/hostap-latest/src/pae/ |
D | ieee802_1x_cp.c | 96 static int changed_cipher(struct ieee802_1x_cp_sm *sm) in changed_cipher() argument 98 return sm->confidentiality_offset != sm->cipher_offset || in changed_cipher() 99 sm->current_cipher_suite != sm->cipher_suite; in changed_cipher() 103 static int changed_connect(struct ieee802_1x_cp_sm *sm) in changed_connect() argument 105 return sm->connect != SECURE || sm->chgd_server || changed_cipher(sm); in changed_connect() 113 sm->controlled_port_enabled = false; in SM_STATE() 114 secy_cp_control_enable_port(sm->kay, sm->controlled_port_enabled); in SM_STATE() 116 sm->port_valid = false; in SM_STATE() 118 os_free(sm->lki); in SM_STATE() 119 sm->lki = NULL; in SM_STATE() [all …]
|
/hostap-latest/src/eapol_supp/ |
D | eapol_supp_sm.c | 152 static void eapol_sm_txLogoff(struct eapol_sm *sm); 153 static void eapol_sm_txStart(struct eapol_sm *sm); 154 static void eapol_sm_processKey(struct eapol_sm *sm); 155 static void eapol_sm_getSuppRsp(struct eapol_sm *sm); 156 static void eapol_sm_txSuppRsp(struct eapol_sm *sm); 157 static void eapol_sm_abortSupp(struct eapol_sm *sm); 158 static void eapol_sm_abort_cached(struct eapol_sm *sm); 160 static void eapol_sm_set_port_authorized(struct eapol_sm *sm); 161 static void eapol_sm_set_port_unauthorized(struct eapol_sm *sm); 168 struct eapol_sm *sm = timeout_ctx; in eapol_port_timers_tick() local [all …]
|
D | eapol_supp_sm.h | 331 void eapol_sm_deinit(struct eapol_sm *sm); 332 void eapol_sm_step(struct eapol_sm *sm); 333 int eapol_sm_get_status(struct eapol_sm *sm, char *buf, size_t buflen, 335 int eapol_sm_get_mib(struct eapol_sm *sm, char *buf, size_t buflen); 336 void eapol_sm_configure(struct eapol_sm *sm, int heldPeriod, int authPeriod, 338 int eapol_sm_rx_eapol(struct eapol_sm *sm, const u8 *src, const u8 *buf, 340 void eapol_sm_notify_tx_eapol_key(struct eapol_sm *sm); 341 void eapol_sm_notify_portEnabled(struct eapol_sm *sm, bool enabled); 342 void eapol_sm_notify_portValid(struct eapol_sm *sm, bool valid); 343 void eapol_sm_notify_eap_success(struct eapol_sm *sm, bool success); [all …]
|
/hostap-latest/src/eap_server/ |
D | eap_server.c | 28 static int eap_sm_calculateTimeout(struct eap_sm *sm, int retransCount, 31 static void eap_sm_parseEapResp(struct eap_sm *sm, const struct wpabuf *resp); 33 static struct wpabuf * eap_sm_buildSuccess(struct eap_sm *sm, u8 id); 34 static struct wpabuf * eap_sm_buildFailure(struct eap_sm *sm, u8 id); 35 static int eap_sm_nextId(struct eap_sm *sm, int id); 36 static void eap_sm_Policy_update(struct eap_sm *sm, const u8 *nak_list, 38 static enum eap_type eap_sm_Policy_getNextMethod(struct eap_sm *sm, 40 static int eap_sm_Policy_getDecision(struct eap_sm *sm); 41 static bool eap_sm_Policy_doPickUp(struct eap_sm *sm, enum eap_type method); 44 static int eap_get_erp_send_reauth_start(struct eap_sm *sm) in eap_get_erp_send_reauth_start() argument [all …]
|
