HomeSort by: relevance | last modified time | path
    Searched refs:sm (Results 1 - 25 of 385) sorted by relevancy

1 2 3 4 5 6 7 8 91011>>

  /src/external/bsd/wpa/dist/src/pae/
ieee802_1x_cp.c 96 static int changed_cipher(struct ieee802_1x_cp_sm *sm)
98 return sm->confidentiality_offset != sm->cipher_offset ||
99 sm->current_cipher_suite != sm->cipher_suite;
103 static int changed_connect(struct ieee802_1x_cp_sm *sm)
105 return sm->connect != SECURE || sm->chgd_server || changed_cipher(sm);
113 sm->controlled_port_enabled = false
452 struct ieee802_1x_cp_sm *sm; local
524 struct ieee802_1x_cp_sm *sm = eloop_ctx; local
552 struct ieee802_1x_cp_sm *sm = cp_ctx; local
563 struct ieee802_1x_cp_sm *sm = (struct ieee802_1x_cp_sm *)cp_ctx; local
574 struct ieee802_1x_cp_sm *sm = cp_ctx; local
585 struct ieee802_1x_cp_sm *sm = cp_ctx; local
596 struct ieee802_1x_cp_sm *sm = cp_ctx; local
607 struct ieee802_1x_cp_sm *sm = cp_ctx; local
617 struct ieee802_1x_cp_sm *sm = cp_ctx; local
627 struct ieee802_1x_cp_sm *sm = cp_ctx; local
637 struct ieee802_1x_cp_sm *sm = cp_ctx; local
648 struct ieee802_1x_cp_sm *sm = cp_ctx; local
658 struct ieee802_1x_cp_sm *sm = cp_ctx; local
668 struct ieee802_1x_cp_sm *sm = cp_ctx; local
678 struct ieee802_1x_cp_sm *sm = cp_ctx; local
688 struct ieee802_1x_cp_sm *sm = cp_ctx; local
698 struct ieee802_1x_cp_sm *sm = cp_ctx; local
717 struct ieee802_1x_cp_sm *sm = cp_ctx; local
726 struct ieee802_1x_cp_sm *sm = eloop_ctx; local
735 struct ieee802_1x_cp_sm *sm = eloop_ctx; local
    [all...]
  /src/external/bsd/wpa/dist/src/eap_server/
eap_server.c 28 static int eap_sm_calculateTimeout(struct eap_sm *sm, int retransCount,
31 static void eap_sm_parseEapResp(struct eap_sm *sm, const struct wpabuf *resp);
33 static struct wpabuf * eap_sm_buildSuccess(struct eap_sm *sm, u8 id);
34 static struct wpabuf * eap_sm_buildFailure(struct eap_sm *sm, u8 id);
35 static int eap_sm_nextId(struct eap_sm *sm, int id);
36 static void eap_sm_Policy_update(struct eap_sm *sm, const u8 *nak_list,
38 static enum eap_type eap_sm_Policy_getNextMethod(struct eap_sm *sm,
40 static int eap_sm_Policy_getDecision(struct eap_sm *sm);
41 static bool eap_sm_Policy_doPickUp(struct eap_sm *sm, enum eap_type method);
44 static int eap_get_erp_send_reauth_start(struct eap_sm *sm)
1858 struct eap_sm *sm; local
    [all...]
eap_server_gtc.c 21 static void * eap_gtc_init(struct eap_sm *sm)
31 if (sm->m && sm->m->vendor == EAP_VENDOR_IETF &&
32 sm->m->method == EAP_TYPE_FAST) {
43 static void eap_gtc_reset(struct eap_sm *sm, void *priv)
50 static struct wpabuf * eap_gtc_buildReq(struct eap_sm *sm, void *priv, u8 id)
77 static bool eap_gtc_check(struct eap_sm *sm, void *priv,
93 static void eap_gtc_process(struct eap_sm *sm, void *priv,
131 if (sm->identity && sm->require_identity_match &
    [all...]
