| /src/external/bsd/wpa/dist/src/pae/ |
| ieee802_1x_cp.c | 96 static int changed_cipher(struct ieee802_1x_cp_sm *sm) 98 return sm->confidentiality_offset != sm->cipher_offset || 99 sm->current_cipher_suite != sm->cipher_suite; 103 static int changed_connect(struct ieee802_1x_cp_sm *sm) 105 return sm->connect != SECURE || sm->chgd_server || changed_cipher(sm); 113 sm->controlled_port_enabled = false 452 struct ieee802_1x_cp_sm *sm; local 524 struct ieee802_1x_cp_sm *sm = eloop_ctx; local 552 struct ieee802_1x_cp_sm *sm = cp_ctx; local 563 struct ieee802_1x_cp_sm *sm = (struct ieee802_1x_cp_sm *)cp_ctx; local 574 struct ieee802_1x_cp_sm *sm = cp_ctx; local 585 struct ieee802_1x_cp_sm *sm = cp_ctx; local 596 struct ieee802_1x_cp_sm *sm = cp_ctx; local 607 struct ieee802_1x_cp_sm *sm = cp_ctx; local 617 struct ieee802_1x_cp_sm *sm = cp_ctx; local 627 struct ieee802_1x_cp_sm *sm = cp_ctx; local 637 struct ieee802_1x_cp_sm *sm = cp_ctx; local 648 struct ieee802_1x_cp_sm *sm = cp_ctx; local 658 struct ieee802_1x_cp_sm *sm = cp_ctx; local 668 struct ieee802_1x_cp_sm *sm = cp_ctx; local 678 struct ieee802_1x_cp_sm *sm = cp_ctx; local 688 struct ieee802_1x_cp_sm *sm = cp_ctx; local 698 struct ieee802_1x_cp_sm *sm = cp_ctx; local 717 struct ieee802_1x_cp_sm *sm = cp_ctx; local 726 struct ieee802_1x_cp_sm *sm = eloop_ctx; local 735 struct ieee802_1x_cp_sm *sm = eloop_ctx; local [all...] |
| /src/external/bsd/wpa/dist/src/eap_server/ |
| eap_server.c | 28 static int eap_sm_calculateTimeout(struct eap_sm *sm, int retransCount, 31 static void eap_sm_parseEapResp(struct eap_sm *sm, const struct wpabuf *resp); 33 static struct wpabuf * eap_sm_buildSuccess(struct eap_sm *sm, u8 id); 34 static struct wpabuf * eap_sm_buildFailure(struct eap_sm *sm, u8 id); 35 static int eap_sm_nextId(struct eap_sm *sm, int id); 36 static void eap_sm_Policy_update(struct eap_sm *sm, const u8 *nak_list, 38 static enum eap_type eap_sm_Policy_getNextMethod(struct eap_sm *sm, 40 static int eap_sm_Policy_getDecision(struct eap_sm *sm); 41 static bool eap_sm_Policy_doPickUp(struct eap_sm *sm, enum eap_type method); 44 static int eap_get_erp_send_reauth_start(struct eap_sm *sm) 1858 struct eap_sm *sm; local [all...] |
| eap_server_gtc.c | 21 static void * eap_gtc_init(struct eap_sm *sm) 31 if (sm->m && sm->m->vendor == EAP_VENDOR_IETF && 32 sm->m->method == EAP_TYPE_FAST) { 43 static void eap_gtc_reset(struct eap_sm *sm, void *priv) 50 static struct wpabuf * eap_gtc_buildReq(struct eap_sm *sm, void *priv, u8 id) 77 static bool eap_gtc_check(struct eap_sm *sm, void *priv, 93 static void eap_gtc_process(struct eap_sm *sm, void *priv, 131 if (sm->identity && sm->require_identity_match & [all...] |
| /src/external/bsd/wpa/dist/src/eapol_supp/ |