D | eap_server_ttls.c | 24 static void eap_ttls_reset(struct eap_sm *sm, void *priv); 79 static void eap_ttls_valid_session(struct eap_sm *sm, in eap_ttls_valid_session() argument 84 if (!sm->cfg->tls_session_lifetime) in eap_ttls_valid_session() 87 buf = wpabuf_alloc(1 + 1 + sm->identity_len); in eap_ttls_valid_session() 91 if (sm->identity) { in eap_ttls_valid_session() 94 if (sm->identity_len <= 255) in eap_ttls_valid_session() 95 id_len = sm->identity_len; in eap_ttls_valid_session() 99 wpabuf_put_data(buf, sm->identity, id_len); in eap_ttls_valid_session() 331 static u8 * eap_ttls_implicit_challenge(struct eap_sm *sm, in eap_ttls_implicit_challenge() argument 334 return eap_server_tls_derive_key(sm, &data->ssl, "ttls challenge", in eap_ttls_implicit_challenge() [all …]
|
D | eap_server_fast.c | 22 static void eap_fast_reset(struct eap_sm *sm, void *priv); 71 static int eap_fast_process_phase2_start(struct eap_sm *sm, 111 static enum eap_type eap_fast_req_failure(struct eap_sm *sm, in eap_fast_req_failure() argument 272 static void eap_fast_derive_key_auth(struct eap_sm *sm, in eap_fast_derive_key_auth() argument 281 sks = eap_fast_derive_key(sm->cfg->ssl_ctx, data->ssl.conn, in eap_fast_derive_key_auth() 302 static void eap_fast_derive_key_provisioning(struct eap_sm *sm, in eap_fast_derive_key_provisioning() argument 307 eap_fast_derive_key(sm->cfg->ssl_ctx, data->ssl.conn, in eap_fast_derive_key_provisioning() 333 static int eap_fast_get_phase2_key(struct eap_sm *sm, in eap_fast_get_phase2_key() argument 351 if ((key = data->phase2_method->getKey(sm, data->phase2_priv, in eap_fast_get_phase2_key() 367 static int eap_fast_update_icmk(struct eap_sm *sm, struct eap_fast_data *data) in eap_fast_update_icmk() argument [all …]
|
D | eap_server_teap.c | 20 static void eap_teap_reset(struct eap_sm *sm, void *priv); 82 static int eap_teap_process_phase2_start(struct eap_sm *sm, 84 static int eap_teap_phase2_init(struct eap_sm *sm, struct eap_teap_data *data, 292 static int eap_teap_derive_key_auth(struct eap_sm *sm, in eap_teap_derive_key_auth() argument 298 res = tls_connection_export_key(sm->cfg->ssl_ctx, data->ssl.conn, in eap_teap_derive_key_auth() 312 static int eap_teap_update_icmk(struct eap_sm *sm, struct eap_teap_data *data) in eap_teap_update_icmk() argument 321 if (sm->cfg->eap_teap_auth == 1) in eap_teap_update_icmk() 332 msk = data->phase2_method->getKey(sm, data->phase2_priv, in eap_teap_update_icmk() 342 emsk = data->phase2_method->get_emsk(sm, data->phase2_priv, in eap_teap_update_icmk() 362 static void * eap_teap_init(struct eap_sm *sm) in eap_teap_init() argument [all …]
|
D | eap_server_peap.c | 29 static void eap_peap_reset(struct eap_sm *sm, void *priv); 59 static int eap_peap_phase2_init(struct eap_sm *sm, struct eap_peap_data *data, 107 static void eap_peap_valid_session(struct eap_sm *sm, in eap_peap_valid_session() argument 112 if (!sm->cfg->tls_session_lifetime || in eap_peap_valid_session() 113 tls_connection_resumed(sm->cfg->ssl_ctx, data->ssl.conn)) in eap_peap_valid_session() 116 buf = wpabuf_alloc(1 + 1 + sm->identity_len); in eap_peap_valid_session() 120 if (sm->identity) { in eap_peap_valid_session() 123 if (sm->identity_len <= 255) in eap_peap_valid_session() 124 id_len = sm->identity_len; in eap_peap_valid_session() 128 wpabuf_put_data(buf, sm->identity, id_len); in eap_peap_valid_session() [all …]
