HomeSort by relevance Sort by last modified time
    Searched refs:sm (Results 76 - 100 of 302) sorted by null

1 2 34 5 6 7 8 91011>>

  /external/wpa_supplicant_8/src/ap/
ieee802_1x.h 37 u8 * ieee802_1x_get_identity(struct eapol_state_machine *sm, size_t *len);
38 u8 * ieee802_1x_get_radius_class(struct eapol_state_machine *sm, size_t *len,
40 struct wpabuf * ieee802_1x_get_radius_cui(struct eapol_state_machine *sm);
41 const u8 * ieee802_1x_get_key(struct eapol_state_machine *sm, size_t *len);
42 void ieee802_1x_notify_port_enabled(struct eapol_state_machine *sm,
44 void ieee802_1x_notify_port_valid(struct eapol_state_machine *sm,
46 void ieee802_1x_notify_pre_auth(struct eapol_state_machine *sm, int pre_auth);
wpa_auth_ft.c 343 int wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, const u8 *pmk,
349 const u8 *mdid = sm->wpa_auth->conf.mobility_domain;
350 const u8 *r0kh = sm->wpa_auth->conf.r0_key_holder;
351 size_t r0kh_len = sm->wpa_auth->conf.r0_key_holder_len;
352 const u8 *r1kh = sm->wpa_auth->conf.r1_key_holder;
353 const u8 *ssid = sm->wpa_auth->conf.ssid;
354 size_t ssid_len = sm->wpa_auth->conf.ssid_len;
357 if (sm->xxkey_len == 0) {
363 wpa_derive_pmk_r0(sm->xxkey, sm->xxkey_len, ssid, ssid_len, mdid
1187 struct wpa_state_machine *sm; local
    [all...]
  /external/wpa_supplicant_8/src/wps/
wps_upnp_ssdp.c 123 next_advertisement(struct upnp_wps_device_sm *sm,
132 iface = dl_list_first(&sm->interfaces,
168 sm->ip_addr_text, sm->web_port,
224 * @sm: WPS UPnP state machine from upnp_wps_device_init()
227 void advertisement_state_machine_stop(struct upnp_wps_device_sm *sm,
230 struct advertisement_state_machine *a = &sm->advertisement;
235 eloop_cancel_timeout(advertisement_state_machine_handler, NULL, sm);
236 if (!send_byebye || sm->multicast_sd < 0)
248 msg = next_advertisement(sm, a, &islast)
265 struct upnp_wps_device_sm *sm = user_ctx; local
386 struct upnp_wps_device_sm *sm = eloop_data; local
689 struct upnp_wps_device_sm *sm = sock_ctx; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_aka.c 61 static void eap_aka_determine_identity(struct eap_sm *sm,
96 static void * eap_aka_init(struct eap_sm *sm)
100 if (sm->eap_sim_db_priv == NULL) {
112 eap_aka_determine_identity(sm, data, 1, 0);
120 static void * eap_aka_prime_init(struct eap_sm *sm)
126 if (sm->eap_sim_db_priv == NULL) {
146 eap_aka_determine_identity(sm, data, 1, 0);
154 static void eap_aka_reset(struct eap_sm *sm, void *priv)
265 static struct wpabuf * eap_aka_build_identity(struct eap_sm *sm,
274 if (eap_sim_db_identity_known(sm->eap_sim_db_priv, sm->identity
    [all...]
eap_tls.c 23 static void eap_tls_reset(struct eap_sm *sm, void *priv);
59 static void * eap_tls_init(struct eap_sm *sm)
68 if (eap_server_tls_ssl_init(sm, &data->ssl, 1)) {
70 eap_tls_reset(sm, data);
78 static void eap_tls_reset(struct eap_sm *sm, void *priv)
83 eap_server_tls_ssl_deinit(sm, &data->ssl);
88 static struct wpabuf * eap_tls_build_start(struct eap_sm *sm,
110 static struct wpabuf * eap_tls_buildReq(struct eap_sm *sm, void *priv, u8 id)
127 return eap_tls_build_start(sm, data, id);
129 if (tls_connection_established(sm->ssl_ctx, data->ssl.conn)
    [all...]
eap_mschapv2.c 63 static void * eap_mschapv2_init(struct eap_sm *sm)
72 if (sm->auth_challenge) {
73 os_memcpy(data->auth_challenge, sm->auth_challenge,
78 if (sm->peer_challenge) {
84 os_memcpy(data->peer_challenge, sm->peer_challenge,
92 static void eap_mschapv2_reset(struct eap_sm *sm, void *priv)
104 struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id)
148 struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id)
192 struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id)
224 static struct wpabuf * eap_mschapv2_buildReq(struct eap_sm *sm, void *priv
    [all...]
