HomeSort by relevance Sort by last modified time
    Searched refs:pmkid (Results 1 - 25 of 102) sorted by null

1 2 3 4 5

  /external/wpa_supplicant_8/src/ap/
pmksa_cache_auth.h 19 u8 pmkid[PMKID_LEN]; member in struct:rsn_pmksa_cache_entry
43 const u8 *spa, const u8 *pmkid);
46 const u8 *pmkid);
55 const u8 *aa, const u8 *pmkid);
pmksa_cache_auth.c 25 #define PMKID_HASH(pmkid) (unsigned int) ((pmkid)[0] & 0x7f)
26 struct rsn_pmksa_cache_entry *pmkid[PMKID_HASH_SIZE]; member in struct:rsn_pmksa_cache
59 hash = PMKID_HASH(entry->pmkid);
60 pos = pmksa->pmkid[hash];
67 pmksa->pmkid[hash] = entry->hnext;
212 hash = PMKID_HASH(entry->pmkid);
213 entry->hnext = pmksa->pmkid[hash];
214 pmksa->pmkid[hash] = entry;
221 wpa_hexdump(MSG_DEBUG, "RSN: added PMKID", entry->pmkid, PMKID_LEN)
    [all...]
wpa_auth_ie.c 92 const u8 *pmkid)
243 if (pmkid) {
246 /* PMKID Count */
249 os_memcpy(pos, pmkid, PMKID_LEN);
257 if (pmkid == NULL) {
258 /* PMKID Count */
293 int pmkid_count_set = pmkid != NULL;
296 /* PMKID Count */
431 const u8 *pmkid; member in struct:wpa_auth_okc_iter_data
439 data->pmkid);
455 const u8 *pmkid = NULL; local
    [all...]
wpa_auth_ie.h 17 const u8 *pmkid; member in struct:wpa_eapol_ie_parse
wpa_auth.c 711 ie.num_pmkid != 1 || ie.pmkid == NULL) {
717 os_memcpy(sm->sup_pmk_r1_name, ie.pmkid, PMKID_LEN);
1770 u8 buf[2 + RSN_SELECTOR_LEN + PMKID_LEN], *pmkid = NULL; local
    [all...]
wpa_auth_i.h 209 const u8 *pmkid);
  /external/wpa_supplicant_8/src/drivers/
driver_ndis.h 23 u8 pmkid[16]; member in struct:ndis_pmkid_entry
46 struct ndis_pmkid_entry *pmkid; member in struct:wpa_driver_ndis_data
driver_ndis.c 250 NDIS_802_11_PMKID_VALUE PMKID;
325 NDIS_802_11_PMKID_VALUE PMKID;
1208 entry = drv->pmkid;
1222 entry = drv->pmkid;
1225 os_memcpy(&p->BSSIDInfo[i].PMKID, entry->pmkid, 16);
1236 const u8 *pmkid)
1308 struct ndis_pmkid_entry *pmkid, *prev; local
1566 NDIS_802_11_PMKID_CANDIDATE_LIST *pmkid; local
    [all...]
driver_wext.c 338 wpa_printf(MSG_DEBUG, "PMKID candidate wireless event: "
892 * Make sure that the driver does not have any obsolete PMKID entries.
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
pmksa_cache.h 17 u8 pmkid[PMKID_LEN]; member in struct:rsn_pmksa_cache_entry
55 const u8 *aa, const u8 *pmkid,
63 int pmksa_cache_set_current(struct wpa_sm *sm, const u8 *pmkid,
87 pmksa_cache_get(struct rsn_pmksa_cache *pmksa, const u8 *aa, const u8 *pmkid,
116 static inline int pmksa_cache_set_current(struct wpa_sm *sm, const u8 *pmkid,
pmksa_cache.c 46 wpa_sm_remove_pmkid(pmksa->sm, entry->aa, entry->pmkid);
120 * this entry will be replaced with the new entry. PMKID will be calculated
121 * based on the PMK and the driver interface is notified of the new PMKID.
138 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid,
156 os_memcmp_const(pos->pmkid, entry->pmkid,
234 wpa_sm_add_pmkid(pmksa->sm, entry->aa, entry->pmkid);
307 * @pmkid: PMKID or %NULL to match any
