/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth_ft.c | 124 os_memcpy(pos, conf->r1_key_holder, FT_R1KH_ID_LEN); 344 os_memcpy(f.r1kh_id, sm->wpa_auth->conf.r1_key_holder, FT_R1KH_ID_LEN); 373 const u8 *r1kh = sm->wpa_auth->conf.r1_key_holder; 862 sm->wpa_auth->conf.r1_key_holder, sm->addr, 1079 if (os_memcmp_const(parse.r1kh_id, sm->wpa_auth->conf.r1_key_holder, 1086 sm->wpa_auth->conf.r1_key_holder, FT_R1KH_ID_LEN); 1486 if (os_memcmp_const(f.r1kh_id, wpa_auth->conf.r1_key_holder, 1568 if (os_memcmp_const(f.r1kh_id, wpa_auth->conf.r1_key_holder, 1573 MAC2STR(wpa_auth->conf.r1_key_holder));
|
H A D | ap_config.h | 330 u8 r1_key_holder[FT_R1KH_ID_LEN]; member in struct:hostapd_bss_config
|
H A D | wpa_auth.h | 166 u8 r1_key_holder[FT_R1KH_ID_LEN]; member in struct:wpa_auth_config
|
H A D | wpa_auth_glue.c | 69 os_memcpy(wconf->r1_key_holder, conf->r1_key_holder, FT_R1KH_ID_LEN);
|
H A D | hostapd.c | 954 if (is_zero_ether_addr(conf->r1_key_holder)) 955 os_memcpy(conf->r1_key_holder, hapd->own_addr, ETH_ALEN);
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth_ft.c | 124 os_memcpy(pos, conf->r1_key_holder, FT_R1KH_ID_LEN); 344 os_memcpy(f.r1kh_id, sm->wpa_auth->conf.r1_key_holder, FT_R1KH_ID_LEN); 373 const u8 *r1kh = sm->wpa_auth->conf.r1_key_holder; 862 sm->wpa_auth->conf.r1_key_holder, sm->addr, 1079 if (os_memcmp_const(parse.r1kh_id, sm->wpa_auth->conf.r1_key_holder, 1086 sm->wpa_auth->conf.r1_key_holder, FT_R1KH_ID_LEN); 1486 if (os_memcmp_const(f.r1kh_id, wpa_auth->conf.r1_key_holder, 1568 if (os_memcmp_const(f.r1kh_id, wpa_auth->conf.r1_key_holder, 1573 MAC2STR(wpa_auth->conf.r1_key_holder));
|
H A D | ap_config.h | 330 u8 r1_key_holder[FT_R1KH_ID_LEN]; member in struct:hostapd_bss_config
|
H A D | wpa_auth.h | 166 u8 r1_key_holder[FT_R1KH_ID_LEN]; member in struct:wpa_auth_config
|
H A D | wpa_auth_glue.c | 69 os_memcpy(wconf->r1_key_holder, conf->r1_key_holder, FT_R1KH_ID_LEN);
|
H A D | hostapd.c | 954 if (is_zero_ether_addr(conf->r1_key_holder)) 955 os_memcpy(conf->r1_key_holder, hapd->own_addr, ETH_ALEN);
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth_ft.c | 124 os_memcpy(pos, conf->r1_key_holder, FT_R1KH_ID_LEN); 344 os_memcpy(f.r1kh_id, sm->wpa_auth->conf.r1_key_holder, FT_R1KH_ID_LEN); 373 const u8 *r1kh = sm->wpa_auth->conf.r1_key_holder; 862 sm->wpa_auth->conf.r1_key_holder, sm->addr, 1079 if (os_memcmp_const(parse.r1kh_id, sm->wpa_auth->conf.r1_key_holder, 1086 sm->wpa_auth->conf.r1_key_holder, FT_R1KH_ID_LEN); 1486 if (os_memcmp_const(f.r1kh_id, wpa_auth->conf.r1_key_holder, 1568 if (os_memcmp_const(f.r1kh_id, wpa_auth->conf.r1_key_holder, 1573 MAC2STR(wpa_auth->conf.r1_key_holder));
|
H A D | ap_config.h | 330 u8 r1_key_holder[FT_R1KH_ID_LEN]; member in struct:hostapd_bss_config
|
H A D | wpa_auth.h | 166 u8 r1_key_holder[FT_R1KH_ID_LEN]; member in struct:wpa_auth_config
|
H A D | wpa_auth_glue.c | 69 os_memcpy(wconf->r1_key_holder, conf->r1_key_holder, FT_R1KH_ID_LEN);
|
H A D | hostapd.c | 954 if (is_zero_ether_addr(conf->r1_key_holder)) 955 os_memcpy(conf->r1_key_holder, hapd->own_addr, ETH_ALEN);
|
/external/wpa_supplicant_8/hostapd/ |
H A D | config_file.c | 2532 } else if (os_strcmp(buf, "r1_key_holder") == 0) { 2534 hexstr2bin(pos, bss->r1_key_holder, FT_R1KH_ID_LEN) != 0) { 2536 "Line %d: Invalid r1_key_holder '%s'",
|