/external/wpa_supplicant_8/src/pae/ |
D | ieee802_1x_cp.c | 95 static int changed_cipher(struct ieee802_1x_cp_sm *sm) in changed_cipher() argument 97 return sm->confidentiality_offset != sm->cipher_offset || in changed_cipher() 98 sm->current_cipher_suite != sm->cipher_suite; in changed_cipher() 102 static int changed_connect(struct ieee802_1x_cp_sm *sm) in changed_connect() argument 104 return sm->connect != SECURE || sm->chgd_server || changed_cipher(sm); in changed_connect() 112 sm->controlled_port_enabled = FALSE; in SM_STATE() 113 secy_cp_control_enable_port(sm->kay, sm->controlled_port_enabled); in SM_STATE() 115 sm->port_valid = FALSE; in SM_STATE() 117 os_free(sm->lki); in SM_STATE() 118 sm->lki = NULL; in SM_STATE() [all …]
|
/external/wpa_supplicant_8/src/eapol_supp/ |
D | eapol_supp_sm.c | 152 static void eapol_sm_txLogoff(struct eapol_sm *sm); 153 static void eapol_sm_txStart(struct eapol_sm *sm); 154 static void eapol_sm_processKey(struct eapol_sm *sm); 155 static void eapol_sm_getSuppRsp(struct eapol_sm *sm); 156 static void eapol_sm_txSuppRsp(struct eapol_sm *sm); 157 static void eapol_sm_abortSupp(struct eapol_sm *sm); 158 static void eapol_sm_abort_cached(struct eapol_sm *sm); 160 static void eapol_sm_set_port_authorized(struct eapol_sm *sm); 161 static void eapol_sm_set_port_unauthorized(struct eapol_sm *sm); 168 struct eapol_sm *sm = timeout_ctx; in eapol_port_timers_tick() local [all …]
|
D | eapol_supp_sm.h | 312 void eapol_sm_deinit(struct eapol_sm *sm); 313 void eapol_sm_step(struct eapol_sm *sm); 314 int eapol_sm_get_status(struct eapol_sm *sm, char *buf, size_t buflen, 316 int eapol_sm_get_mib(struct eapol_sm *sm, char *buf, size_t buflen); 317 void eapol_sm_configure(struct eapol_sm *sm, int heldPeriod, int authPeriod, 319 int eapol_sm_rx_eapol(struct eapol_sm *sm, const u8 *src, const u8 *buf, 321 void eapol_sm_notify_tx_eapol_key(struct eapol_sm *sm); 322 void eapol_sm_notify_portEnabled(struct eapol_sm *sm, Boolean enabled); 323 void eapol_sm_notify_portValid(struct eapol_sm *sm, Boolean valid); 324 void eapol_sm_notify_eap_success(struct eapol_sm *sm, Boolean success); [all …]
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server.c | 30 static int eap_sm_calculateTimeout(struct eap_sm *sm, int retransCount, 33 static void eap_sm_parseEapResp(struct eap_sm *sm, const struct wpabuf *resp); 35 static struct wpabuf * eap_sm_buildSuccess(struct eap_sm *sm, u8 id); 36 static struct wpabuf * eap_sm_buildFailure(struct eap_sm *sm, u8 id); 37 static int eap_sm_nextId(struct eap_sm *sm, int id); 38 static void eap_sm_Policy_update(struct eap_sm *sm, const u8 *nak_list, 40 static EapType eap_sm_Policy_getNextMethod(struct eap_sm *sm, int *vendor); 41 static int eap_sm_Policy_getDecision(struct eap_sm *sm); 42 static Boolean eap_sm_Policy_doPickUp(struct eap_sm *sm, EapType method); 45 static int eap_get_erp_send_reauth_start(struct eap_sm *sm) in eap_get_erp_send_reauth_start() argument [all …]
|
