Lines Matching defs:ckn

163 	wpa_hexdump(MSG_DEBUG, "\tCAK Name", body->ckn,
280 ieee802_1x_kay_get_participant(struct ieee802_1x_kay *kay, const u8 *ckn,
287 if (participant->ckn.len == len &&
288 os_memcmp(participant->ckn.name, ckn,
289 participant->ckn.len) == 0)
726 length += participant->ckn.len;
743 length += participant->ckn.len;
769 os_memcpy(body->ckn, participant->ckn.name, participant->ckn.len);
821 participant = ieee802_1x_kay_get_participant(kay, body->ckn, ckn_len);
2662 ieee802_1x_kay_delete_mka(kay, &participant->ckn);
3146 participant = ieee802_1x_kay_get_participant(kay, body->ckn, ckn_len);
3590 ieee802_1x_kay_delete_mka(kay, &participant->ckn);
3624 const struct mka_key_name *ckn,
3635 if (!kay || !ckn || !cak) {
3636 wpa_printf(MSG_ERROR, "KaY: ckn or cak is null");
3645 if (ckn->len > MAX_CKN_LEN) {
3660 participant->ckn.len = ckn->len;
3661 os_memcpy(participant->ckn.name, ckn->name, ckn->len);
3662 wpa_hexdump(MSG_DEBUG, "KaY: CKN", participant->ckn.name,
3663 participant->ckn.len);
3741 participant->ckn.name,
3742 participant->ckn.len,
3755 participant->ckn.name,
3756 participant->ckn.len,
3795 ieee802_1x_kay_delete_mka(struct ieee802_1x_kay *kay, struct mka_key_name *ckn)
3802 if (!kay || !ckn)
3808 participant = ieee802_1x_kay_get_participant(kay, ckn->name, ckn->len);
3811 ckn->name, ckn->len);
3859 struct mka_key_name *ckn, bool status)
3863 if (!kay || !ckn)
3866 participant = ieee802_1x_kay_get_participant(kay, ckn->name, ckn->len);
4015 pos2 += wpa_snprintf_hex(pos2, end - pos2, p->ckn.name,
4016 p->ckn.len);
4117 pos2 += wpa_snprintf_hex(pos2, end - pos2, p->ckn.name,
4118 p->ckn.len);