  /src/external/bsd/wpa/dist/src/eapol_supp/
eapol_supp_sm.c 152 static void eapol_sm_txLogoff(struct eapol_sm *sm);
153 static void eapol_sm_txStart(struct eapol_sm *sm);
154 static void eapol_sm_processKey(struct eapol_sm *sm);
155 static void eapol_sm_getSuppRsp(struct eapol_sm *sm);
156 static void eapol_sm_txSuppRsp(struct eapol_sm *sm);
157 static void eapol_sm_abortSupp(struct eapol_sm *sm);
158 static void eapol_sm_abort_cached(struct eapol_sm *sm);
160 static void eapol_sm_set_port_authorized(struct eapol_sm *sm);
161 static void eapol_sm_set_port_unauthorized(struct eapol_sm *sm);
168 struct eapol_sm *sm = timeout_ctx local
1857 struct eapol_sm *sm = ctx; local
1864 struct eapol_sm *sm = ctx; local
1874 struct eapol_sm *sm = ctx; local
1906 struct eapol_sm *sm = ctx; local
1946 struct eapol_sm *sm = ctx; local
1960 struct eapol_sm *sm = ctx; local
1976 struct eapol_sm *sm = ctx; local
1987 struct eapol_sm *sm = ctx; local
2000 struct eapol_sm *sm = ctx; local
2017 struct eapol_sm *sm = ctx; local
2029 struct eapol_sm *sm = ctx; local
2038 struct eapol_sm *sm = ctx; local
2047 struct eapol_sm *sm = ctx; local
2058 struct eapol_sm *sm = ctx; local
2069 struct eapol_sm *sm = ctx; local
2080 struct eapol_sm *sm = ctx; local
2121 struct eapol_sm *sm; local
2222 struct eapol_sm *sm = ctx; local
    [all...]
eapol_supp_sm.h 331 void eapol_sm_deinit(struct eapol_sm *sm);
332 void eapol_sm_step(struct eapol_sm *sm);
333 int eapol_sm_get_status(struct eapol_sm *sm, char *buf, size_t buflen,
335 int eapol_sm_get_mib(struct eapol_sm *sm, char *buf, size_t buflen);
336 void eapol_sm_configure(struct eapol_sm *sm, int heldPeriod, int authPeriod,
338 int eapol_sm_rx_eapol(struct eapol_sm *sm, const u8 *src, const u8 *buf,
340 void eapol_sm_notify_tx_eapol_key(struct eapol_sm *sm);
341 void eapol_sm_notify_portEnabled(struct eapol_sm *sm, bool enabled);
342 void eapol_sm_notify_portValid(struct eapol_sm *sm, bool valid);
343 void eapol_sm_notify_eap_success(struct eapol_sm *sm, bool success)
    [all...]
  /src/external/bsd/wpa/dist/src/eapol_auth/
eapol_auth_sm.c 23 #define STATE_MACHINE_ADDR sm->addr
30 sm->eapol->cb.set_port_authorized(sm->eapol->conf.ctx, sm->sta, 1)
32 sm->eapol->cb.set_port_authorized(sm->eapol->conf.ctx, sm->sta, 0)
35 #define txCannedFail() eapol_auth_tx_canned_eap(sm, 0)
36 #define txCannedSuccess() eapol_auth_tx_canned_eap(sm, 1)
37 #define txReq() eapol_auth_tx_req(sm)
794 struct eapol_state_machine *sm; local
986 struct eapol_state_machine *sm = eloop_ctx; local
1031 struct eapol_state_machine *sm = ctx; local
1044 struct eapol_state_machine *sm = ctx; local
1052 struct eapol_state_machine *sm = ctx; local
1059 struct eapol_state_machine *sm = ctx; local
1067 struct eapol_state_machine *sm = ctx; local
1074 struct eapol_state_machine *sm = ctx; local
    [all...]
eapol_auth_dump.c 121 int eapol_auth_dump_state(struct eapol_state_machine *sm, char *buf,
132 sm->aWhile, sm->quietWhile, sm->reAuthWhen);
158 _SB(sm->authAbort),
159 _SB(sm->authFail),
160 port_state_txt(sm->authPortStatus),
161 _SB(sm->authStart),
162 _SB(sm->authTimeout),
163 _SB(sm->authSuccess)
    [all...]
