/external/wpa_supplicant_8/src/rsn_supp/ |
pmksa_cache.c | 2 * WPA Supplicant - RSN PMKSA cache 23 struct rsn_pmksa_cache_entry *pmksa; /* PMKSA cache */ member in struct:rsn_pmksa_cache 24 int pmksa_count; /* number of entries in PMKSA cache */ 33 static void pmksa_cache_set_expiration(struct rsn_pmksa_cache *pmksa); 42 static void pmksa_cache_free_entry(struct rsn_pmksa_cache *pmksa, 46 wpa_sm_remove_pmkid(pmksa->sm, entry->aa, entry->pmkid); 47 pmksa->pmksa_count--; 48 pmksa->free_cb(entry, pmksa->ctx, reason) 55 struct rsn_pmksa_cache *pmksa = eloop_ctx; local 73 struct rsn_pmksa_cache *pmksa = eloop_ctx; local 423 struct rsn_pmksa_cache *pmksa = sm->pmksa; local 513 struct rsn_pmksa_cache *pmksa; local [all...] |
pmksa_cache.h | 2 * wpa_supplicant - WPA2/RSN PMKSA cache functions 13 * struct rsn_pmksa_cache_entry - PMKSA cache entry 29 * This field is only used to match PMKSA cache entries to a specific 31 * This can be a pointer to the configuration entry, but PMKSA caching 53 void pmksa_cache_deinit(struct rsn_pmksa_cache *pmksa); 54 struct rsn_pmksa_cache_entry * pmksa_cache_get(struct rsn_pmksa_cache *pmksa, 57 int pmksa_cache_list(struct rsn_pmksa_cache *pmksa, char *buf, size_t len); 59 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 67 pmksa_cache_get_opportunistic(struct rsn_pmksa_cache *pmksa, 69 void pmksa_cache_flush(struct rsn_pmksa_cache *pmksa, void *network_ctx [all...] |
preauth.c | 34 * pmksa_candidate_free - Free all entries in PMKSA candidate list 95 pmksa_cache_add(sm->pmksa, pmk, pmk_len, 163 * address. This is usually called for PMKSA candidates found from scan results 277 * rsn_preauth_candidate_process - Process PMKSA candidates 280 * Go through the PMKSA candidates and start pre-authentication if a candidate 281 * without an existing PMKSA cache entry is found. Processed candidates will be 293 wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: processing PMKSA candidate " 308 p = pmksa_cache_get(sm->pmksa, candidate->bssid, NULL, NULL); 311 wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: PMKSA " 321 wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: PMKSA candidate 443 struct rsn_pmksa_cache_entry *pmksa; local [all...] |
wpa_i.h | 35 struct rsn_pmksa_cache *pmksa; /* PMKSA cache */ member in struct:wpa_sm 36 struct rsn_pmksa_cache_entry *cur_pmksa; /* current PMKSA entry */
|
wpa.c | 147 * matching PMKSA cache entry here. */ 148 sm->cur_pmksa = pmksa_cache_get(sm->pmksa, src_addr, pmkid, 152 "RSN: found matching PMKID from PMKSA cache"); 164 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from PMKSA cache", 199 sa = pmksa_cache_add(sm->pmksa, 206 pmksa_cache_get(sm->pmksa, src_addr, pmkid, NULL)) 223 "RSN: Cancelled PMKSA caching " 240 "RSN: no PMKSA entry found - trigger " 489 "opportunistic PMKSA entry - marking it valid"); [all...] |
/external/wpa_supplicant_8/src/ap/ |
pmksa_cache_auth.c | 2 * hostapd - PMKSA cache for IEEE 802.11i RSN 27 struct rsn_pmksa_cache_entry *pmksa; member in struct:rsn_pmksa_cache 35 static void pmksa_cache_set_expiration(struct rsn_pmksa_cache *pmksa); 51 void pmksa_cache_free_entry(struct rsn_pmksa_cache *pmksa, 56 pmksa->pmksa_count--; 57 pmksa->free_cb(entry, pmksa->ctx); 58 pos = pmksa->pmkid[PMKID_HASH(entry->pmkid)]; 65 pmksa->pmkid[PMKID_HASH(entry->pmkid)] = 74 pos = pmksa->pmksa 93 struct rsn_pmksa_cache *pmksa = eloop_ctx; local 421 struct rsn_pmksa_cache *pmksa; local [all...] |
pmksa_cache_auth.h | 2 * hostapd - PMKSA cache for IEEE 802.11i RSN 15 * struct rsn_pmksa_cache_entry - PMKSA cache entry 40 void pmksa_cache_auth_deinit(struct rsn_pmksa_cache *pmksa); 42 pmksa_cache_auth_get(struct rsn_pmksa_cache *pmksa, 45 struct rsn_pmksa_cache *pmksa, const u8 *spa, const u8 *aa, 48 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, 53 pmksa_cache_add_okc(struct rsn_pmksa_cache *pmksa, 58 void pmksa_cache_free_entry(struct rsn_pmksa_cache *pmksa,