eap_sim.c 77 static void * eap_sim_init(struct eap_sm *sm)
81 if (sm->eap_sim_db_priv == NULL) {
95 static void eap_sim_reset(struct eap_sm *sm, void *priv)
104 static struct wpabuf * eap_sim_build_start(struct eap_sm *sm,
113 if (eap_sim_db_identity_known(sm->eap_sim_db_priv, sm->identity,
114 sm->identity_len)) {
134 static int eap_sim_build_encr(struct eap_sm *sm, struct eap_sim_data *data,
140 eap_sim_db_get_next_pseudonym(sm->eap_sim_db_priv, 0);
144 eap_sim_db_get_next_reauth_id(sm->eap_sim_db_priv, 0)
    [all...]
eap_wsc.c 69 struct eap_sm *sm = eloop_ctx; local
72 if (sm->method_pending != METHOD_PENDING_WAIT)
78 eap_sm_pending_cb(sm);
82 static void * eap_wsc_init(struct eap_sm *sm)
88 if (sm->identity && sm->identity_len == WSC_ID_REGISTRAR_LEN &&
89 os_memcmp(sm->identity, WSC_ID_REGISTRAR, WSC_ID_REGISTRAR_LEN) ==
92 else if (sm->identity && sm->identity_len == WSC_ID_ENROLLEE_LEN &&
93 os_memcmp(sm->identity, WSC_ID_ENROLLEE, WSC_ID_ENROLLEE_LEN
    [all...]
eap_peap.c 35 static void eap_peap_reset(struct eap_sm *sm, void *priv);
134 static void eap_peap_req_success(struct eap_sm *sm,
151 static void eap_peap_req_failure(struct eap_sm *sm,
169 static void * eap_peap_init(struct eap_sm *sm)
178 if (sm->user && sm->user->force_version >= 0) {
179 data->force_version = sm->user->force_version;
187 if (eap_server_tls_ssl_init(sm, &data->ssl, 0)) {
189 eap_peap_reset(sm, data);
197 static void eap_peap_reset(struct eap_sm *sm, void *priv
    [all...]
eap_md5.c 30 static void * eap_md5_init(struct eap_sm *sm)
43 static void eap_md5_reset(struct eap_sm *sm, void *priv)
50 static struct wpabuf * eap_md5_buildReq(struct eap_sm *sm, void *priv, u8 id)
81 static Boolean eap_md5_check(struct eap_sm *sm, void *priv,
103 static void eap_md5_process(struct eap_sm *sm, void *priv,
111 if (sm->user == NULL || sm->user->password == NULL ||
112 sm->user->password_hash) {
127 chap_md5(id, sm->user->password, sm->user->password_len
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_mschapv2.c 106 static void eap_mschapv2_deinit(struct eap_sm *sm, void *priv);
109 static void * eap_mschapv2_init(struct eap_sm *sm)
116 if (sm->peer_challenge) {
119 eap_mschapv2_deinit(sm, data);
122 os_memcpy(data->peer_challenge, sm->peer_challenge,
126 if (sm->auth_challenge) {
129 eap_mschapv2_deinit(sm, data);
132 os_memcpy(data->auth_challenge, sm->auth_challenge,
136 data->phase2 = sm->init_phase2;
142 static void eap_mschapv2_deinit(struct eap_sm *sm, void *priv
    [all...]
eap_ttls.c 42 static void eap_ttls_deinit(struct eap_sm *sm, void *priv);
84 static void * eap_ttls_init(struct eap_sm *sm)
87 struct eap_peer_config *config = eap_get_config(sm);
135 eap_ttls_deinit(sm, data);
144 if (!(tls_capabilities(sm->ssl_ctx) & TLS_CAPABILITY_IA) &&
150 eap_ttls_deinit(sm, data);
161 static void eap_ttls_phase2_eap_deinit(struct eap_sm *sm,
165 data->phase2_method->deinit(sm, data->phase2_priv);
172 static void eap_ttls_deinit(struct eap_sm *sm, void *priv)
177 eap_ttls_phase2_eap_deinit(sm, data)
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_mschapv2.c 101 static void eap_mschapv2_deinit(struct eap_sm *sm, void *priv);
104 static void * eap_mschapv2_init(struct eap_sm *sm)
111 if (sm->peer_challenge) {
114 eap_mschapv2_deinit(sm, data);
117 os_memcpy(data->peer_challenge, sm->peer_challenge,
121 if (sm->auth_challenge) {
124 eap_mschapv2_deinit(sm, data);
127 os_memcpy(data->auth_challenge, sm->auth_challenge,
131 data->phase2 = sm->init_phase2;
137 static void eap_mschapv2_deinit(struct eap_sm *sm, void *priv
    [all...]