  /src/external/gpl3/gcc/dist/gcc/config/nvptx/
gen-multilib-matches.sh 25 nvptx_sm_def="$1/nvptx-sm.def"
39 for sm in $sms; do
40 if [ x"sm_$sm" = x"$multilib_options_isa_default" ]; then
42 elif expr " $multilib_options_isa_list " : ".* sm_$sm " > /dev/null; then
49 sm_next_lower=$sm
53 echo ".=misa?sm_$sm"
55 echo "misa?sm_$sm_map=misa?sm_$sm"
gen-opt.sh 21 nvptx_sm_def="$1/nvptx-sm.def"
27 for sm in $sms; do
28 last="$sm"
33 ; Generated automatically by gen-opt.sh from nvptx-sm.def.
53 for sm in $sms; do
56 Enum(ptx_isa) String(sm_$sm) Value(PTX_ISA_SM$sm)
59 if [ "$sm" = "$last" ]; then
gen-omp-device-properties.sh 21 nvptx_sm_def="$1/nvptx-sm.def"
29 for sm in $sms; do
30 isa="$isa sm_$sm"
  /src/external/bsd/wpa/dist/src/rsn_supp/
preauth.h 16 void pmksa_candidate_free(struct wpa_sm *sm);
17 int rsn_preauth_init(struct wpa_sm *sm, const u8 *dst,
19 void rsn_preauth_deinit(struct wpa_sm *sm);
20 int rsn_preauth_scan_results(struct wpa_sm *sm);
21 void rsn_preauth_scan_result(struct wpa_sm *sm, const u8 *bssid,
23 void pmksa_candidate_add(struct wpa_sm *sm, const u8 *bssid,
25 void rsn_preauth_candidate_process(struct wpa_sm *sm);
26 int rsn_preauth_get_status(struct wpa_sm *sm, char *buf, size_t buflen,
28 int rsn_preauth_in_progress(struct wpa_sm *sm);
32 static inline void pmksa_candidate_free(struct wpa_sm *sm)
    [all...]
preauth.c 35 * @sm: Pointer to WPA state machine data from wpa_sm_init()
37 void pmksa_candidate_free(struct wpa_sm *sm)
41 if (sm == NULL)
44 dl_list_for_each_safe(entry, n, &sm->pmksa_candidates,
65 struct wpa_sm *sm = ctx; local
70 if (sm->preauth_eapol == NULL ||
71 is_zero_ether_addr(sm->preauth_bssid) ||
72 !ether_addr_equal(sm->preauth_bssid, src_addr)) {
79 eapol_sm_rx_eapol(sm->preauth_eapol, src_addr, buf, len,
88 struct wpa_sm *sm = ctx local
132 struct wpa_sm *sm = eloop_ctx; local
144 struct wpa_sm *sm = ctx; local
    [all...]
wpa_ft.c 29 static void wpa_ft_pasn_store_r1kh(struct wpa_sm *sm, const u8 *bssid);
31 static void wpa_ft_pasn_store_r1kh(struct wpa_sm *sm, const u8 *bssid)
37 int wpa_derive_ptk_ft(struct wpa_sm *sm, const unsigned char *src_addr,
42 int use_sha384 = wpa_key_mgmt_sha384(sm->key_mgmt);
47 if (sm->xxkey_len > 0) {
48 mpmk = sm->xxkey;
49 mpmk_len = sm->xxkey_len;
50 } else if (sm->cur_pmksa) {
51 mpmk = sm->cur_pmksa->pmk;
52 mpmk_len = sm->cur_pmksa->pmk_len
    [all...]
wpa.c 81 * @sm: Pointer to WPA state machine data from wpa_sm_init()
91 int wpa_eapol_key_send(struct wpa_sm *sm, struct wpa_ptk *ptk,
96 size_t mic_len = wpa_mic_len(sm->key_mgmt, sm->pmk_len);
100 MAC2STR(dest), ver, (int) mic_len, sm->key_mgmt);
101 if (is_zero_ether_addr(dest) && is_zero_ether_addr(sm->bssid)) {
106 if (wpa_sm_get_bssid(sm, sm->bssid) < 0) {
107 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG,
111 dest = sm->bssid
1124 struct wpa_sm *sm = eloop_ctx; local
1179 struct wpa_sm *sm = eloop_ctx; local
4064 struct wpa_sm *sm = ctx; local
4106 struct wpa_sm *sm = ctx; local
4115 struct wpa_sm *sm = ctx; local
4131 struct wpa_sm *sm; local
    [all...]
