Lines Matching refs:lnkid

493 static int wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid,  in wpa_tdls_ftie_mic()  argument
502 int len = 2 * ETH_ALEN + 1 + 2 + lnkid[1] + rsne_len + in wpa_tdls_ftie_mic()
511 _lnkid = (const struct wpa_tdls_lnkid *) lnkid; in wpa_tdls_ftie_mic()
521 os_memcpy(pos, lnkid, 2 + lnkid[1]); in wpa_tdls_ftie_mic()
522 pos += 2 + lnkid[1]; in wpa_tdls_ftie_mic()
558 u8 dtoken, const u8 *lnkid, in wpa_tdls_key_mic_teardown() argument
566 if (lnkid == NULL) in wpa_tdls_key_mic_teardown()
569 len = 2 + lnkid[1] + sizeof(rcode) + sizeof(dtoken) + in wpa_tdls_key_mic_teardown()
580 os_memcpy(pos, lnkid, 2 + lnkid[1]); in wpa_tdls_key_mic_teardown()
581 pos += 2 + lnkid[1]; in wpa_tdls_key_mic_teardown()
606 const u8 *lnkid, const u8 *timeoutie, in wpa_supplicant_verify_tdls_mic() argument
613 wpa_tdls_ftie_mic(peer->tpk.kck, trans_seq, lnkid, in wpa_supplicant_verify_tdls_mic()
636 const u8 *lnkid, const struct wpa_tdls_ftie *ftie, size_t fte_len) in wpa_supplicant_verify_tdls_mic_teardown() argument
642 dtoken, lnkid, (const u8 *) ftie, in wpa_supplicant_verify_tdls_mic_teardown()
765 struct wpa_tdls_lnkid *lnkid) in wpa_tdls_linkid() argument
767 lnkid->ie_type = WLAN_EID_LINK_ID; in wpa_tdls_linkid()
768 lnkid->ie_len = 3 * ETH_ALEN; in wpa_tdls_linkid()
769 os_memcpy(lnkid->bssid, wpa_tdls_get_link_bssid(sm, peer->mld_link_id), in wpa_tdls_linkid()
772 os_memcpy(lnkid->init_sta, sm->own_addr, ETH_ALEN); in wpa_tdls_linkid()
773 os_memcpy(lnkid->resp_sta, peer->addr, ETH_ALEN); in wpa_tdls_linkid()
775 os_memcpy(lnkid->init_sta, peer->addr, ETH_ALEN); in wpa_tdls_linkid()
776 os_memcpy(lnkid->resp_sta, sm->own_addr, ETH_ALEN); in wpa_tdls_linkid()
786 struct wpa_tdls_lnkid lnkid; in wpa_tdls_send_teardown() local
857 wpa_tdls_linkid(sm, peer, &lnkid); in wpa_tdls_send_teardown()
859 dialog_token, (const u8 *) &lnkid, in wpa_tdls_send_teardown()
973 struct wpa_tdls_lnkid *lnkid; in wpa_tdls_recv_teardown() local
1011 if (kde.lnkid == NULL || kde.lnkid_len < 3 * ETH_ALEN) { in wpa_tdls_recv_teardown()
1016 lnkid = (struct wpa_tdls_lnkid *) kde.lnkid; in wpa_tdls_recv_teardown()
1031 (const u8 *) lnkid, in wpa_tdls_recv_teardown()
1284 struct wpa_tdls_lnkid *lnkid, in wpa_tdls_send_tpk_m2() argument
1354 wpa_tdls_ftie_mic(peer->tpk.kck, 2, (const u8 *) lnkid, peer->rsnie_p, in wpa_tdls_send_tpk_m2()
1376 struct wpa_tdls_lnkid *lnkid, in wpa_tdls_send_tpk_m3() argument
1445 wpa_tdls_ftie_mic(peer->tpk.kck, 3, (const u8 *) lnkid, peer->rsnie_p, in wpa_tdls_send_tpk_m3()
1563 const struct wpa_tdls_lnkid *lnkid, in wpa_tdls_is_lnkid_bss_valid() argument
1569 if (!ether_addr_equal(sm->bssid, lnkid->bssid)) in wpa_tdls_is_lnkid_bss_valid()