D | eap_server_ttls.c | 24 static void eap_ttls_reset(struct eap_sm *sm, void *priv); 79 static void eap_ttls_valid_session(struct eap_sm *sm, in eap_ttls_valid_session() argument 84 if (!sm->tls_session_lifetime) in eap_ttls_valid_session() 87 buf = wpabuf_alloc(1 + 1 + sm->identity_len); in eap_ttls_valid_session() 91 if (sm->identity) { in eap_ttls_valid_session() 94 if (sm->identity_len <= 255) in eap_ttls_valid_session() 95 id_len = sm->identity_len; in eap_ttls_valid_session() 99 wpabuf_put_data(buf, sm->identity, id_len); in eap_ttls_valid_session() 331 static u8 * eap_ttls_implicit_challenge(struct eap_sm *sm, in eap_ttls_implicit_challenge() argument 334 return eap_server_tls_derive_key(sm, &data->ssl, "ttls challenge", in eap_ttls_implicit_challenge() [all …]
|
D | eap_server_fast.c | 22 static void eap_fast_reset(struct eap_sm *sm, void *priv); 71 static int eap_fast_process_phase2_start(struct eap_sm *sm, 111 static EapType eap_fast_req_failure(struct eap_sm *sm, in eap_fast_req_failure() argument 272 static void eap_fast_derive_key_auth(struct eap_sm *sm, in eap_fast_derive_key_auth() argument 281 sks = eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, in eap_fast_derive_key_auth() 302 static void eap_fast_derive_key_provisioning(struct eap_sm *sm, in eap_fast_derive_key_provisioning() argument 307 eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, in eap_fast_derive_key_provisioning() 333 static int eap_fast_get_phase2_key(struct eap_sm *sm, in eap_fast_get_phase2_key() argument 351 if ((key = data->phase2_method->getKey(sm, data->phase2_priv, in eap_fast_get_phase2_key() 378 static int eap_fast_update_icmk(struct eap_sm *sm, struct eap_fast_data *data) in eap_fast_update_icmk() argument [all …]
|
D | eap_server_peap.c | 29 static void eap_peap_reset(struct eap_sm *sm, void *priv); 103 static void eap_peap_valid_session(struct eap_sm *sm, in eap_peap_valid_session() argument 108 if (!sm->tls_session_lifetime || in eap_peap_valid_session() 109 tls_connection_resumed(sm->ssl_ctx, data->ssl.conn)) in eap_peap_valid_session() 112 buf = wpabuf_alloc(1 + 1 + sm->identity_len); in eap_peap_valid_session() 116 if (sm->identity) { in eap_peap_valid_session() 119 if (sm->identity_len <= 255) in eap_peap_valid_session() 120 id_len = sm->identity_len; in eap_peap_valid_session() 124 wpabuf_put_data(buf, sm->identity, id_len); in eap_peap_valid_session() 132 static void eap_peap_req_success(struct eap_sm *sm, in eap_peap_req_success() argument [all …]
|
D | eap_server_gtc.c | 21 static void * eap_gtc_init(struct eap_sm *sm) in eap_gtc_init() argument 31 if (sm->m && sm->m->vendor == EAP_VENDOR_IETF && in eap_gtc_init() 32 sm->m->method == EAP_TYPE_FAST) { in eap_gtc_init() 43 static void eap_gtc_reset(struct eap_sm *sm, void *priv) in eap_gtc_reset() argument 50 static struct wpabuf * eap_gtc_buildReq(struct eap_sm *sm, void *priv, u8 id) in eap_gtc_buildReq() argument 77 static Boolean eap_gtc_check(struct eap_sm *sm, void *priv, in eap_gtc_check() argument 93 static void eap_gtc_process(struct eap_sm *sm, void *priv, in eap_gtc_process() argument 131 if (sm->identity && sm->require_identity_match && in eap_gtc_process() 132 (pos2 - pos != (int) sm->identity_len || in eap_gtc_process() 133 os_memcmp(pos, sm->identity, sm->identity_len))) { in eap_gtc_process() [all …]