wpa.h 184 void wpa_sm_deinit(struct wpa_sm *sm);
185 void wpa_sm_notify_assoc(struct wpa_sm *sm, const u8 *bssid);
186 void wpa_sm_notify_disassoc(struct wpa_sm *sm);
187 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len,
189 void wpa_sm_set_pmk_from_pmksa(struct wpa_sm *sm);
190 void wpa_sm_set_fast_reauth(struct wpa_sm *sm, int fast_reauth);
191 void wpa_sm_set_scard_ctx(struct wpa_sm *sm, void *scard_ctx);
192 void wpa_sm_set_config(struct wpa_sm *sm, struct rsn_supp_config *config);
193 void wpa_sm_set_ssid(struct wpa_sm *sm, const u8 *ssid, size_t ssid_len);
194 void wpa_sm_set_own_addr(struct wpa_sm *sm, const u8 *addr)
    [all...]
wpa_i.h 235 static inline void wpa_sm_set_state(struct wpa_sm *sm, enum wpa_states state)
237 WPA_ASSERT(sm->ctx->set_state);
238 sm->ctx->set_state(sm->ctx->ctx, state);
241 static inline enum wpa_states wpa_sm_get_state(struct wpa_sm *sm)
243 WPA_ASSERT(sm->ctx->get_state);
244 return sm->ctx->get_state(sm->ctx->ctx);
247 static inline void wpa_sm_deauthenticate(struct wpa_sm *sm, u16 reason_code)
249 WPA_ASSERT(sm->ctx->deauthenticate)
    [all...]
  /src/external/bsd/wpa/dist/src/eap_peer/
eap.c 40 static bool eap_sm_allowMethod(struct eap_sm *sm, int vendor,
42 static struct wpabuf * eap_sm_buildNak(struct eap_sm *sm, int id);
43 static void eap_sm_processIdentity(struct eap_sm *sm,
45 static void eap_sm_processNotify(struct eap_sm *sm, const struct wpabuf *req);
47 static void eap_sm_parseEapReq(struct eap_sm *sm, const struct wpabuf *req);
52 static void eap_sm_request(struct eap_sm *sm, enum wpa_ctrl_req_type field,
57 static bool eapol_get_bool(struct eap_sm *sm, enum eapol_bool_var var)
59 return sm->eapol_cb->get_bool(sm->eapol_ctx, var);
63 static void eapol_set_bool(struct eap_sm *sm, enum eapol_bool_var var
2133 struct eap_sm *sm = ctx; local
2210 struct eap_sm *sm; local
    [all...]
eap_proxy.h 28 int eap_proxy_key_available(struct eap_proxy_sm *sm);
30 const u8 * eap_proxy_get_eapKeyData(struct eap_proxy_sm *sm, size_t *len);
32 struct wpabuf * eap_proxy_get_eapRespData(struct eap_proxy_sm *sm);
34 int eap_proxy_sm_step(struct eap_proxy_sm *sm, struct eap_sm *eap_sm);
40 int eap_proxy_sm_get_status(struct eap_proxy_sm *sm, char *buf, size_t buflen,
46 int eap_proxy_notify_config(struct eap_proxy_sm *sm,
49 u8 * eap_proxy_get_eap_session_id(struct eap_proxy_sm *sm, size_t *len);
51 u8 * eap_proxy_get_emsk(struct eap_proxy_sm *sm, size_t *len);
53 void eap_proxy_sm_abort(struct eap_proxy_sm *sm);
eap_proxy_dummy.c 27 int eap_proxy_key_available(struct eap_proxy_sm *sm)
33 const u8 * eap_proxy_get_eapKeyData(struct eap_proxy_sm *sm, size_t *len)
39 struct wpabuf * eap_proxy_get_eapRespData(struct eap_proxy_sm *sm)
45 int eap_proxy_sm_step(struct eap_proxy_sm *sm, struct eap_sm *eap_sm)
59 int eap_proxy_sm_get_status(struct eap_proxy_sm *sm, char *buf, size_t buflen,
73 int eap_proxy_notify_config(struct eap_proxy_sm *sm,
80 u8 * eap_proxy_get_eap_session_id(struct eap_proxy_sm *sm, size_t *len)
86 u8 * eap_proxy_get_emsk(struct eap_proxy_sm *sm, size_t *len)
92 void eap_proxy_sm_abort(struct eap_proxy_sm *sm)
eap.h 332 void eap_peer_sm_deinit(struct eap_sm *sm);
333 int eap_peer_sm_step(struct eap_sm *sm);
334 void eap_sm_abort(struct eap_sm *sm);
335 int eap_sm_get_status(struct eap_sm *sm, char *buf, size_t buflen,
337 const char * eap_sm_get_method_name(struct eap_sm *sm);
338 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, int encrypted);
339 void eap_sm_request_identity(struct eap_sm *sm);
340 void eap_sm_request_password(struct eap_sm *sm);
341 void eap_sm_request_new_password(struct eap_sm *sm);
342 void eap_sm_request_pin(struct eap_sm *sm);
    [all...]
