/external/wpa_supplicant_8/src/ap/ |
pmksa_cache_auth.h | 19 u8 pmkid[PMKID_LEN]; member in struct:rsn_pmksa_cache_entry 43 const u8 *spa, const u8 *pmkid); 46 const u8 *pmkid); 55 const u8 *aa, const u8 *pmkid);
|
pmksa_cache_auth.c | 25 #define PMKID_HASH(pmkid) (unsigned int) ((pmkid)[0] & 0x7f) 26 struct rsn_pmksa_cache_entry *pmkid[PMKID_HASH_SIZE]; member in struct:rsn_pmksa_cache 58 pos = pmksa->pmkid[PMKID_HASH(entry->pmkid)]; 65 pmksa->pmkid[PMKID_HASH(entry->pmkid)] = 208 entry->hnext = pmksa->pmkid[PMKID_HASH(entry->pmkid)]; 209 pmksa->pmkid[PMKID_HASH(entry->pmkid)] = entry [all...] |
wpa_auth_ie.c | 92 const u8 *pmkid) 243 if (pmkid) { 246 /* PMKID Count */ 249 os_memcpy(pos, pmkid, PMKID_LEN); 257 if (pmkid == NULL) { 258 /* PMKID Count */ 275 int pmkid_count_set = pmkid != NULL; 278 /* PMKID Count */ 361 const u8 *pmkid; member in struct:wpa_auth_okc_iter_data 369 data->pmkid); 385 const u8 *pmkid = NULL; local [all...] |
wpa_auth_ie.h | 17 const u8 *pmkid; member in struct:wpa_eapol_ie_parse
|
wpa_auth.c | 665 ie.num_pmkid != 1 || ie.pmkid == NULL) { 671 os_memcpy(sm->sup_pmk_r1_name, ie.pmkid, PMKID_LEN); 1685 u8 buf[2 + RSN_SELECTOR_LEN + PMKID_LEN], *pmkid = NULL; local [all...] |
wpa_auth_i.h | 190 const u8 *pmkid);
|
/external/wpa_supplicant_8/src/rsn_supp/ |
pmksa_cache.h | 17 u8 pmkid[PMKID_LEN]; member in struct:rsn_pmksa_cache_entry 55 const u8 *aa, const u8 *pmkid, 63 int pmksa_cache_set_current(struct wpa_sm *sm, const u8 *pmkid, 86 pmksa_cache_get(struct rsn_pmksa_cache *pmksa, const u8 *aa, const u8 *pmkid, 115 static inline int pmksa_cache_set_current(struct wpa_sm *sm, const u8 *pmkid,
|
pmksa_cache.c | 46 wpa_sm_remove_pmkid(pmksa->sm, entry->aa, entry->pmkid); 120 * this entry will be replaced with the new entry. PMKID will be calculated 121 * based on the PMK and the driver interface is notified of the new PMKID. 138 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, 156 os_memcmp(pos->pmkid, entry->pmkid, PMKID_LEN) == 228 wpa_sm_add_pmkid(pmksa->sm, entry->aa, entry->pmkid); 294 * @pmkid: PMKID or %NULL to match any 299 const u8 *aa, const u8 *pmkid, [all...] |
wpa_ie.h | 19 const u8 *pmkid; member in struct:wpa_eapol_ie_parse
|
wpa_i.h | 197 const u8 *pmkid) 200 return sm->ctx->add_pmkid(sm->ctx->ctx, bssid, pmkid); 204 const u8 *pmkid) 207 return sm->ctx->remove_pmkid(sm->ctx->ctx, bssid, pmkid);
|
wpa.c | 139 const u8 *pmkid) 143 if (pmkid && !sm->cur_pmksa) { 148 sm->cur_pmksa = pmksa_cache_get(sm->pmksa, src_addr, pmkid, 152 "RSN: found matching PMKID from PMKSA cache"); 155 "RSN: no matching PMKID found"); 160 if (pmkid && sm->cur_pmksa && 161 os_memcmp(pmkid, sm->cur_pmksa->pmkid, PMKID_LEN) == 0) { 162 wpa_hexdump(MSG_DEBUG, "RSN: matched PMKID", pmkid, PMKID_LEN) [all...] |
wpa.h | 40 int (*add_pmkid)(void *ctx, const u8 *bssid, const u8 *pmkid); 41 int (*remove_pmkid)(void *ctx, const u8 *bssid, const u8 *pmkid);