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | wpa.c | 50 int wpa_eapol_key_send(struct wpa_sm *sm, struct wpa_ptk *ptk, in wpa_eapol_key_send() argument 55 size_t mic_len = wpa_mic_len(sm->key_mgmt, sm->pmk_len); in wpa_eapol_key_send() 59 MAC2STR(dest), ver, (int) mic_len, sm->key_mgmt); in wpa_eapol_key_send() 60 if (is_zero_ether_addr(dest) && is_zero_ether_addr(sm->bssid)) { in wpa_eapol_key_send() 65 if (wpa_sm_get_bssid(sm, sm->bssid) < 0) { in wpa_eapol_key_send() 66 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, in wpa_eapol_key_send() 70 dest = sm->bssid; in wpa_eapol_key_send() 71 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, in wpa_eapol_key_send() 83 wpa_eapol_key_mic(ptk->kck, ptk->kck_len, sm->key_mgmt, ver, in wpa_eapol_key_send() 85 wpa_msg(sm->ctx->msg_ctx, MSG_ERROR, in wpa_eapol_key_send() [all …]
|
D | preauth.c | 37 void pmksa_candidate_free(struct wpa_sm *sm) in pmksa_candidate_free() argument 41 if (sm == NULL) in pmksa_candidate_free() 44 dl_list_for_each_safe(entry, n, &sm->pmksa_candidates, in pmksa_candidate_free() 55 struct wpa_sm *sm = ctx; in rsn_preauth_receive() local 60 if (sm->preauth_eapol == NULL || in rsn_preauth_receive() 61 is_zero_ether_addr(sm->preauth_bssid) || in rsn_preauth_receive() 62 os_memcmp(sm->preauth_bssid, src_addr, ETH_ALEN) != 0) { in rsn_preauth_receive() 69 eapol_sm_rx_eapol(sm->preauth_eapol, src_addr, buf, len); in rsn_preauth_receive() 77 struct wpa_sm *sm = ctx; in rsn_preauth_eapol_cb() local 95 sm->pmk_len = pmk_len; in rsn_preauth_eapol_cb() [all …]
|
D | wpa_ft.c | 24 int wpa_derive_ptk_ft(struct wpa_sm *sm, const unsigned char *src_addr, in wpa_derive_ptk_ft() argument 29 int use_sha384 = wpa_key_mgmt_sha384(sm->key_mgmt); in wpa_derive_ptk_ft() 31 if (sm->xxkey_len == 0) { in wpa_derive_ptk_ft() 37 sm->pmk_r0_len = use_sha384 ? SHA384_MAC_LEN : PMK_LEN; in wpa_derive_ptk_ft() 38 if (wpa_derive_pmk_r0(sm->xxkey, sm->xxkey_len, sm->ssid, in wpa_derive_ptk_ft() 39 sm->ssid_len, sm->mobility_domain, in wpa_derive_ptk_ft() 40 sm->r0kh_id, sm->r0kh_id_len, sm->own_addr, in wpa_derive_ptk_ft() 41 sm->pmk_r0, sm->pmk_r0_name, use_sha384) < 0) in wpa_derive_ptk_ft() 43 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R0", sm->pmk_r0, sm->pmk_r0_len); in wpa_derive_ptk_ft() 45 sm->pmk_r0_name, WPA_PMK_NAME_LEN); in wpa_derive_ptk_ft() [all …]
|