|
wpa_auth_ie.c | 358 struct rsn_pmksa_cache_entry *pmksa; member in struct:wpa_auth_okc_iter_data 368 data->pmksa = pmksa_cache_get_okc(a->pmksa, data->aa, data->spa, 370 if (data->pmksa) 577 sm->pmksa = NULL; 581 sm->pmksa = pmksa_cache_auth_get(wpa_auth->pmksa, sm->addr, 583 if (sm->pmksa) { 584 pmkid = sm->pmksa->pmkid; 588 for (i = 0; sm->pmksa == NULL && wpa_auth->conf.okc & [all...] |
preauth_auth.c | 214 "added PMKSA cache entry (pre-auth)"); 218 "failed to add PMKSA cache entry "
|
wpa_auth_i.h | 106 struct rsn_pmksa_cache_entry *pmksa; member in struct:wpa_state_machine 185 struct rsn_pmksa_cache *pmksa; member in struct:wpa_authenticator
|
wpa_auth.c | 271 if (sm->pmksa == ctx) 272 sm->pmksa = NULL; 397 wpa_auth->pmksa = pmksa_cache_auth_init(wpa_auth_pmksa_free_cb, 399 if (wpa_auth->pmksa == NULL) { 400 wpa_printf(MSG_ERROR, "PMKSA cache initialization failed."); 411 pmksa_cache_auth_deinit(wpa_auth->pmksa); 460 pmksa_cache_auth_deinit(wpa_auth->pmksa); 2958 struct rsn_pmksa_cache_entry *pmksa; local [all...] |
ieee802_1x.c | 649 struct rsn_pmksa_cache_entry *pmksa; local 764 pmksa = wpa_auth_sta_get_pmksa(sta->wpa_sm); 765 if (pmksa) { 767 HOSTAPD_LEVEL_DEBUG, "cached PMKSA " 770 wpa_auth_sta_clear_pmksa(sta->wpa_sm, pmksa); 824 struct rsn_pmksa_cache_entry *pmksa; local 913 pmksa = wpa_auth_sta_get_pmksa(sta->wpa_sm); 914 if (pmksa) { 919 "PMK from PMKSA cache - skip IEEE 802.1X/EAP"); 921 * because of existing PMKSA information in the cache. * [all...] |
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
wpa_cli.sgml | 240 <term>pmksa</term> 242 <para>show PMKSA cache</para>
|
wpa_background.sgml | 78 pre-authentication, and PMKSA caching).</para>
|
/external/wpa_supplicant_8/wpa_supplicant/ |
ChangeLog | 109 * limited PMKSA cache entries to be used only with the network context 111 * improved PMKSA cache expiration to avoid unnecessary disconnections 259 - Support PMKSA candidate events. This adds support for RSN 584 * fixed canceling of PMKSA caching when using drivers that generate [all...] |
todo.txt | 35 - consider merging hostapd and wpa_supplicant PMKSA cache implementations
|
config_ssid.h | 239 * known as opportunistic PMKSA caching for WPA2. This is disabled (0) 244 * are using the same PMK and generate PMKSA cache entries without
|
README | 91 * PMKSA caching 254 messages in initial key handshake, pre-authentication, and PMKSA caching). 742 pmksa = show PMKSA cache [all...] |
wpas_glue.c | 144 /* Trying to use PMKSA caching - do not send EAPOL-Start frames 146 wpa_printf(MSG_DEBUG, "RSN: PMKSA caching - do not send "
|
/external/wpa_supplicant_8/src/eapol_supp/ |
eapol_supp_sm.c | [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_wext.c | 2239 struct iw_pmksa pmksa; local [all...] |
driver.h | [all...] |
/hardware/ti/wlan/mac80211/wpa_supplicant_lib/ |
driver_mac80211.c | 1602 struct iw_pmksa pmksa; local [all...] |
/external/wpa_supplicant_8/hostapd/ |
ChangeLog | 111 * Allow PMKSA caching to be disabled on the Authenticator. See 470 * fixed PMKSA cache update in the end of successful RSN 499 using WPA2 even if PMKSA caching is not used 613 * fixed PMKSA caching to copy User-Name and Class attributes so that 617 * fixed PMKSA caching for the case where STA (re)associates without [all...] |
README | 241 - RSN/WPA2 (IEEE 802.11i), including PMKSA caching and pre-authentication 305 messages in initial key handshake, pre-authentication, and PMKSA caching).
|