|
peerkey.c | 677 if (wpa_supplicant_parse_ies(kde, len, &ie) < 0 || ie.pmkid == NULL) { 681 if (os_memcmp(ie.pmkid, peerkey->smkid, PMKID_LEN) != 0) { 683 ie.pmkid, PMKID_LEN); 786 kde.pmkid == NULL || kde.rsn_ie == NULL) { 791 if (os_memcmp(kde.pmkid, peerkey->smkid, PMKID_LEN) != 0) { 793 kde.pmkid, PMKID_LEN); [all...] |
wpa_ie.c | 196 /* PMKID Count (2 octets, little endian) */ 199 /* PMKID */ 200 os_memcpy(pos, sm->cur_pmksa->pmkid, PMKID_LEN); 207 /* PMKID Count */ 279 ie->pmkid = pos + 2 + RSN_SELECTOR_LEN; 280 wpa_hexdump(MSG_DEBUG, "WPA: PMKID in EAPOL-Key",
|
/external/wpa_supplicant_8/src/drivers/ |
driver_ndis.h | 23 u8 pmkid[16]; member in struct:ndis_pmkid_entry 46 struct ndis_pmkid_entry *pmkid; member in struct:wpa_driver_ndis_data
|
driver_ndis.c | 250 NDIS_802_11_PMKID_VALUE PMKID; 325 NDIS_802_11_PMKID_VALUE PMKID; 1208 entry = drv->pmkid; 1222 entry = drv->pmkid; 1225 os_memcpy(&p->BSSIDInfo[i].PMKID, entry->pmkid, 16); 1236 const u8 *pmkid) 1245 entry = drv->pmkid; 1308 struct ndis_pmkid_entry *pmkid, *prev; local 1566 NDIS_802_11_PMKID_CANDIDATE_LIST *pmkid; local [all...] |
driver_wext.c | 350 wpa_printf(MSG_DEBUG, "PMKID candidate wireless event: " 912 * Make sure that the driver does not have any obsolete PMKID entries. [all...] |
/external/wpa_supplicant_8/src/common/ |
wpa_common.c | 266 if (data.num_pmkid == 1 && data.pmkid) 267 parse->rsn_pmkid = data.pmkid; 412 data->pmkid = NULL; 521 wpa_printf(MSG_DEBUG, "%s: PMKID underflow " 528 data->pmkid = pos; 602 data->pmkid = NULL; 871 * @pmkid: Buffer for PMKID 875 * PMKID = HMAC-SHA1-128(PMK, "PMK Name" || AA || SPA) 878 u8 *pmkid, int use_sha256 [all...] |
wpa_common.h | 219 /* 1/4: PMKID 238 * PMKID Count (2 octets) (default: 0) 239 * PMKID List (16 * n octets) 349 const u8 *pmkid; member in struct:wpa_ie_data 360 u8 *pmkid, int use_sha256); 367 int wpa_insert_pmkid(u8 *ies, size_t ies_len, const u8 *pmkid);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
preauth_test.c | 150 const u8 *bssid, const u8 *pmkid) 158 const u8 *bssid, const u8 *pmkid)
|
driver_i.h | 143 const u8 *bssid, const u8 *pmkid) 146 return wpa_s->driver->add_pmkid(wpa_s->drv_priv, bssid, pmkid); 152 const u8 *bssid, const u8 *pmkid) 156 pmkid);
|
wpas_glue.c | 455 const u8 *bssid, const u8 *pmkid) 457 return wpa_drv_add_pmkid(wpa_s, bssid, pmkid); 462 const u8 *bssid, const u8 *pmkid) 464 return wpa_drv_remove_pmkid(wpa_s, bssid, pmkid);
|
/hardware/ti/wlan/mac80211/wpa_supplicant_lib/ |
driver_mac80211.c | 239 wpa_printf(MSG_DEBUG, "PMKID candidate wireless event: " 749 * Make sure that the driver does not have any obsolete PMKID entries. [all...] |
/bionic/libc/kernel/common/linux/ |
wireless.h | 391 __u8 pmkid[IW_PMKID_LEN]; member in struct:iw_pmksa
|
/development/ndk/platforms/android-3/include/linux/ |
wireless.h | 386 __u8 pmkid[IW_PMKID_LEN]; member in struct:iw_pmksa
|