/external/wpa_supplicant_8/src/rsn_supp/ |
D | wpa_ft.c | 147 const u8 *kck, const u8 *target_ap, in wpa_ft_gen_req_ies() argument 299 if (wpa_ft_mic(kck, sm->own_addr, target_ap, 5, in wpa_ft_gen_req_ies() 373 int ft_action, const u8 *target_ap, in wpa_ft_process_response() argument 395 if (os_memcmp(target_ap, sm->target_ap, ETH_ALEN) != 0) { in wpa_ft_process_response() 477 bssid = target_ap; in wpa_ft_process_response() 517 os_memcpy(sm->bssid, target_ap, ETH_ALEN); in wpa_ft_process_response() 808 int wpa_ft_start_over_ds(struct wpa_sm *sm, const u8 *target_ap, in wpa_ft_start_over_ds() argument 815 MAC2STR(target_ap)); in wpa_ft_start_over_ds() 824 NULL, target_ap, NULL, 0, mdie); in wpa_ft_start_over_ds() 827 os_memcpy(sm->target_ap, target_ap, ETH_ALEN); in wpa_ft_start_over_ds() [all …]
|
D | wpa_i.h | 119 u8 target_ap[ETH_ALEN]; /* over-the-DS target AP */ member 227 const u8 *target_ap, in wpa_sm_send_ft_action() argument 231 return sm->ctx->send_ft_action(sm->ctx->ctx, action, target_ap, in wpa_sm_send_ft_action() 237 const u8 *target_ap) in wpa_sm_mark_authenticated() argument 240 return sm->ctx->mark_authenticated(sm->ctx->ctx, target_ap); in wpa_sm_mark_authenticated()
|
D | wpa.h | 49 int (*send_ft_action)(void *ctx, u8 action, const u8 *target_ap, 51 int (*mark_authenticated)(void *ctx, const u8 *target_ap); 315 int ft_action, const u8 *target_ap, 320 int wpa_ft_start_over_ds(struct wpa_sm *sm, const u8 *target_ap, 339 int ft_action, const u8 *target_ap) in wpa_ft_process_response() argument
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | wpas_glue.c | 480 const u8 *target_ap, in wpa_supplicant_send_ft_action() argument 484 return wpa_drv_send_ft_action(wpa_s, action, target_ap, ies, ies_len); in wpa_supplicant_send_ft_action() 488 static int wpa_supplicant_mark_authenticated(void *ctx, const u8 *target_ap) in wpa_supplicant_mark_authenticated() argument 494 bss = wpa_bss_get_bssid(wpa_s, target_ap); in wpa_supplicant_mark_authenticated() 499 params.bssid = target_ap; in wpa_supplicant_mark_authenticated()
|
D | driver_i.h | 268 u8 action, const u8 *target_ap, in wpa_drv_send_ft_action() argument 273 target_ap, ies, ies_len); in wpa_drv_send_ft_action()
|
D | wpa_priv.c | 811 os_memcpy(pos, data->ft_ies.target_ap, ETH_ALEN); in wpa_priv_send_ft_response()
|
D | ctrl_iface.c | 593 u8 target_ap[ETH_ALEN]; in wpa_supplicant_ctrl_iface_ft_ds() local 597 if (hwaddr_aton(addr, target_ap)) { in wpa_supplicant_ctrl_iface_ft_ds() 603 wpa_printf(MSG_DEBUG, "CTRL_IFACE FT_DS " MACSTR, MAC2STR(target_ap)); in wpa_supplicant_ctrl_iface_ft_ds() 605 bss = wpa_bss_get_bssid(wpa_s, target_ap); in wpa_supplicant_ctrl_iface_ft_ds() 611 return wpa_ft_start_over_ds(wpa_s->wpa, target_ap, mdie); in wpa_supplicant_ctrl_iface_ft_ds()
|
D | sme.c | 616 os_memcpy(edata.ft_ies.target_ap, data->auth.peer, ETH_ALEN); in sme_event_auth()
|
D | events.c | 2259 data->ft_ies.target_ap,
|
/external/wpa_supplicant_8/src/ap/ |
D | wpa_auth_ft.c | 1116 const u8 *sta_addr, *target_ap; in wpa_ft_action_rx() local 1138 target_ap = data + 8; in wpa_ft_action_rx() 1144 MAC2STR(sta_addr), MAC2STR(target_ap), action); in wpa_ft_action_rx() 1158 if ((target_ap[0] & 0x01) || in wpa_ft_action_rx() 1159 os_memcmp(target_ap, sm->wpa_auth->addr, ETH_ALEN) == 0) { in wpa_ft_action_rx() 1175 wpa_ft_rrb_send(sm->wpa_auth, target_ap, (u8 *) frame, in wpa_ft_action_rx()
|
/external/wpa_supplicant_8/src/drivers/ |
D | driver.h | 1474 int (*send_ft_action)(void *priv, u8 action, const u8 *target_ap, 3347 u8 target_ap[ETH_ALEN]; member
|
D | driver_privsep.c | 409 os_memcpy(data.ft_ies.target_ap, buf + sizeof(int), ETH_ALEN); in wpa_driver_privsep_event_ft_response()
|
D | driver_nl80211.c | 1665 os_memcpy(data.ft_ies.target_ap, in mlme_event_ft_event() 1669 MAC2STR(data.ft_ies.target_ap)); in mlme_event_ft_event() 9020 static int nl80211_send_ft_action(void *priv, u8 action, const u8 *target_ap, in nl80211_send_ft_action() argument 9054 os_memcpy(pos, target_ap, ETH_ALEN); in nl80211_send_ft_action()
|