/external/wpa_supplicant_8/src/ap/ |
tkip_countermeasures.c | 35 struct sta_info *sta; local 47 for (sta = hapd->sta_list; sta != NULL; sta = sta->next) { 48 hostapd_drv_sta_deauth(hapd, sta->addr, 50 ap_sta_set_authorized(hapd, sta, 0); 51 sta->flags &= ~(WLAN_STA_AUTH | WLAN_STA_ASSOC); 52 hostapd_drv_sta_remove(hapd, sta->addr); 68 struct sta_info *sta = ap_get_sta(hapd, addr) local [all...] |
ctrl_iface_ap.c | 23 struct sta_info *sta, 28 if (sta == NULL) { 37 MAC2STR(sta->addr)); 42 res = ieee802_11_get_mib_sta(hapd, sta, buf + len, buflen - len); 45 res = wpa_get_mib_sta(sta->wpa_sm, buf + len, buflen - len); 48 res = ieee802_1x_get_mib_sta(hapd, sta, buf + len, buflen - len); 51 res = hostapd_wps_get_mib_sta(hapd, sta->addr, buf + len, 55 res = hostapd_p2p_get_mib_sta(hapd, sta, buf + len, buflen - len); 91 struct sta_info *sta; local 95 (sta = ap_get_sta(hapd, addr)) == NULL) [all...] |
accounting.c | 25 * STA is not using interim accounting. This detects wrap arounds for 30 struct sta_info *sta); 34 struct sta_info *sta, 50 if (sta) { 51 radius_msg_make_authenticator(msg, (u8 *) sta, sizeof(*sta)); 54 sta->acct_session_id_hi, sta->acct_session_id_lo); 78 if (sta) { 79 val = ieee802_1x_get_identity(sta->eapol_sm, &len) 208 struct sta_info *sta = timeout_ctx; local [all...] |
ieee802_11_shared.c | 23 struct sta_info *sta, u8 *eid) 33 os_time_sub(&now, &sta->sa_query_start, &passed); 79 struct sta_info *sta; local 88 sta = ap_get_sta(hapd, sa); 89 if (sta == NULL || !(sta->flags & WLAN_STA_ASSOC)) { 91 "from unassociated STA " MACSTR, MAC2STR(sa)); 117 struct sta_info *sta; local 138 sta = ap_get_sta(hapd, sa); 139 if (sta == NULL || sta->sa_query_trans_id == NULL) [all...] |
preauth_auth.c | 47 struct sta_info *sta; local 67 sta = ap_get_sta(hapd, ethhdr->h_source); 68 if (sta && (sta->flags & WLAN_STA_ASSOC)) { 70 "STA " MACSTR, MAC2STR(sta->addr)); 73 if (!sta && hdr->type == IEEE802_1X_TYPE_EAPOL_START) { 74 sta = ap_sta_add(hapd, ethhdr->h_source); 75 if (sta == NULL) 77 sta->flags = WLAN_STA_PREAUTH 188 struct sta_info *sta = timeout_ctx; local [all...] |
drv_callbacks.c | 34 struct sta_info *sta; local 62 wpa_printf(MSG_DEBUG, "STA included WPS IE in (Re)AssocReq"); 66 wpa_printf(MSG_DEBUG, "STA included RSN IE in (Re)AssocReq"); 70 wpa_printf(MSG_DEBUG, "STA included WPA IE in (Re)AssocReq"); 74 wpa_printf(MSG_DEBUG, "STA did not include WPS/RSN/WPA IE in " 78 sta = ap_get_sta(hapd, addr); 79 if (sta) { 80 accounting_sta_stop(hapd, sta); 82 sta = ap_sta_add(hapd, addr); 83 if (sta == NULL 217 struct sta_info *sta; local 253 struct sta_info *sta = ap_get_sta(hapd, addr); local 426 struct sta_info *sta = ap_get_sta(hapd, addr); local [all...] |
wmm.c | 269 struct sta_info *sta = ap_get_sta(hapd, mgmt->sa); local 272 if (!sta || 273 (sta->flags & (WLAN_STA_ASSOC | WLAN_STA_WMM)) !=
|
beacon.c | 190 struct sta_info *sta, 226 host_to_le16(hostapd_own_capab_info(hapd, sta, 1)); 302 struct sta_info *sta = NULL; local 327 wpa_printf(MSG_DEBUG, "STA " MACSTR " sent probe request " 366 sta = ap_get_sta(hapd, mgmt->sa); 382 if (sta) 383 sta->ssid_probe = &hapd->conf->ssid; 430 resp = hostapd_gen_probe_resp(hapd, sta, mgmt, elems.p2p != NULL, 446 wpa_printf(MSG_EXCESSIVE, "STA " MACSTR " sent probe request for %s "
|
