_subelem(struct wpa_state_machine * sm,u8 * pos) wpa_wnmsleep_bigtk_subelem() argument
5395 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos; wpa_auth_resend_m3() local
5579 u8 *kde_buf = NULL, *pos, hdr[2]; wpa_auth_resend_group_m1() local
[all...]
H A Dwpa_auth_ft.c2 * hostapd - IEEE 802.11r - Fast BSS Transition
3 * Copyright (c) 2004-2018, Jouni Malinen <j@w1.fi>
58 * wpa_ft_rrb_decrypt - Decrypt FT RRB message
59 * @key: AES-SIV key for AEAD
66 * @type: Vendor-specific subtype of the RRB frame (FT_PACKET_*)
72 * Returns: 0 on success, -1 on error in wpa_ft_rrb_decrypt()
105 *plain = os_zalloc(enc_len - AES_BLOCK_SIZE); in wpa_ft_rrb_decrypt()
117 enc_len -= 2; in wpa_ft_rrb_decrypt()
123 *plain_size = enc_len - AES_BLOCK_SIZ in wpa_ft_rrb_decrypt()
329 u8 *pos; wpa_ft_tlv_lin() local
385 u8 *pos = start; wpa_ft_vlan_lin() local
438 u8 *pos, *endpos; wpa_ft_rrb_lin() local
527 u8 *plain = NULL, *auth = NULL, *pos, *tmp; wpa_ft_rrb_build() local
790 u8 *pos = buf; wpa_write_mdie() local
814 u8 *pos = buf, *ielen; wpa_write_ftie() local
2255 u8 *subelem, *pos; wpa_ft_igtk_subelem() local
2316 u8 *subelem, *pos; wpa_ft_bigtk_subelem() local
2375 wpa_ft_process_rdie(struct wpa_state_machine * sm,u8 * pos,u8 * end,u8 id,u8 descr_count,const u8 * ies,size_t ies_len) wpa_ft_process_rdie() argument
2473 wpa_ft_process_ric(struct wpa_state_machine * sm,u8 * pos,u8 * end,const u8 * ric,size_t ric_len) wpa_ft_process_ric() argument
2505 wpa_sm_write_assoc_resp_ies(struct wpa_state_machine * sm,u8 * pos,size_t max_len,int auth_alg,const u8 * req_ies,size_t req_ies_len,int omit_rsnxe) wpa_sm_write_assoc_resp_ies() argument
3063 u8 *pos, *end; wpa_ft_process_auth_req() local
3315 u8 mic[WPA_EAPOL_KEY_MIC_MAX_LEN]; wpa_ft_validate_reassoc() local
3687 u8 *pos; wpa_ft_send_rrb_auth_resp() local
4553 const u8 *pos, *end, *start; wpa_ft_rrb_rx() local
[all...]
H A Dieee802_11.c3 * Copyright (c) 2002-2017, Jouni Malinen <j@w1.fi>
95 if (!hapd->conf->multi_ap) in hostapd_eid_multi_ap()
98 if (hapd->conf->multi_ap & BACKHAUL_BSS) in hostapd_eid_multi_ap()
100 if (hapd->conf->multi_ap & FRONTHAUL_BSS) in hostapd_eid_multi_ap()
103 if (hapd->conf->multi_ap_client_disallow & in hostapd_eid_multi_ap()
107 if (hapd->con in hostapd_eid_supp_rates()
108 u8 *pos = eid; hostapd_eid_supp_rates() local
164 u8 *pos = eid; hostapd_eid_ext_supp_rates() local
1262 const u8 *pos; check_sae_rejected_groups() local
1297 const u8 *pos, *end; handle_auth_sae() local
1773 handle_auth_fils(struct hostapd_data * hapd,struct sta_info * sta,const u8 * pos,size_t len,u16 auth_alg,u16 auth_transaction,u16 status_code,void (* cb)(struct hostapd_data * hapd,struct sta_info * sta,u16 resp,struct wpabuf * data,int pub)) handle_auth_fils() argument
2951 u8 mic[WPA_PASN_MAX_MIC_LEN]; handle_auth_pasn_resp() local
3387 u8 mic[WPA_PASN_MAX_MIC_LEN], out_mic[WPA_PASN_MAX_MIC_LEN]; handle_auth_pasn_3() local
3672 u8 *pos; handle_auth() local
5450 const u8 *pos; handle_assoc() local
6082 const u8 *pos, *end; handle_action() local
6095 const u8 *pos, *end; handle_action() local
6635 const u8 *pos, *end; handle_action_cb() local
6648 const u8 *pos, *end; handle_action_cb() local
[all...]
