Searched defs:bssid (Results 26 - 50 of 154) sorted by relevance

1234567

/external/wpa_supplicant_8/hostapd/src/p2p/
H A Dp2p_invitation.c180 u8 group_bssid[ETH_ALEN], *bssid; local
366 bssid = group_bssid;
368 bssid = NULL;
370 bssid, reg_class, channel, channels);
634 const u8 *bssid, const u8 *ssid, size_t ssid_len,
643 if (bssid)
644 p2p_dbg(p2p, "Invitation for BSSID " MACSTR, MAC2STR(bssid));
697 p2p->inv_bssid_set = bssid != NULL;
698 if (bssid)
699 os_memcpy(p2p->inv_bssid, bssid, ETH_ALE
633 p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role, const u8 *bssid, const u8 *ssid, size_t ssid_len, unsigned int force_freq, const u8 *go_dev_addr, int persistent_group, unsigned int pref_freq, int dev_pw_id) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dpmksa_cache.c96 pmksa_cache_get(pmksa, pmksa->sm->bssid, NULL, NULL);
426 * @bssid: BSSID for PMKSA or %NULL if not used
432 const u8 *bssid, void *network_ctx,
441 if (bssid)
443 MAC2STR(bssid));
449 if (sm->cur_pmksa == NULL && bssid)
450 sm->cur_pmksa = pmksa_cache_get(pmksa, bssid, NULL,
452 if (sm->cur_pmksa == NULL && try_opportunistic && bssid)
455 bssid);
431 pmksa_cache_set_current(struct wpa_sm *sm, const u8 *pmkid, const u8 *bssid, void *network_ctx, int try_opportunistic) argument
H A Dpreauth.c28 u8 bssid[ETH_ALEN]; member in struct:rsn_pmksa_candidate
326 p = pmksa_cache_get(sm->pmksa, candidate->bssid, NULL, NULL);
327 if (os_memcmp(sm->bssid, candidate->bssid, ETH_ALEN) != 0 &&
332 MAC2STR(candidate->bssid));
334 rsn_preauth_init(sm, candidate->bssid,
341 MAC2STR(candidate->bssid));
345 wpa_sm_add_pmkid(sm, candidate->bssid, p->pmkid);
359 * @bssid: BSSID (authenticator address) of the candidate
367 void pmksa_candidate_add(struct wpa_sm *sm, const u8 *bssid, argument
469 rsn_preauth_scan_result(struct wpa_sm *sm, const u8 *bssid, const u8 *ssid, const u8 *rsn) argument
[all...]
H A Dwpa_ft.c46 sm->bssid, sm->pmk_r1_name, ptk, ptk_name,
315 static int wpa_ft_install_ptk(struct wpa_sm *sm, const u8 *bssid) argument
332 if (wpa_sm_set_key(sm, alg, bssid, 0, 1, null_rsc,
360 NULL, 0, sm->bssid, NULL, 0, mdie);
382 const u8 *bssid; local
477 bssid = target_ap;
479 sm->own_addr, bssid, sm->pmk_r1_name, &sm->ptk,
485 sm->ptk.kck, sm->ptk.kck_len, bssid,
494 wpa_sm_mark_authenticated(sm, bssid);
495 ret = wpa_ft_install_ptk(sm, bssid);
[all...]
/external/wpa_supplicant_8/src/common/
H A Dprivsep_commands.h33 u8 bssid[ETH_ALEN]; member in struct:privsep_cmd_associate
/external/wpa_supplicant_8/src/p2p/
H A Dp2p_invitation.c180 u8 group_bssid[ETH_ALEN], *bssid; local
366 bssid = group_bssid;
368 bssid = NULL;
370 bssid, reg_class, channel, channels);
634 const u8 *bssid, const u8 *ssid, size_t ssid_len,
643 if (bssid)
644 p2p_dbg(p2p, "Invitation for BSSID " MACSTR, MAC2STR(bssid));
697 p2p->inv_bssid_set = bssid != NULL;
698 if (bssid)
699 os_memcpy(p2p->inv_bssid, bssid, ETH_ALE
633 p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role, const u8 *bssid, const u8 *ssid, size_t ssid_len, unsigned int force_freq, const u8 *go_dev_addr, int persistent_group, unsigned int pref_freq, int dev_pw_id) argument
[all...]
