/external/wpa_supplicant_8/hostapd/src/p2p/ |
H A D | p2p_invitation.c | 180 u8 group_bssid[ETH_ALEN], *bssid; local 366 bssid = group_bssid; 368 bssid = NULL; 370 bssid, reg_class, channel, channels); 634 const u8 *bssid, const u8 *ssid, size_t ssid_len, 643 if (bssid) 644 p2p_dbg(p2p, "Invitation for BSSID " MACSTR, MAC2STR(bssid)); 697 p2p->inv_bssid_set = bssid != NULL; 698 if (bssid) 699 os_memcpy(p2p->inv_bssid, bssid, ETH_ALE 633 p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role, const u8 *bssid, const u8 *ssid, size_t ssid_len, unsigned int force_freq, const u8 *go_dev_addr, int persistent_group, unsigned int pref_freq, int dev_pw_id) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | pmksa_cache.c | 96 pmksa_cache_get(pmksa, pmksa->sm->bssid, NULL, NULL); 426 * @bssid: BSSID for PMKSA or %NULL if not used 432 const u8 *bssid, void *network_ctx, 441 if (bssid) 443 MAC2STR(bssid)); 449 if (sm->cur_pmksa == NULL && bssid) 450 sm->cur_pmksa = pmksa_cache_get(pmksa, bssid, NULL, 452 if (sm->cur_pmksa == NULL && try_opportunistic && bssid) 455 bssid); 431 pmksa_cache_set_current(struct wpa_sm *sm, const u8 *pmkid, const u8 *bssid, void *network_ctx, int try_opportunistic) argument
|
H A D | preauth.c | 28 u8 bssid[ETH_ALEN]; member in struct:rsn_pmksa_candidate 326 p = pmksa_cache_get(sm->pmksa, candidate->bssid, NULL, NULL); 327 if (os_memcmp(sm->bssid, candidate->bssid, ETH_ALEN) != 0 && 332 MAC2STR(candidate->bssid)); 334 rsn_preauth_init(sm, candidate->bssid, 341 MAC2STR(candidate->bssid)); 345 wpa_sm_add_pmkid(sm, candidate->bssid, p->pmkid); 359 * @bssid: BSSID (authenticator address) of the candidate 367 void pmksa_candidate_add(struct wpa_sm *sm, const u8 *bssid, argument 469 rsn_preauth_scan_result(struct wpa_sm *sm, const u8 *bssid, const u8 *ssid, const u8 *rsn) argument [all...] |
H A D | wpa_ft.c | 46 sm->bssid, sm->pmk_r1_name, ptk, ptk_name, 315 static int wpa_ft_install_ptk(struct wpa_sm *sm, const u8 *bssid) argument 332 if (wpa_sm_set_key(sm, alg, bssid, 0, 1, null_rsc, 360 NULL, 0, sm->bssid, NULL, 0, mdie); 382 const u8 *bssid; local 477 bssid = target_ap; 479 sm->own_addr, bssid, sm->pmk_r1_name, &sm->ptk, 485 sm->ptk.kck, sm->ptk.kck_len, bssid, 494 wpa_sm_mark_authenticated(sm, bssid); 495 ret = wpa_ft_install_ptk(sm, bssid); [all...] |
/external/wpa_supplicant_8/src/common/ |
H A D | privsep_commands.h | 33 u8 bssid[ETH_ALEN]; member in struct:privsep_cmd_associate
|
/external/wpa_supplicant_8/src/p2p/ |
H A D | p2p_invitation.c | 180 u8 group_bssid[ETH_ALEN], *bssid; local 366 bssid = group_bssid; 368 bssid = NULL; 370 bssid, reg_class, channel, channels); 634 const u8 *bssid, const u8 *ssid, size_t ssid_len, 643 if (bssid) 644 p2p_dbg(p2p, "Invitation for BSSID " MACSTR, MAC2STR(bssid)); 697 p2p->inv_bssid_set = bssid != NULL; 698 if (bssid) 699 os_memcpy(p2p->inv_bssid, bssid, ETH_ALE 633 p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role, const u8 *bssid, const u8 *ssid, size_t ssid_len, unsigned int force_freq, const u8 *go_dev_addr, int