HomeSort by relevance Sort by last modified time
    Searched refs:pmksa (Results 1 - 15 of 15) sorted by null

  /external/wpa_supplicant_8/src/rsn_supp/
pmksa_cache.c 2 * WPA Supplicant - RSN PMKSA cache
23 struct rsn_pmksa_cache_entry *pmksa; /* PMKSA cache */ member in struct:rsn_pmksa_cache
24 int pmksa_count; /* number of entries in PMKSA cache */
33 static void pmksa_cache_set_expiration(struct rsn_pmksa_cache *pmksa);
42 static void pmksa_cache_free_entry(struct rsn_pmksa_cache *pmksa,
46 wpa_sm_remove_pmkid(pmksa->sm, entry->network_ctx, entry->aa,
48 pmksa->pmksa_count--;
49 pmksa->free_cb(entry, pmksa->ctx, reason)
56 struct rsn_pmksa_cache *pmksa = eloop_ctx; local
74 struct rsn_pmksa_cache *pmksa = eloop_ctx; local
451 struct rsn_pmksa_cache *pmksa = sm->pmksa; local
547 struct rsn_pmksa_cache *pmksa; local
    [all...]
pmksa_cache.h 2 * wpa_supplicant - WPA2/RSN PMKSA cache functions
13 * struct rsn_pmksa_cache_entry - PMKSA cache entry
29 * This field is only used to match PMKSA cache entries to a specific
31 * This can be a pointer to the configuration entry, but PMKSA caching
53 void pmksa_cache_deinit(struct rsn_pmksa_cache *pmksa);
54 struct rsn_pmksa_cache_entry * pmksa_cache_get(struct rsn_pmksa_cache *pmksa,
57 int pmksa_cache_list(struct rsn_pmksa_cache *pmksa, char *buf, size_t len);
58 struct rsn_pmksa_cache_entry * pmksa_cache_head(struct rsn_pmksa_cache *pmksa);
60 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
64 pmksa_cache_add_entry(struct rsn_pmksa_cache *pmksa,
    [all...]
preauth.c 34 * pmksa_candidate_free - Free all entries in PMKSA candidate list
96 pmksa_cache_add(sm->pmksa, pmk, pmk_len, NULL,
166 * address. This is usually called for PMKSA candidates found from scan results
293 * rsn_preauth_candidate_process - Process PMKSA candidates
296 * Go through the PMKSA candidates and start pre-authentication if a candidate
297 * without an existing PMKSA cache entry is found. Processed candidates will be
309 wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: processing PMKSA candidate "
326 p = pmksa_cache_get(sm->pmksa, candidate->bssid, NULL, NULL);
329 wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: PMKSA "
339 wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: PMKSA candidate
473 struct rsn_pmksa_cache_entry *pmksa; local
    [all...]
wpa.c 265 * matching PMKSA cache entry here. */
266 sm->cur_pmksa = pmksa_cache_get(sm->pmksa, src_addr, pmkid,
270 "RSN: found matching PMKID from PMKSA cache");
282 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from PMKSA cache",
325 sa = pmksa_cache_add(sm->pmksa,
333 pmksa_cache_get(sm->pmksa, src_addr, pmkid, NULL))
361 "RSN: Cancelled PMKSA caching "
380 "RSN: no PMKSA entry found - trigger "
662 "opportunistic PMKSA entry - marking it valid");
    [all...]
wpa_i.h 37 struct rsn_pmksa_cache *pmksa; /* PMKSA cache */ member in struct:wpa_sm
38 struct rsn_pmksa_cache_entry *cur_pmksa; /* current PMKSA entry */
  /external/wpa_supplicant_8/src/ap/
pmksa_cache_auth.c 2 * hostapd - PMKSA cache for IEEE 802.11i RSN
28 struct rsn_pmksa_cache_entry *pmksa; member in struct:rsn_pmksa_cache
36 static void pmksa_cache_set_expiration(struct rsn_pmksa_cache *pmksa);
51 void pmksa_cache_free_entry(struct rsn_pmksa_cache *pmksa,
57 pmksa->pmksa_count--;
58 pmksa->free_cb(entry, pmksa->ctx);
62 pos = pmksa->pmkid[hash];
69 pmksa->pmkid[hash] = entry->hnext;
77 pos = pmksa->pmksa
111 struct rsn_pmksa_cache *pmksa = eloop_ctx; local
539 struct rsn_pmksa_cache *pmksa; local
    [all...]