/freebsd-src/contrib/wpa/src/drivers/
H A Ddriver_bsd.c2 * WPA Supplicant - driver interaction with BSD net80211 layer
85 dl_list_for_each(drv, &global->ifaces, struct bsd_driver_data, list) { in bsd_get_drvindex()
86 if (drv->ifindex == ifindex) in bsd_get_drvindex()
98 dl_list_for_each(drv, &global->ifaces, struct bsd_driver_data, list) { in bsd_get_drvname()
99 if (os_strcmp(drv->ifname, ifname) == 0) in bsd_get_drvname()
111 if (drv->ifindex == 0 || drv->if_removed) in bsd_set80211()
112 return -1; in bsd_set80211()
115 os_strlcpy(ireq.i_name, drv->ifname, sizeof(ireq.i_name)); in bsd_set80211()
121 if (ioctl(drv->globa in bsd_set80211()
761 struct ieee80211_michael_event *mic; bsd_wireless_event_receive() local
1431 u8 *pos; wpa_driver_bsd_add_scan_entry() local
1504 uint8_t buf[24*1024], *pos; wpa_driver_bsd_get_scan_results2() local
[all...]
H A Ddriver_wext.c3 * Copyright (c) 2003-2015, Jouni Malinen <j@w1.fi>
9 * When used with WE-18 or newer, this interface can be used as-is with number
49 os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ); in wpa_driver_wext_set_auth_param()
53 if (ioctl(drv->ioctl_sock, SIOCSIWAUTH, &iwr) < 0) { in wpa_driver_wext_set_auth_param()
59 ret = errno == EOPNOTSUPP ? -2 : -1; in wpa_driver_wext_set_auth_param()
67 * wpa_driver_wext_get_bssid - Get BSSID, SIOCGIWAP
70 * Returns: 0 on success, -1 on failure
79 os_strlcpy(iwr.ifr_name, drv->ifnam in wpa_driver_wext_get_bssid()
300 const struct iw_michaelmicfailure *mic; wpa_driver_wext_event_wireless_michaelmicfailure() local
417 char *pos, *end, *custom, *buf; wpa_driver_wext_event_wireless() local
751 char buf[90], *pos; wext_get_phy_name() local
927 char path[200], buf[200], *pos; wext_check_hostap() local
1307 wext_get_scan_rate(struct iw_event * iwe,struct wext_scan_data * res,char * pos,char * end) wext_get_scan_rate() argument
1436 u8 *pos, *end, *ssid_ie = NULL, *rate_ie = NULL; wpa_driver_wext_add_scan_entry() local
1510 char *pos, *end, *custom; wpa_driver_wext_get_scan_results() local
2455 char *pos, *end; wpa_driver_wext_status() local
[all...]
/freebsd-src/sys/contrib/device-tree/src/arm/microchip/
H A Dat91-sama7g5ek.dts1 // SPDX-License-Identifier: (GPL-2.0+ OR MIT)
3 * at91-sama7g5ek.dts - Device Tree file for SAMA7G5-EK board
11 /dts-v1/;
12 #include "sama7g5-pinfunc.h"
14 #include <dt-bindings/mfd/atmel-flexco
[all...]

12