/external/wpa_supplicant_8/src/common/ |
sae.c | 17 #include "sae.h" 20 int sae_set_group(struct sae_data *sae, int group) 24 sae_clear_data(sae); 25 tmp = sae->tmp = os_zalloc(sizeof(*tmp)); 32 sae->group = group; 42 sae->group = group; 45 sae_clear_data(sae); 52 sae_clear_data(sae); 60 sae_clear_data(sae); 73 void sae_clear_temp_data(struct sae_data *sae) [all...] |
sae.h | 54 int sae_set_group(struct sae_data *sae, int group); 55 void sae_clear_temp_data(struct sae_data *sae); 56 void sae_clear_data(struct sae_data *sae); 60 struct sae_data *sae); 61 int sae_process_commit(struct sae_data *sae); 62 void sae_write_commit(struct sae_data *sae, struct wpabuf *buf, 64 u16 sae_parse_commit(struct sae_data *sae, const u8 *data, size_t len, 66 void sae_write_confirm(struct sae_data *sae, struct wpabuf *buf); 67 int sae_check_confirm(struct sae_data *sae, const u8 *data, size_t len); 68 u16 sae_group_allowed(struct sae_data *sae, int *allowed_groups, u16 group) [all...] |
Makefile | 22 sae.o \
|
/external/llvm/test/MC/X86/ |
intel-syntax-avx512.s | 19 // CHECK: vaddpd {rn-sae}, %zmm2, %zmm1, %zmm1 21 vaddpd zmm1,zmm1,zmm2,{rn-sae} 23 // CHECK: vaddpd {ru-sae}, %zmm2, %zmm1, %zmm1 25 vaddpd zmm1,zmm1,zmm2,{ru-sae} 27 // CHECK: vaddpd {rd-sae}, %zmm2, %zmm1, %zmm1 29 vaddpd zmm1,zmm1,zmm2,{rd-sae} 31 // CHECK: vaddpd {rz-sae}, %zmm2, %zmm1, %zmm1 33 vaddpd zmm1,zmm1,zmm2,{rz-sae}
|
x86-64-avx512f_vl.s | [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
mesh_rsn.c | 37 if (sta->sae->state != SAE_ACCEPTED) { 53 sta->sae->state = SAE_NOTHING; 91 if (!sta->sae || prev_psk) 93 return sta->sae->pmk; 241 struct sae_data *sae) 254 if (sae_set_group(sae, group) == 0) { 255 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Selected SAE group %d", 256 sae->group); 271 wpa_msg(wpa_s, MSG_DEBUG, "SAE: No password available"); 275 if (mesh_rsn_sae_group(wpa_s, sta->sae) < 0) [all...] |
sme.c | 17 #include "common/sae.h" 72 if (sae_set_group(&wpa_s->sme.sae, group) == 0) { 73 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Selected SAE group %d", 74 wpa_s->sme.sae.group); 92 wpa_printf(MSG_DEBUG, "SAE: No password available"); 97 wpa_printf(MSG_DEBUG, "SAE: Failed to select group"); 104 &wpa_s->sme.sae) < 0) { 105 wpa_printf(MSG_DEBUG, "SAE: Could not pick PWE"); 116 sae_write_commit(&wpa_s->sme.sae, buf, wpa_s->sme.sae_token); 132 sae_write_confirm(&wpa_s->sme.sae, buf) [all...] |
mesh_mpm.c | 321 if (sta->sae == NULL) { 322 wpa_msg(wpa_s, MSG_INFO, "Mesh MPM: no SAE session"); 970 if (sta->sae && sta->sae->state != SAE_ACCEPTED) { 971 wpa_printf(MSG_DEBUG, "MPM: SAE not yet accepted for peer");
|
wpa_supplicant_i.h | 14 #include "common/sae.h" 702 struct sae_data sae; member in struct:wpa_supplicant::__anon21642 [all...] |
Makefile | 240 OBJS += ../src/common/sae.o [all...] |
ctrl_iface.c | [all...] |
/external/wpa_supplicant_8/src/ap/ |
ieee802_11.c | 21 #include "common/sae.h" 326 wpa_printf(MSG_DEBUG, "SAE: No password available"); 334 sta->sae) < 0) { 335 wpa_printf(MSG_DEBUG, "SAE: Could not pick PWE"); 342 sae_write_commit(sta->sae, buf, sta->sae->tmp ? 343 sta->sae->tmp->anti_clogging_token : NULL); 358 sae_write_confirm(sta->sae, buf); 413 if (!sta->sae) 415 if (sta->sae->state != SAE_COMMITTED & [all...] |
ctrl_iface_ap.c | 13 #include "common/sae.h" 148 if (sta->sae && sta->sae->state == SAE_ACCEPTED) { 150 sta->sae->group);
|
sta_info.h | 160 struct sae_data *sae; member in struct:sta_info
|
wpa_auth_glue.c | 13 #include "common/sae.h" 226 if (!sta->sae || prev_psk) 228 return sta->sae->pmk;
|
sta_info.c | 15 #include "common/sae.h" 310 sae_clear_data(sta->sae); 311 os_free(sta->sae); [all...] |
/external/wpa_supplicant_8/hostapd/ |
Android.mk | 237 OBJS += src/common/sae.c
|
Makefile | 228 OBJS += ../src/common/sae.o
|