/external/wpa_supplicant_8/src/eapol_auth/ |
D | eapol_auth_sm.c | 30 sm->eapol->cb.set_port_authorized(sm->eapol->conf.ctx, sm->sta, 1) 32 sm->eapol->cb.set_port_authorized(sm->eapol->conf.ctx, sm->sta, 0) 38 #define abortAuth() sm->eapol->cb.abort_auth(sm->eapol->conf.ctx, sm->sta) 39 #define txKey() sm->eapol->cb.tx_key(sm->eapol->conf.ctx, sm->sta) 49 static void eapol_auth_logger(struct eapol_authenticator *eapol, in eapol_auth_logger() argument 53 if (eapol->cb.logger == NULL) in eapol_auth_logger() 55 eapol->cb.logger(eapol->conf.ctx, addr, level, txt); in eapol_auth_logger() 59 static void eapol_auth_vlogger(struct eapol_authenticator *eapol, in eapol_auth_vlogger() argument 67 if (eapol->cb.logger == NULL) in eapol_auth_vlogger() 79 eapol_auth_logger(eapol, addr, level, format); in eapol_auth_vlogger() [all …]
|
D | eapol_auth_sm.h | 88 void eapol_auth_deinit(struct eapol_authenticator *eapol); 90 eapol_auth_alloc(struct eapol_authenticator *eapol, const u8 *addr,
|
D | eapol_auth_sm_i.h | 167 struct eapol_authenticator *eapol; member
|
/external/wpa_supplicant_8/src/ap/ |
D | pmksa_cache_auth.c | 142 struct eapol_state_machine *eapol) in pmksa_cache_from_eapol_data() argument 146 if (eapol == NULL) in pmksa_cache_from_eapol_data() 149 if (eapol->identity) { in pmksa_cache_from_eapol_data() 150 entry->identity = os_malloc(eapol->identity_len); in pmksa_cache_from_eapol_data() 152 entry->identity_len = eapol->identity_len; in pmksa_cache_from_eapol_data() 153 os_memcpy(entry->identity, eapol->identity, in pmksa_cache_from_eapol_data() 154 eapol->identity_len); in pmksa_cache_from_eapol_data() 158 if (eapol->radius_cui) in pmksa_cache_from_eapol_data() 159 entry->cui = wpabuf_dup(eapol->radius_cui); in pmksa_cache_from_eapol_data() 162 radius_copy_class(&entry->radius_class, &eapol->radius_class); in pmksa_cache_from_eapol_data() [all …]
|
D | pmksa_cache_auth.h | 55 struct eapol_state_machine *eapol, int akmp); 60 struct eapol_state_machine *eapol, int akmp); 69 struct eapol_state_machine *eapol);
|
D | ieee802_1x.c | 217 struct eapol_authenticator *eapol = hapd->eapol_auth; in ieee802_1x_tx_key() local 233 if (eapol->default_wep_key) { in ieee802_1x_tx_key() 234 ieee802_1x_tx_key_one(hapd, sta, eapol->default_wep_key_idx, 1, in ieee802_1x_tx_key() 235 eapol->default_wep_key, in ieee802_1x_tx_key() 1998 struct eapol_authenticator *eapol = hapd->eapol_auth; in ieee802_1x_rekey_broadcast() local 2003 os_free(eapol->default_wep_key); in ieee802_1x_rekey_broadcast() 2004 eapol->default_wep_key = os_malloc(hapd->conf->default_wep_key_len); in ieee802_1x_rekey_broadcast() 2005 if (eapol->default_wep_key == NULL || in ieee802_1x_rekey_broadcast() 2006 random_get_bytes(eapol->default_wep_key, in ieee802_1x_rekey_broadcast() 2009 os_free(eapol->default_wep_key); in ieee802_1x_rekey_broadcast() [all …]
|
D | wpa_auth.h | 368 int session_timeout, struct eapol_state_machine *eapol); 372 struct eapol_state_machine *eapol);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | eapol_test.c | 367 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { in eapol_test_compare_pmk() 376 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) { in eapol_test_compare_pmk() 394 sess_id = eapol_sm_get_session_id(e->wpa_s->eapol, &sess_id_len); in eapol_test_compare_pmk() 420 static void eapol_sm_cb(struct eapol_sm *eapol, enum eapol_supp_result result, in eapol_sm_cb() argument 614 wpa_s->eapol = eapol_sm_init(ctx); in test_eapol() 615 if (wpa_s->eapol == NULL) { in test_eapol() 647 eapol_sm_notify_config(wpa_s->eapol, &ssid->eap, &eapol_conf); in test_eapol() 648 eapol_sm_register_scard_ctx(wpa_s->eapol, wpa_s->scard); in test_eapol() 651 eapol_sm_notify_portValid(wpa_s->eapol, FALSE); in test_eapol() 653 eapol_sm_notify_portEnabled(wpa_s->eapol, TRUE); in test_eapol() [all …]