D | wpa_i.h | 178 static inline void wpa_sm_set_state(struct wpa_sm *sm, enum wpa_states state) in wpa_sm_set_state() argument 180 WPA_ASSERT(sm->ctx->set_state); in wpa_sm_set_state() 181 sm->ctx->set_state(sm->ctx->ctx, state); in wpa_sm_set_state() 184 static inline enum wpa_states wpa_sm_get_state(struct wpa_sm *sm) in wpa_sm_get_state() argument 186 WPA_ASSERT(sm->ctx->get_state); in wpa_sm_get_state() 187 return sm->ctx->get_state(sm->ctx->ctx); in wpa_sm_get_state() 190 static inline void wpa_sm_deauthenticate(struct wpa_sm *sm, int reason_code) in wpa_sm_deauthenticate() argument 192 WPA_ASSERT(sm->ctx->deauthenticate); in wpa_sm_deauthenticate() 193 sm->ctx->deauthenticate(sm->ctx->ctx, reason_code); in wpa_sm_deauthenticate() 196 static inline int wpa_sm_set_key(struct wpa_sm *sm, enum wpa_alg alg, in wpa_sm_set_key() argument [all …]
|
D | wpa.h | 121 void wpa_sm_deinit(struct wpa_sm *sm); 122 void wpa_sm_notify_assoc(struct wpa_sm *sm, const u8 *bssid); 123 void wpa_sm_notify_disassoc(struct wpa_sm *sm); 124 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, 126 void wpa_sm_set_pmk_from_pmksa(struct wpa_sm *sm); 127 void wpa_sm_set_fast_reauth(struct wpa_sm *sm, int fast_reauth); 128 void wpa_sm_set_scard_ctx(struct wpa_sm *sm, void *scard_ctx); 129 void wpa_sm_set_config(struct wpa_sm *sm, struct rsn_supp_config *config); 130 void wpa_sm_set_own_addr(struct wpa_sm *sm, const u8 *addr); 131 void wpa_sm_set_ifname(struct wpa_sm *sm, const char *ifname, [all …]
|
D | tdls.c | 86 static void wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer); 87 static void wpa_tdls_disable_peer_link(struct wpa_sm *sm, 89 static int wpa_tdls_send_teardown(struct wpa_sm *sm, const u8 *addr, 160 static int wpa_tdls_get_privacy(struct wpa_sm *sm) in wpa_tdls_get_privacy() argument 167 return sm->pairwise_cipher != WPA_CIPHER_NONE; in wpa_tdls_get_privacy() 178 static int wpa_tdls_del_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) in wpa_tdls_del_key() argument 180 if (wpa_sm_set_key(sm, WPA_ALG_NONE, peer->addr, in wpa_tdls_del_key() 191 static int wpa_tdls_set_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) in wpa_tdls_set_key() argument 224 sm->pairwise_cipher); in wpa_tdls_set_key() 230 if (wpa_sm_set_key(sm, alg, peer->addr, -1, 1, in wpa_tdls_set_key() [all …]
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap.c | 39 static Boolean eap_sm_allowMethod(struct eap_sm *sm, int vendor, 41 static struct wpabuf * eap_sm_buildNak(struct eap_sm *sm, int id); 42 static void eap_sm_processIdentity(struct eap_sm *sm, 44 static void eap_sm_processNotify(struct eap_sm *sm, const struct wpabuf *req); 46 static void eap_sm_parseEapReq(struct eap_sm *sm, const struct wpabuf *req); 51 static void eap_sm_request(struct eap_sm *sm, enum wpa_ctrl_req_type field, 56 static Boolean eapol_get_bool(struct eap_sm *sm, enum eapol_bool_var var) in eapol_get_bool() argument 58 return sm->eapol_cb->get_bool(sm->eapol_ctx, var); in eapol_get_bool() 62 static void eapol_set_bool(struct eap_sm *sm, enum eapol_bool_var var, in eapol_set_bool() argument 65 sm->eapol_cb->set_bool(sm->eapol_ctx, var, value); in eapol_set_bool() [all …]
|