persistent_group, unsigned int pref_freq, int dev_pw_id) argument [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | pmksa_cache.c | 96 pmksa_cache_get(pmksa, pmksa->sm->bssid, NULL, NULL); 426 * @bssid: BSSID for PMKSA or %NULL if not used 432 const u8 *bssid, void *network_ctx, 441 if (bssid) 443 MAC2STR(bssid)); 449 if (sm->cur_pmksa == NULL && bssid) 450 sm->cur_pmksa = pmksa_cache_get(pmksa, bssid, NULL, 452 if (sm->cur_pmksa == NULL && try_opportunistic && bssid) 455 bssid); 431 pmksa_cache_set_current(struct wpa_sm *sm, const u8 *pmkid, const u8 *bssid, void *network_ctx, int try_opportunistic) argument
|
H A D | preauth.c | 28 u8 bssid[ETH_ALEN]; member in struct:rsn_pmksa_candidate 326 p = pmksa_cache_get(sm->pmksa, candidate->bssid, NULL, NULL); 327 if (os_memcmp(sm->bssid, candidate->bssid, ETH_ALEN) != 0 && 332 MAC2STR(candidate->bssid)); 334 rsn_preauth_init(sm, candidate->bssid, 341 MAC2STR(candidate->bssid)); 345 wpa_sm_add_pmkid(sm, candidate->bssid, p->pmkid); 359 * @bssid: BSSID (authenticator address) of the candidate 367 void pmksa_candidate_add(struct wpa_sm *sm, const u8 *bssid, argument 469 rsn_preauth_scan_result(struct wpa_sm *sm, const u8 *bssid, const u8 *ssid, const u8 *rsn) argument [all...] |
H A D | wpa_ft.c | 46 sm->bssid, sm->pmk_r1_name, ptk, ptk_name, 315 static int wpa_ft_install_ptk(struct wpa_sm *sm, const u8 *bssid) argument 332 if (wpa_sm_set_key(sm, alg, bssid, 0, 1, null_rsc, 360 NULL, 0, sm->bssid, NULL, 0, mdie); 382 const u8 *bssid; local 477 bssid = target_ap; 479 sm->own_addr, bssid, sm->pmk_r1_name, &sm->ptk, 485 sm->ptk.kck, sm->ptk.kck_len, bssid, 494 wpa_sm_mark_authenticated(sm, bssid); 495 ret = wpa_ft_install_ptk(sm, bssid); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | bss.h | 68 u8 bssid[ETH_ALEN]; member in struct:wpa_bss 115 struct wpa_bss * wpa_bss_get(struct wpa_supplicant *wpa_s, const u8 *bssid, 118 const u8 *bssid); 120 const u8 *bssid);
|
H A D | p2p_supplicant.h | 111 int wpas_p2p_deauth_notif(struct wpa_supplicant *wpa_s, const u8 *bssid, 114 void wpas_p2p_disassoc_notif(struct wpa_supplicant *wpa_s, const u8 *bssid, 158 const u8 *dst, const u8 *bssid, 167 const u8 *sa, const u8 *bssid, 212 const u8 *dst, const u8 *bssid, 236 const u8 *sa, const u8 *bssid, 210 wpas_p2p_probe_req_rx(struct wpa_supplicant *wpa_s, const u8 *addr, const u8 *dst, const u8 *bssid, const u8 *ie, size_t ie_len, unsigned int rx_freq, int ssi_signal) argument 234 wpas_p2p_rx_action(struct wpa_supplicant *wpa_s, const u8 *da, const u8 *sa, const u8 *bssid, u8 category, const u8 *data, size_t len, int freq) argument
|
H A D | bgscan_learn.c | 24 u8 bssid[ETH_ALEN]; member in struct:bgscan_learn_bss 52 static int bssid_in_array(u8 *array, size_t array_len, const u8 *bssid) argument 60 if (os_memcmp(array + i * ETH_ALEN, bssid, ETH_ALEN) == 0) 69 const u8 *bssid) 73 if (os_memcmp(bss->bssid, bssid, ETH_ALEN) == 0) 75 if (bssid_in_array(bss->neigh, bss->num_neigh, bssid)) 82 os_memcpy(n + bss->num_neigh * ETH_ALEN, bssid, ETH_ALEN); 89 struct bgscan_learn_data *data, const u8 *bssid) 94 if (os_memcmp(bss->bssid, bssi 68 bgscan_learn_add_neighbor(struct bgscan_learn_bss *bss, const u8 *bssid) argument 88 bgscan_learn_get_bss( struct bgscan_learn_data *data, const u8 *bssid) argument 490 u8 bssid[MAX_BSS * ETH_ALEN]; local [all...] |
