/freebsd/contrib/wpa/src/eapol_auth/ |
H A D | eapol_auth_sm.c | 30 sm->eapol->cb.set_port_authorized(sm->eapol->conf.ctx, sm->sta, 1) 32 sm->eapol->cb.set_port_authorized(sm->eapol->conf.ctx, sm->sta, 0) 38 #define abortAuth() sm->eapol->cb.abort_auth(sm->eapol->conf.ctx, sm->sta) 39 #define txKey() sm->eapol->cb.tx_key(sm->eapol->conf.ctx, sm->sta) 49 static void eapol_auth_logger(struct eapol_authenticator *eapol, in eapol_auth_logger() argument 53 if (eapol->cb.logger == NULL) in eapol_auth_logger() 55 eapol->cb.logger(eapol->conf.ctx, addr, level, txt); in eapol_auth_logger() 60 static void eapol_auth_vlogger(struct eapol_authenticator *eapol, in eapol_auth_vlogger() argument 68 if (eapol->cb.logger == NULL) in eapol_auth_vlogger() 80 eapol_auth_logger(eapol, addr, level, format); in eapol_auth_vlogger() [all …]
|
H A D | eapol_auth_sm.h | 68 void eapol_auth_deinit(struct eapol_authenticator *eapol); 70 eapol_auth_alloc(struct eapol_authenticator *eapol, const u8 *addr,
|
H A D | eapol_auth_sm_i.h | 167 struct eapol_authenticator *eapol; member
|
/freebsd/contrib/wpa/src/ap/ |
H A D | pmksa_cache_auth.c | 145 struct eapol_state_machine *eapol) in pmksa_cache_from_eapol_data() argument 149 if (eapol == NULL) in pmksa_cache_from_eapol_data() 152 if (eapol->identity) { in pmksa_cache_from_eapol_data() 153 entry->identity = os_malloc(eapol->identity_len); in pmksa_cache_from_eapol_data() 155 entry->identity_len = eapol->identity_len; in pmksa_cache_from_eapol_data() 156 os_memcpy(entry->identity, eapol->identity, in pmksa_cache_from_eapol_data() 157 eapol->identity_len); in pmksa_cache_from_eapol_data() 161 if (eapol->radius_cui) in pmksa_cache_from_eapol_data() 162 entry->cui = wpabuf_dup(eapol->radius_cui); in pmksa_cache_from_eapol_data() 165 radius_copy_class(&entry->radius_class, &eapol->radius_class); in pmksa_cache_from_eapol_data() [all …]
|
H A D | pmksa_cache_auth.h | 59 struct eapol_state_machine *eapol, int akmp); 64 struct eapol_state_machine *eapol, int akmp); 73 struct eapol_state_machine *eapol);
|
H A D | ieee802_11_auth.c | 51 u8 *eapol; member 109 os_free(query->eapol); in hostapd_acl_query_free() 184 if (query->eapol && in hostapd_radius_acl_query() 188 query->eapol, query->eapol_len)) { in hostapd_radius_acl_query() 723 const u8 *eapol, size_t eapol_len) in hostapd_acl_req_radius_psk() argument 737 if (eapol) { in hostapd_acl_req_radius_psk() 738 query->eapol = os_memdup(eapol, eapol_len); in hostapd_acl_req_radius_psk()
|
H A D | ieee802_1x.c | 309 struct eapol_authenticator *eapol = hapd->eapol_auth; in ieee802_1x_tx_key() local 325 if (eapol->default_wep_key) { in ieee802_1x_tx_key() 326 ieee802_1x_tx_key_one(hapd, sta, eapol->default_wep_key_idx, 1, in ieee802_1x_tx_key() 327 eapol->default_wep_key, in ieee802_1x_tx_key() 2221 struct eapol_authenticator *eapol = hapd->eapol_auth; in ieee802_1x_rekey_broadcast() local 2226 os_free(eapol->default_wep_key); in ieee802_1x_rekey_broadcast() 2227 eapol->default_wep_key = os_malloc(hapd->conf->default_wep_key_len); in ieee802_1x_rekey_broadcast() 2228 if (!eapol->default_wep_key || in ieee802_1x_rekey_broadcast() 2229 random_get_bytes(eapol->default_wep_key, in ieee802_1x_rekey_broadcast() 2232 os_free(eapol->default_wep_key); in ieee802_1x_rekey_broadcast() [all …]
|
H A D | ieee802_11_auth.h | 41 const u8 *eapol, size_t eapol_len);
|
H A D | wpa_auth.h | 372 const u8 *eapol, size_t eapol_len); 477 int session_timeout, struct eapol_state_machine *eapol); 481 struct eapol_state_machine *eapol);
|