| eapol_supp_sm.c | 152 static void eapol_sm_txLogoff(struct eapol_sm *sm); 153 static void eapol_sm_txStart(struct eapol_sm *sm); 154 static void eapol_sm_processKey(struct eapol_sm *sm); 155 static void eapol_sm_getSuppRsp(struct eapol_sm *sm); 156 static void eapol_sm_txSuppRsp(struct eapol_sm *sm); 157 static void eapol_sm_abortSupp(struct eapol_sm *sm); 158 static void eapol_sm_abort_cached(struct eapol_sm *sm); 160 static void eapol_sm_set_port_authorized(struct eapol_sm *sm); 161 static void eapol_sm_set_port_unauthorized(struct eapol_sm *sm); 168 struct eapol_sm *sm = timeout_ctx local 1857 struct eapol_sm *sm = ctx; local 1864 struct eapol_sm *sm = ctx; local 1874 struct eapol_sm *sm = ctx; local 1906 struct eapol_sm *sm = ctx; local 1946 struct eapol_sm *sm = ctx; local 1960 struct eapol_sm *sm = ctx; local 1976 struct eapol_sm *sm = ctx; local 1987 struct eapol_sm *sm = ctx; local 2000 struct eapol_sm *sm = ctx; local 2017 struct eapol_sm *sm = ctx; local 2029 struct eapol_sm *sm = ctx; local 2038 struct eapol_sm *sm = ctx; local 2047 struct eapol_sm *sm = ctx; local 2058 struct eapol_sm *sm = ctx; local 2069 struct eapol_sm *sm = ctx; local 2080 struct eapol_sm *sm = ctx; local 2121 struct eapol_sm *sm; local 2222 struct eapol_sm *sm = ctx; local [all...] |
| eapol_supp_sm.h | 331 void eapol_sm_deinit(struct eapol_sm *sm); 332 void eapol_sm_step(struct eapol_sm *sm); 333 int eapol_sm_get_status(struct eapol_sm *sm, char *buf, size_t buflen, 335 int eapol_sm_get_mib(struct eapol_sm *sm, char *buf, size_t buflen); 336 void eapol_sm_configure(struct eapol_sm *sm, int heldPeriod, int authPeriod, 338 int eapol_sm_rx_eapol(struct eapol_sm *sm, const u8 *src, const u8 *buf, 340 void eapol_sm_notify_tx_eapol_key(struct eapol_sm *sm); 341 void eapol_sm_notify_portEnabled(struct eapol_sm *sm, bool enabled); 342 void eapol_sm_notify_portValid(struct eapol_sm *sm, bool valid); 343 void eapol_sm_notify_eap_success(struct eapol_sm *sm, bool success) [all...] |
| /src/external/bsd/wpa/dist/src/eapol_auth/ |
| eapol_auth_sm.c | 23 #define STATE_MACHINE_ADDR sm->addr 30 sm->eapol->cb.set_port_authorized(sm->eapol->conf.ctx, sm->sta, 1) 32 sm->eapol->cb.set_port_authorized(sm->eapol->conf.ctx, sm->sta, 0) 35 #define txCannedFail() eapol_auth_tx_canned_eap(sm, 0) 36 #define txCannedSuccess() eapol_auth_tx_canned_eap(sm, 1) 37 #define txReq() eapol_auth_tx_req(sm) 794 struct eapol_state_machine *sm; local 986 struct eapol_state_machine *sm = eloop_ctx; local 1031 struct eapol_state_machine *sm = ctx; local 1044 struct eapol_state_machine *sm = ctx; local 1052 struct eapol_state_machine *sm = ctx; local 1059 struct eapol_state_machine *sm = ctx; local 1067 struct eapol_state_machine *sm = ctx; local 1074 struct eapol_state_machine *sm = ctx; local [all...] |
| eapol_auth_dump.c | 121 int eapol_auth_dump_state(struct eapol_state_machine *sm, char *buf, 132 sm->aWhile, sm->quietWhile, sm->reAuthWhen); 158 _SB(sm->authAbort), 159 _SB(sm->authFail), 160 port_state_txt(sm->authPortStatus), 161 _SB(sm->authStart), 162 _SB(sm->authTimeout), 163 _SB(sm->authSuccess) [all...] |
| /src/external/gpl3/gcc/dist/gcc/config/nvptx/ |
| gen-multilib-matches.sh | 25 nvptx_sm_def="$1/nvptx-sm.def" 39 for sm in $sms; do 40 if [ x"sm_$sm" = x"$multilib_options_isa_default" ]; then 42 elif expr " $multilib_options_isa_list " : ".* sm_$sm " > /dev/null; then 49 sm_next_lower=$sm 53 echo ".=misa?sm_$sm" 55 echo "misa?sm_$sm_map=misa?sm_$sm"
