/external/wpa_supplicant_8/src/ap/ |
D | peerkey_auth.c | 95 if (kde.rsn_ie == NULL || kde.mac_addr == NULL || in wpa_smk_m1() 104 search.addr = kde.mac_addr; in wpa_smk_m1() 110 MAC2STR(kde.mac_addr)); in wpa_smk_m1() 111 wpa_smk_send_error(wpa_auth, sm, kde.mac_addr, STK_MUI_SMK, in wpa_smk_m1() 170 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, kde->mac_addr, ETH_ALEN, in wpa_send_smk_m4() 269 kde.mac_addr == NULL || kde.mac_addr_len < ETH_ALEN || in wpa_smk_m3() 279 search.addr = kde.mac_addr; in wpa_smk_m3() 285 MAC2STR(kde.mac_addr)); in wpa_smk_m3() 286 wpa_smk_send_error(wpa_auth, sm, kde.mac_addr, STK_MUI_SMK, in wpa_smk_m3() 340 if (kde.mac_addr == NULL || kde.mac_addr_len < ETH_ALEN || in wpa_smk_error() [all …]
|
D | iapp.c | 82 u8 mac_addr[ETH_ALEN]; member 103 u8 mac_addr[ETH_ALEN]; member 114 u8 mac_addr[ETH_ALEN]; member 131 u8 mac_addr[ETH_ALEN]; member 144 u8 mac_addr[ETH_ALEN]; member 178 static void iapp_send_add(struct iapp_data *iapp, u8 *mac_addr, u16 seq_num) in iapp_send_add() argument 197 os_memcpy(add->mac_addr, mac_addr, ETH_ALEN); in iapp_send_add() 284 sta = ap_get_sta(iapp->hapd, add->mac_addr); in iapp_process_add_notify() 287 hostapd_logger(iapp->hapd, add->mac_addr, HOSTAPD_MODULE_IAPP, in iapp_process_add_notify() 301 hostapd_logger(iapp->hapd, add->mac_addr, HOSTAPD_MODULE_IAPP, in iapp_process_add_notify()
|
D | wps_hostapd.c | 94 static int hostapd_wps_new_psk_cb(void *ctx, const u8 *mac_addr, const u8 *psk, in hostapd_wps_new_psk_cb() argument 102 MACSTR, MAC2STR(mac_addr)); in hostapd_wps_new_psk_cb() 115 os_memcpy(p->addr, mac_addr, ETH_ALEN); in hostapd_wps_new_psk_cb() 133 fprintf(f, MACSTR " %s\n", MAC2STR(mac_addr), hex); in hostapd_wps_new_psk_cb() 167 uuid, MAC2STR(dev->mac_addr), dev->device_name, in hostapd_wps_pin_needed_cb() 184 t.sec, uuid, MAC2STR(dev->mac_addr), dev->device_name, in hostapd_wps_pin_needed_cb() 211 static void hostapd_wps_reg_success_cb(void *ctx, const u8 *mac_addr, in hostapd_wps_reg_success_cb() argument 221 MAC2STR(mac_addr), uuid); in hostapd_wps_reg_success_cb() 224 mac_addr, uuid_e); in hostapd_wps_reg_success_cb() 422 MAC2STR(cred->mac_addr)); in hapd_wps_cred_cb() [all …]
|
D | wpa_auth_ie.h | 20 const u8 *mac_addr; member
|
D | hostapd.h | 163 void (*wps_reg_success_cb)(void *ctx, const u8 *mac_addr, 171 void (*sta_authorized_cb)(void *ctx, const u8 *mac_addr,
|
/external/wpa_supplicant_8/src/wps/ |
D | wps_attr_process.c | 195 const u8 *mac_addr) in wps_process_cred_mac_addr() argument 197 if (mac_addr == NULL) { in wps_process_cred_mac_addr() 203 wpa_printf(MSG_DEBUG, "WPS: MAC Address " MACSTR, MAC2STR(mac_addr)); in wps_process_cred_mac_addr() 204 os_memcpy(cred->mac_addr, mac_addr, ETH_ALEN); in wps_process_cred_mac_addr() 313 wps_process_cred_mac_addr(cred, attr->mac_addr) || in wps_process_cred() 339 wps_process_cred_mac_addr(cred, attr->mac_addr)) in wps_process_ap_settings()
|
D | wps.h | 55 u8 mac_addr[ETH_ALEN]; member 87 u8 mac_addr[ETH_ALEN]; member 255 int (*new_psk_cb)(void *ctx, const u8 *mac_addr, const u8 *psk, 296 void (*reg_success_cb)(void *ctx, const u8 *mac_addr, 499 const u8 *mac_addr; member 515 const u8 *mac_addr; member 813 void uuid_gen_mac_addr(const u8 *mac_addr, u8 *uuid);