|
D | wpas_glue.c | 270 static void wpa_supplicant_eapol_cb(struct eapol_sm *eapol, in wpa_supplicant_eapol_cb() argument 314 res = eapol_sm_get_key(eapol, buf, 2 * PMK_LEN); in wpa_supplicant_eapol_cb() 323 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); in wpa_supplicant_eapol_cb() 329 res = eapol_sm_get_key(eapol, pmk, 16); in wpa_supplicant_eapol_cb() 944 wpa_s->mnc_len = eapol_sm_get_eap_proxy_imsi(wpa_s->eapol, -1, in wpa_supplicant_eap_proxy_cb() 1129 wpa_s->eapol = eapol_sm_init(ctx); in wpa_supplicant_init_eapol() 1130 if (wpa_s->eapol == NULL) { in wpa_supplicant_init_eapol()
|
D | wpa_supplicant.c | 312 eapol_sm_notify_portControl(wpa_s->eapol, ForceAuthorized); in wpa_supplicant_initiate_eapol() 313 eapol_sm_notify_eap_success(wpa_s->eapol, TRUE); in wpa_supplicant_initiate_eapol() 314 eapol_sm_notify_eap_fail(wpa_s->eapol, FALSE); in wpa_supplicant_initiate_eapol() 319 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE); in wpa_supplicant_initiate_eapol() 320 eapol_sm_notify_eap_fail(wpa_s->eapol, FALSE); in wpa_supplicant_initiate_eapol() 324 eapol_sm_notify_portControl(wpa_s->eapol, ForceAuthorized); in wpa_supplicant_initiate_eapol() 326 eapol_sm_notify_portControl(wpa_s->eapol, Auto); in wpa_supplicant_initiate_eapol() 368 eapol_sm_notify_config(wpa_s->eapol, &ssid->eap, &eapol_conf); in wpa_supplicant_initiate_eapol() 484 eapol_sm_register_scard_ctx(wpa_s->eapol, NULL); in wpa_supplicant_cleanup() 517 eapol_sm_deinit(wpa_s->eapol); in wpa_supplicant_cleanup() [all …]
|
D | events.c | 237 eapol_sm_invalidate_cached_session(wpa_s->eapol); in wpa_supplicant_select_config() 315 eapol_sm_notify_portEnabled(wpa_s->eapol, FALSE); in wpa_supplicant_mark_disassoc() 316 eapol_sm_notify_portValid(wpa_s->eapol, FALSE); in wpa_supplicant_mark_disassoc() 320 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE); in wpa_supplicant_mark_disassoc() 323 eapol_sm_notify_config(wpa_s->eapol, NULL, NULL); in wpa_supplicant_mark_disassoc() 356 eapol_sm_notify_pmkid_attempt(wpa_s->eapol); in wpa_find_assoc_pmkid() 470 eapol_sm_register_scard_ctx(wpa_s->eapol, wpa_s->scard); in wpa_supplicant_scard_init() 2828 eapol_sm_notify_portEnabled(wpa_s->eapol, FALSE); in wpa_supplicant_event_assoc() 2829 eapol_sm_notify_portValid(wpa_s->eapol, FALSE); in wpa_supplicant_event_assoc() 2835 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE); in wpa_supplicant_event_assoc() [all …]
|
D | wpas_kay.c | 272 session_id = eapol_sm_get_session_id(wpa_s->eapol, &id_len); in ieee802_1x_auth_get_session_id() 300 sm = wpa_s->eapol; in ieee802_1x_auth_get_msk()
|
D | ctrl_iface.c | 430 eapol_sm_configure(wpa_s->eapol, in wpa_supplicant_ctrl_iface_set() 433 eapol_sm_configure(wpa_s->eapol, in wpa_supplicant_ctrl_iface_set() 436 eapol_sm_configure(wpa_s->eapol, in wpa_supplicant_ctrl_iface_set() 439 eapol_sm_configure(wpa_s->eapol, in wpa_supplicant_ctrl_iface_set() 2286 res = eapol_sm_get_status(wpa_s->eapol, pos, end - pos, in wpa_supplicant_ctrl_iface_status() 2298 sess_id = eapol_sm_get_session_id(wpa_s->eapol, &sess_id_len); in wpa_supplicant_ctrl_iface_status() 3284 eapol_sm_invalidate_cached_session(wpa_s->eapol); in wpa_supplicant_ctrl_iface_remove_network() 3290 eapol_sm_notify_config(wpa_s->eapol, NULL, NULL); in wpa_supplicant_ctrl_iface_remove_network() 3353 eapol_sm_invalidate_cached_session(wpa_s->eapol); in wpa_supplicant_ctrl_iface_update_network() 7972 eapol_sm_notify_logoff(wpa_s->eapol, FALSE); in wpa_supplicant_ctrl_iface_flush() [all …]