|
| gen-opt.sh | 21 nvptx_sm_def="$1/nvptx-sm.def" 27 for sm in $sms; do 28 last="$sm" 33 ; Generated automatically by gen-opt.sh from nvptx-sm.def. 53 for sm in $sms; do 56 Enum(ptx_isa) String(sm_$sm) Value(PTX_ISA_SM$sm) 59 if [ "$sm" = "$last" ]; then
|
| gen-omp-device-properties.sh | 21 nvptx_sm_def="$1/nvptx-sm.def" 29 for sm in $sms; do 30 isa="$isa sm_$sm"
|
| /src/external/bsd/wpa/dist/src/rsn_supp/ |
| preauth.h | 16 void pmksa_candidate_free(struct wpa_sm *sm); 17 int rsn_preauth_init(struct wpa_sm *sm, const u8 *dst, 19 void rsn_preauth_deinit(struct wpa_sm *sm); 20 int rsn_preauth_scan_results(struct wpa_sm *sm); 21 void rsn_preauth_scan_result(struct wpa_sm *sm, const u8 *bssid, 23 void pmksa_candidate_add(struct wpa_sm *sm, const u8 *bssid, 25 void rsn_preauth_candidate_process(struct wpa_sm *sm); 26 int rsn_preauth_get_status(struct wpa_sm *sm, char *buf, size_t buflen, 28 int rsn_preauth_in_progress(struct wpa_sm *sm); 32 static inline void pmksa_candidate_free(struct wpa_sm *sm) [all...] |
| preauth.c | 35 * @sm: Pointer to WPA state machine data from wpa_sm_init() 37 void pmksa_candidate_free(struct wpa_sm *sm) 41 if (sm == NULL) 44 dl_list_for_each_safe(entry, n, &sm->pmksa_candidates, 65 struct wpa_sm *sm = ctx; local 70 if (sm->preauth_eapol == NULL || 71 is_zero_ether_addr(sm->preauth_bssid) || 72 !ether_addr_equal(sm->preauth_bssid, src_addr)) { 79 eapol_sm_rx_eapol(sm->preauth_eapol, src_addr, buf, len, 88 struct wpa_sm *sm = ctx local 132 struct wpa_sm *sm = eloop_ctx; local 144 struct wpa_sm *sm = ctx; local [all...] |
| wpa_ft.c | 29 static void wpa_ft_pasn_store_r1kh(struct wpa_sm *sm, const u8 *bssid); 31 static void wpa_ft_pasn_store_r1kh(struct wpa_sm *sm, const u8 *bssid) 37 int wpa_derive_ptk_ft(struct wpa_sm *sm, const unsigned char *src_addr, 42 int use_sha384 = wpa_key_mgmt_sha384(sm->key_mgmt); 47 if (sm->xxkey_len > 0) { 48 mpmk = sm->xxkey; 49 mpmk_len = sm->xxkey_len; 50 } else if (sm->cur_pmksa) { 51 mpmk = sm->cur_pmksa->pmk; 52 mpmk_len = sm->cur_pmksa->pmk_len [all...] |
| wpa.c | 81 * @sm: Pointer to WPA state machine data from wpa_sm_init() 91 int wpa_eapol_key_send(struct wpa_sm *sm, struct wpa_ptk *ptk, 96 size_t mic_len = wpa_mic_len(sm->key_mgmt, sm->pmk_len); 100 MAC2STR(dest), ver, (int) mic_len, sm->key_mgmt); 101 if (is_zero_ether_addr(dest) && is_zero_ether_addr(sm->bssid)) { 106 if (wpa_sm_get_bssid(sm, sm->bssid) < 0) { 107 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, 111 dest = sm->bssid 1124 struct wpa_sm *sm = eloop_ctx; local 1179 struct wpa_sm *sm = eloop_ctx; local 4064 struct wpa_sm *sm = ctx; local 4106 struct wpa_sm *sm = ctx; local 4115 struct wpa_sm *sm = ctx; local 4131 struct wpa_sm *sm; local [all...] |
