HomeSort by relevance Sort by last modified time
    Searched refs:pmkid (Results 1 - 25 of 65) sorted by null

1 2 3

  /external/wpa_supplicant_8/src/ap/
pmksa_cache_auth.h 19 u8 pmkid[PMKID_LEN]; member in struct:rsn_pmksa_cache_entry
43 const u8 *spa, const u8 *pmkid);
46 const u8 *pmkid);
55 const u8 *aa, const u8 *pmkid);
pmksa_cache_auth.c 25 #define PMKID_HASH(pmkid) (unsigned int) ((pmkid)[0] & 0x7f)
26 struct rsn_pmksa_cache_entry *pmkid[PMKID_HASH_SIZE]; member in struct:rsn_pmksa_cache
58 pos = pmksa->pmkid[PMKID_HASH(entry->pmkid)];
65 pmksa->pmkid[PMKID_HASH(entry->pmkid)] =
208 entry->hnext = pmksa->pmkid[PMKID_HASH(entry->pmkid)];
209 pmksa->pmkid[PMKID_HASH(entry->pmkid)] = entry
    [all...]
wpa_auth_ie.c 92 const u8 *pmkid)
243 if (pmkid) {
246 /* PMKID Count */
249 os_memcpy(pos, pmkid, PMKID_LEN);
257 if (pmkid == NULL) {
258 /* PMKID Count */
275 int pmkid_count_set = pmkid != NULL;
278 /* PMKID Count */
361 const u8 *pmkid; member in struct:wpa_auth_okc_iter_data
369 data->pmkid);
385 const u8 *pmkid = NULL; local
    [all...]
wpa_auth_ie.h 17 const u8 *pmkid; member in struct:wpa_eapol_ie_parse
wpa_auth.c 665 ie.num_pmkid != 1 || ie.pmkid == NULL) {
671 os_memcpy(sm->sup_pmk_r1_name, ie.pmkid, PMKID_LEN);
1685 u8 buf[2 + RSN_SELECTOR_LEN + PMKID_LEN], *pmkid = NULL; local
    [all...]
wpa_auth_i.h 190 const u8 *pmkid);
  /external/wpa_supplicant_8/src/rsn_supp/
pmksa_cache.h 17 u8 pmkid[PMKID_LEN]; member in struct:rsn_pmksa_cache_entry
55 const u8 *aa, const u8 *pmkid,
63 int pmksa_cache_set_current(struct wpa_sm *sm, const u8 *pmkid,
86 pmksa_cache_get(struct rsn_pmksa_cache *pmksa, const u8 *aa, const u8 *pmkid,
115 static inline int pmksa_cache_set_current(struct wpa_sm *sm, const u8 *pmkid,
pmksa_cache.c 46 wpa_sm_remove_pmkid(pmksa->sm, entry->aa, entry->pmkid);
120 * this entry will be replaced with the new entry. PMKID will be calculated
121 * based on the PMK and the driver interface is notified of the new PMKID.
138 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid,
156 os_memcmp(pos->pmkid, entry->pmkid, PMKID_LEN) ==
228 wpa_sm_add_pmkid(pmksa->sm, entry->aa, entry->pmkid);
294 * @pmkid: PMKID or %NULL to match any
299 const u8 *aa, const u8 *pmkid,
    [all...]
wpa_ie.h 19 const u8 *pmkid; member in struct:wpa_eapol_ie_parse
wpa_i.h 197 const u8 *pmkid)
200 return sm->ctx->add_pmkid(sm->ctx->ctx, bssid, pmkid);
204 const u8 *pmkid)
207 return sm->ctx->remove_pmkid(sm->ctx->ctx, bssid, pmkid);
wpa.c 139 const u8 *pmkid)
143 if (pmkid && !sm->cur_pmksa) {
148 sm->cur_pmksa = pmksa_cache_get(sm->pmksa, src_addr, pmkid,
152 "RSN: found matching PMKID from PMKSA cache");
155 "RSN: no matching PMKID found");
160 if (pmkid && sm->cur_pmksa &&
161 os_memcmp(pmkid, sm->cur_pmksa->pmkid, PMKID_LEN) == 0) {
162 wpa_hexdump(MSG_DEBUG, "RSN: matched PMKID", pmkid, PMKID_LEN)
    [all...]
wpa.h 40 int (*add_pmkid)(void *ctx, const u8 *bssid, const u8 *pmkid);
