/external/wpa_supplicant_8/src/ap/ |
ieee802_1x.h | 37 u8 * ieee802_1x_get_identity(struct eapol_state_machine *sm, size_t *len); 38 u8 * ieee802_1x_get_radius_class(struct eapol_state_machine *sm, size_t *len, 40 struct wpabuf * ieee802_1x_get_radius_cui(struct eapol_state_machine *sm); 41 const u8 * ieee802_1x_get_key(struct eapol_state_machine *sm, size_t *len); 42 void ieee802_1x_notify_port_enabled(struct eapol_state_machine *sm, 44 void ieee802_1x_notify_port_valid(struct eapol_state_machine *sm, 46 void ieee802_1x_notify_pre_auth(struct eapol_state_machine *sm, int pre_auth);
|
wpa_auth_ft.c | 343 int wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, const u8 *pmk, 349 const u8 *mdid = sm->wpa_auth->conf.mobility_domain; 350 const u8 *r0kh = sm->wpa_auth->conf.r0_key_holder; 351 size_t r0kh_len = sm->wpa_auth->conf.r0_key_holder_len; 352 const u8 *r1kh = sm->wpa_auth->conf.r1_key_holder; 353 const u8 *ssid = sm->wpa_auth->conf.ssid; 354 size_t ssid_len = sm->wpa_auth->conf.ssid_len; 357 if (sm->xxkey_len == 0) { 363 wpa_derive_pmk_r0(sm->xxkey, sm->xxkey_len, ssid, ssid_len, mdid 1187 struct wpa_state_machine *sm; local [all...] |
/external/wpa_supplicant_8/src/wps/ |
wps_upnp_ssdp.c | 123 next_advertisement(struct upnp_wps_device_sm *sm, 132 iface = dl_list_first(&sm->interfaces, 168 sm->ip_addr_text, sm->web_port, 224 * @sm: WPS UPnP state machine from upnp_wps_device_init() 227 void advertisement_state_machine_stop(struct upnp_wps_device_sm *sm, 230 struct advertisement_state_machine *a = &sm->advertisement; 235 eloop_cancel_timeout(advertisement_state_machine_handler, NULL, sm); 236 if (!send_byebye || sm->multicast_sd < 0) 248 msg = next_advertisement(sm, a, &islast) 265 struct upnp_wps_device_sm *sm = user_ctx; local 386 struct upnp_wps_device_sm *sm = eloop_data; local 689 struct upnp_wps_device_sm *sm = sock_ctx; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_aka.c | 61 static void eap_aka_determine_identity(struct eap_sm *sm, 96 static void * eap_aka_init(struct eap_sm *sm) 100 if (sm->eap_sim_db_priv == NULL) { 112 eap_aka_determine_identity(sm, data, 1, 0); 120 static void * eap_aka_prime_init(struct eap_sm *sm) 126 if (sm->eap_sim_db_priv == NULL) { 146 eap_aka_determine_identity(sm, data, 1, 0); 154 static void eap_aka_reset(struct eap_sm *sm, void *priv) 265 static struct wpabuf * eap_aka_build_identity(struct eap_sm *sm, 274 if (eap_sim_db_identity_known(sm->eap_sim_db_priv, sm->identity [all...] |
eap_tls.c | 23 static void eap_tls_reset(struct eap_sm *sm, void *priv); 59 static void * eap_tls_init(struct eap_sm *sm) 68 if (eap_server_tls_ssl_init(sm, &data->ssl, 1)) { 70 eap_tls_reset(sm, data); 78 static void eap_tls_reset(struct eap_sm *sm, void *priv) 83 eap_server_tls_ssl_deinit(sm, &data->ssl); 88 static struct wpabuf * eap_tls_build_start(struct eap_sm *sm, 110 static struct wpabuf * eap_tls_buildReq(struct eap_sm *sm, void *priv, u8 id) 127 return eap_tls_build_start(sm, data, id); 129 if (tls_connection_established(sm->ssl_ctx, data->ssl.conn) [all...] |
eap_mschapv2.c | 63 static void * eap_mschapv2_init(struct eap_sm *sm) 72 if (sm->auth_challenge) { 73 os_memcpy(data->auth_challenge, sm->auth_challenge, 78 if (sm->peer_challenge) { 84 os_memcpy(data->peer_challenge, sm->peer_challenge, 92 static void eap_mschapv2_reset(struct eap_sm *sm, void *priv) 104 struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id) 148 struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id) 192 struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id) 224 static struct wpabuf * eap_mschapv2_buildReq(struct eap_sm *sm, void *priv [all...] |
