/external/wpa_supplicant_8/src/ap/ |
pmksa_cache_auth.h | 19 u8 pmkid[PMKID_LEN]; member in struct:rsn_pmksa_cache_entry 43 const u8 *spa, const u8 *pmkid); 46 const u8 *pmkid); 55 const u8 *aa, const u8 *pmkid);
|
pmksa_cache_auth.c | 25 #define PMKID_HASH(pmkid) (unsigned int) ((pmkid)[0] & 0x7f) 26 struct rsn_pmksa_cache_entry *pmkid[PMKID_HASH_SIZE]; member in struct:rsn_pmksa_cache 59 hash = PMKID_HASH(entry->pmkid); 60 pos = pmksa->pmkid[hash]; 67 pmksa->pmkid[hash] = entry->hnext; 212 hash = PMKID_HASH(entry->pmkid); 213 entry->hnext = pmksa->pmkid[hash]; 214 pmksa->pmkid[hash] = entry; 221 wpa_hexdump(MSG_DEBUG, "RSN: added PMKID", entry->pmkid, PMKID_LEN) [all...] |
wpa_auth_ie.c | 92 const u8 *pmkid) 243 if (pmkid) { 246 /* PMKID Count */ 249 os_memcpy(pos, pmkid, PMKID_LEN); 257 if (pmkid == NULL) { 258 /* PMKID Count */ 293 int pmkid_count_set = pmkid != NULL; 296 /* PMKID Count */ 431 const u8 *pmkid; member in struct:wpa_auth_okc_iter_data 439 data->pmkid); 455 const u8 *pmkid = NULL; local [all...] |
wpa_auth_ie.h | 17 const u8 *pmkid; member in struct:wpa_eapol_ie_parse
|
wpa_auth.c | 711 ie.num_pmkid != 1 || ie.pmkid == NULL) { 717 os_memcpy(sm->sup_pmk_r1_name, ie.pmkid, PMKID_LEN); 1770 u8 buf[2 + RSN_SELECTOR_LEN + PMKID_LEN], *pmkid = NULL; local [all...] |
wpa_auth_i.h | 209 const u8 *pmkid);
|
/external/wpa_supplicant_8/src/drivers/ |
driver_ndis.h | 23 u8 pmkid[16]; member in struct:ndis_pmkid_entry 46 struct ndis_pmkid_entry *pmkid; member in struct:wpa_driver_ndis_data
|
driver_ndis.c | 250 NDIS_802_11_PMKID_VALUE PMKID; 325 NDIS_802_11_PMKID_VALUE PMKID; 1208 entry = drv->pmkid; 1222 entry = drv->pmkid; 1225 os_memcpy(&p->BSSIDInfo[i].PMKID, entry->pmkid, 16); 1236 const u8 *pmkid) 1308 struct ndis_pmkid_entry *pmkid, *prev; local 1566 NDIS_802_11_PMKID_CANDIDATE_LIST *pmkid; local [all...] |
driver_wext.c | 338 wpa_printf(MSG_DEBUG, "PMKID candidate wireless event: " 892 * Make sure that the driver does not have any obsolete PMKID entries. [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
pmksa_cache.h | 17 u8 pmkid[PMKID_LEN]; member in struct:rsn_pmksa_cache_entry 55 const u8 *aa, const u8 *pmkid, 63 int pmksa_cache_set_current(struct wpa_sm *sm, const u8 *pmkid, 87 pmksa_cache_get(struct rsn_pmksa_cache *pmksa, const u8 *aa, const u8 *pmkid, 116 static inline int pmksa_cache_set_current(struct wpa_sm *sm, const u8 *pmkid,
|
pmksa_cache.c | 46 wpa_sm_remove_pmkid(pmksa->sm, entry->aa, entry->pmkid); 120 * this entry will be replaced with the new entry. PMKID will be calculated 121 * based on the PMK and the driver interface is notified of the new PMKID. 138 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, 156 os_memcmp_const(pos->pmkid, entry->pmkid, 234 wpa_sm_add_pmkid(pmksa->sm, entry->aa, entry->pmkid); 307 * @pmkid: PMKID or %NULL to match any 312 const u8 *aa, const u8 *pmkid, [all...] |