  /src/external/bsd/wpa/dist/src/utils/
state_machine.h 33 static void sm_ ## machine ## _ ## state ## _Enter(STATE_MACHINE_DATA *sm, \
47 if (!global || sm->machine ## _state != machine ## _ ## state) { \
48 sm->changed = true; \
52 sm->machine ## _state = machine ## _ ## state;
66 if (!global || sm->data ## _ ## state != machine ## _ ## _state) { \
67 sm->changed = true; \
71 sm->data ## _ ## state = machine ## _ ## _state;
84 if (!global || sm->data ## _ ## state != machine ## _ ## _state) { \
85 sm->changed = true; \
90 sm->data ## _ ## state = machine ## _ ## _state
    [all...]
  /src/external/gpl3/gcc.old/dist/gcc/config/nvptx/
gen-opt.sh 21 nvptx_sm_def="$1/nvptx-sm.def"
27 for sm in $sms; do
28 last="$sm"
33 ; Generated automatically by gen-opt.sh from nvptx-sm.def.
53 for sm in $sms; do
56 Enum(ptx_isa) String(sm_$sm) Value(PTX_ISA_SM$sm)
59 if [ "$sm" == "$last" ]; then
  /src/external/cddl/osnet/dist/uts/common/fs/zfs/
space_map.c 60 space_map_load(space_map_t *sm, range_tree_t *rt, maptype_t maptype)
66 ASSERT(MUTEX_HELD(sm->sm_lock));
68 end = space_map_length(sm);
69 space = space_map_allocated(sm);
74 range_tree_add(rt, sm->sm_start, sm->sm_size);
75 space = sm->sm_size - space;
78 bufsize = MAX(sm->sm_blksz, SPA_MINBLOCKSIZE);
81 mutex_exit(sm->sm_lock);
83 dmu_prefetch(sm->sm_os, space_map_object(sm), 0, bufsize
360 space_map_t *sm; local
    [all...]
  /src/sys/secmodel/
secmodel.c 76 secmodel_t sm; local
78 sm = kmem_alloc(sizeof(*sm), KM_SLEEP);
80 sm->sm_id = id;
81 sm->sm_name = name;
82 sm->sm_behavior = behavior;
83 sm->sm_eval = eval;
84 sm->sm_setinfo = setinfo;
86 err = secmodel_plug(sm);
90 kmem_free(sm, sizeof(*sm))
239 secmodel_t sm; local
    [all...]
  /src/external/bsd/wpa/dist/src/ap/
wpa_auth.c 40 #define STATE_MACHINE_ADDR wpa_auth_get_spa(sm)
44 static int wpa_sm_step(struct wpa_state_machine *sm);
48 static int wpa_aead_decrypt(struct wpa_state_machine *sm, struct wpa_ptk *ptk,
50 static struct wpabuf * fils_prepare_plainbuf(struct wpa_state_machine *sm,
56 static void wpa_request_new_ptk(struct wpa_state_machine *sm);
61 static int wpa_derive_ptk(struct wpa_state_machine *sm, const u8 *snonce,
72 static int ieee80211w_kde_len(struct wpa_state_machine *sm);
73 static u8 * ieee80211w_kde_add(struct wpa_state_machine *sm, u8 *pos);
89 static const u8 * wpa_auth_get_aa(const struct wpa_state_machine *sm)
92 if (sm->mld_assoc_link_id >= 0
603 struct wpa_state_machine *sm = timeout_ctx; local
940 struct wpa_state_machine *sm; local
1948 struct wpa_state_machine *sm = timeout_ctx; local
5913 struct wpa_state_machine *sm = eloop_ctx; local
    [all...]

Completed in 36 milliseconds

1 2 3 4 5 6 7 8 91011>>