eap_sim.c | 77 static void * eap_sim_init(struct eap_sm *sm) 81 if (sm->eap_sim_db_priv == NULL) { 95 static void eap_sim_reset(struct eap_sm *sm, void *priv) 104 static struct wpabuf * eap_sim_build_start(struct eap_sm *sm, 113 if (eap_sim_db_identity_known(sm->eap_sim_db_priv, sm->identity, 114 sm->identity_len)) { 134 static int eap_sim_build_encr(struct eap_sm *sm, struct eap_sim_data *data, 140 eap_sim_db_get_next_pseudonym(sm->eap_sim_db_priv, 0); 144 eap_sim_db_get_next_reauth_id(sm->eap_sim_db_priv, 0) [all...] |
eap_wsc.c | 69 struct eap_sm *sm = eloop_ctx; local 72 if (sm->method_pending != METHOD_PENDING_WAIT) 78 eap_sm_pending_cb(sm); 82 static void * eap_wsc_init(struct eap_sm *sm) 88 if (sm->identity && sm->identity_len == WSC_ID_REGISTRAR_LEN && 89 os_memcmp(sm->identity, WSC_ID_REGISTRAR, WSC_ID_REGISTRAR_LEN) == 92 else if (sm->identity && sm->identity_len == WSC_ID_ENROLLEE_LEN && 93 os_memcmp(sm->identity, WSC_ID_ENROLLEE, WSC_ID_ENROLLEE_LEN [all...] |
eap_peap.c | 35 static void eap_peap_reset(struct eap_sm *sm, void *priv); 134 static void eap_peap_req_success(struct eap_sm *sm, 151 static void eap_peap_req_failure(struct eap_sm *sm, 169 static void * eap_peap_init(struct eap_sm *sm) 178 if (sm->user && sm->user->force_version >= 0) { 179 data->force_version = sm->user->force_version; 187 if (eap_server_tls_ssl_init(sm, &data->ssl, 0)) { 189 eap_peap_reset(sm, data); 197 static void eap_peap_reset(struct eap_sm *sm, void *priv [all...] |
eap_md5.c | 30 static void * eap_md5_init(struct eap_sm *sm) 43 static void eap_md5_reset(struct eap_sm *sm, void *priv) 50 static struct wpabuf * eap_md5_buildReq(struct eap_sm *sm, void *priv, u8 id) 81 static Boolean eap_md5_check(struct eap_sm *sm, void *priv, 103 static void eap_md5_process(struct eap_sm *sm, void *priv, 111 if (sm->user == NULL || sm->user->password == NULL || 112 sm->user->password_hash) { 127 chap_md5(id, sm->user->password, sm->user->password_len [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_mschapv2.c | 106 static void eap_mschapv2_deinit(struct eap_sm *sm, void *priv); 109 static void * eap_mschapv2_init(struct eap_sm *sm) 116 if (sm->peer_challenge) { 119 eap_mschapv2_deinit(sm, data); 122 os_memcpy(data->peer_challenge, sm->peer_challenge, 126 if (sm->auth_challenge) { 129 eap_mschapv2_deinit(sm, data); 132 os_memcpy(data->auth_challenge, sm->auth_challenge, 136 data->phase2 = sm->init_phase2; 142 static void eap_mschapv2_deinit(struct eap_sm *sm, void *priv [all...] |
eap_ttls.c | 42 static void eap_ttls_deinit(struct eap_sm *sm, void *priv); 84 static void * eap_ttls_init(struct eap_sm *sm) 87 struct eap_peer_config *config = eap_get_config(sm); 135 eap_ttls_deinit(sm, data); 144 if (!(tls_capabilities(sm->ssl_ctx) & TLS_CAPABILITY_IA) && 150 eap_ttls_deinit(sm, data); 161 static void eap_ttls_phase2_eap_deinit(struct eap_sm *sm, 165 data->phase2_method->deinit(sm, data->phase2_priv); 172 static void eap_ttls_deinit(struct eap_sm *sm, void *priv) 177 eap_ttls_phase2_eap_deinit(sm, data) [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_mschapv2.c | 101 static void eap_mschapv2_deinit(struct eap_sm *sm, void *priv); 104 static void * eap_mschapv2_init(struct eap_sm *sm) 111 if (sm->peer_challenge) { 114 eap_mschapv2_deinit(sm, data); 117 os_memcpy(data->peer_challenge, sm->peer_challenge, 121 if (sm->auth_challenge) { 124 eap_mschapv2_deinit(sm, data); 127 os_memcpy(data->auth_challenge, sm->auth_challenge, 131 data->phase2 = sm->init_phase2; 137 static void eap_mschapv2_deinit(struct eap_sm *sm, void *priv [all...] |