312 const u8 *aa, const u8 *pmkid,
    [all...]
wpa_ie.h 19 const u8 *pmkid; member in struct:wpa_eapol_ie_parse
wpa_i.h 202 const u8 *pmkid)
205 return sm->ctx->add_pmkid(sm->ctx->ctx, bssid, pmkid);
209 const u8 *pmkid)
212 return sm->ctx->remove_pmkid(sm->ctx->ctx, bssid, pmkid);
wpa.c 143 const u8 *pmkid)
147 if (pmkid && !sm->cur_pmksa) {
152 sm->cur_pmksa = pmksa_cache_get(sm->pmksa, src_addr, pmkid,
156 "RSN: found matching PMKID from PMKSA cache");
159 "RSN: no matching PMKID found");
164 if (pmkid && sm->cur_pmksa &&
165 os_memcmp_const(pmkid, sm->cur_pmksa->pmkid, PMKID_LEN) == 0) {
166 wpa_hexdump(MSG_DEBUG, "RSN: matched PMKID", pmkid, PMKID_LEN)
    [all...]
peerkey.c 673 ie.pmkid == NULL) {
677 if (os_memcmp_const(ie.pmkid, peerkey->smkid, PMKID_LEN) != 0) {
679 ie.pmkid, PMKID_LEN);
776 kde.pmkid == NULL || kde.rsn_ie == NULL) {
781 if (os_memcmp_const(kde.pmkid, peerkey->smkid, PMKID_LEN) != 0) {
783 kde.pmkid, PMKID_LEN);
    [all...]
wpa.h 40 int (*add_pmkid)(void *ctx, const u8 *bssid, const u8 *pmkid);
41 int (*remove_pmkid)(void *ctx, const u8 *bssid, const u8 *pmkid);
wpa_ie.c 195 /* PMKID Count (2 octets, little endian) */
198 /* PMKID */
199 os_memcpy(pos, sm->cur_pmksa->pmkid, PMKID_LEN);
206 /* PMKID Count */
377 ie->pmkid = pos + 2 + RSN_SELECTOR_LEN;
378 wpa_hexdump(MSG_DEBUG, "WPA: PMKID in EAPOL-Key",
  /external/wpa_supplicant_8/wpa_supplicant/
preauth_test.c 147 const u8 *bssid, const u8 *pmkid)
155 const u8 *bssid, const u8 *pmkid)
driver_i.h 159 const u8 *bssid, const u8 *pmkid)
162 return wpa_s->driver->add_pmkid(wpa_s->drv_priv, bssid, pmkid);
168 const u8 *bssid, const u8 *pmkid)
172 pmkid);
wpas_glue.c 154 * due to that AP failing to operate correctly if PMKID is
502 const u8 *bssid, const u8 *pmkid)
504 return wpa_drv_add_pmkid(wpa_s, bssid, pmkid);
509 const u8 *bssid, const u8 *pmkid)
511 return wpa_drv_remove_pmkid(wpa_s, bssid, pmkid);
  /external/wpa_supplicant_8/src/common/
wpa_common.c 272 if (data.num_pmkid == 1 && data.pmkid)
273 parse->rsn_pmkid = data.pmkid;
447 data->pmkid = NULL;
554 wpa_printf(MSG_DEBUG, "%s: PMKID underflow "
561 data->pmkid = pos;
633 data->pmkid = NULL;
903 * @pmkid: Buffer for PMKID
907 * PMKID = HMAC-SHA1-128(PMK, "PMK Name" || AA || SPA)
910 u8 *pmkid, int use_sha256
    [all...]
wpa_common.h 234 /* 1/4: PMKID
253 * PMKID Count (2 octets) (default: 0)
254 * PMKID List (16 * n octets)
365 const u8 *pmkid; member in struct:wpa_ie_data
376 u8 *pmkid, int use_sha256);
384 int wpa_insert_pmkid(u8 *ies, size_t ies_len, const u8 *pmkid);
  /bionic/libc/kernel/uapi/linux/
wireless.h 421 __u8 pmkid[IW_PMKID_LEN]; member in struct:iw_pmksa
  /development/ndk/platforms/android-3/include/linux/
wireless.h 386 __u8 pmkid[IW_PMKID_LEN]; member in struct:iw_pmksa
  /development/ndk/platforms/android-L/include/linux/
wireless.h 421 __u8 pmkid[IW_PMKID_LEN]; member in struct:iw_pmksa

Completed in 533 milliseconds

1 2 3 4 5