HomeSort by relevance Sort by last modified time
    Searched refs:sm (Results 51 - 75 of 326) sorted by null

1 23 4 5 6 7 8 91011>>

  /external/wpa_supplicant_8/src/ap/
wpa_auth_ie.c 533 struct wpa_state_machine *sm, int freq,
544 if (wpa_auth == NULL || sm == NULL)
557 version, MAC2STR(sm->addr));
577 MAC2STR(sm->addr));
675 MACSTR " (res=%d)", MAC2STR(sm->addr), res);
682 MACSTR, data.group_cipher, MAC2STR(sm->addr));
689 MACSTR, data.key_mgmt, MAC2STR(sm->addr));
695 sm->wpa_key_mgmt = WPA_KEY_MGMT_IEEE8021X_SUITE_B_192;
697 sm->wpa_key_mgmt = WPA_KEY_MGMT_IEEE8021X_SUITE_B;
701 sm->wpa_key_mgmt = WPA_KEY_MGMT_FT_FILS_SHA384
    [all...]
wpa_auth.h 265 int (*for_each_sta)(void *ctx, int (*cb)(struct wpa_state_machine *sm,
321 struct wpa_state_machine *sm, int freq,
326 struct wpa_state_machine *sm,
328 int wpa_auth_uses_mfp(struct wpa_state_machine *sm);
329 void wpa_auth_set_ocv(struct wpa_state_machine *sm, int ocv);
330 int wpa_auth_uses_ocv(struct wpa_state_machine *sm);
335 struct wpa_state_machine *sm);
336 void wpa_auth_sta_no_wpa(struct wpa_state_machine *sm);
337 void wpa_auth_sta_deinit(struct wpa_state_machine *sm);
339 struct wpa_state_machine *sm,
    [all...]
ieee802_1x.h 37 u8 * ieee802_1x_get_identity(struct eapol_state_machine *sm, size_t *len);
38 u8 * ieee802_1x_get_radius_class(struct eapol_state_machine *sm, size_t *len,
40 struct wpabuf * ieee802_1x_get_radius_cui(struct eapol_state_machine *sm);
41 const u8 * ieee802_1x_get_key(struct eapol_state_machine *sm, size_t *len);
42 void ieee802_1x_notify_port_enabled(struct eapol_state_machine *sm,
44 void ieee802_1x_notify_port_valid(struct eapol_state_machine *sm,
46 void ieee802_1x_notify_pre_auth(struct eapol_state_machine *sm, int pre_auth);
ieee802_1x.c 145 struct eapol_state_machine *sm = sta->eapol_sm; local
147 if (sm == NULL)
178 if (sm->eap_if->eapKeyData == NULL || sm->eap_if->eapKeyDataLen < 64) {
193 os_memcpy(ekey + sizeof(key->key_iv), sm->eap_if->eapKeyData, 32);
202 hmac_md5(sm->eap_if->eapKeyData + 32, 32, buf, sizeof(*hdr) + len,
206 " (%s index=%d)", MAC2STR(sm->addr),
218 struct eapol_state_machine *sm = sta->eapol_sm; local
220 if (sm == NULL || !sm->eap_if->eapKeyData
599 struct eapol_state_machine *sm = sta->eapol_sm; local
770 struct eapol_state_machine *sm = sta->eapol_sm; local
803 struct eapol_state_machine *sm = sta->eapol_sm; local
1276 struct eapol_state_machine *sm = sta->eapol_sm; local
1311 struct eapol_state_machine *sm = sta->eapol_sm; local
1387 struct eapol_state_machine *sm = sta->eapol_sm; local
1432 struct eapol_state_machine *sm = sta->eapol_sm; local
1487 struct eapol_state_machine *sm = sta->eapol_sm; local
1517 struct eapol_state_machine *sm = sta->eapol_sm; local
1714 struct eapol_state_machine *sm; member in struct:sta_id_search
1723 struct eapol_state_machine *sm = sta->eapol_sm; local
