/freebsd-11-stable/contrib/wpa/src/eapol_auth/ |
H A D | eapol_auth_sm.c | 30 sm->eapol->cb.set_port_authorized(sm->eapol->conf.ctx, sm->sta, 1) 32 sm->eapol->cb.set_port_authorized(sm->eapol->conf.ctx, sm->sta, 0) 38 #define abortAuth() sm->eapol->cb.abort_auth(sm->eapol->conf.ctx, sm->sta) 39 #define txKey() sm->eapol->cb.tx_key(sm->eapol->conf.ctx, sm->sta) 49 static void eapol_auth_logger(struct eapol_authenticator *eapol, argument 53 if (eapol 59 eapol_auth_vlogger(struct eapol_authenticator *eapol, const u8 *addr, eapol_logger_level level, const char *fmt, ...) argument 772 eapol_auth_alloc(struct eapol_authenticator *eapol, const u8 *addr, int flags, const struct wpabuf *assoc_wps_ie, const struct wpabuf *assoc_p2p_ie, void *sta_ctx, const char *identity, const char *radius_cui) argument 901 eapol_sm_sta_entry_alive(struct eapol_authenticator *eapol, const u8 *addr) argument 910 struct eapol_authenticator *eapol = sm->eapol; local 1284 struct eapol_authenticator *eapol; local 1317 eapol_auth_deinit(struct eapol_authenticator *eapol) argument [all...] |
H A D | eapol_auth_sm.h | 91 void eapol_auth_deinit(struct eapol_authenticator *eapol); 93 eapol_auth_alloc(struct eapol_authenticator *eapol, const u8 *addr,
|
H A D | eapol_auth_sm_i.h | 167 struct eapol_authenticator *eapol; member in struct:eapol_state_machine
|
/freebsd-11-stable/contrib/wpa/src/ap/ |
H A D | pmksa_cache_auth.c | 142 struct eapol_state_machine *eapol) 146 if (eapol == NULL) 149 if (eapol->identity) { 150 entry->identity = os_malloc(eapol->identity_len); 152 entry->identity_len = eapol->identity_len; 153 os_memcpy(entry->identity, eapol->identity, 154 eapol->identity_len); 158 if (eapol->radius_cui) 159 entry->cui = wpabuf_dup(eapol->radius_cui); 162 radius_copy_class(&entry->radius_class, &eapol 141 pmksa_cache_from_eapol_data(struct rsn_pmksa_cache_entry *entry, struct eapol_state_machine *eapol) argument 180 pmksa_cache_to_eapol_data(struct hostapd_data *hapd, struct rsn_pmksa_cache_entry *entry, struct eapol_state_machine *eapol) argument 279 pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument 315 pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, int session_timeout, struct eapol_state_machine *eapol, int akmp) argument [all...] |
H A D | pmksa_cache_auth.h | 55 struct eapol_state_machine *eapol, int akmp); 60 struct eapol_state_machine *eapol, int akmp); 69 struct eapol_state_machine *eapol);
|
H A D | ieee802_1x.c | 244 struct eapol_authenticator *eapol = hapd->eapol_auth; local 260 if (eapol->default_wep_key) { 261 ieee802_1x_tx_key_one(hapd, sta, eapol->default_wep_key_idx, 1, 262 eapol->default_wep_key, 2109 struct eapol_authenticator *eapol = hapd->eapol_auth; local 2114 os_free(eapol->default_wep_key); 2115 eapol->default_wep_key = os_malloc(hapd->conf->default_wep_key_len); 2116 if (eapol->default_wep_key == NULL || 2117 random_get_bytes(eapol->default_wep_key, 2120 os_free(eapol 2147 struct eapol_authenticator *eapol = hapd->eapol_auth; local [all...] |
H A D | wpa_auth.h | 368 int session_timeout, struct eapol_state_machine *eapol); 372 struct eapol_state_machine *eapol);
|
/freebsd-11-stable/contrib/wpa/wpa_supplicant/ |
H A D | eapol_test.c | 368 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { 377 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) { 395 sess_id = eapol_sm_get_session_id(e->wpa_s->eapol, &sess_id_len); 421 static void eapol_sm_cb(struct eapol_sm *eapol, enum eapol_supp_result result, argument 610 wpa_s->eapol = eapol_sm_init(ctx); 611 if (wpa_s->eapol == NULL) { 643 eapol_sm_notify_config(wpa_s->eapol, &ssid->eap, &eapol_conf); 644 eapol_sm_register_scard_ctx(wpa_s->eapol, wpa_s->scard); 647 eapol_sm_notify_portValid(wpa_s->eapol, FALSE); 649 eapol_sm_notify_portEnabled(wpa_s->eapol, TRU [all...] |
H A D | wpas_glue.c | 270 static void wpa_supplicant_eapol_cb(struct eapol_sm *eapol, argument 314 res = eapol_sm_get_key(eapol, buf, 2 * PMK_LEN); 323 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 329 res = eapol_sm_get_key(eapol, pmk, 16); 944 wpa_s->mnc_len = eapol_sm_get_eap_proxy_imsi(wpa_s->eapol, -1, 1126 wpa_s->eapol = eapol_sm_init(ctx); 1127 if (wpa_s->eapol == NULL) {