|
D | eap_server_gtc.c | 21 static void * eap_gtc_init(struct eap_sm *sm) in eap_gtc_init() argument 31 if (sm->m && sm->m->vendor == EAP_VENDOR_IETF && in eap_gtc_init() 32 sm->m->method == EAP_TYPE_FAST) { in eap_gtc_init() 43 static void eap_gtc_reset(struct eap_sm *sm, void *priv) in eap_gtc_reset() argument 50 static struct wpabuf * eap_gtc_buildReq(struct eap_sm *sm, void *priv, u8 id) in eap_gtc_buildReq() argument 77 static bool eap_gtc_check(struct eap_sm *sm, void *priv, in eap_gtc_check() argument 93 static void eap_gtc_process(struct eap_sm *sm, void *priv, in eap_gtc_process() argument 131 if (sm->identity && sm->require_identity_match && in eap_gtc_process() 132 (pos2 - pos != (int) sm->identity_len || in eap_gtc_process() 133 os_memcmp(pos, sm->identity, sm->identity_len))) { in eap_gtc_process() [all …]
|
D | eap_server_aka.c | 59 static void eap_aka_fullauth(struct eap_sm *sm, struct eap_aka_data *data); 92 static int eap_aka_check_identity_reauth(struct eap_sm *sm, in eap_aka_check_identity_reauth() argument 104 data->reauth = eap_sim_db_get_reauth_entry(sm->cfg->eap_sim_db_priv, in eap_aka_check_identity_reauth() 113 if (data->reauth->counter > sm->cfg->eap_sim_aka_fast_reauth_limit) { in eap_aka_check_identity_reauth() 116 if (sm->cfg->eap_sim_id & 0x04) { in eap_aka_check_identity_reauth() 121 os_strlcpy(sm->sim_aka_permanent, in eap_aka_check_identity_reauth() 123 sizeof(sm->sim_aka_permanent)); in eap_aka_check_identity_reauth() 124 eap_sim_db_remove_reauth(sm->cfg->eap_sim_db_priv, in eap_aka_check_identity_reauth() 127 eap_aka_fullauth(sm, data); in eap_aka_check_identity_reauth() 155 static void eap_aka_check_identity(struct eap_sm *sm, in eap_aka_check_identity() argument [all …]
|
/hostap-latest/src/eapol_auth/ |
D | eapol_auth_sm.c | 23 #define STATE_MACHINE_ADDR sm->addr 30 sm->eapol->cb.set_port_authorized(sm->eapol->conf.ctx, sm->sta, 1) 32 sm->eapol->cb.set_port_authorized(sm->eapol->conf.ctx, sm->sta, 0) 35 #define txCannedFail() eapol_auth_tx_canned_eap(sm, 0) 36 #define txCannedSuccess() eapol_auth_tx_canned_eap(sm, 1) 37 #define txReq() eapol_auth_tx_req(sm) 38 #define abortAuth() sm->eapol->cb.abort_auth(sm->eapol->conf.ctx, sm->sta) 39 #define txKey() sm->eapol->cb.tx_key(sm->eapol->conf.ctx, sm->sta) 43 static void eapol_sm_step_run(struct eapol_state_machine *sm); 45 static void eapol_auth_initialize(struct eapol_state_machine *sm); [all …]
|
D | eapol_auth_dump.c | 121 int eapol_auth_dump_state(struct eapol_state_machine *sm, char *buf, in eapol_auth_dump_state() argument 132 sm->aWhile, sm->quietWhile, sm->reAuthWhen); in eapol_auth_dump_state() 158 _SB(sm->authAbort), in eapol_auth_dump_state() 159 _SB(sm->authFail), in eapol_auth_dump_state() 160 port_state_txt(sm->authPortStatus), in eapol_auth_dump_state() 161 _SB(sm->authStart), in eapol_auth_dump_state() 162 _SB(sm->authTimeout), in eapol_auth_dump_state() 163 _SB(sm->authSuccess), in eapol_auth_dump_state() 164 _SB(sm->eap_if->eapFail), in eapol_auth_dump_state() 165 _SB(sm->eapolEap), in eapol_auth_dump_state() [all …]