H A D | wpa_auth_glue.c | 1509 const u8 *eapol, size_t eapol_len) in hostapd_request_radius_psk() argument 1516 wpa_hexdump(MSG_DEBUG, "EAPOL", eapol, eapol_len); in hostapd_request_radius_psk() 1517 hostapd_acl_req_radius_psk(hapd, addr, key_mgmt, anonce, eapol, in hostapd_request_radius_psk()
|
/freebsd/contrib/wpa/wpa_supplicant/ |
H A D | eapol_test.c | 372 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { in eapol_test_compare_pmk() 381 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) { in eapol_test_compare_pmk() 399 sess_id = eapol_sm_get_session_id(e->wpa_s->eapol, &sess_id_len); in eapol_test_compare_pmk() 425 static void eapol_sm_cb(struct eapol_sm *eapol, enum eapol_supp_result result, in eapol_sm_cb() argument 614 wpa_s->eapol = eapol_sm_init(ctx); in test_eapol() 615 if (wpa_s->eapol == NULL) { in test_eapol() 647 eapol_sm_notify_config(wpa_s->eapol, &ssid->eap, &eapol_conf); in test_eapol() 648 eapol_sm_register_scard_ctx(wpa_s->eapol, wpa_s->scard); in test_eapol() 651 eapol_sm_notify_portValid(wpa_s->eapol, false); in test_eapol() 653 eapol_sm_notify_portEnabled(wpa_s->eapol, true); in test_eapol() [all …]
|
H A D | pasn_supplicant.c | 437 eapol_sm_notify_eap_success(pasn->eapol, false); in wpas_pasn_initiate_eapol() 438 eapol_sm_notify_eap_fail(pasn->eapol, false); in wpas_pasn_initiate_eapol() 439 eapol_sm_notify_portControl(pasn->eapol, Auto); in wpas_pasn_initiate_eapol() 445 eapol_sm_notify_config(pasn->eapol, &ssid->eap, &eapol_conf); in wpas_pasn_initiate_eapol() 619 pasn->eapol = wpa_s->eapol; in wpas_pasn_auth_start_cb()
|
H A D | wpa_supplicant.c | 325 eapol_sm_notify_portControl(wpa_s->eapol, ForceAuthorized); in wpa_supplicant_initiate_eapol() 326 eapol_sm_notify_eap_success(wpa_s->eapol, true); in wpa_supplicant_initiate_eapol() 327 eapol_sm_notify_eap_fail(wpa_s->eapol, false); in wpa_supplicant_initiate_eapol() 332 eapol_sm_notify_eap_success(wpa_s->eapol, false); in wpa_supplicant_initiate_eapol() 333 eapol_sm_notify_eap_fail(wpa_s->eapol, false); in wpa_supplicant_initiate_eapol() 337 eapol_sm_notify_portControl(wpa_s->eapol, ForceAuthorized); in wpa_supplicant_initiate_eapol() 339 eapol_sm_notify_portControl(wpa_s->eapol, Auto); in wpa_supplicant_initiate_eapol() 381 eapol_sm_notify_config(wpa_s->eapol, &ssid->eap, &eapol_conf); in wpa_supplicant_initiate_eapol() 537 eapol_sm_register_scard_ctx(wpa_s->eapol, NULL); in wpa_supplicant_cleanup() 579 eapol_sm_deinit(wpa_s->eapol); in wpa_supplicant_cleanup() [all …]
|
H A D | wpas_glue.c | 283 static void wpa_supplicant_eapol_cb(struct eapol_sm *eapol, in wpa_supplicant_eapol_cb() argument 339 res = eapol_sm_get_key(eapol, buf, 2 * PMK_LEN); in wpa_supplicant_eapol_cb() 348 res = eapol_sm_get_key(eapol, pmk, pmk_len); in wpa_supplicant_eapol_cb() 354 res = eapol_sm_get_key(eapol, pmk, 16); in wpa_supplicant_eapol_cb() 1005 wpa_s->mnc_len = eapol_sm_get_eap_proxy_imsi(wpa_s->eapol, -1, in wpa_supplicant_eap_proxy_cb() 1223 wpa_s->eapol = eapol_sm_init(ctx); in wpa_supplicant_init_eapol() 1224 if (wpa_s->eapol == NULL) { in wpa_supplicant_init_eapol()
|
H A D | wpas_kay.c | 281 sm = wpa_s->eapol; in ieee802_1x_auth_get_msk() 331 sid = eapol_sm_get_session_id(wpa_s->eapol, &sid_len); in ieee802_1x_notify_create_actor()
|
