/freebsd-11.0-release/contrib/wpa/src/rsn_supp/ |
H A D | peerkey.h | 44 struct wpa_eapol_key *key, u16 key_info, u16 ver, 48 u16 key_info, u16 ver); 64 struct wpa_eapol_key *key, u16 key_info, u16 ver, 72 u16 key_info, u16 ver) 63 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver, const u8 *key_data, size_t key_data_len) argument 70 peerkey_rx_eapol_smk(struct wpa_sm *sm, const u8 *src_addr, struct wpa_eapol_key *key, size_t extra_len, u16 key_info, u16 ver) argument
|
H A D | wpa.c | 94 int key_info, ver; local 125 key_info = WPA_KEY_INFO_REQUEST | ver; 127 key_info |= WPA_KEY_INFO_MIC; 129 key_info |= WPA_KEY_INFO_ERROR; 131 key_info |= WPA_KEY_INFO_KEY_TYPE; 132 WPA_PUT_BE16(reply->key_info, key_info); 142 if (!(key_info & WPA_KEY_INFO_MIC)) 388 WPA_PUT_BE16(reply->key_info, 787 int key_info) 784 wpa_supplicant_pairwise_gtk(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *gtk, size_t gtk_len, int key_info) argument 1155 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, struct wpa_ptk *ptk) argument 1205 u16 key_info, keylen; local 1330 wpa_supplicant_process_1_of_2_rsn(struct wpa_sm *sm, const u8 *keydata, size_t keydatalen, u16 key_info, struct wpa_gtk_data *gd) argument 1380 wpa_supplicant_process_1_of_2_wpa(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 key_info, u16 ver, struct wpa_gtk_data *gd) argument 1467 wpa_supplicant_send_2_of_2(struct wpa_sm *sm, const struct wpa_eapol_key *key, int ver, u16 key_info) argument 1517 u16 key_info; local 1724 u16 key_info = WPA_GET_BE16(key->key_info); local 1778 u16 key_info, ver; local [all...] |
H A D | peerkey.c | 72 u16 key_info; local 86 key_info = ver | WPA_KEY_INFO_SMK_MESSAGE | WPA_KEY_INFO_MIC | 89 WPA_PUT_BE16(err->key_info, key_info); 134 u16 key_info; local 149 key_info = ver | WPA_KEY_INFO_SMK_MESSAGE | WPA_KEY_INFO_MIC | 151 WPA_PUT_BE16(reply->key_info, key_info); 329 u16 key_info, ver; local 346 key_info 386 u16 key_info, ver; local 985 int key_info, ver; local 1113 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver, const u8 *key_data, size_t key_data_len) argument 1137 peerkey_rx_eapol_smk(struct wpa_sm *sm, const u8 *src_addr, struct wpa_eapol_key *key, size_t extra_len, u16 key_info, u16 ver) argument [all...] |
H A D | wpa_i.h | 369 u16 ver, u16 key_info,
|
/freebsd-11.0-release/crypto/openssl/engines/ccgost/ |
H A D | gost2001_keyx.c | 177 if (!ASN1_OCTET_STRING_set(gkt->key_info->imit, crypted_key + 40, 4)) { 181 (gkt->key_info->encrypted_key, crypted_key + 8, 32)) { 274 OPENSSL_assert(gkt->key_info->encrypted_key->length == 32); 275 memcpy(wrappedKey + 8, gkt->key_info->encrypted_key->data, 32); 276 OPENSSL_assert(gkt->key_info->imit->length == 4); 277 memcpy(wrappedKey + 40, gkt->key_info->imit->data, 4);
|
H A D | gost94_keyx.c | 161 if (!ASN1_OCTET_STRING_set(gkt->key_info->imit, crypted_key + 40, 4)) { 165 (gkt->key_info->encrypted_key, crypted_key + 8, 32)) { 264 OPENSSL_assert(gkt->key_info->encrypted_key->length == 32); 265 memcpy(wrappedKey + 8, gkt->key_info->encrypted_key->data, 32); 266 OPENSSL_assert(gkt->key_info->imit->length == 4); 267 memcpy(wrappedKey + 40, gkt->key_info->imit->data, 4);
|
H A D | gost_asn1.c | 15 ASN1_SIMPLE(GOST_KEY_TRANSPORT, key_info, GOST_KEY_INFO),
|
H A D | gost_lcl.h | 78 GOST_KEY_INFO *key_info; member in struct:__anon6454
|
/freebsd-11.0-release/contrib/wpa/src/ap/ |
H A D | wpa_auth.c | 876 u16 key_info, key_data_length; local 897 key_info = WPA_GET_BE16(key->key_info); 906 " key_info=0x%x type=%u key_data_length=%u", 907 MAC2STR(sm->addr), key_info, key->type, key_data_length); 948 if ((key_info & (WPA_KEY_INFO_SMK_MESSAGE | WPA_KEY_INFO_REQUEST)) == 950 if (key_info & WPA_KEY_INFO_ERROR) { 957 } else if (key_info & WPA_KEY_INFO_SMK_MESSAGE) { 960 } else if (key_info & WPA_KEY_INFO_REQUEST) { 963 } else if (!(key_info 1402 __wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr, int force_version) argument 1603 wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr) argument 1640 u16 key_info; local [all...] |
H A D | wpa_auth_i.h | 221 struct wpa_state_machine *sm, int key_info,
|
/freebsd-11.0-release/contrib/telnet/libtelnet/ |
H A D | encrypt.c | 174 static struct key_info { struct 185 static void encrypt_keyid(struct key_info *kp, unsigned char *keyid, int len); 718 encrypt_keyid(struct key_info *kp, unsigned char *keyid, int len) 769 struct key_info *kp = &ki[(dir == DIR_ENCRYPT) ? 0 : 1];
|
/freebsd-11.0-release/crypto/heimdal/appl/telnet/libtelnet/ |
H A D | encrypt.c | 166 static struct key_info { struct 733 encrypt_keyid(struct key_info *kp, unsigned char *keyid, int len) 793 struct key_info *kp = &ki[(dir == DIR_ENCRYPT) ? 0 : 1];
|
/freebsd-11.0-release/contrib/wpa/src/common/ |
H A D | wpa_common.h | 172 /* Note: key_info, key_length, and key_data_length are unaligned */ 173 u8 key_info[2]; /* big endian */ member in struct:wpa_eapol_key 187 /* Note: key_info, key_length, and key_data_length are unaligned */ 188 u8 key_info[2]; /* big endian */ member in struct:wpa_eapol_key_192
|
/freebsd-11.0-release/contrib/wpa/wpa_supplicant/ |
H A D | ibss_rsn.c | 711 u16 key_info; local 744 key_info = WPA_GET_BE16(key->key_info); 746 return !!(key_info & WPA_KEY_INFO_ACK);
|