H A D | gas_query.c | 207 const u8 *src, const u8 *bssid, 250 os_memcmp(addr, wpa_s->bssid, ETH_ALEN) != 0) 429 * @bssid: BSSID of the Action frame 437 const u8 *bssid, u8 categ, const u8 *data, size_t len, 451 pmf = pmf_in_use(gas->wpa_s, bssid); 205 gas_query_tx_status(struct wpa_supplicant *wpa_s, unsigned int freq, const u8 *dst, const u8 *src, const u8 *bssid, const u8 *data, size_t data_len, enum offchannel_send_action_result result) argument 436 gas_query_rx(struct gas_query *gas, const u8 *da, const u8 *sa, const u8 *bssid, u8 categ, const u8 *data, size_t len, int freq) argument
|
H A D | preauth_test.c | 120 static int wpa_supplicant_get_bssid(void *wpa_s, u8 *bssid) argument 147 const u8 *bssid, const u8 *pmkid) 155 const u8 *bssid, const u8 *pmkid) 276 u8 bssid[ETH_ALEN]; local 293 if (hwaddr_aton(argv[2], bssid)) { 335 if (rsn_preauth_init(wpa_s.wpa, bssid, &wpa_s.conf->ssid->eap)) 347 ret = pmksa_cache_set_current(wpa_s.wpa, NULL, bssid, NULL, 0) 146 wpa_supplicant_add_pmkid(void *wpa_s, const u8 *bssid, const u8 *pmkid) argument 154 wpa_supplicant_remove_pmkid(void *wpa_s, const u8 *bssid, const u8 *pmkid) argument
|
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
H A D | dbus_old.c | 27 * @bssid: (out) the scanned bssid this object path refers to, if any 34 char **bssid) 68 } else if (bssid && bssid_part) { 73 *bssid = os_strdup(bssid_name); 75 *bssid = NULL; 116 * wpas_dbus_new_invalid_bssid_error - Return a new invalid bssid error message 120 * Convenience function to create and return an invalid bssid error 165 * @bssid: bssid o 33 wpas_dbus_decompose_object_path(const char *path, char **network, char **bssid) argument 174 u8 bssid[ETH_ALEN]; local 212 char *bssid = NULL; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | privsep_commands.h | 33 u8 bssid[ETH_ALEN]; member in struct:privsep_cmd_associate
|
/external/wpa_supplicant_8/wpa_supplicant/src/p2p/ |
H A D | p2p_invitation.c | 180 u8 group_bssid[ETH_ALEN], *bssid; local 366 bssid = group_bssid; 368 bssid = NULL; 370 bssid, reg_class, channel, channels); 634 const u8 *bssid, const u8 *ssid, size_t ssid_len, 643 if (bssid) 644 p2p_dbg(p2p, "Invitation for BSSID " MACSTR, MAC2STR(bssid)); 697 p2p->inv_bssid_set = bssid != NULL; 698 if (bssid) 699 os_memcpy(p2p->inv_bssid, bssid, ETH_ALE 633 p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role, const u8 *bssid, const u8 *ssid, size_t ssid_len, unsigned int force_freq, const u8 *go_dev_addr, int persistent_group, unsigned int pref_freq, int dev_pw_id) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | pmksa_cache.c | 96 pmksa_cache_get(pmksa, pmksa->sm->bssid, NULL, NULL); 426 * @bssid: BSSID for PMKSA or %NULL if not used 432 const u8 *bssid, void *network_ctx, 441 if (bssid) 443 MAC2STR(bssid)); 449 if (sm->cur_pmksa == NULL && bssid) 450 sm->cur_pmksa = pmksa_cache_get(pmksa, bssid, NULL, 452 if (sm->cur_pmksa == NULL && try_opportunistic && bssid) 455 bssid); 431 pmksa_cache_set_current(struct wpa_sm *sm, const u8 *pmkid, const u8 *bssid, void *network_ctx, int try_opportunistic) argument