1803 struct eapol_state_machine *sm; local
1968 struct eapol_state_machine *sm = sta->eapol_sm; local
2090 struct eapol_state_machine *sm = sta->eapol_sm; local
2593 struct eapol_state_machine *sm = sta->eapol_sm; local
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_fast_pac.h 39 int eap_fast_load_pac(struct eap_sm *sm, struct eap_fast_pac **pac_root,
41 int eap_fast_save_pac(struct eap_sm *sm, struct eap_fast_pac *pac_root,
45 int eap_fast_load_pac_bin(struct eap_sm *sm, struct eap_fast_pac **pac_root,
47 int eap_fast_save_pac_bin(struct eap_sm *sm, struct eap_fast_pac *pac_root,
eap_gtc.c 20 static void * eap_gtc_init(struct eap_sm *sm)
27 if (sm->m && sm->m->vendor == EAP_VENDOR_IETF &&
28 sm->m->method == EAP_TYPE_FAST) {
37 static void eap_gtc_deinit(struct eap_sm *sm, void *priv)
44 static struct wpabuf * eap_gtc_process(struct eap_sm *sm, void *priv,
77 password = eap_get_config_otp(sm, &password_len);
81 password = eap_get_config_password(sm, &password_len);
87 eap_sm_request_otp(sm, (const char *) pos, len);
99 identity = eap_get_config_identity(sm, &identity_len)
    [all...]
eap_tls_common.h 98 int eap_peer_tls_ssl_init(struct eap_sm *sm, struct eap_ssl_data *data,
100 void eap_peer_tls_ssl_deinit(struct eap_sm *sm, struct eap_ssl_data *data);
101 u8 * eap_peer_tls_derive_key(struct eap_sm *sm, struct eap_ssl_data *data,
104 u8 * eap_peer_tls_derive_session_id(struct eap_sm *sm,
107 int eap_peer_tls_process_helper(struct eap_sm *sm, struct eap_ssl_data *data,
113 int eap_peer_tls_reauth_init(struct eap_sm *sm, struct eap_ssl_data *data);
114 int eap_peer_tls_status(struct eap_sm *sm, struct eap_ssl_data *data,
116 const u8 * eap_peer_tls_process_init(struct eap_sm *sm,
124 int eap_peer_tls_decrypt(struct eap_sm *sm, struct eap_ssl_data *data,
127 int eap_peer_tls_encrypt(struct eap_sm *sm, struct eap_ssl_data *data
    [all...]
eap_mschapv2.c 101 static void eap_mschapv2_deinit(struct eap_sm *sm, void *priv);
104 static void * eap_mschapv2_init(struct eap_sm *sm)
111 if (sm->peer_challenge) {
112 data->peer_challenge = os_memdup(sm->peer_challenge,
115 eap_mschapv2_deinit(sm, data);
120 if (sm->auth_challenge) {
121 data->auth_challenge = os_memdup(sm->auth_challenge,
124 eap_mschapv2_deinit(sm, data);
129 data->phase2 = sm->init_phase2;
135 static void eap_mschapv2_deinit(struct eap_sm *sm, void *priv
    [all...]
  /external/libhevc/encoder/
rc_rd_model_fix.c 95 ps_rd_model->model_coeff_a_quad.sm = 0;
96 ps_rd_model->model_coeff_b_quad.sm = 0;
97 ps_rd_model->model_coeff_c_quad.sm = 0;
99 ps_rd_model->model_coeff_a_lin.sm = 0;
100 ps_rd_model->model_coeff_b_lin.sm = 0;
101 ps_rd_model->model_coeff_c_lin.sm = 0;
103 ps_rd_model->model_coeff_a_lin_wo_int.sm = 0;
104 ps_rd_model->model_coeff_b_lin_wo_int.sm = 0;
105 ps_rd_model->model_coeff_c_lin_wo_int.sm = 0;
132 ps_rd_model->model_coeff_a_quad.sm = 0
    [all...]