|
/hostap-latest/src/rsn_supp/ |
D | wpa.c | 91 int wpa_eapol_key_send(struct wpa_sm *sm, struct wpa_ptk *ptk, in wpa_eapol_key_send() argument 96 size_t mic_len = wpa_mic_len(sm->key_mgmt, sm->pmk_len); in wpa_eapol_key_send() 100 MAC2STR(dest), ver, (int) mic_len, sm->key_mgmt); in wpa_eapol_key_send() 101 if (is_zero_ether_addr(dest) && is_zero_ether_addr(sm->bssid)) { in wpa_eapol_key_send() 106 if (wpa_sm_get_bssid(sm, sm->bssid) < 0) { in wpa_eapol_key_send() 107 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, in wpa_eapol_key_send() 111 dest = sm->bssid; in wpa_eapol_key_send() 112 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, in wpa_eapol_key_send() 124 wpa_eapol_key_mic(ptk->kck, ptk->kck_len, sm->key_mgmt, ver, in wpa_eapol_key_send() 126 wpa_msg(sm->ctx->msg_ctx, MSG_ERROR, in wpa_eapol_key_send() [all …]
|
D | wpa_ft.c | 29 static void wpa_ft_pasn_store_r1kh(struct wpa_sm *sm, const u8 *bssid); 31 static void wpa_ft_pasn_store_r1kh(struct wpa_sm *sm, const u8 *bssid) in wpa_ft_pasn_store_r1kh() argument 37 int wpa_derive_ptk_ft(struct wpa_sm *sm, const unsigned char *src_addr, in wpa_derive_ptk_ft() argument 42 int use_sha384 = wpa_key_mgmt_sha384(sm->key_mgmt); in wpa_derive_ptk_ft() 47 if (sm->xxkey_len > 0) { in wpa_derive_ptk_ft() 48 mpmk = sm->xxkey; in wpa_derive_ptk_ft() 49 mpmk_len = sm->xxkey_len; in wpa_derive_ptk_ft() 50 } else if (sm->cur_pmksa) { in wpa_derive_ptk_ft() 51 mpmk = sm->cur_pmksa->pmk; in wpa_derive_ptk_ft() 52 mpmk_len = sm->cur_pmksa->pmk_len; in wpa_derive_ptk_ft() [all …]
|
D | preauth.c | 37 void pmksa_candidate_free(struct wpa_sm *sm) in pmksa_candidate_free() argument 41 if (sm == NULL) in pmksa_candidate_free() 44 dl_list_for_each_safe(entry, n, &sm->pmksa_candidates, in pmksa_candidate_free() 65 struct wpa_sm *sm = ctx; in rsn_preauth_receive() local 70 if (sm->preauth_eapol == NULL || in rsn_preauth_receive() 71 is_zero_ether_addr(sm->preauth_bssid) || in rsn_preauth_receive() 72 !ether_addr_equal(sm->preauth_bssid, src_addr)) { in rsn_preauth_receive() 79 eapol_sm_rx_eapol(sm->preauth_eapol, src_addr, buf, len, in rsn_preauth_receive() 88 struct wpa_sm *sm = ctx; in rsn_preauth_eapol_cb() local 106 sm->pmk_len = pmk_len; in rsn_preauth_eapol_cb() [all …]
|
D | wpa_i.h | 241 static inline void wpa_sm_set_state(struct wpa_sm *sm, enum wpa_states state) in wpa_sm_set_state() argument 243 WPA_ASSERT(sm->ctx->set_state); in wpa_sm_set_state() 244 sm->ctx->set_state(sm->ctx->ctx, state); in wpa_sm_set_state() 247 static inline enum wpa_states wpa_sm_get_state(struct wpa_sm *sm) in wpa_sm_get_state() argument 249 WPA_ASSERT(sm->ctx->get_state); in wpa_sm_get_state() 250 return sm->ctx->get_state(sm->ctx->ctx); in wpa_sm_get_state() 253 static inline void wpa_sm_deauthenticate(struct wpa_sm *sm, u16 reason_code) in wpa_sm_deauthenticate() argument 255 WPA_ASSERT(sm->ctx->deauthenticate); in wpa_sm_deauthenticate() 256 sm->ctx->deauthenticate(sm->ctx->ctx, reason_code); in wpa_sm_deauthenticate() 259 static inline int wpa_sm_set_key(struct wpa_sm *sm, int link_id, in wpa_sm_set_key() argument [all …]