wpa_ie.h | 19 const u8 *pmkid; member in struct:wpa_eapol_ie_parse
|
wpa_i.h | 202 const u8 *pmkid) 205 return sm->ctx->add_pmkid(sm->ctx->ctx, bssid, pmkid); 209 const u8 *pmkid) 212 return sm->ctx->remove_pmkid(sm->ctx->ctx, bssid, pmkid);
|
wpa.c | 143 const u8 *pmkid) 147 if (pmkid && !sm->cur_pmksa) { 152 sm->cur_pmksa = pmksa_cache_get(sm->pmksa, src_addr, pmkid, 156 "RSN: found matching PMKID from PMKSA cache"); 159 "RSN: no matching PMKID found"); 164 if (pmkid && sm->cur_pmksa && 165 os_memcmp_const(pmkid, sm->cur_pmksa->pmkid, PMKID_LEN) == 0) { 166 wpa_hexdump(MSG_DEBUG, "RSN: matched PMKID", pmkid, PMKID_LEN) [all...] |
peerkey.c | 673 ie.pmkid == NULL) { 677 if (os_memcmp_const(ie.pmkid, peerkey->smkid, PMKID_LEN) != 0) { 679 ie.pmkid, PMKID_LEN); 776 kde.pmkid == NULL || kde.rsn_ie == NULL) { 781 if (os_memcmp_const(kde.pmkid, peerkey->smkid, PMKID_LEN) != 0) { 783 kde.pmkid, PMKID_LEN); [all...] |
wpa.h | 40 int (*add_pmkid)(void *ctx, const u8 *bssid, const u8 *pmkid); 41 int (*remove_pmkid)(void *ctx, const u8 *bssid, const u8 *pmkid);
|
wpa_ie.c | 195 /* PMKID Count (2 octets, little endian) */ 198 /* PMKID */ 199 os_memcpy(pos, sm->cur_pmksa->pmkid, PMKID_LEN); 206 /* PMKID Count */ 377 ie->pmkid = pos + 2 + RSN_SELECTOR_LEN; 378 wpa_hexdump(MSG_DEBUG, "WPA: PMKID in EAPOL-Key",
|
/external/wpa_supplicant_8/wpa_supplicant/ |
preauth_test.c | 147 const u8 *bssid, const u8 *pmkid) 155 const u8 *bssid, const u8 *pmkid)
|
driver_i.h | 159 const u8 *bssid, const u8 *pmkid) 162 return wpa_s->driver->add_pmkid(wpa_s->drv_priv, bssid, pmkid); 168 const u8 *bssid, const u8 *pmkid) 172 pmkid);
|
wpas_glue.c | 154 * due to that AP failing to operate correctly if PMKID is 502 const u8 *bssid, const u8 *pmkid) 504 return wpa_drv_add_pmkid(wpa_s, bssid, pmkid); 509 const u8 *bssid, const u8 *pmkid) 511 return wpa_drv_remove_pmkid(wpa_s, bssid, pmkid);
|
/external/wpa_supplicant_8/src/common/ |
wpa_common.c | 272 if (data.num_pmkid == 1 && data.pmkid) 273 parse->rsn_pmkid = data.pmkid; 447 data->pmkid = NULL; 554 wpa_printf(MSG_DEBUG, "%s: PMKID underflow " 561 data->pmkid = pos; 633 data->pmkid = NULL; 903 * @pmkid: Buffer for PMKID 907 * PMKID = HMAC-SHA1-128(PMK, "PMK Name" || AA || SPA) 910 u8 *pmkid, int use_sha256 [all...] |
wpa_common.h | 234 /* 1/4: PMKID 253 * PMKID Count (2 octets) (default: 0) 254 * PMKID List (16 * n octets) 365 const u8 *pmkid; member in struct:wpa_ie_data 376 u8 *pmkid, int use_sha256); 384 int wpa_insert_pmkid(u8 *ies, size_t ies_len, const u8 *pmkid);
|
/bionic/libc/kernel/uapi/linux/ |
wireless.h | 421 __u8 pmkid[IW_PMKID_LEN]; member in struct:iw_pmksa
|
/development/ndk/platforms/android-3/include/linux/ |
wireless.h | 386 __u8 pmkid[IW_PMKID_LEN]; member in struct:iw_pmksa
|
/development/ndk/platforms/android-L/include/linux/ |
wireless.h | 421 __u8 pmkid[IW_PMKID_LEN]; member in struct:iw_pmksa
|