D | eap.h | 337 void eap_peer_sm_deinit(struct eap_sm *sm); 338 int eap_peer_sm_step(struct eap_sm *sm); 339 void eap_sm_abort(struct eap_sm *sm); 340 int eap_sm_get_status(struct eap_sm *sm, char *buf, size_t buflen, 342 const char * eap_sm_get_method_name(struct eap_sm *sm); 343 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, int encrypted); 344 void eap_sm_request_identity(struct eap_sm *sm); 345 void eap_sm_request_password(struct eap_sm *sm); 346 void eap_sm_request_new_password(struct eap_sm *sm); 347 void eap_sm_request_pin(struct eap_sm *sm); [all …]
|
D | eap_tls.c | 18 static void eap_tls_deinit(struct eap_sm *sm, void *priv); 32 static void * eap_tls_init(struct eap_sm *sm) in eap_tls_init() argument 35 struct eap_peer_config *config = eap_get_config(sm); in eap_tls_init() 37 ((sm->init_phase2 ? config->private_key2 : config->private_key) in eap_tls_init() 39 (sm->init_phase2 ? config->engine2 : config->engine) == 0)) { in eap_tls_init() 48 data->ssl_ctx = sm->init_phase2 && sm->ssl_ctx2 ? sm->ssl_ctx2 : in eap_tls_init() 49 sm->ssl_ctx; in eap_tls_init() 51 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_TLS)) { in eap_tls_init() 53 eap_tls_deinit(sm, data); in eap_tls_init() 57 eap_sm_request_pin(sm); in eap_tls_init() [all …]
|
/external/wpa_supplicant_8/src/eapol_auth/ |
D | eapol_auth_sm.c | 23 #define STATE_MACHINE_ADDR sm->addr 30 sm->eapol->cb.set_port_authorized(sm->eapol->conf.ctx, sm->sta, 1) 32 sm->eapol->cb.set_port_authorized(sm->eapol->conf.ctx, sm->sta, 0) 35 #define txCannedFail() eapol_auth_tx_canned_eap(sm, 0) 36 #define txCannedSuccess() eapol_auth_tx_canned_eap(sm, 1) 37 #define txReq() eapol_auth_tx_req(sm) 38 #define abortAuth() sm->eapol->cb.abort_auth(sm->eapol->conf.ctx, sm->sta) 39 #define txKey() sm->eapol->cb.tx_key(sm->eapol->conf.ctx, sm->sta) 43 static void eapol_sm_step_run(struct eapol_state_machine *sm); 45 static void eapol_auth_initialize(struct eapol_state_machine *sm); [all …]
|
D | eapol_auth_dump.c | 121 int eapol_auth_dump_state(struct eapol_state_machine *sm, char *buf, in eapol_auth_dump_state() argument 132 sm->aWhile, sm->quietWhile, sm->reAuthWhen); in eapol_auth_dump_state() 158 _SB(sm->authAbort), in eapol_auth_dump_state() 159 _SB(sm->authFail), in eapol_auth_dump_state() 160 port_state_txt(sm->authPortStatus), in eapol_auth_dump_state() 161 _SB(sm->authStart), in eapol_auth_dump_state() 162 _SB(sm->authTimeout), in eapol_auth_dump_state() 163 _SB(sm->authSuccess), in eapol_auth_dump_state() 164 _SB(sm->eap_if->eapFail), in eapol_auth_dump_state() 165 _SB(sm->eapolEap), in eapol_auth_dump_state() [all …]
|
/external/wpa_supplicant_8/src/ap/ |
D | wpa_auth.c | 36 #define STATE_MACHINE_ADDR sm->addr 40 static int wpa_sm_step(struct wpa_state_machine *sm); 44 static int wpa_aead_decrypt(struct wpa_state_machine *sm, struct wpa_ptk *ptk, 46 static struct wpabuf * fils_prepare_plainbuf(struct wpa_state_machine *sm, 52 static void wpa_request_new_ptk(struct wpa_state_machine *sm); 57 static int wpa_derive_ptk(struct wpa_state_machine *sm, const u8 *snonce, 66 static u8 * ieee80211w_kde_add(struct wpa_state_machine *sm, u8 *pos); 180 int (*cb)(struct wpa_state_machine *sm, void *ctx), in wpa_auth_for_each_sta() argument 315 struct wpa_state_machine *sm = timeout_ctx; in wpa_rekey_ptk() local 317 wpa_auth_logger(wpa_auth, sm->addr, LOGGER_DEBUG, "rekeying PTK"); in wpa_rekey_ptk() [all …]