/external/wpa_supplicant_8/src/rsn_supp/
H A Dpmksa_cache.c96 pmksa_cache_get(pmksa, pmksa->sm->bssid, NULL, NULL);
426 * @bssid: BSSID for PMKSA or %NULL if not used
432 const u8 *bssid, void *network_ctx,
441 if (bssid)
443 MAC2STR(bssid));
449 if (sm->cur_pmksa == NULL && bssid)
450 sm->cur_pmksa = pmksa_cache_get(pmksa, bssid, NULL,
452 if (sm->cur_pmksa == NULL && try_opportunistic && bssid)
455 bssid);
431 pmksa_cache_set_current(struct wpa_sm *sm, const u8 *pmkid, const u8 *bssid, void *network_ctx, int try_opportunistic) argument
H A Dpreauth.c28 u8 bssid[ETH_ALEN]; member in struct:rsn_pmksa_candidate
326 p = pmksa_cache_get(sm->pmksa, candidate->bssid, NULL, NULL);
327 if (os_memcmp(sm->bssid, candidate->bssid, ETH_ALEN) != 0 &&
332 MAC2STR(candidate->bssid));
334 rsn_preauth_init(sm, candidate->bssid,
341 MAC2STR(candidate->bssid));
345 wpa_sm_add_pmkid(sm, candidate->bssid, p->pmkid);
359 * @bssid: BSSID (authenticator address) of the candidate
367 void pmksa_candidate_add(struct wpa_sm *sm, const u8 *bssid, argument
469 rsn_preauth_scan_result(struct wpa_sm *sm, const u8 *bssid, const u8 *ssid, const u8 *rsn) argument
[all...]
H A Dwpa_ft.c46 sm->bssid, sm->pmk_r1_name, ptk, ptk_name,
315 static int wpa_ft_install_ptk(struct wpa_sm *sm, const u8 *bssid) argument
332 if (wpa_sm_set_key(sm, alg, bssid, 0, 1, null_rsc,
360 NULL, 0, sm->bssid, NULL, 0, mdie);
382 const u8 *bssid; local
477 bssid = target_ap;
479 sm->own_addr, bssid, sm->pmk_r1_name, &sm->ptk,
485 sm->ptk.kck, sm->ptk.kck_len, bssid,
494 wpa_sm_mark_authenticated(sm, bssid);
495 ret = wpa_ft_install_ptk(sm, bssid);
[all...]
/external/wpa_supplicant_8/wpa_supplicant/
H A Dbss.h68 u8 bssid[ETH_ALEN]; member in struct:wpa_bss
115 struct wpa_bss * wpa_bss_get(struct wpa_supplicant *wpa_s, const u8 *bssid,
118 const u8 *bssid);
120 const u8 *bssid);
H A Dp2p_supplicant.h111 int wpas_p2p_deauth_notif(struct wpa_supplicant *wpa_s, const u8 *bssid,
114 void wpas_p2p_disassoc_notif(struct wpa_supplicant *wpa_s, const u8 *bssid,
158 const u8 *dst, const u8 *bssid,
167 const u8 *sa, const u8 *bssid,
212 const u8 *dst, const u8 *bssid,
236 const u8 *sa, const u8 *bssid,
210 wpas_p2p_probe_req_rx(struct wpa_supplicant *wpa_s, const u8 *addr, const u8 *dst, const u8 *bssid, const u8 *ie, size_t ie_len, unsigned int rx_freq, int ssi_signal) argument
234 wpas_p2p_rx_action(struct wpa_supplicant *wpa_s, const u8 *da, const u8 *sa, const u8 *bssid, u8 category, const u8 *data, size_t len, int freq) argument
H A Dbgscan_learn.c24 u8 bssid[ETH_ALEN]; member in struct:bgscan_learn_bss
52 static int bssid_in_array(u8 *array, size_t array_len, const u8 *bssid) argument
60 if (os_memcmp(array + i * ETH_ALEN, bssid, ETH_ALEN) == 0)
69 const u8 *bssid)
73 if (os_memcmp(bss->bssid, bssid, ETH_ALEN) == 0)
75 if (bssid_in_array(bss->neigh, bss->num_neigh, bssid))
82 os_memcpy(n + bss->num_neigh * ETH_ALEN, bssid, ETH_ALEN);
89 struct bgscan_learn_data *data, const u8 *bssid)
94 if (os_memcmp(bss->bssid, bssi
68 bgscan_learn_add_neighbor(struct bgscan_learn_bss *bss, const u8 *bssid) argument
88 bgscan_learn_get_bss( struct bgscan_learn_data *data, const u8 *bssid) argument
490 u8 bssid[MAX_BSS * ETH_ALEN]; local
[all...]