| wpa.h | 184 void wpa_sm_deinit(struct wpa_sm *sm); 185 void wpa_sm_notify_assoc(struct wpa_sm *sm, const u8 *bssid); 186 void wpa_sm_notify_disassoc(struct wpa_sm *sm); 187 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, 189 void wpa_sm_set_pmk_from_pmksa(struct wpa_sm *sm); 190 void wpa_sm_set_fast_reauth(struct wpa_sm *sm, int fast_reauth); 191 void wpa_sm_set_scard_ctx(struct wpa_sm *sm, void *scard_ctx); 192 void wpa_sm_set_config(struct wpa_sm *sm, struct rsn_supp_config *config); 193 void wpa_sm_set_ssid(struct wpa_sm *sm, const u8 *ssid, size_t ssid_len); 194 void wpa_sm_set_own_addr(struct wpa_sm *sm, const u8 *addr) [all...] |
| wpa_i.h | 235 static inline void wpa_sm_set_state(struct wpa_sm *sm, enum wpa_states state) 237 WPA_ASSERT(sm->ctx->set_state); 238 sm->ctx->set_state(sm->ctx->ctx, state); 241 static inline enum wpa_states wpa_sm_get_state(struct wpa_sm *sm) 243 WPA_ASSERT(sm->ctx->get_state); 244 return sm->ctx->get_state(sm->ctx->ctx); 247 static inline void wpa_sm_deauthenticate(struct wpa_sm *sm, u16 reason_code) 249 WPA_ASSERT(sm->ctx->deauthenticate) [all...] |
| /src/external/bsd/wpa/dist/src/eap_peer/ |
| eap.c | 40 static bool eap_sm_allowMethod(struct eap_sm *sm, int vendor, 42 static struct wpabuf * eap_sm_buildNak(struct eap_sm *sm, int id); 43 static void eap_sm_processIdentity(struct eap_sm *sm, 45 static void eap_sm_processNotify(struct eap_sm *sm, const struct wpabuf *req); 47 static void eap_sm_parseEapReq(struct eap_sm *sm, const struct wpabuf *req); 52 static void eap_sm_request(struct eap_sm *sm, enum wpa_ctrl_req_type field, 57 static bool eapol_get_bool(struct eap_sm *sm, enum eapol_bool_var var) 59 return sm->eapol_cb->get_bool(sm->eapol_ctx, var); 63 static void eapol_set_bool(struct eap_sm *sm, enum eapol_bool_var var 2133 struct eap_sm *sm = ctx; local 2210 struct eap_sm *sm; local [all...] |
| eap_proxy.h | 28 int eap_proxy_key_available(struct eap_proxy_sm *sm); 30 const u8 * eap_proxy_get_eapKeyData(struct eap_proxy_sm *sm, size_t *len); 32 struct wpabuf * eap_proxy_get_eapRespData(struct eap_proxy_sm *sm); 34 int eap_proxy_sm_step(struct eap_proxy_sm *sm, struct eap_sm *eap_sm); 40 int eap_proxy_sm_get_status(struct eap_proxy_sm *sm, char *buf, size_t buflen, 46 int eap_proxy_notify_config(struct eap_proxy_sm *sm, 49 u8 * eap_proxy_get_eap_session_id(struct eap_proxy_sm *sm, size_t *len); 51 u8 * eap_proxy_get_emsk(struct eap_proxy_sm *sm, size_t *len); 53 void eap_proxy_sm_abort(struct eap_proxy_sm *sm);
|
| eap_proxy_dummy.c | 27 int eap_proxy_key_available(struct eap_proxy_sm *sm) 33 const u8 * eap_proxy_get_eapKeyData(struct eap_proxy_sm *sm, size_t *len) 39 struct wpabuf * eap_proxy_get_eapRespData(struct eap_proxy_sm *sm) 45 int eap_proxy_sm_step(struct eap_proxy_sm *sm, struct eap_sm *eap_sm) 59 int eap_proxy_sm_get_status(struct eap_proxy_sm *sm, char *buf, size_t buflen, 73 int eap_proxy_notify_config(struct eap_proxy_sm *sm, 80 u8 * eap_proxy_get_eap_session_id(struct eap_proxy_sm *sm, size_t *len) 86 u8 * eap_proxy_get_emsk(struct eap_proxy_sm *sm, size_t *len) 92 void eap_proxy_sm_abort(struct eap_proxy_sm *sm)
|