eap_ttls.c | 26 static void eap_ttls_deinit(struct eap_sm *sm, void *priv); 67 static void * eap_ttls_init(struct eap_sm *sm) 70 struct eap_peer_config *config = eap_get_config(sm); 105 eap_ttls_deinit(sm, data); 113 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_TTLS)) { 115 eap_ttls_deinit(sm, data); 123 static void eap_ttls_phase2_eap_deinit(struct eap_sm *sm, 127 data->phase2_method->deinit(sm, data->phase2_priv); 134 static void eap_ttls_deinit(struct eap_sm *sm, void *priv) 139 eap_ttls_phase2_eap_deinit(sm, data) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
pmksa_cache.c | 33 struct wpa_sm *sm; /* TODO: get rid of this reference(?) */ member in struct:rsn_pmksa_cache 114 pmksa->sm->cur_pmksa = NULL; 115 eapol_sm_request_reauth(pmksa->sm->eapol); 135 entry = pmksa->sm->cur_pmksa ? pmksa->sm->cur_pmksa : 136 pmksa_cache_get(pmksa, pmksa->sm->bssid, NULL); 170 if (pmksa->sm->proto != WPA_PROTO_RSN || pmk_len > PMK_LEN) 181 entry->expiration = now.sec + pmksa->sm->dot11RSNAConfigPMKLifetime; 182 entry->reauth_time = now.sec + pmksa->sm->dot11RSNAConfigPMKLifetime * 183 pmksa->sm->dot11RSNAConfigPMKReauthThreshold / 100 [all...] |
peerkey.c | 52 struct wpa_sm *sm = eloop_ctx; 59 static void wpa_supplicant_peerkey_free(struct wpa_sm *sm, 62 eloop_cancel_timeout(wpa_supplicant_smk_timeout, sm, peerkey); 67 static int wpa_supplicant_send_smk_error(struct wpa_sm *sm, const u8 *dst, 82 rbuf = wpa_sm_alloc_eapol(sm, IEEE802_1X_TYPE_EAPOL_KEY, 94 os_memcpy(err->replay_counter, sm->request_counter, 96 inc_byte_array(sm->request_counter, WPA_REPLAY_COUNTER_LEN); 120 wpa_eapol_key_send(sm, sm->ptk.kck, ver, dst, ETH_P_EAPOL, 127 static int wpa_supplicant_send_smk_m3(struct wpa_sm *sm, [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_mschapv2.c | 58 static void * eap_mschapv2_init(struct eap_sm *sm) 67 if (sm->auth_challenge) { 68 os_memcpy(data->auth_challenge, sm->auth_challenge, 73 if (sm->peer_challenge) { 79 os_memcpy(data->peer_challenge, sm->peer_challenge, 87 static void eap_mschapv2_reset(struct eap_sm *sm, void *priv) 99 struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id) 143 struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id) 187 struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id) 219 static struct wpabuf * eap_mschapv2_buildReq(struct eap_sm *sm, void *priv [all...] |
eap_server_peap.c | 30 static void eap_peap_reset(struct eap_sm *sm, void *priv); 129 static void eap_peap_req_success(struct eap_sm *sm, 146 static void eap_peap_req_failure(struct eap_sm *sm, 164 static void * eap_peap_init(struct eap_sm *sm) 173 if (sm->user && sm->user->force_version >= 0) { 174 data->force_version = sm->user->force_version; 182 if (eap_server_tls_ssl_init(sm, &data->ssl, 0)) { 184 eap_peap_reset(sm, data); 192 static void eap_peap_reset(struct eap_sm *sm, void *priv [all...] |