|
D | wps_er.h | 45 u8 mac_addr[ETH_ALEN]; member 79 u8 mac_addr[ETH_ALEN]; /* mac addr of network i.f. we use */ member
|
D | wps_enrollee.c | 315 wpabuf_put_data(msg, wps->wps->dev.mac_addr, ETH_ALEN); in wps_build_cred_mac_addr() 660 if (os_memcmp(wps->cred.mac_addr, wps->wps->dev.mac_addr, ETH_ALEN) != in wps_process_cred_e() 664 ")", MAC2STR(wps->cred.mac_addr), in wps_process_cred_e() 665 MAC2STR(wps->wps->dev.mac_addr)); in wps_process_cred_e() 761 if (os_memcmp(cred.mac_addr, wps->wps->dev.mac_addr, ETH_ALEN) != in wps_process_ap_settings_e() 765 ")", MAC2STR(cred.mac_addr), in wps_process_ap_settings_e() 766 MAC2STR(wps->wps->dev.mac_addr)); in wps_process_ap_settings_e()
|
D | wps_registrar.c | 145 int (*new_psk_cb)(void *ctx, const u8 *mac_addr, const u8 *psk, 151 void (*reg_success_cb)(void *ctx, const u8 *mac_addr, 262 if (os_memcmp(dev->dev.mac_addr, addr, ETH_ALEN) == 0) in wps_device_get() 272 os_memcpy(dst->mac_addr, src->mac_addr, ETH_ALEN); in wps_device_clone_data() 293 d = wps_device_get(reg, dev->mac_addr); in wps_device_store() 1167 static int wps_cb_new_psk(struct wps_registrar *reg, const u8 *mac_addr, in wps_cb_new_psk() argument 1173 return reg->new_psk_cb(reg->cb_ctx, mac_addr, psk, psk_len); in wps_cb_new_psk() 1187 static void wps_cb_reg_success(struct wps_registrar *reg, const u8 *mac_addr, in wps_cb_reg_success() argument 1194 reg->reg_success_cb(reg->cb_ctx, mac_addr, uuid_e, dev_pw, dev_pw_len); in wps_cb_reg_success() 1538 MAC2STR(cred->mac_addr)); in wps_build_cred_mac_addr() [all …]
|
D | wps_upnp.h | 30 const u8 *mac_addr, const struct wpabuf *msg,
|
D | wps_validate.c | 562 static int wps_validate_mac_addr(const u8 *mac_addr, int mandatory) in wps_validate_mac_addr() argument 564 if (mac_addr == NULL) { in wps_validate_mac_addr() 572 if (mac_addr[0] & 0x01) { in wps_validate_mac_addr() 574 "attribute value " MACSTR, MAC2STR(mac_addr)); in wps_validate_mac_addr() 1046 wps_validate_mac_addr(attr.mac_addr, 1) || in wps_validate_cred() 1302 wps_validate_mac_addr(attr.mac_addr, 1) || in wps_validate_m1() 1739 wps_validate_mac_addr(attr.mac_addr, !ap) || in wps_validate_m7_encr() 1815 wps_validate_mac_addr(attr.mac_addr, ap) || in wps_validate_m8_encr()
|
D | wps_er.c | 45 ev->mac_addr = sta->addr; in wps_er_sta_event() 101 const u8 *mac_addr) in wps_er_ap_get() argument 108 (mac_addr == NULL || in wps_er_ap_get() 109 os_memcmp(mac_addr, ap->mac_addr, ETH_ALEN) == 0)) in wps_er_ap_get() 149 evap->mac_addr = ap->mac_addr; in wps_er_ap_event() 489 if (attr.mac_addr) in wps_er_ap_get_m1() 490 os_memcpy(ap->mac_addr, attr.mac_addr, ETH_ALEN); in wps_er_ap_get_m1() 1080 os_memcpy(sta->cred->mac_addr, sta->addr, ETH_ALEN); in wps_er_sta_start() 1306 er->mac_addr)) { in wps_er_init()
|
D | wps_attr_parse.h | 49 const u8 *mac_addr; /* ETH_ALEN (6) octets */ member
|
D | wps_upnp_i.h | 129 u8 mac_addr[ETH_ALEN]; /* mac addr of network i.f. we use */ member
|
D | wps.c | 44 os_memcpy(data->mac_addr_e, cfg->wps->dev.mac_addr, ETH_ALEN); in wps_init() 129 os_memcpy(data->peer_dev.mac_addr, cfg->peer_addr, ETH_ALEN); in wps_init()
|
D | wps_common.c | 443 void uuid_gen_mac_addr(const u8 *mac_addr, u8 *uuid) in uuid_gen_mac_addr() argument 458 addr[1] = mac_addr; in uuid_gen_mac_addr()
