Searched refs:key_info (Results 1 - 14 of 14) sorted by relevance

/freebsd-11.0-release/contrib/wpa/src/rsn_supp/
H A Dpeerkey.h44 struct wpa_eapol_key *key, u16 key_info, u16 ver,
48 u16 key_info, u16 ver);
64 struct wpa_eapol_key *key, u16 key_info, u16 ver,
72 u16 key_info, u16 ver)
63 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver, const u8 *key_data, size_t key_data_len) argument
70 peerkey_rx_eapol_smk(struct wpa_sm *sm, const u8 *src_addr, struct wpa_eapol_key *key, size_t extra_len, u16 key_info, u16 ver) argument
H A Dwpa.c94 int key_info, ver; local
125 key_info = WPA_KEY_INFO_REQUEST | ver;
127 key_info |= WPA_KEY_INFO_MIC;
129 key_info |= WPA_KEY_INFO_ERROR;
131 key_info |= WPA_KEY_INFO_KEY_TYPE;
132 WPA_PUT_BE16(reply->key_info, key_info);
142 if (!(key_info & WPA_KEY_INFO_MIC))
388 WPA_PUT_BE16(reply->key_info,
787 int key_info)
784 wpa_supplicant_pairwise_gtk(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *gtk, size_t gtk_len, int key_info) argument
1155 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, struct wpa_ptk *ptk) argument
1205 u16 key_info, keylen; local
1330 wpa_supplicant_process_1_of_2_rsn(struct wpa_sm *sm, const u8 *keydata, size_t keydatalen, u16 key_info, struct wpa_gtk_data *gd) argument
1380 wpa_supplicant_process_1_of_2_wpa(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 key_info, u16 ver, struct wpa_gtk_data *gd) argument
1467 wpa_supplicant_send_2_of_2(struct wpa_sm *sm, const struct wpa_eapol_key *key, int ver, u16 key_info) argument
1517 u16 key_info; local
1724 u16 key_info = WPA_GET_BE16(key->key_info); local
1778 u16 key_info, ver; local
[all...]
H A Dpeerkey.c72 u16 key_info; local
86 key_info = ver | WPA_KEY_INFO_SMK_MESSAGE | WPA_KEY_INFO_MIC |
89 WPA_PUT_BE16(err->key_info, key_info);
134 u16 key_info; local
149 key_info = ver | WPA_KEY_INFO_SMK_MESSAGE | WPA_KEY_INFO_MIC |
151 WPA_PUT_BE16(reply->key_info, key_info);
329 u16 key_info, ver; local
346 key_info
386 u16 key_info, ver; local
985 int key_info, ver; local
1113 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver, const u8 *key_data, size_t key_data_len) argument
1137 peerkey_rx_eapol_smk(struct wpa_sm *sm, const u8 *src_addr, struct wpa_eapol_key *key, size_t extra_len, u16 key_info, u16 ver) argument
[all...]
H A Dwpa_i.h369 u16 ver, u16 key_info,
/freebsd-11.0-release/crypto/openssl/engines/ccgost/
H A Dgost2001_keyx.c177 if (!ASN1_OCTET_STRING_set(gkt->key_info->imit, crypted_key + 40, 4)) {
181 (gkt->key_info->encrypted_key, crypted_key + 8, 32)) {
274 OPENSSL_assert(gkt->key_info->encrypted_key->length == 32);
275 memcpy(wrappedKey + 8, gkt->key_info->encrypted_key->data, 32);
276 OPENSSL_assert(gkt->key_info->imit->length == 4);
277 memcpy(wrappedKey + 40, gkt->key_info->imit->data, 4);
H A Dgost94_keyx.c161 if (!ASN1_OCTET_STRING_set(gkt->key_info->imit, crypted_key + 40, 4)) {
165 (gkt->key_info->encrypted_key, crypted_key + 8, 32)) {
264 OPENSSL_assert(gkt->key_info->encrypted_key->length == 32);
265 memcpy(wrappedKey + 8, gkt->key_info->encrypted_key->data, 32);
266 OPENSSL_assert(gkt->key_info->imit->length == 4);
267 memcpy(wrappedKey + 40, gkt->key_info->imit->data, 4);
H A Dgost_asn1.c15 ASN1_SIMPLE(GOST_KEY_TRANSPORT, key_info, GOST_KEY_INFO),
H A Dgost_lcl.h78 GOST_KEY_INFO *key_info; member in struct:__anon6454
/freebsd-11.0-release/contrib/wpa/src/ap/
H A Dwpa_auth.c876 u16 key_info, key_data_length; local
897 key_info = WPA_GET_BE16(key->key_info);
906 " key_info=0x%x type=%u key_data_length=%u",
907 MAC2STR(sm->addr), key_info, key->type, key_data_length);
948 if ((key_info & (WPA_KEY_INFO_SMK_MESSAGE | WPA_KEY_INFO_REQUEST)) ==
950 if (key_info & WPA_KEY_INFO_ERROR) {
957 } else if (key_info & WPA_KEY_INFO_SMK_MESSAGE) {
960 } else if (key_info & WPA_KEY_INFO_REQUEST) {
963 } else if (!(key_info
1402 __wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr, int force_version) argument
1603 wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr) argument
1640 u16 key_info; local
[all...]
H A Dwpa_auth_i.h221 struct wpa_state_machine *sm, int key_info,
/freebsd-11.0-release/contrib/telnet/libtelnet/
H A Dencrypt.c174 static struct key_info { struct
185 static void encrypt_keyid(struct key_info *kp, unsigned char *keyid, int len);
718 encrypt_keyid(struct key_info *kp, unsigned char *keyid, int len)
769 struct key_info *kp = &ki[(dir == DIR_ENCRYPT) ? 0 : 1];
/freebsd-11.0-release/crypto/heimdal/appl/telnet/libtelnet/
H A Dencrypt.c166 static struct key_info { struct
733 encrypt_keyid(struct key_info *kp, unsigned char *keyid, int len)
793 struct key_info *kp = &ki[(dir == DIR_ENCRYPT) ? 0 : 1];
/freebsd-11.0-release/contrib/wpa/src/common/
H A Dwpa_common.h172 /* Note: key_info, key_length, and key_data_length are unaligned */
173 u8 key_info[2]; /* big endian */ member in struct:wpa_eapol_key
187 /* Note: key_info, key_length, and key_data_length are unaligned */
188 u8 key_info[2]; /* big endian */ member in struct:wpa_eapol_key_192
/freebsd-11.0-release/contrib/wpa/wpa_supplicant/
H A Dibss_rsn.c711 u16 key_info; local
744 key_info = WPA_GET_BE16(key->key_info);
746 return !!(key_info & WPA_KEY_INFO_ACK);

Completed in 357 milliseconds