pmksa_cache_auth.h 2 * hostapd - PMKSA cache for IEEE 802.11i RSN
15 * struct rsn_pmksa_cache_entry - PMKSA cache entry
42 void pmksa_cache_auth_deinit(struct rsn_pmksa_cache *pmksa);
44 pmksa_cache_auth_get(struct rsn_pmksa_cache *pmksa,
47 struct rsn_pmksa_cache *pmksa, const u8 *spa, const u8 *aa,
50 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa,
60 int pmksa_cache_auth_add_entry(struct rsn_pmksa_cache *pmksa,
63 pmksa_cache_add_okc(struct rsn_pmksa_cache *pmksa,
69 void pmksa_cache_free_entry(struct rsn_pmksa_cache *pmksa,
71 int pmksa_cache_auth_radius_das_disconnect(struct rsn_pmksa_cache *pmksa,
    [all...]
wpa_auth_ie.c 480 struct rsn_pmksa_cache_entry *pmksa; member in struct:wpa_auth_okc_iter_data
490 data->pmksa = pmksa_cache_get_okc(a->pmksa, data->aa, data->spa,
492 if (data->pmksa)
736 sm->pmksa = NULL;
740 sm->pmksa = pmksa_cache_auth_get(wpa_auth->pmksa, sm->addr,
742 if (sm->pmksa) {
743 pmkid = sm->pmksa->pmkid;
747 for (i = 0; sm->pmksa == NULL && wpa_auth->conf.okc &
    [all...]
wpa_auth.c 315 if (sm->pmksa == ctx)
316 sm->pmksa = NULL;
443 wpa_auth->pmksa = pmksa_cache_auth_init(wpa_auth_pmksa_free_cb,
445 if (wpa_auth->pmksa == NULL) {
446 wpa_printf(MSG_ERROR, "PMKSA cache initialization failed.");
459 pmksa_cache_auth_deinit(wpa_auth->pmksa);
516 pmksa_cache_auth_deinit(wpa_auth->pmksa);
3833 struct rsn_pmksa_cache_entry *pmksa; local
    [all...]
wpa_auth_i.h 103 struct rsn_pmksa_cache_entry *pmksa; member in struct:wpa_state_machine
205 struct rsn_pmksa_cache *pmksa; member in struct:wpa_authenticator
ieee802_11.c 794 "SAE: Cancel use of mesh PMKSA caching because peer starts SAE authentication");
1012 struct rsn_pmksa_cache_entry *pmksa,
1025 struct rsn_pmksa_cache_entry *pmksa = NULL; local
1098 pmksa = wpa_auth_pmksa_get(hapd->wpa_auth, sta->addr,
1100 if (pmksa)
1106 if (pmksa && wpa_auth_sta_key_mgmt(sta->wpa_sm) != pmksa->akmp) {
1108 "FILS: Matching PMKSA cache entry has different AKMP (0x%x != 0x%x) - ignore",
1109 wpa_auth_sta_key_mgmt(sta->wpa_sm), pmksa->akmp);
1110 pmksa = NULL
    [all...]
ieee802_1x.c 907 struct rsn_pmksa_cache_entry *pmksa; local
1029 pmksa = wpa_auth_sta_get_pmksa(sta->wpa_sm);
1030 if (pmksa) {
1032 HOSTAPD_LEVEL_DEBUG, "cached PMKSA "
1035 wpa_auth_sta_clear_pmksa(sta->wpa_sm, pmksa);
1089 struct rsn_pmksa_cache_entry *pmksa; local
    [all...]
wpa_auth.h 317 void wpa_auth_pmksa_set_to_sm(struct rsn_pmksa_cache_entry *pmksa,
  /external/wpa_supplicant_8/wpa_supplicant/
mesh_rsn.c 339 struct rsn_pmksa_cache_entry *pmksa; local
355 pmksa = wpa_auth_pmksa_get(hapd->wpa_auth, sta->addr, NULL);
356 if (pmksa) {
367 "AUTH: Mesh PMKSA cache entry found for " MACSTR
368 " - try to use PMKSA caching instead of new SAE authentication",
370 wpa_auth_pmksa_set_to_sm(pmksa, sta->wpa_sm, hapd->wpa_auth,
  /external/wpa_supplicant_8/src/drivers/
driver_wext.c 2330 struct iw_pmksa pmksa; local
    [all...]

Completed in 867 milliseconds