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | peerkey.c | 199 if (kde.rsn_ie == NULL || kde.mac_addr == NULL || in wpa_supplicant_process_smk_m2() 207 MAC2STR(kde.mac_addr)); in wpa_supplicant_process_smk_m2() 224 wpa_supplicant_send_smk_error(sm, src_addr, kde.mac_addr, in wpa_supplicant_process_smk_m2() 238 os_memcpy(peerkey->addr, kde.mac_addr, ETH_ALEN); in wpa_supplicant_process_smk_m2() 438 MAC2STR(kde->mac_addr)); in wpa_supplicant_process_smk_m4() 468 MAC2STR(kde->mac_addr)); in wpa_supplicant_process_smk_m5() 497 "unacceptable cipher", MAC2STR(kde->mac_addr)); in wpa_supplicant_process_smk_m5() 498 wpa_supplicant_send_smk_error(sm, src_addr, kde->mac_addr, in wpa_supplicant_process_smk_m5() 533 if (kde.mac_addr == NULL || kde.mac_addr_len < ETH_ALEN || in wpa_supplicant_process_smk_m45() 543 if (os_memcmp(peerkey->addr, kde.mac_addr, ETH_ALEN) == 0 && in wpa_supplicant_process_smk_m45() [all …]
|
D | wpa_ie.h | 22 const u8 *mac_addr; member
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | notify.c | 577 const u8 *mac_addr, int authorized, in wpas_notify_sta_authorized() argument 581 wpas_notify_ap_sta_authorized(wpa_s, mac_addr, p2p_dev_addr); in wpas_notify_sta_authorized() 583 wpas_notify_ap_sta_deauthorized(wpa_s, mac_addr); in wpas_notify_sta_authorized()
|
D | wps_supplicant.c | 164 bss = wpa_bss_get(wpa_s, cred->mac_addr, ssid->ssid, ssid->ssid_len); in wpas_wps_security_workaround() 263 MAC2STR(cred->mac_addr)); in wpa_supplicant_wps_cred() 605 uuid_str, MAC2STR(ap->mac_addr), dev_type, ap->wps_state, in wpa_supplicant_wps_event_er_ap_add() 640 uuid_str, MAC2STR(enrollee->mac_addr), enrollee->m1_received, in wpa_supplicant_wps_event_er_enrollee_add() 656 uuid_str, MAC2STR(enrollee->mac_addr)); in wpa_supplicant_wps_event_er_enrollee_remove() 1095 static int wpas_wps_new_psk_cb(void *ctx, const u8 *mac_addr, const u8 *psk, in wpas_wps_new_psk_cb() argument 1099 "STA " MACSTR, MAC2STR(mac_addr)); in wpas_wps_new_psk_cb() 1119 uuid, MAC2STR(dev->mac_addr), dev->device_name, in wpas_wps_pin_needed_cb() 1273 os_memcpy(wps->dev.mac_addr, wpa_s->own_addr, ETH_ALEN); in wpas_wps_init()
|
D | notify.h | 84 const u8 *mac_addr, int authorized,
|
D | ap.c | 362 static void ap_sta_authorized_cb(void *ctx, const u8 *mac_addr, in ap_sta_authorized_cb() argument 365 wpas_notify_sta_authorized(ctx, mac_addr, authorized, p2p_dev_addr); in ap_sta_authorized_cb() 403 static void ap_wps_reg_success_cb(void *ctx, const u8 *mac_addr, in ap_wps_reg_success_cb() argument 408 wpas_p2p_wps_success(wpa_s, mac_addr, 1); in ap_wps_reg_success_cb()
|
/external/kernel-headers/original/linux/ |
D | if_bridge.h | 96 __u8 mac_addr[6]; member
|
/external/libppp/src/ |
D | radius.c | 900 char *mac_addr; in radius_Authenticate() local 1044 if ((mac_addr = getenv("HISMACADDR")) != NULL && in radius_Authenticate() 1045 rad_put_string(r->cx.rad, RAD_CALLING_STATION_ID, mac_addr) != 0) { in radius_Authenticate() 1102 char *mac_addr; in radius_Account() local 1200 if ((mac_addr = getenv("HISMACADDR")) != NULL && in radius_Account() 1201 rad_put_string(r->cx.rad, RAD_CALLING_STATION_ID, mac_addr) != 0) { in radius_Account()
|