|
H A D | preauth.c | 28 u8 bssid[ETH_ALEN]; member in struct:rsn_pmksa_candidate 326 p = pmksa_cache_get(sm->pmksa, candidate->bssid, NULL, NULL); 327 if (os_memcmp(sm->bssid, candidate->bssid, ETH_ALEN) != 0 && 332 MAC2STR(candidate->bssid)); 334 rsn_preauth_init(sm, candidate->bssid, 341 MAC2STR(candidate->bssid)); 345 wpa_sm_add_pmkid(sm, candidate->bssid, p->pmkid); 359 * @bssid: BSSID (authenticator address) of the candidate 367 void pmksa_candidate_add(struct wpa_sm *sm, const u8 *bssid, argument 469 rsn_preauth_scan_result(struct wpa_sm *sm, const u8 *bssid, const u8 *ssid, const u8 *rsn) argument [all...] |
H A D | wpa_ft.c | 46 sm->bssid, sm->pmk_r1_name, ptk, ptk_name, 315 static int wpa_ft_install_ptk(struct wpa_sm *sm, const u8 *bssid) argument 332 if (wpa_sm_set_key(sm, alg, bssid, 0, 1, null_rsc, 360 NULL, 0, sm->bssid, NULL, 0, mdie); 382 const u8 *bssid; local 477 bssid = target_ap; 479 sm->own_addr, bssid, sm->pmk_r1_name, &sm->ptk, 485 sm->ptk.kck, sm->ptk.kck_len, bssid, 494 wpa_sm_mark_authenticated(sm, bssid); 495 ret = wpa_ft_install_ptk(sm, bssid); [all...] |
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_roboswitch.c | 190 static int wpa_driver_roboswitch_get_bssid(void *priv, u8 *bssid) argument 193 os_memcpy(bssid, pae_group_addr, ETH_ALEN);
|
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_roboswitch.c | 190 static int wpa_driver_roboswitch_get_bssid(void *priv, u8 *bssid) argument 193 os_memcpy(bssid, pae_group_addr, ETH_ALEN);
|
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_roboswitch.c | 190 static int wpa_driver_roboswitch_get_bssid(void *priv, u8 *bssid) argument 193 os_memcpy(bssid, pae_group_addr, ETH_ALEN);
|
/external/wpa_supplicant_8/wpa_supplicant/tests/ |
H A D | test_wpa.c | 44 static int supp_get_bssid(void *ctx, u8 *bssid) argument 48 os_memcpy(bssid, wpa->auth_addr, ETH_ALEN);
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | drv_callbacks.c | 620 const u8 *bssid, const u8 *ie, size_t ie_len, 632 sa, da, bssid, ie, ie_len, 646 const u8 *bssid, 696 wpa_ft_process_auth(sta->wpa_sm, rx_auth->bssid, 762 const u8 *bssid) 766 if (bssid == NULL) 768 if (bssid[0] == 0xff && bssid[1] == 0xff && bssid[2] == 0xff && 769 bssid[ 619 hostapd_probe_req_rx(struct hostapd_data *hapd, const u8 *sa, const u8 *da, const u8 *bssid, const u8 *ie, size_t ie_len, int ssi_signal) argument 645 hostapd_notify_auth_ft_finish(void *ctx, const u8 *dst, const u8 *bssid, u16 auth_transaction, u16 status, const u8 *ies, size_t ies_len) argument 761 get_hapd_bssid(struct hostapd_iface *iface, const u8 *bssid) argument 781 hostapd_rx_from_unknown_sta(struct hostapd_data *hapd, const u8 *bssid, const u8 *addr, int wds) argument 797 const u8 *bssid; local [all...] |