H A Dgas_query.c207 const u8 *src, const u8 *bssid,
250 os_memcmp(addr, wpa_s->bssid, ETH_ALEN) != 0)
429 * @bssid: BSSID of the Action frame
437 const u8 *bssid, u8 categ, const u8 *data, size_t len,
451 pmf = pmf_in_use(gas->wpa_s, bssid);
205 gas_query_tx_status(struct wpa_supplicant *wpa_s, unsigned int freq, const u8 *dst, const u8 *src, const u8 *bssid, const u8 *data, size_t data_len, enum offchannel_send_action_result result) argument
436 gas_query_rx(struct gas_query *gas, const u8 *da, const u8 *sa, const u8 *bssid, u8 categ, const u8 *data, size_t len, int freq) argument
H A Dpreauth_test.c120 static int wpa_supplicant_get_bssid(void *wpa_s, u8 *bssid) argument
147 const u8 *bssid, const u8 *pmkid)
155 const u8 *bssid, const u8 *pmkid)
276 u8 bssid[ETH_ALEN]; local
293 if (hwaddr_aton(argv[2], bssid)) {
335 if (rsn_preauth_init(wpa_s.wpa, bssid, &wpa_s.conf->ssid->eap))
347 ret = pmksa_cache_set_current(wpa_s.wpa, NULL, bssid, NULL, 0)
146 wpa_supplicant_add_pmkid(void *wpa_s, const u8 *bssid, const u8 *pmkid) argument
154 wpa_supplicant_remove_pmkid(void *wpa_s, const u8 *bssid, const u8 *pmkid) argument
/external/wpa_supplicant_8/wpa_supplicant/dbus/
H A Ddbus_old.c27 * @bssid: (out) the scanned bssid this object path refers to, if any
34 char **bssid)
68 } else if (bssid && bssid_part) {
73 *bssid = os_strdup(bssid_name);
75 *bssid = NULL;
116 * wpas_dbus_new_invalid_bssid_error - Return a new invalid bssid error message
120 * Convenience function to create and return an invalid bssid error
165 * @bssid: bssid o
33 wpas_dbus_decompose_object_path(const char *path, char **network, char **bssid) argument
174 u8 bssid[ETH_ALEN]; local
212 char *bssid = NULL; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/common/
H A Dprivsep_commands.h33 u8 bssid[ETH_ALEN]; member in struct:privsep_cmd_associate
/external/wpa_supplicant_8/wpa_supplicant/src/p2p/
H A Dp2p_invitation.c180 u8 group_bssid[ETH_ALEN], *bssid; local
366 bssid = group_bssid;
368 bssid = NULL;
370 bssid, reg_class, channel, channels);
634 const u8 *bssid, const u8 *ssid, size_t ssid_len,
643 if (bssid)
644 p2p_dbg(p2p, "Invitation for BSSID " MACSTR, MAC2STR(bssid));
697 p2p->inv_bssid_set = bssid != NULL;
698 if (bssid)
699 os_memcpy(p2p->inv_bssid, bssid, ETH_ALE
633 p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role, const u8 *bssid, const u8 *ssid, size_t ssid_len, unsigned int force_freq, const u8 *go_dev_addr, int persistent_group, unsigned int pref_freq, int dev_pw_id) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dpmksa_cache.c96 pmksa_cache_get(pmksa, pmksa->sm->bssid, NULL, NULL);
426 * @bssid: BSSID for PMKSA or %NULL if not used
432 const u8 *bssid, void *network_ctx,
441 if (bssid)
443 MAC2STR(bssid));
449 if (sm->cur_pmksa == NULL && bssid)
450 sm->cur_pmksa = pmksa_cache_get(pmksa, bssid, NULL,
452 if (sm->cur_pmksa == NULL && try_opportunistic && bssid)
455 bssid);
431 pmksa_cache_set_current(struct wpa_sm *sm, const u8 *pmkid, const u8 *bssid, void *network_ctx, int try_opportunistic) argument
H A Dpreauth.c28 u8 bssid[ETH_ALEN]; member in struct:rsn_pmksa_candidate
326 p = pmksa_cache_get(sm->pmksa, candidate->bssid, NULL, NULL);
327 if (os_memcmp(sm->bssid, candidate->bssid, ETH_ALEN) != 0 &&
332 MAC2STR(candidate->bssid));
334 rsn_preauth_init(sm, candidate->bssid,
341 MAC2STR(candidate->bssid));
345 wpa_sm_add_pmkid(sm, candidate->bssid, p->pmkid);
359 * @bssid: BSSID (authenticator address) of the candidate
367 void pmksa_candidate_add(struct wpa_sm *sm, const u8 *bssid, argument
469 rsn_preauth_scan_result(struct wpa_sm *sm, const u8 *bssid, const u8 *ssid, const u8 *rsn) argument
[all...]