1575 if (ether_addr_equal(lnkid->bssid, in wpa_tdls_is_lnkid_bss_valid()
1584 MACSTR, MAC2STR(lnkid->bssid)); in wpa_tdls_is_lnkid_bss_valid()
1598 const struct wpa_tdls_lnkid *lnkid; in wpa_tdls_process_discovery_request() local
1628 if (!kde.lnkid) { in wpa_tdls_process_discovery_request()
1634 lnkid = (const struct wpa_tdls_lnkid *) kde.lnkid; in wpa_tdls_process_discovery_request()
1636 if (!wpa_tdls_is_lnkid_bss_valid(sm, lnkid, &link_id)) { in wpa_tdls_process_discovery_request()
1639 MACSTR, MAC2STR(lnkid->bssid)); in wpa_tdls_process_discovery_request()
1952 struct wpa_tdls_lnkid *lnkid; in wpa_tdls_process_tpk_m1() local
2033 if (kde.lnkid == NULL || kde.lnkid_len < 3 * ETH_ALEN) { in wpa_tdls_process_tpk_m1()
2039 kde.lnkid, kde.lnkid_len); in wpa_tdls_process_tpk_m1()
2040 lnkid = (struct wpa_tdls_lnkid *) kde.lnkid; in wpa_tdls_process_tpk_m1()
2042 if (!wpa_tdls_is_lnkid_bss_valid(sm, lnkid, &link_id)) { in wpa_tdls_process_tpk_m1()
2044 MACSTR, MAC2STR(lnkid->bssid)); in wpa_tdls_process_tpk_m1()
2297 if (wpa_tdls_send_tpk_m2(sm, src_addr, dtoken, lnkid, peer) < 0) { in wpa_tdls_process_tpk_m1()
2305 wpa_tdls_send_tpk_m2(sm, src_addr, dtoken, lnkid, peer); in wpa_tdls_process_tpk_m1()
2364 struct wpa_tdls_lnkid *lnkid; in wpa_tdls_process_tpk_m2() local
2455 if (kde.lnkid == NULL || kde.lnkid_len < 3 * ETH_ALEN) { in wpa_tdls_process_tpk_m2()
2461 kde.lnkid, kde.lnkid_len); in wpa_tdls_process_tpk_m2()
2462 lnkid = (struct wpa_tdls_lnkid *) kde.lnkid; in wpa_tdls_process_tpk_m2()
2599 if (wpa_supplicant_verify_tdls_mic(2, peer, (const u8 *) lnkid, in wpa_tdls_process_tpk_m2()
2627 if (wpa_tdls_send_tpk_m3(sm, src_addr, dtoken, lnkid, peer) < 0) in wpa_tdls_process_tpk_m2()
2662 struct wpa_tdls_lnkid *lnkid; in wpa_tdls_process_tpk_m3() local
2709 if (kde.lnkid == NULL || kde.lnkid_len < 3 * ETH_ALEN) { in wpa_tdls_process_tpk_m3()
2714 (u8 *) kde.lnkid, kde.lnkid_len); in wpa_tdls_process_tpk_m3()
2715 lnkid = (struct wpa_tdls_lnkid *) kde.lnkid; in wpa_tdls_process_tpk_m3()
2718 lnkid->bssid)) { in wpa_tdls_process_tpk_m3()
2775 if (wpa_supplicant_verify_tdls_mic(3, peer, (const u8 *) lnkid, in wpa_tdls_process_tpk_m3()
3197 const struct wpa_tdls_lnkid *lnkid; in wpa_tdls_process_discovery_response() local
3227 lnkid = (const struct wpa_tdls_lnkid *) (elems.link_id - 2); in wpa_tdls_process_discovery_response()
3229 if (!wpa_tdls_is_lnkid_bss_valid(sm, lnkid, &link_id)) { in wpa_tdls_process_discovery_response()
3232 MACSTR, MAC2STR(lnkid->bssid)); in wpa_tdls_process_discovery_response()
3244 " , link id: %u", MAC2STR(lnkid->bssid), link_id); in wpa_tdls_process_discovery_response()