|
H A D | wpas_kay.c | 272 session_id = eapol_sm_get_session_id(wpa_s->eapol, &id_len); 300 sm = wpa_s->eapol;
|
H A D | events.c | 237 eapol_sm_invalidate_cached_session(wpa_s->eapol); 315 eapol_sm_notify_portEnabled(wpa_s->eapol, FALSE); 316 eapol_sm_notify_portValid(wpa_s->eapol, FALSE); 320 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE); 323 eapol_sm_notify_config(wpa_s->eapol, NULL, NULL); 356 eapol_sm_notify_pmkid_attempt(wpa_s->eapol); 470 eapol_sm_register_scard_ctx(wpa_s->eapol, wpa_s->scard); 2828 eapol_sm_notify_portEnabled(wpa_s->eapol, FALSE); 2829 eapol_sm_notify_portValid(wpa_s->eapol, FALSE); 2835 eapol_sm_notify_eap_success(wpa_s->eapol, FALS [all...] |
H A D | wpa_supplicant.c | 312 eapol_sm_notify_portControl(wpa_s->eapol, ForceAuthorized); 313 eapol_sm_notify_eap_success(wpa_s->eapol, TRUE); 314 eapol_sm_notify_eap_fail(wpa_s->eapol, FALSE); 319 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE); 320 eapol_sm_notify_eap_fail(wpa_s->eapol, FALSE); 324 eapol_sm_notify_portControl(wpa_s->eapol, ForceAuthorized); 326 eapol_sm_notify_portControl(wpa_s->eapol, Auto); 368 eapol_sm_notify_config(wpa_s->eapol, &ssid->eap, &eapol_conf); 484 eapol_sm_register_scard_ctx(wpa_s->eapol, NULL); 517 eapol_sm_deinit(wpa_s->eapol); [all...] |
H A D | ctrl_iface.c | 430 eapol_sm_configure(wpa_s->eapol, 433 eapol_sm_configure(wpa_s->eapol, 436 eapol_sm_configure(wpa_s->eapol, 439 eapol_sm_configure(wpa_s->eapol, 2286 res = eapol_sm_get_status(wpa_s->eapol, pos, end - pos, 2298 sess_id = eapol_sm_get_session_id(wpa_s->eapol, &sess_id_len); 3327 eapol_sm_invalidate_cached_session(wpa_s->eapol); 3333 eapol_sm_notify_config(wpa_s->eapol, NULL, NULL); 3396 eapol_sm_invalidate_cached_session(wpa_s->eapol); 8015 eapol_sm_notify_logoff(wpa_s->eapol, FALS [all...] |
H A D | ctrl_iface_named_pipe.c | 341 eapol_sm_notify_ctrl_attached(wpa_s->eapol);
|
H A D | ctrl_iface_udp.c | 343 eapol_sm_notify_ctrl_attached(wpa_s->eapol);
|
H A D | sme.c | 367 eapol_sm_notify_pmkid_attempt(wpa_s->eapol); 717 eapol_sm_get_erp_info(wpa_s->eapol, &ssid->eap, 764 eapol_sm_notify_portValid(wpa_s->eapol, FALSE);
|
H A D | ap.c | 885 eapol_sm_notify_config(wpa_s->eapol, NULL, NULL); 917 eapol_sm_notify_config(wpa_s->eapol, NULL, NULL);
|
H A D | ctrl_iface_unix.c | 226 eapol_sm_notify_ctrl_attached(wpa_s->eapol);
|
/freebsd-11-stable/contrib/wpa/src/rsn_supp/ |
H A D | preauth.c | 73 static void rsn_preauth_eapol_cb(struct eapol_sm *eapol, argument 83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 89 res = eapol_sm_get_key(eapol, pmk, 16);
|
H A D | wpa.c | 162 eapol_sm_notify_tx_eapol_key(sm->eapol); 290 eapol_sm_notify_cached(sm->eapol); 306 } else if (wpa_key_mgmt_wpa_ieee8021x(sm->key_mgmt) && sm->eapol) { 316 res = eapol_sm_get_key(sm->eapol, sm->pmk, pmk_len); 323 res = eapol_sm_get_key(sm->eapol, sm->pmk, 16); 329 eapol_sm_get_key(sm->eapol, buf, 2 * PMK_LEN) == 0) { 742 eapol_sm_notify_portValid(sm->eapol, TRUE); 746 eapol_sm_notify_eap_success(sm->eapol, TRUE); 1543 eapol_sm_notify_portValid(sm->eapol, TRUE); 2293 eapol_sm_notify_lower_layer_success(sm->eapol, 2993 wpa_sm_set_eapol(struct wpa_sm *sm, struct eapol_sm *eapol) argument [all...] |
H A D | wpa.h | 133 void wpa_sm_set_eapol(struct wpa_sm *sm, struct eapol_sm *eapol); 234 static inline void wpa_sm_set_eapol(struct wpa_sm *sm, struct eapol_sm *eapol) argument
|
H A D | wpa_i.h | 39 struct eapol_sm *eapol; /* EAPOL state machine from upper level code */ member in struct:wpa_sm
|
H A D | pmksa_cache.c | 78 eapol_sm_request_reauth(pmksa->sm->eapol);
|
/freebsd-11-stable/contrib/wpa/src/eapol_supp/ |
H A D | eapol_supp_sm.h | 100 * @eapol: Pointer to EAPOL state machine data 109 void (*cb)(struct eapol_sm *eapol, enum eapol_supp_result result,
|
/freebsd-11-stable/contrib/wpa/wpa_supplicant/dbus/ |
H A D | dbus_new_handlers.c | 276 eapol_sm_invalidate_cached_session(wpa_s->eapol); 1932 eapol_sm_notify_ctrl_response(wpa_s->eapol); 2170 eapol_sm_notify_logoff(wpa_s->eapol, TRUE); 2186 eapol_sm_notify_logoff(wpa_s->eapol, FALSE);
|