var_q_operator.h 25 WORD32 sm; /* MSB 1 bit sign & rest magnitude */ member in struct:__anon28796
47 (a).sm = (b); \
62 *a = (varq).sm >> ((varq).e - q_fact); \
66 *a = (varq).sm << (q_fact - (varq).e); \
71 (var_q).sm = fixq; \
  /cts/tests/tests/security/src/android/security/cts/
VoldExploitTest.java 31 final StorageManager sm = (StorageManager) getContext().getSystemService( local
33 String path = sm.getMountedObbPath("/dev/null\0asec list");
  /external/libcxx/test/std/re/re.submatch/
types.pass.cpp 34 typedef std::sub_match<char*> SM;
35 static_assert((std::is_same<SM::iterator, char*>::value), "");
36 static_assert((std::is_same<SM::value_type, char>::value), "");
37 static_assert((std::is_same<SM::difference_type, std::ptrdiff_t>::value), "");
38 static_assert((std::is_same<SM::string_type, std::string>::value), "");
39 static_assert((std::is_convertible<SM*, std::pair<char*, char*>*>::value), "");
41 SM sm; local
42 sm.first = nullptr;
43 sm.second = nullptr
54 SM sm; local
    [all...]
  /external/ltp/testcases/network/tcp_cmds/
Makefile 32 INSTALL_DEPS := ../datafiles/bin.sm
34 ../datafiles/bin.sm:
  /frameworks/av/camera/cameraserver/
main_cameraserver.cpp 34 sp<IServiceManager> sm = defaultServiceManager(); local
35 ALOGI("ServiceManager: %p", sm.get());
  /frameworks/av/drm/drmserver/
main_drmserver.cpp 34 sp<IServiceManager> sm = defaultServiceManager(); local
35 ALOGV("ServiceManager: %p", sm.get());
  /frameworks/av/media/libmediaplayerservice/
ActivityManager.cpp 31 sp<IServiceManager> sm = defaultServiceManager(); local
32 sp<IBinder> binder = sm->getService(String16("activity"));
  /external/wpa_supplicant_8/src/eap_server/
eap_i.h 29 void * (*init)(struct eap_sm *sm);
30 void * (*initPickUp)(struct eap_sm *sm);
31 void (*reset)(struct eap_sm *sm, void *priv);
33 struct wpabuf * (*buildReq)(struct eap_sm *sm, void *priv, u8 id);
34 int (*getTimeout)(struct eap_sm *sm, void *priv);
35 Boolean (*check)(struct eap_sm *sm, void *priv,
37 void (*process)(struct eap_sm *sm, void *priv,
39 Boolean (*isDone)(struct eap_sm *sm, void *priv);
40 u8 * (*getKey)(struct eap_sm *sm, void *priv, size_t *len);
43 Boolean (*isSuccess)(struct eap_sm *sm, void *priv)
    [all...]
eap_server_wsc.c 66 struct eap_sm *sm = eloop_ctx; local
69 if (sm->method_pending != METHOD_PENDING_WAIT)
75 eap_sm_pending_cb(sm);
79 static void * eap_wsc_init(struct eap_sm *sm)
85 if (sm->identity && sm->identity_len == WSC_ID_REGISTRAR_LEN &&
86 os_memcmp(sm->identity, WSC_ID_REGISTRAR, WSC_ID_REGISTRAR_LEN) ==
89 else if (sm->identity && sm->identity_len == WSC_ID_ENROLLEE_LEN &&
90 os_memcmp(sm->identity, WSC_ID_ENROLLEE, WSC_ID_ENROLLEE_LEN
    [all...]
eap_server_tls.c 17 static void eap_tls_reset(struct eap_sm *sm, void *priv);
57 static void eap_tls_valid_session(struct eap_sm *sm, struct eap_tls_data *data)
61 if (!sm->tls_session_lifetime)
72 static void * eap_tls_init(struct eap_sm *sm)
81 if (eap_server_tls_ssl_init(sm, &data->ssl, 1, EAP_TYPE_TLS)) {
83 eap_tls_reset(sm, data);
89 data->phase2 = sm->init_phase2;
96 static void * eap_unauth_tls_init(struct eap_sm *sm)
105 if (eap_server_tls_ssl_init(sm, &data->ssl, 0, EAP_UNAUTH_TLS_TYPE)) {
107 eap_tls_reset(sm, data)
    [all...]