sta_info.c | 34 struct sta_info *sta); 41 static int ap_sta_remove(struct hostapd_data *hapd, struct sta_info *sta); 44 int (*cb)(struct hostapd_data *hapd, struct sta_info *sta, 48 struct sta_info *sta; local 50 for (sta = hapd->sta_list; sta; sta = sta->next) { 51 if (cb(hapd, sta, ctx)) 59 struct sta_info * ap_get_sta(struct hostapd_data *hapd, const u8 *sta) 233 struct sta_info *sta, *prev; local 262 struct sta_info *sta = timeout_ctx; local 397 struct sta_info *sta = timeout_ctx; local 436 struct sta_info *sta; local 516 struct sta_info *sta = timeout_ctx; local 549 struct sta_info *sta = timeout_ctx; local 723 struct sta_info *sta = timeout_ctx; local [all...] |
wpa_auth_glue.c | 106 "STA " MACSTR " reason %d", 123 struct sta_info *sta = ap_get_sta(hapd, addr); local 124 if (sta == NULL) 128 ieee802_1x_notify_port_enabled(sta->eapol_sm, value); 131 ieee802_1x_notify_port_valid(sta->eapol_sm, value); 134 ieee802_1x_set_sta_authorized(hapd, sta, value); 137 if (sta->eapol_sm) 138 sta->eapol_sm->portControl = Auto; 141 if (sta->eapol_sm) 142 sta->eapol_sm->keyRun = value ? TRUE : FALSE 165 struct sta_info *sta = ap_get_sta(hapd, addr); local 183 struct sta_info *sta = ap_get_sta(hapd, addr); local 196 struct sta_info *sta; local 246 struct sta_info *sta; local 263 struct sta_info *sta; local 399 struct sta_info *sta; local 426 struct sta_info *sta; local [all...] |
iapp.c | 90 u8 sa[ETH_ALEN]; /* STA addr */ 239 * iapp_new_station - IAPP processing for a new STA 241 * @sta: The associated station 243 void iapp_new_station(struct iapp_data *iapp, struct sta_info *sta) 251 assoc = sta->last_assoc_req; 255 hostapd_logger(iapp->hapd, sta->addr, HOSTAPD_MODULE_IAPP, 257 iapp_send_layer2_update(iapp, sta->addr); 258 iapp_send_add(iapp, sta->addr, seq); 276 struct sta_info *sta; local 284 sta = ap_get_sta(iapp->hapd, add->mac_addr) [all...] |
ieee802_11.c | 114 u16 hostapd_own_capab_info(struct hostapd_data *hapd, struct sta_info *sta, 134 if (sta) { 136 if (probe && sta->ssid_probe) { 137 policy = sta->ssid_probe->security_policy; 138 def_klen = sta->ssid_probe->wep.default_len; 140 policy = sta->ssid->security_policy; 141 def_klen = sta->ssid->wep.default_len; 175 static u16 auth_shared_key(struct hostapd_data *hapd, struct sta_info *sta, 179 hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_IEEE80211, 185 if (!sta->challenge) 279 struct sta_info *sta; local 304 struct sta_info *sta = NULL; local 941 struct sta_info *sta; local 1109 struct sta_info *sta; local 1157 struct sta_info *sta; local 1246 struct sta_info *sta; local 1446 struct sta_info *sta; local 1487 struct sta_info *sta; local 1617 struct sta_info *sta; local 1641 struct sta_info *sta; local 1728 struct sta_info *sta; local 1758 struct sta_info *sta; local 1784 struct sta_info *sta; local 1811 struct sta_info *sta; local [all...] |
ieee802_1x.c | 36 struct sta_info *sta, int success); 39 static void ieee802_1x_send(struct hostapd_data *hapd, struct sta_info *sta, 64 if (wpa_auth_pairwise_set(sta->wpa_sm)) 66 if (sta->flags & WLAN_STA_PREAUTH) { 67 rsn_preauth_send(hapd, sta, buf, len); 69 hostapd_drv_hapd_send_eapol(hapd, sta->addr, buf, len, 70 encrypt, sta->flags); 78 struct sta_info *sta, int authorized) 82 if (sta->flags & WLAN_STA_PREAUTH) 86 ap_sta_set_authorized(hapd, sta, 1) 665 struct sta_info *sta; local 1240 struct sta_info *sta; local 1514 struct sta_info *sta = sta_ctx; local 1546 struct sta_info *sta = sta_ctx; local 1557 struct sta_info *sta = sta_ctx; local 1604 struct sta_info *sta; local 1642 struct sta_info *sta = sta_ctx; local 1650 struct sta_info *sta = sta_ctx; local 1658 struct sta_info *sta = sta_ctx; local 1667 struct sta_info *sta = sta_ctx; local [all...] |