| eap.h | 332 void eap_peer_sm_deinit(struct eap_sm *sm); 333 int eap_peer_sm_step(struct eap_sm *sm); 334 void eap_sm_abort(struct eap_sm *sm); 335 int eap_sm_get_status(struct eap_sm *sm, char *buf, size_t buflen, 337 const char * eap_sm_get_method_name(struct eap_sm *sm); 338 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, int encrypted); 339 void eap_sm_request_identity(struct eap_sm *sm); 340 void eap_sm_request_password(struct eap_sm *sm); 341 void eap_sm_request_new_password(struct eap_sm *sm); 342 void eap_sm_request_pin(struct eap_sm *sm); [all...] |
| /src/external/bsd/wpa/dist/src/utils/ |
| state_machine.h | 33 static void sm_ ## machine ## _ ## state ## _Enter(STATE_MACHINE_DATA *sm, \ 47 if (!global || sm->machine ## _state != machine ## _ ## state) { \ 48 sm->changed = true; \ 52 sm->machine ## _state = machine ## _ ## state; 66 if (!global || sm->data ## _ ## state != machine ## _ ## _state) { \ 67 sm->changed = true; \ 71 sm->data ## _ ## state = machine ## _ ## _state; 84 if (!global || sm->data ## _ ## state != machine ## _ ## _state) { \ 85 sm->changed = true; \ 90 sm->data ## _ ## state = machine ## _ ## _state [all...] |
| /src/external/gpl3/gcc.old/dist/gcc/config/nvptx/ |
| gen-opt.sh | 21 nvptx_sm_def="$1/nvptx-sm.def" 27 for sm in $sms; do 28 last="$sm" 33 ; Generated automatically by gen-opt.sh from nvptx-sm.def. 53 for sm in $sms; do 56 Enum(ptx_isa) String(sm_$sm) Value(PTX_ISA_SM$sm) 59 if [ "$sm" == "$last" ]; then
|
| /src/external/cddl/osnet/dist/uts/common/fs/zfs/ |
| space_map.c | 60 space_map_load(space_map_t *sm, range_tree_t *rt, maptype_t maptype) 66 ASSERT(MUTEX_HELD(sm->sm_lock)); 68 end = space_map_length(sm); 69 space = space_map_allocated(sm); 74 range_tree_add(rt, sm->sm_start, sm->sm_size); 75 space = sm->sm_size - space; 78 bufsize = MAX(sm->sm_blksz, SPA_MINBLOCKSIZE); 81 mutex_exit(sm->sm_lock); 83 dmu_prefetch(sm->sm_os, space_map_object(sm), 0, bufsize 360 space_map_t *sm; local [all...] |
| /src/sys/secmodel/ |
| secmodel.c | 76 secmodel_t sm; local 78 sm = kmem_alloc(sizeof(*sm), KM_SLEEP); 80 sm->sm_id = id; 81 sm->sm_name = name; 82 sm->sm_behavior = behavior; 83 sm->sm_eval = eval; 84 sm->sm_setinfo = setinfo; 86 err = secmodel_plug(sm); 90 kmem_free(sm, sizeof(*sm)) 239 secmodel_t sm; local [all...] |
| /src/external/bsd/wpa/dist/src/ap/ |
| wpa_auth.c | 40 #define STATE_MACHINE_ADDR wpa_auth_get_spa(sm) 44 static int wpa_sm_step(struct wpa_state_machine *sm); 48 static int wpa_aead_decrypt(struct wpa_state_machine *sm, struct wpa_ptk *ptk, 50 static struct wpabuf * fils_prepare_plainbuf(struct wpa_state_machine *sm, 56 static void wpa_request_new_ptk(struct wpa_state_machine *sm); 61 static int wpa_derive_ptk(struct wpa_state_machine *sm, const u8 *snonce, 72 static int ieee80211w_kde_len(struct wpa_state_machine *sm); 73 static u8 * ieee80211w_kde_add(struct wpa_state_machine *sm, u8 *pos); 89 static const u8 * wpa_auth_get_aa(const struct wpa_state_machine *sm) 92 if (sm->mld_assoc_link_id >= 0 603 struct wpa_state_machine *sm = timeout_ctx; local 940 struct wpa_state_machine *sm; local 1948 struct wpa_state_machine *sm = timeout_ctx; local 5913 struct wpa_state_machine *sm = eloop_ctx; local [all...] |