eap_ttls.c 26 static void eap_ttls_deinit(struct eap_sm *sm, void *priv);
67 static void * eap_ttls_init(struct eap_sm *sm)
70 struct eap_peer_config *config = eap_get_config(sm);
105 eap_ttls_deinit(sm, data);
113 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_TTLS)) {
115 eap_ttls_deinit(sm, data);
123 static void eap_ttls_phase2_eap_deinit(struct eap_sm *sm,
127 data->phase2_method->deinit(sm, data->phase2_priv);
134 static void eap_ttls_deinit(struct eap_sm *sm, void *priv)
139 eap_ttls_phase2_eap_deinit(sm, data)
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
pmksa_cache.c 33 struct wpa_sm *sm; /* TODO: get rid of this reference(?) */ member in struct:rsn_pmksa_cache
114 pmksa->sm->cur_pmksa = NULL;
115 eapol_sm_request_reauth(pmksa->sm->eapol);
135 entry = pmksa->sm->cur_pmksa ? pmksa->sm->cur_pmksa :
136 pmksa_cache_get(pmksa, pmksa->sm->bssid, NULL);
170 if (pmksa->sm->proto != WPA_PROTO_RSN || pmk_len > PMK_LEN)
181 entry->expiration = now.sec + pmksa->sm->dot11RSNAConfigPMKLifetime;
182 entry->reauth_time = now.sec + pmksa->sm->dot11RSNAConfigPMKLifetime *
183 pmksa->sm->dot11RSNAConfigPMKReauthThreshold / 100
    [all...]
peerkey.c 52 struct wpa_sm *sm = eloop_ctx;
59 static void wpa_supplicant_peerkey_free(struct wpa_sm *sm,
62 eloop_cancel_timeout(wpa_supplicant_smk_timeout, sm, peerkey);
67 static int wpa_supplicant_send_smk_error(struct wpa_sm *sm, const u8 *dst,
82 rbuf = wpa_sm_alloc_eapol(sm, IEEE802_1X_TYPE_EAPOL_KEY,
94 os_memcpy(err->replay_counter, sm->request_counter,
96 inc_byte_array(sm->request_counter, WPA_REPLAY_COUNTER_LEN);
120 wpa_eapol_key_send(sm, sm->ptk.kck, ver, dst, ETH_P_EAPOL,
127 static int wpa_supplicant_send_smk_m3(struct wpa_sm *sm,
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_mschapv2.c 58 static void * eap_mschapv2_init(struct eap_sm *sm)
67 if (sm->auth_challenge) {
68 os_memcpy(data->auth_challenge, sm->auth_challenge,
73 if (sm->peer_challenge) {
79 os_memcpy(data->peer_challenge, sm->peer_challenge,
87 static void eap_mschapv2_reset(struct eap_sm *sm, void *priv)
99 struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id)
143 struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id)
187 struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id)
219 static struct wpabuf * eap_mschapv2_buildReq(struct eap_sm *sm, void *priv
    [all...]
eap_server_peap.c 30 static void eap_peap_reset(struct eap_sm *sm, void *priv);
129 static void eap_peap_req_success(struct eap_sm *sm,
146 static void eap_peap_req_failure(struct eap_sm *sm,
164 static void * eap_peap_init(struct eap_sm *sm)
173 if (sm->user && sm->user->force_version >= 0) {
174 data->force_version = sm->user->force_version;
182 if (eap_server_tls_ssl_init(sm, &data->ssl, 0)) {
184 eap_peap_reset(sm, data);
192 static void eap_peap_reset(struct eap_sm *sm, void *priv
    [all...]
eap_server_aka.c 57 static void eap_aka_fullauth(struct eap_sm *sm, struct eap_aka_data *data);
90 static int eap_aka_check_identity_reauth(struct eap_sm *sm,
102 data->reauth = eap_sim_db_get_reauth_entry(sm->eap_sim_db_priv,
131 static void eap_aka_check_identity(struct eap_sm *sm,
138 username = sim_get_username(sm->identity, sm->identity_len);
142 if (eap_aka_check_identity_reauth(sm, data, username) > 0) {
159 sm->eap_sim_db_priv, username);
173 eap_aka_fullauth(sm, data);
180 static void * eap_aka_init(struct eap_sm *sm)
    [all...]
