Lines Matching defs:data

333     size_t wpa_ie_len, struct wpa_ie_data *data)
340 data->proto = WPA_PROTO_WPA;
341 data->pairwise_cipher = WPA_CIPHER_TKIP;
342 data->group_cipher = WPA_CIPHER_TKIP;
343 data->key_mgmt = WPA_KEY_MGMT_IEEE8021X;
344 data->capabilities = 0;
372 data->group_cipher = wpa_selector_to_bitfield(pos);
382 data->pairwise_cipher = 0;
393 data->pairwise_cipher |= wpa_selector_to_bitfield(pos);
404 data->key_mgmt = 0;
415 data->key_mgmt |= wpa_key_mgmt_to_bitfield(pos);
426 data->capabilities = pos[0] | (pos[1] << 8);
443 size_t rsn_ie_len, struct wpa_ie_data *data)
450 data->proto = WPA_PROTO_RSN;
451 data->pairwise_cipher = WPA_CIPHER_CCMP;
452 data->group_cipher = WPA_CIPHER_CCMP;
453 data->key_mgmt = WPA_KEY_MGMT_IEEE8021X;
454 data->capabilities = 0;
481 data->group_cipher = rsn_selector_to_bitfield(pos);
491 data->pairwise_cipher = 0;
502 data->pairwise_cipher |= rsn_selector_to_bitfield(pos);
513 data->key_mgmt = 0;
524 data->key_mgmt |= rsn_key_mgmt_to_bitfield(pos);
535 data->capabilities = pos[0] | (pos[1] << 8);
542 * RSN IE could include PMKID data, but Authenticator should
554 size_t wpa_ie_len, struct wpa_ie_data *data)
557 return (wpa_parse_wpa_ie_rsn(wpa_s, wpa_ie, wpa_ie_len, data));
559 return (wpa_parse_wpa_ie_wpa(wpa_s, wpa_ie, wpa_ie_len, data));
714 uint8_t data[2 * IEEE80211_ADDR_LEN + 2 * WPA_PMK_LEN];
723 (void) memcpy(data, addr1, IEEE80211_ADDR_LEN);
724 (void) memcpy(data + IEEE80211_ADDR_LEN, addr2,
727 (void) memcpy(data, addr2, IEEE80211_ADDR_LEN);
728 (void) memcpy(data + IEEE80211_ADDR_LEN, addr1,
733 (void) memcpy(data + 2 * IEEE80211_ADDR_LEN, nonce1,
735 (void) memcpy(data + 2 * IEEE80211_ADDR_LEN + WPA_PMK_LEN,
738 (void) memcpy(data + 2 * IEEE80211_ADDR_LEN, nonce2,
740 (void) memcpy(data + 2 * IEEE80211_ADDR_LEN + WPA_PMK_LEN,
744 sha1_prf(pmk, WPA_PMK_LEN, "Pairwise key expansion", data,
745 sizeof (data), ptk, ptk_len);
900 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data",
905 wpa_printf(MSG_DEBUG, "RSN: key data "
964 "random data for SNonce");
1015 * this workaround, the data connection does not work
1127 wpa_printf(MSG_DEBUG, "RSN: key data "
1142 "in unencrypted key data");
1323 wpa_printf(MSG_DEBUG, "RSN: key data "
1335 "in unencrypted key data");
1447 * only APs) and without this workaround, the data
1577 /* Decrypt RSN EAPOL-Key key data (RC4 or AES-WRAP) */
1584 wpa_hexdump(MSG_DEBUG, "RSN: encrypted key data",
1588 "cannot decrypt EAPOL-Key key data.");
1593 * Decrypt key data here so that this operation does not need
1619 "could not decrypt EAPOL-Key key data");
1626 wpa_hexdump(MSG_DEBUG, "WPA: decrypted EAPOL-Key key data",
1680 "802.1X data", len - data_len);