|
D | wpa.h | 194 void wpa_sm_deinit(struct wpa_sm *sm); 195 void wpa_sm_notify_assoc(struct wpa_sm *sm, const u8 *bssid); 196 void wpa_sm_notify_disassoc(struct wpa_sm *sm); 197 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, 199 void wpa_sm_set_pmk_from_pmksa(struct wpa_sm *sm); 200 void wpa_sm_set_fast_reauth(struct wpa_sm *sm, int fast_reauth); 201 void wpa_sm_set_scard_ctx(struct wpa_sm *sm, void *scard_ctx); 202 void wpa_sm_set_config(struct wpa_sm *sm, struct rsn_supp_config *config); 203 void wpa_sm_set_ssid(struct wpa_sm *sm, const u8 *ssid, size_t ssid_len); 204 void wpa_sm_set_own_addr(struct wpa_sm *sm, const u8 *addr); [all …]
|
D | tdls.c | 86 static void wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer); 87 static void wpa_tdls_disable_peer_link(struct wpa_sm *sm, 89 static int wpa_tdls_send_teardown(struct wpa_sm *sm, const u8 *addr, 169 static const u8 * wpa_tdls_get_link_bssid(struct wpa_sm *sm, int link_id) in wpa_tdls_get_link_bssid() argument 172 return sm->mlo.links[link_id].bssid; in wpa_tdls_get_link_bssid() 173 return sm->bssid; in wpa_tdls_get_link_bssid() 177 static int wpa_tdls_get_privacy(struct wpa_sm *sm) in wpa_tdls_get_privacy() argument 184 return sm->pairwise_cipher != WPA_CIPHER_NONE; in wpa_tdls_get_privacy() 195 static int wpa_tdls_del_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) in wpa_tdls_del_key() argument 197 if (wpa_sm_set_key(sm, -1, WPA_ALG_NONE, peer->addr, in wpa_tdls_del_key() [all …]
|
/hostap-latest/src/eap_peer/ |
D | eap.c | 40 static bool eap_sm_allowMethod(struct eap_sm *sm, int vendor, 42 static struct wpabuf * eap_sm_buildNak(struct eap_sm *sm, int id); 43 static void eap_sm_processIdentity(struct eap_sm *sm, 45 static void eap_sm_processNotify(struct eap_sm *sm, const struct wpabuf *req); 47 static void eap_sm_parseEapReq(struct eap_sm *sm, const struct wpabuf *req); 52 static void eap_sm_request(struct eap_sm *sm, enum wpa_ctrl_req_type field, 57 static bool eapol_get_bool(struct eap_sm *sm, enum eapol_bool_var var) in eapol_get_bool() argument 59 return sm->eapol_cb->get_bool(sm->eapol_ctx, var); in eapol_get_bool() 63 static void eapol_set_bool(struct eap_sm *sm, enum eapol_bool_var var, in eapol_set_bool() argument 66 sm->eapol_cb->set_bool(sm->eapol_ctx, var, value); in eapol_set_bool() [all …]
|
D | eap.h | 332 void eap_peer_sm_deinit(struct eap_sm *sm); 333 int eap_peer_sm_step(struct eap_sm *sm); 334 void eap_sm_abort(struct eap_sm *sm); 335 int eap_sm_get_status(struct eap_sm *sm, char *buf, size_t buflen, 337 const char * eap_sm_get_method_name(struct eap_sm *sm); 338 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, int encrypted); 339 void eap_sm_request_identity(struct eap_sm *sm); 340 void eap_sm_request_password(struct eap_sm *sm); 341 void eap_sm_request_new_password(struct eap_sm *sm); 342 void eap_sm_request_pin(struct eap_sm *sm); [all …]
|