eap_server_md5.c 25 static void * eap_md5_init(struct eap_sm *sm)
38 static void eap_md5_reset(struct eap_sm *sm, void *priv)
45 static struct wpabuf * eap_md5_buildReq(struct eap_sm *sm, void *priv, u8 id)
76 static Boolean eap_md5_check(struct eap_sm *sm, void *priv,
98 static void eap_md5_process(struct eap_sm *sm, void *priv,
106 if (sm->user == NULL || sm->user->password == NULL ||
107 sm->user->password_hash) {
122 if (chap_md5(id, sm->user->password, sm->user->password_len
    [all...]
eap_server_tls_common.c 33 int eap_server_tls_ssl_init(struct eap_sm *sm, struct eap_ssl_data *data,
36 data->eap = sm;
37 data->phase2 = sm->init_phase2;
39 data->conn = tls_connection_init(sm->ssl_ctx);
46 if (tls_connection_set_verify(sm->ssl_ctx, data->conn, verify_peer)) {
49 tls_connection_deinit(sm->ssl_ctx, data->conn);
54 data->tls_out_limit = sm->fragment_size > 0 ? sm->fragment_size : 1398;
66 void eap_server_tls_ssl_deinit(struct eap_sm *sm, struct eap_ssl_data *data)
68 tls_connection_deinit(sm->ssl_ctx, data->conn)
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/wps/
wps_upnp.h 56 void upnp_wps_device_deinit(struct upnp_wps_device_sm *sm);
58 int upnp_wps_device_start(struct upnp_wps_device_sm *sm, char *net_if);
59 void upnp_wps_device_stop(struct upnp_wps_device_sm *sm);
61 int upnp_wps_device_send_wlan_event(struct upnp_wps_device_sm *sm,
65 int upnp_wps_subscribers(struct upnp_wps_device_sm *sm);
  /external/wpa_supplicant_8/src/rsn_supp/
pmksa_cache.c 25 struct wpa_sm *sm; /* TODO: get rid of this reference(?) */ member in struct:rsn_pmksa_cache
46 wpa_sm_remove_pmkid(pmksa->sm, entry->aa, entry->pmkid);
74 pmksa->sm->cur_pmksa = NULL;
75 eapol_sm_request_reauth(pmksa->sm->eapol);
95 entry = pmksa->sm->cur_pmksa ? pmksa->sm->cur_pmksa :
96 pmksa_cache_get(pmksa, pmksa->sm->bssid, NULL, NULL);
141 entry->expiration = now.sec + pmksa->sm->dot11RSNAConfigPMKLifetime;
142 entry->reauth_time = now.sec + pmksa->sm->dot11RSNAConfigPMKLifetime *
143 pmksa->sm->dot11RSNAConfigPMKReauthThreshold / 100
    [all...]
peerkey.c 47 struct wpa_sm *sm = eloop_ctx;
54 static void wpa_supplicant_peerkey_free(struct wpa_sm *sm,
57 eloop_cancel_timeout(wpa_supplicant_smk_timeout, sm, peerkey);
62 static int wpa_supplicant_send_smk_error(struct wpa_sm *sm, const u8 *dst,
77 rbuf = wpa_sm_alloc_eapol(sm, IEEE802_1X_TYPE_EAPOL_KEY,
89 os_memcpy(err->replay_counter, sm->request_counter,
91 inc_byte_array(sm->request_counter, WPA_REPLAY_COUNTER_LEN);
115 wpa_eapol_key_send(sm, sm->ptk.kck, ver, dst, ETH_P_EAPOL,
122 static int wpa_supplicant_send_smk_m3(struct wpa_sm *sm,
    [all...]
  /frameworks/base/core/tests/coretests/src/android/view/
ListContextMenu.java 103 SubMenu sm = menu.addSubMenu(0, 0, 0, "The 2nd item, a sub menu").setIcon(R.drawable.black_square_stretchable); local
104 item = sm.getItem();
106 sm.add(1, 0, 0, "Subitem 1");
107 sm.add(1, 0, 0, "Subitem 2");
108 sm.add(1, 0, 0, "Subitem 3");
109 sm.setGroupCheckable(1, true, true);
117 sm = menu.addSubMenu(0, 0, 0, "Item 10 SM");
118 sm.add(0, 0, 0, "Subitem 1");
119 sm.add(0, 0, 0, "Subitem 2")
147 SubMenu sm = menu.addSubMenu(0, 0, 0, "Test 1.5 SM"); local
    [all...]

Completed in 1025 milliseconds

1 2 34 5 6 7 8 91011>>