|
D | ctrl_iface_udp.c | 343 eapol_sm_notify_ctrl_attached(wpa_s->eapol);
|
D | ctrl_iface_named_pipe.c | 341 eapol_sm_notify_ctrl_attached(wpa_s->eapol); in wpa_supplicant_ctrl_iface_rx()
|
D | ap.c | 880 eapol_sm_notify_config(wpa_s->eapol, NULL, NULL); in wpa_supplicant_create_ap() 912 eapol_sm_notify_config(wpa_s->eapol, NULL, NULL); in wpa_supplicant_ap_deinit()
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | preauth.c | 73 static void rsn_preauth_eapol_cb(struct eapol_sm *eapol, in rsn_preauth_eapol_cb() argument 83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); in rsn_preauth_eapol_cb() 89 res = eapol_sm_get_key(eapol, pmk, 16); in rsn_preauth_eapol_cb()
|
D | wpa.c | 162 eapol_sm_notify_tx_eapol_key(sm->eapol); in wpa_eapol_key_send() 290 eapol_sm_notify_cached(sm->eapol); in wpa_supplicant_get_pmk() 306 } else if (wpa_key_mgmt_wpa_ieee8021x(sm->key_mgmt) && sm->eapol) { in wpa_supplicant_get_pmk() 313 res = eapol_sm_get_key(sm->eapol, sm->pmk, pmk_len); in wpa_supplicant_get_pmk() 320 res = eapol_sm_get_key(sm->eapol, sm->pmk, 16); in wpa_supplicant_get_pmk() 326 if (eapol_sm_get_key(sm->eapol, buf, 2 * PMK_LEN) == 0) in wpa_supplicant_get_pmk() 716 eapol_sm_notify_portValid(sm->eapol, TRUE); in wpa_supplicant_key_neg_complete() 720 eapol_sm_notify_eap_success(sm->eapol, TRUE); in wpa_supplicant_key_neg_complete() 1517 eapol_sm_notify_portValid(sm->eapol, TRUE); in wpa_supplicant_process_3_of_4() 2267 eapol_sm_notify_lower_layer_success(sm->eapol, 0); in wpa_sm_rx_eapol() [all …]
|
D | wpa.h | 133 void wpa_sm_set_eapol(struct wpa_sm *sm, struct eapol_sm *eapol); 234 static inline void wpa_sm_set_eapol(struct wpa_sm *sm, struct eapol_sm *eapol) in wpa_sm_set_eapol() argument
|
D | wpa_i.h | 39 struct eapol_sm *eapol; /* EAPOL state machine from upper level code */ member
|
D | pmksa_cache.c | 78 eapol_sm_request_reauth(pmksa->sm->eapol); in pmksa_cache_reauth()
|
/external/wpa_supplicant_8/wpa_supplicant/hidl/1.2/ |
D | sta_network.cpp | 1715 eapol_sm_notify_ctrl_response(wpa_s->eapol); in sendNetworkEapSimGsmAuthResponseInternal() 1732 eapol_sm_notify_ctrl_response(wpa_s->eapol); in sendNetworkEapSimGsmAuthFailureInternal() 1766 eapol_sm_notify_ctrl_response(wpa_s->eapol); in sendNetworkEapSimUmtsAuthResponseInternal() 1791 eapol_sm_notify_ctrl_response(wpa_s->eapol); in sendNetworkEapSimUmtsAutsResponseInternal() 1808 eapol_sm_notify_ctrl_response(wpa_s->eapol); in sendNetworkEapSimUmtsAuthFailureInternal() 1824 eapol_sm_notify_ctrl_response(wpa_s->eapol); in sendNetworkEapIdentityResponseInternal() 1849 eapol_sm_notify_ctrl_response(wpa_s->eapol); in sendNetworkEapIdentityResponseInternal_1_1() 2015 eapol_sm_invalidate_cached_session(wpa_s->eapol); in resetInternalStateAfterParamsUpdate()
|
/external/wpa_supplicant_8/src/eapol_supp/ |
D | eapol_supp_sm.h | 107 void (*cb)(struct eapol_sm *eapol, enum eapol_supp_result result,
|
/external/scapy/test/ |
D | regression.uts | 6359 eapol = EAPOL(s) 6360 assert(eapol.version == 3) 6361 assert(eapol.type == 1) 6362 assert(eapol.len == 0) 6366 eapol = EAPOL(s) 6367 assert(eapol.version == 3) 6368 assert(eapol.type == 0) 6369 assert(eapol.len == 5) 6373 eapol = EAPOL(s) 6374 assert(eapol.version == 3) [all …]
|
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
D | dbus_new_handlers.c | 276 eapol_sm_invalidate_cached_session(wpa_s->eapol); in set_network_properties() 1932 eapol_sm_notify_ctrl_response(wpa_s->eapol); in wpas_dbus_handler_network_reply() 2170 eapol_sm_notify_logoff(wpa_s->eapol, TRUE); in wpas_dbus_handler_eap_logoff() 2186 eapol_sm_notify_logoff(wpa_s->eapol, FALSE); in wpas_dbus_handler_eap_logon()
|