H A Dwpa_ft.c46 sm->bssid, sm->pmk_r1_name, ptk, ptk_name,
315 static int wpa_ft_install_ptk(struct wpa_sm *sm, const u8 *bssid) argument
332 if (wpa_sm_set_key(sm, alg, bssid, 0, 1, null_rsc,
360 NULL, 0, sm->bssid, NULL, 0, mdie);
382 const u8 *bssid; local
477 bssid = target_ap;
479 sm->own_addr, bssid, sm->pmk_r1_name, &sm->ptk,
485 sm->ptk.kck, sm->ptk.kck_len, bssid,
494 wpa_sm_mark_authenticated(sm, bssid);
495 ret = wpa_ft_install_ptk(sm, bssid);
[all...]
/external/wpa_supplicant_8/hostapd/src/drivers/
H A Ddriver_roboswitch.c190 static int wpa_driver_roboswitch_get_bssid(void *priv, u8 *bssid) argument
193 os_memcpy(bssid, pae_group_addr, ETH_ALEN);
/external/wpa_supplicant_8/src/drivers/
H A Ddriver_roboswitch.c190 static int wpa_driver_roboswitch_get_bssid(void *priv, u8 *bssid) argument
193 os_memcpy(bssid, pae_group_addr, ETH_ALEN);
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/
H A Ddriver_roboswitch.c190 static int wpa_driver_roboswitch_get_bssid(void *priv, u8 *bssid) argument
193 os_memcpy(bssid, pae_group_addr, ETH_ALEN);
/external/wpa_supplicant_8/wpa_supplicant/tests/
H A Dtest_wpa.c44 static int supp_get_bssid(void *ctx, u8 *bssid) argument
48 os_memcpy(bssid, wpa->auth_addr, ETH_ALEN);
/external/wpa_supplicant_8/hostapd/src/ap/
H A Ddrv_callbacks.c620 const u8 *bssid, const u8 *ie, size_t ie_len,
632 sa, da, bssid, ie, ie_len,
646 const u8 *bssid,
696 wpa_ft_process_auth(sta->wpa_sm, rx_auth->bssid,
762 const u8 *bssid)
766 if (bssid == NULL)
768 if (bssid[0] == 0xff && bssid[1] == 0xff && bssid[2] == 0xff &&
769 bssid[
619 hostapd_probe_req_rx(struct hostapd_data *hapd, const u8 *sa, const u8 *da, const u8 *bssid, const u8 *ie, size_t ie_len, int ssi_signal) argument
645 hostapd_notify_auth_ft_finish(void *ctx, const u8 *dst, const u8 *bssid, u16 auth_transaction, u16 status, const u8 *ies, size_t ies_len) argument
761 get_hapd_bssid(struct hostapd_iface *iface, const u8 *bssid) argument
781 hostapd_rx_from_unknown_sta(struct hostapd_data *hapd, const u8 *bssid, const u8 *addr, int wds) argument
797 const u8 *bssid; local
[all...]

Completed in 310 milliseconds

1234567