|
/external/epid-sdk/doc/html/ |
D | tabs.css | 1 …sm{position:relative;z-index:9999}.sm,.sm ul,.sm li{display:block;list-style:none;margin:0;padding…
|
/external/tinyxml2/docs/ |
D | tabs.css | 1 …sm{position:relative;z-index:9999}.sm,.sm ul,.sm li{display:block;list-style:none;margin:0;padding…
|
/external/libhevc/encoder/ |
D | var_q_operator.c | 67 norm_a = norm32(a.sm); /* norm32 defined in ia_basic_ops32.h */ in mult32_var_q() 68 norm_b = norm32(b.sm); in mult32_var_q() 73 a.sm = shl32_sat(a.sm, norm_a); in mult32_var_q() 74 b.sm = shl32_sat(b.sm, norm_b); in mult32_var_q() 76 c->sm = mult32(a.sm, b.sm); /* mult32 defined in ia_basic_ops40.h */ in mult32_var_q() 86 c->sm = div32(a.sm, b.sm, &qoutient_q_format); /* div32 defined in ia_basic_ops32.h */ in div32_var_q() 100 norm_a = norm32(a.sm) - 1; /* norm32 defined in ia_basic_ops32.h */ in add32_var_q() 101 norm_b = norm32(b.sm) - 1; /* we normalise a & b only to 30t bit in add32_var_q() 110 b.sm = shl32_dir_sat(b.sm, norm_b); in add32_var_q() 111 a.sm = shr32_dir_sat(a.sm, ((a.e - b.e) - norm_b)); in add32_var_q() [all …]
|
/external/e2fsprogs/lib/ext2fs/ |
D | sparse_io.c | 60 static void free_sparse_blocks(struct sparse_map *sm) in free_sparse_blocks() argument 64 for (i = 0; i < sm->blocks_count; ++i) in free_sparse_blocks() 65 free(sm->blocks[i]); in free_sparse_blocks() 66 free(sm->blocks); in free_sparse_blocks() 67 sm->blocks = NULL; in free_sparse_blocks() 73 struct sparse_map *sm = priv; in sparse_import_segment() local 76 if (!nr_blocks || len % sm->block_size) in sparse_import_segment() 79 return sparse_write_blk(sm->channel, block, nr_blocks, data); in sparse_import_segment() 83 struct sparse_map *sm, io_channel io) in io_manager_import_sparse() argument 103 sm->block_size = sparse_file_block_size(sparse_file); in io_manager_import_sparse() [all …]
|
/external/wpa_supplicant_8/src/wps/ |
D | wps_upnp.c | 460 static void upnp_wps_device_send_event(struct upnp_wps_device_sm *sm) in upnp_wps_device_send_event() argument 473 if (dl_list_empty(&sm->subscriptions)) { in upnp_wps_device_send_event() 479 if (now.sec != sm->last_event_sec) { in upnp_wps_device_send_event() 480 sm->last_event_sec = now.sec; in upnp_wps_device_send_event() 481 sm->num_events_in_sec = 1; in upnp_wps_device_send_event() 483 sm->num_events_in_sec++; in upnp_wps_device_send_event() 491 if (sm->num_events_in_sec > MAX_EVENTS_PER_SEC && in upnp_wps_device_send_event() 492 sm->wlanevent_type == in upnp_wps_device_send_event() 497 sm->num_events_in_sec); in upnp_wps_device_send_event() 506 if (sm->wlanevent) in upnp_wps_device_send_event() [all …]
|