wps_hostapd.c | 90 wpa_printf(MSG_DEBUG, "Received new WPA/WPA2-PSK from WPS for STA " 1220 struct sta_info *sta; local [all...] |
/external/wpa_supplicant_8/hostapd/ |
dump_state.c | 34 struct sta_info *sta) 36 struct eapol_state_machine *sm = sta->eapol_sm; 70 struct sta_info *sta; local 100 for (sta = hapd->sta_list; sta != NULL; sta = sta->next) { 101 fprintf(f, "\nSTA=" MACSTR "\n", MAC2STR(sta->addr)); 107 sta->aid, 108 sta->flags [all...] |
ctrl_iface.c | 133 struct sta_info *sta; local 140 sta = ap_get_sta(hapd, addr); 141 if (sta) 144 wpa_printf(MSG_DEBUG, "Add new STA " MACSTR " based on ctrl_iface " 146 sta = ap_sta_add(hapd, addr); 147 if (sta == NULL) 150 hostapd_new_assoc_sta(hapd, sta, 0); 170 wpa_dbg(hapd->msg_ctx, MSG_DEBUG, "P2P: Disconnect STA " MACSTR 212 struct sta_info *sta; local 254 sta = ap_get_sta(hapd, addr) 269 struct sta_info *sta; local [all...] |
/external/aac/libFDK/src/arm/ |
qmf_arm.cpp | 467 FIXP_QSS *RESTRICT sta, 484 sta0 = sta[0]; /* save state[0] */ 485 *sta++ = SMLAWT( sta[1], imag, B ); /* index=9...........319 */ 486 *sta++ = SMLAWB( sta[1], real, A ); /* index=316...........6 */ 487 *sta++ = SMLAWB( sta[1], imag, B ); /* index=8,18, ...318 */ 489 *sta++ = SMLAWT( sta[1], real, A ); /* index=317...........7 * 540 FIXP_QSS *RESTRICT sta = (FIXP_QSS*)qmf->FilterStates; local [all...] |
/external/wpa_supplicant_8/src/wps/ |
wps_er.h | 36 struct dl_list sta; /* list of STAs/Enrollees using this AP */ member in struct:wps_er_ap
|
wps_er.c | 34 static void wps_er_sta_event(struct wps_context *wps, struct wps_er_sta *sta, 44 ev->uuid = sta->uuid; 45 ev->mac_addr = sta->addr; 46 ev->m1_received = sta->m1_received; 47 ev->config_methods = sta->config_methods; 48 ev->dev_passwd_id = sta->dev_passwd_id; 49 ev->pri_dev_type = sta->pri_dev_type; 50 ev->dev_name = sta->dev_name; 51 ev->manufacturer = sta->manufacturer; 52 ev->model_name = sta->model_name 62 struct wps_er_sta *sta; local 93 struct wps_er_sta *prev, *sta; local 746 struct wps_er_sta *sta = eloop_data; local 758 struct wps_er_sta *sta = wps_er_sta_get(ap, addr, NULL); local 885 struct wps_er_sta *sta = ctx; local 1090 struct wps_er_sta *sta; local 1335 struct wps_er_sta *sta; local 1574 struct wps_er_sta *sta = NULL; local [all...] |
/external/aac/libFDK/src/ |
qmf.cpp | 189 FIXP_QSS *RESTRICT sta = FilterStates; local 203 FIXP_DBL Are = FX_QSS2FX_DBL(sta[0]) + fMultDiv2( p_fltm[0] , real); 220 sta[0] = sta[1] + FX_DBL2FX_QSS(fMultDiv2( p_flt [4] , imag )); 221 sta[1] = sta[2] + FX_DBL2FX_QSS(fMultDiv2( p_fltm[1] , real )); 222 sta[2] = sta[3] + FX_DBL2FX_QSS(fMultDiv2( p_flt [3] , imag )); 223 sta[3] = sta[4] + FX_DBL2FX_QSS(fMultDiv2( p_fltm[2] , real )) 257 FIXP_QSS *RESTRICT sta = FilterStates; local [all...] |
/external/wpa_supplicant_8/src/eapol_auth/ |
eapol_auth_sm_i.h | 174 void *sta; /* station context pointer to use in callbacks */ member in struct:eapol_state_machine
|