eap_server_aka.c | 57 static void eap_aka_fullauth(struct eap_sm *sm, struct eap_aka_data *data); 90 static int eap_aka_check_identity_reauth(struct eap_sm *sm, 102 data->reauth = eap_sim_db_get_reauth_entry(sm->eap_sim_db_priv, 131 static void eap_aka_check_identity(struct eap_sm *sm, 138 username = sim_get_username(sm->identity, sm->identity_len); 142 if (eap_aka_check_identity_reauth(sm, data, username) > 0) { 159 sm->eap_sim_db_priv, username); 173 eap_aka_fullauth(sm, data); 180 static void * eap_aka_init(struct eap_sm *sm) [all...] |
eap_server_md5.c | 25 static void * eap_md5_init(struct eap_sm *sm) 38 static void eap_md5_reset(struct eap_sm *sm, void *priv) 45 static struct wpabuf * eap_md5_buildReq(struct eap_sm *sm, void *priv, u8 id) 76 static Boolean eap_md5_check(struct eap_sm *sm, void *priv, 98 static void eap_md5_process(struct eap_sm *sm, void *priv, 106 if (sm->user == NULL || sm->user->password == NULL || 107 sm->user->password_hash) { 122 if (chap_md5(id, sm->user->password, sm->user->password_len [all...] |
eap_server_tls_common.c | 33 int eap_server_tls_ssl_init(struct eap_sm *sm, struct eap_ssl_data *data, 36 data->eap = sm; 37 data->phase2 = sm->init_phase2; 39 data->conn = tls_connection_init(sm->ssl_ctx); 46 if (tls_connection_set_verify(sm->ssl_ctx, data->conn, verify_peer)) { 49 tls_connection_deinit(sm->ssl_ctx, data->conn); 54 data->tls_out_limit = sm->fragment_size > 0 ? sm->fragment_size : 1398; 66 void eap_server_tls_ssl_deinit(struct eap_sm *sm, struct eap_ssl_data *data) 68 tls_connection_deinit(sm->ssl_ctx, data->conn) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps_upnp.h | 56 void upnp_wps_device_deinit(struct upnp_wps_device_sm *sm); 58 int upnp_wps_device_start(struct upnp_wps_device_sm *sm, char *net_if); 59 void upnp_wps_device_stop(struct upnp_wps_device_sm *sm); 61 int upnp_wps_device_send_wlan_event(struct upnp_wps_device_sm *sm, 65 int upnp_wps_subscribers(struct upnp_wps_device_sm *sm);
|
/external/wpa_supplicant_8/src/rsn_supp/ |
pmksa_cache.c | 25 struct wpa_sm *sm; /* TODO: get rid of this reference(?) */ member in struct:rsn_pmksa_cache 46 wpa_sm_remove_pmkid(pmksa->sm, entry->aa, entry->pmkid); 74 pmksa->sm->cur_pmksa = NULL; 75 eapol_sm_request_reauth(pmksa->sm->eapol); 95 entry = pmksa->sm->cur_pmksa ? pmksa->sm->cur_pmksa : 96 pmksa_cache_get(pmksa, pmksa->sm->bssid, NULL, NULL); 141 entry->expiration = now.sec + pmksa->sm->dot11RSNAConfigPMKLifetime; 142 entry->reauth_time = now.sec + pmksa->sm->dot11RSNAConfigPMKLifetime * 143 pmksa->sm->dot11RSNAConfigPMKReauthThreshold / 100 [all...] |
peerkey.c | 47 struct wpa_sm *sm = eloop_ctx; 54 static void wpa_supplicant_peerkey_free(struct wpa_sm *sm, 57 eloop_cancel_timeout(wpa_supplicant_smk_timeout, sm, peerkey); 62 static int wpa_supplicant_send_smk_error(struct wpa_sm *sm, const u8 *dst, 77 rbuf = wpa_sm_alloc_eapol(sm, IEEE802_1X_TYPE_EAPOL_KEY, 89 os_memcpy(err->replay_counter, sm->request_counter, 91 inc_byte_array(sm->request_counter, WPA_REPLAY_COUNTER_LEN); 115 wpa_eapol_key_send(sm, sm->ptk.kck, ver, dst, ETH_P_EAPOL, 122 static int wpa_supplicant_send_smk_m3(struct wpa_sm *sm, [all...] |
/frameworks/base/core/tests/coretests/src/android/view/ |
ListContextMenu.java | 103 SubMenu sm = menu.addSubMenu(0, 0, 0, "The 2nd item, a sub menu").setIcon(R.drawable.black_square_stretchable); local 104 item = sm.getItem(); 106 sm.add(1, 0, 0, "Subitem 1"); 107 sm.add(1, 0, 0, "Subitem 2"); 108 sm.add(1, 0, 0, "Subitem 3"); 109 sm.setGroupCheckable(1, true, true); 117 sm = menu.addSubMenu(0, 0, 0, "Item 10 SM"); 118 sm.add(0, 0, 0, "Subitem 1"); 119 sm.add(0, 0, 0, "Subitem 2") 147 SubMenu sm = menu.addSubMenu(0, 0, 0, "Test 1.5 SM"); local [all...] |