eap_server_tls_common.c 40 struct eap_sm *sm = ctx; local
41 eap_log_msg(sm, "TLS: %s", msg);
46 int eap_server_tls_ssl_init(struct eap_sm *sm, struct eap_ssl_data *data,
50 unsigned int flags = sm->tls_flags;
52 if (sm->ssl_ctx == NULL) {
57 data->eap = sm;
58 data->phase2 = sm->init_phase2;
60 data->conn = tls_connection_init(sm->ssl_ctx);
68 tls_connection_set_log_cb(data->conn, eap_server_tls_log_cb, sm);
70 tls_connection_set_test_flags(data->conn, sm->tls_test_flags)
    [all...]
eap.h 149 void eap_server_sm_deinit(struct eap_sm *sm);
150 int eap_server_sm_step(struct eap_sm *sm);
151 void eap_sm_notify_cached(struct eap_sm *sm);
152 void eap_sm_pending_cb(struct eap_sm *sm);
153 int eap_sm_method_pending(struct eap_sm *sm);
154 const u8 * eap_get_identity(struct eap_sm *sm, size_t *len);
155 const char * eap_get_serial_num(struct eap_sm *sm);
156 const char * eap_get_method(struct eap_sm *sm);
157 const char * eap_get_imsi(struct eap_sm *sm);
158 struct eap_eapol_interface * eap_get_interface(struct eap_sm *sm);
    [all...]
eap_server_aka.c 57 static void eap_aka_fullauth(struct eap_sm *sm, struct eap_aka_data *data);
90 static int eap_aka_check_identity_reauth(struct eap_sm *sm,
102 data->reauth = eap_sim_db_get_reauth_entry(sm->eap_sim_db_priv,
131 static void eap_aka_check_identity(struct eap_sm *sm,
138 username = sim_get_username(sm->identity, sm->identity_len);
142 if (eap_aka_check_identity_reauth(sm, data, username) > 0) {
159 sm->eap_sim_db_priv, username);
173 eap_aka_fullauth(sm, data);
180 static void * eap_aka_init(struct eap_sm *sm)
    [all...]
  /external/wpa_supplicant_8/src/wps/
wps_upnp_ssdp.c 120 next_advertisement(struct upnp_wps_device_sm *sm,
129 iface = dl_list_first(&sm->interfaces,
167 sm->ip_addr_text, sm->web_port,
219 * @sm: WPS UPnP state machine from upnp_wps_device_init()
222 void advertisement_state_machine_stop(struct upnp_wps_device_sm *sm,
225 struct advertisement_state_machine *a = &sm->advertisement;
230 eloop_cancel_timeout(advertisement_state_machine_handler, NULL, sm);
231 if (!send_byebye || sm->multicast_sd < 0)
243 msg = next_advertisement(sm, a, &islast)
260 struct upnp_wps_device_sm *sm = user_ctx; local
382 struct upnp_wps_device_sm *sm = eloop_data; local
687 struct upnp_wps_device_sm *sm = sock_ctx; local
    [all...]
  /external/autotest/client/site_tests/login_MultiUserPolicy/
login_MultiUserPolicy.py 41 sm = session_manager.connect(self._bus_loop)
45 sm.StartSession(self._user1, '')
46 policy_blob = sm.RetrievePolicyEx(
62 sm.StorePolicyEx(
70 sm.StorePolicyEx(
82 sm.StartSession(self._user2, '')
83 policy_blob = sm.RetrievePolicyEx(
91 sm.StorePolicyEx(
98 policy_blob = sm.RetrievePolicyEx(
  /external/autotest/client/site_tests/login_RetrieveActiveSessions/
login_RetrieveActiveSessions.py 26 sm = session_manager.connect(bus_loop)
34 sm.StartSession(users[0], '')
36 sm.RetrieveActiveSessions())
38 sm.StartSession(users[1], '')
39 self.__check_for_users_in_actives(users, sm.RetrieveActiveSessions())

Completed in 1411 milliseconds

1 23 4 5 6 7 8 91011>>