41 int (*remove_pmkid)(void *ctx, const u8 *bssid, const u8 *pmkid);
peerkey.c 677 if (wpa_supplicant_parse_ies(kde, len, &ie) < 0 || ie.pmkid == NULL) {
681 if (os_memcmp(ie.pmkid, peerkey->smkid, PMKID_LEN) != 0) {
683 ie.pmkid, PMKID_LEN);
786 kde.pmkid == NULL || kde.rsn_ie == NULL) {
791 if (os_memcmp(kde.pmkid, peerkey->smkid, PMKID_LEN) != 0) {
793 kde.pmkid, PMKID_LEN);
    [all...]
wpa_ie.c 196 /* PMKID Count (2 octets, little endian) */
199 /* PMKID */
200 os_memcpy(pos, sm->cur_pmksa->pmkid, PMKID_LEN);
207 /* PMKID Count */
279 ie->pmkid = pos + 2 + RSN_SELECTOR_LEN;
280 wpa_hexdump(MSG_DEBUG, "WPA: PMKID in EAPOL-Key",
  /external/wpa_supplicant_8/src/drivers/
driver_ndis.h 23 u8 pmkid[16]; member in struct:ndis_pmkid_entry
46 struct ndis_pmkid_entry *pmkid; member in struct:wpa_driver_ndis_data
driver_ndis.c 250 NDIS_802_11_PMKID_VALUE PMKID;
325 NDIS_802_11_PMKID_VALUE PMKID;
1208 entry = drv->pmkid;
1222 entry = drv->pmkid;
1225 os_memcpy(&p->BSSIDInfo[i].PMKID, entry->pmkid, 16);
1236 const u8 *pmkid)
1245 entry = drv->pmkid;
1308 struct ndis_pmkid_entry *pmkid, *prev; local
1566 NDIS_802_11_PMKID_CANDIDATE_LIST *pmkid; local
    [all...]
driver_wext.c 350 wpa_printf(MSG_DEBUG, "PMKID candidate wireless event: "
912 * Make sure that the driver does not have any obsolete PMKID entries.
    [all...]
  /external/wpa_supplicant_8/src/common/
wpa_common.c 266 if (data.num_pmkid == 1 && data.pmkid)
267 parse->rsn_pmkid = data.pmkid;
412 data->pmkid = NULL;
521 wpa_printf(MSG_DEBUG, "%s: PMKID underflow "
528 data->pmkid = pos;
602 data->pmkid = NULL;
871 * @pmkid: Buffer for PMKID
875 * PMKID = HMAC-SHA1-128(PMK, "PMK Name" || AA || SPA)
878 u8 *pmkid, int use_sha256
    [all...]
wpa_common.h 219 /* 1/4: PMKID
238 * PMKID Count (2 octets) (default: 0)
239 * PMKID List (16 * n octets)
349 const u8 *pmkid; member in struct:wpa_ie_data
360 u8 *pmkid, int use_sha256);
367 int wpa_insert_pmkid(u8 *ies, size_t ies_len, const u8 *pmkid);
  /external/wpa_supplicant_8/wpa_supplicant/
preauth_test.c 150 const u8 *bssid, const u8 *pmkid)
158 const u8 *bssid, const u8 *pmkid)
driver_i.h 143 const u8 *bssid, const u8 *pmkid)
146 return wpa_s->driver->add_pmkid(wpa_s->drv_priv, bssid, pmkid);
152 const u8 *bssid, const u8 *pmkid)
156 pmkid);
wpas_glue.c 455 const u8 *bssid, const u8 *pmkid)
457 return wpa_drv_add_pmkid(wpa_s, bssid, pmkid);
462 const u8 *bssid, const u8 *pmkid)
464 return wpa_drv_remove_pmkid(wpa_s, bssid, pmkid);
  /hardware/ti/wlan/mac80211/wpa_supplicant_lib/
driver_mac80211.c 239 wpa_printf(MSG_DEBUG, "PMKID candidate wireless event: "
749 * Make sure that the driver does not have any obsolete PMKID entries.
    [all...]
  /bionic/libc/kernel/common/linux/
wireless.h 391 __u8 pmkid[IW_PMKID_LEN]; member in struct:iw_pmksa
  /development/ndk/platforms/android-3/include/linux/
wireless.h 386 __u8 pmkid[IW_PMKID_LEN]; member in struct:iw_pmksa

Completed in 474 milliseconds

1 2 3