H A D | events.c | 309 eapol_sm_invalidate_cached_session(wpa_s->eapol); in wpa_supplicant_select_config() 397 eapol_sm_notify_portEnabled(wpa_s->eapol, false); in wpa_supplicant_mark_disassoc() 398 eapol_sm_notify_portValid(wpa_s->eapol, false); in wpa_supplicant_mark_disassoc() 402 eapol_sm_notify_eap_success(wpa_s->eapol, false); in wpa_supplicant_mark_disassoc() 406 eapol_sm_notify_config(wpa_s->eapol, NULL, NULL); in wpa_supplicant_mark_disassoc() 465 eapol_sm_notify_pmkid_attempt(wpa_s->eapol); in wpa_find_assoc_pmkid() 581 eapol_sm_register_scard_ctx(wpa_s->eapol, wpa_s->scard); in wpa_supplicant_scard_init() 4285 eapol_sm_notify_portEnabled(wpa_s->eapol, false); in wpa_supplicant_event_assoc() 4286 eapol_sm_notify_portValid(wpa_s->eapol, false); in wpa_supplicant_event_assoc() 4292 eapol_sm_notify_eap_success(wpa_s->eapol, false); in wpa_supplicant_event_assoc() [all …]
|
H A D | ctrl_iface_udp.c | 360 eapol_sm_notify_ctrl_attached(wpa_s->eapol);
|
H A D | ctrl_iface.c | 507 eapol_sm_configure(wpa_s->eapol, in wpa_supplicant_ctrl_iface_set() 510 eapol_sm_configure(wpa_s->eapol, in wpa_supplicant_ctrl_iface_set() 513 eapol_sm_configure(wpa_s->eapol, in wpa_supplicant_ctrl_iface_set() 516 eapol_sm_configure(wpa_s->eapol, in wpa_supplicant_ctrl_iface_set() 521 eapol_sm_notify_portControl(wpa_s->eapol, Auto); in wpa_supplicant_ctrl_iface_set() 523 eapol_sm_notify_portControl(wpa_s->eapol, in wpa_supplicant_ctrl_iface_set() 526 eapol_sm_notify_portControl(wpa_s->eapol, in wpa_supplicant_ctrl_iface_set() 2509 res = eapol_sm_get_status(wpa_s->eapol, pos, end - pos, in wpa_supplicant_ctrl_iface_status() 2521 sess_id = eapol_sm_get_session_id(wpa_s->eapol, &sess_id_len); in wpa_supplicant_ctrl_iface_status() 3685 eapol_sm_invalidate_cached_session(wpa_s->eapol); in wpa_supplicant_ctrl_iface_update_network() [all …]
|
/freebsd/contrib/wpa/src/rsn_supp/ |
H A D | preauth.c | 84 static void rsn_preauth_eapol_cb(struct eapol_sm *eapol, in rsn_preauth_eapol_cb() argument 94 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); in rsn_preauth_eapol_cb() 100 res = eapol_sm_get_key(eapol, pmk, 16); in rsn_preauth_eapol_cb()
|
H A D | wpa.c | 203 eapol_sm_notify_tx_eapol_key(sm->eapol); in wpa_eapol_key_send() 341 eapol_sm_notify_cached(sm->eapol); in wpa_supplicant_get_pmk() 358 } else if (wpa_key_mgmt_wpa_ieee8021x(sm->key_mgmt) && sm->eapol) { in wpa_supplicant_get_pmk() 368 res = eapol_sm_get_key(sm->eapol, sm->pmk, pmk_len); in wpa_supplicant_get_pmk() 375 res = eapol_sm_get_key(sm->eapol, sm->pmk, 16); in wpa_supplicant_get_pmk() 381 eapol_sm_get_key(sm->eapol, buf, 2 * PMK_LEN) == 0) { in wpa_supplicant_get_pmk() 498 eapol_sm_notify_eap_fail(sm->eapol, true); in wpa_supplicant_get_pmk() 499 eapol_sm_notify_eap_fail(sm->eapol, false); in wpa_supplicant_get_pmk() 1144 eapol_sm_notify_portValid(sm->eapol, true); in wpa_supplicant_key_neg_complete() 1148 eapol_sm_notify_eap_success(sm->eapol, true); in wpa_supplicant_key_neg_complete() [all …]
|
H A D | wpa.h | 197 void wpa_sm_set_eapol(struct wpa_sm *sm, struct eapol_sm *eapol); 316 static inline void wpa_sm_set_eapol(struct wpa_sm *sm, struct eapol_sm *eapol) in wpa_sm_set_eapol() argument
|
H A D | wpa_i.h | 45 struct eapol_sm *eapol; /* EAPOL state machine from upper level code */ member
|
/freebsd/contrib/wpa/src/pasn/ |
H A D | pasn_initiator.c | 207 erp_msg = eapol_sm_build_erp_reauth_start(pasn->eapol); in wpas_pasn_fils_build_auth() 398 eapol_sm_process_erp_finish(pasn->eapol, wpabuf_head(fils_wd), in wpas_pasn_wd_fils_rx() 404 if (eapol_sm_failed(pasn->eapol)) { in wpas_pasn_wd_fils_rx() 410 ret = eapol_sm_get_key(pasn->eapol, rmsk, rmsk_len); in wpas_pasn_wd_fils_rx() 414 ret = eapol_sm_get_key(pasn->eapol, rmsk, rmsk_len); in wpas_pasn_wd_fils_rx()
|
H A D | pasn_common.h | 109 struct eapol_sm *eapol; member
|
/freebsd/contrib/wpa/src/eapol_supp/ |
H A D | eapol_supp_sm.h | 109 void (*cb)(struct eapol_sm *eapol, enum eapol_supp_result result,
|