D | eap_tls.c | 18 static void eap_tls_deinit(struct eap_sm *sm, void *priv); 33 static void * eap_tls_init(struct eap_sm *sm) in eap_tls_init() argument 36 struct eap_peer_config *config = eap_get_config(sm); in eap_tls_init() 41 if (!sm->init_phase2) in eap_tls_init() 43 else if (sm->use_machine_cred) in eap_tls_init() 56 data->ssl_ctx = sm->init_phase2 && sm->ssl_ctx2 ? sm->ssl_ctx2 : in eap_tls_init() 57 sm->ssl_ctx; in eap_tls_init() 59 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_TLS)) { in eap_tls_init() 61 eap_tls_deinit(sm, data); in eap_tls_init() 65 eap_sm_request_pin(sm); in eap_tls_init() [all …]
|
/hostap-latest/src/ap/ |
D | wpa_auth.c | 40 #define STATE_MACHINE_ADDR wpa_auth_get_spa(sm) 44 static int wpa_sm_step(struct wpa_state_machine *sm); 48 static int wpa_aead_decrypt(struct wpa_state_machine *sm, struct wpa_ptk *ptk, 50 static struct wpabuf * fils_prepare_plainbuf(struct wpa_state_machine *sm, 56 static void wpa_request_new_ptk(struct wpa_state_machine *sm); 61 static int wpa_derive_ptk(struct wpa_state_machine *sm, const u8 *snonce, 72 static int ieee80211w_kde_len(struct wpa_state_machine *sm); 73 static u8 * ieee80211w_kde_add(struct wpa_state_machine *sm, u8 *pos); 89 static const u8 * wpa_auth_get_aa(const struct wpa_state_machine *sm) in wpa_auth_get_aa() argument 92 if (sm->mld_assoc_link_id >= 0) in wpa_auth_get_aa() [all …]
|
D | wpa_auth_ie.c | 855 struct wpa_state_machine *sm, int freq, in wpa_validate_wpa_ie() argument 869 if (wpa_auth == NULL || sm == NULL) in wpa_validate_wpa_ie() 882 version, MAC2STR(sm->addr)); in wpa_validate_wpa_ie() 902 MAC2STR(sm->addr)); in wpa_validate_wpa_ie() 1006 MACSTR " (res=%d)", MAC2STR(sm->addr), res); in wpa_validate_wpa_ie() 1013 MACSTR, data.group_cipher, MAC2STR(sm->addr)); in wpa_validate_wpa_ie() 1017 if (sm->rsn_override_2) in wpa_validate_wpa_ie() 1020 else if (sm->rsn_override) in wpa_validate_wpa_ie() 1026 MACSTR, data.key_mgmt, MAC2STR(sm->addr)); in wpa_validate_wpa_ie() 1032 sm->wpa_key_mgmt = WPA_KEY_MGMT_IEEE8021X_SUITE_B_192; in wpa_validate_wpa_ie() [all …]
|
D | ieee802_1x.c | 218 struct eapol_state_machine *sm = sta->eapol_sm; in ieee802_1x_tx_key_one() local 220 if (!sm) in ieee802_1x_tx_key_one() 266 if (!sm->eap_if->eapKeyData || sm->eap_if->eapKeyDataLen < 64) { in ieee802_1x_tx_key_one() 281 os_memcpy(ekey + sizeof(key->key_iv), sm->eap_if->eapKeyData, 32); in ieee802_1x_tx_key_one() 294 hmac_md5(sm->eap_if->eapKeyData + 32, 32, buf, sizeof(*hdr) + len, in ieee802_1x_tx_key_one() 298 " (%s index=%d)", MAC2STR(sm->addr), in ieee802_1x_tx_key_one() 310 struct eapol_state_machine *sm = sta->eapol_sm; in ieee802_1x_tx_key() local 312 if (!sm || !sm->eap_if->eapKeyData) in ieee802_1x_tx_key() 400 struct eapol_state_machine *sm, in ieee802_1x_learn_identity() argument 416 eap_erp_update_identity(sm->eap, eap, len); in ieee802_1x_learn_identity() [all …]
|
/hostap-latest/src/wps/ |
D | wps_upnp.c | 306 static int local_network_addr(struct upnp_wps_device_sm *sm, in local_network_addr() argument 309 return (addr->sin_addr.s_addr & sm->netmask.s_addr) == in local_network_addr() 310 (sm->ip_addr & sm->netmask.s_addr); in local_network_addr() 406 if (!local_network_addr(s->sm, addr)) { in subscr_addr_add_url() 481 static void upnp_wps_device_send_event(struct upnp_wps_device_sm *sm) in upnp_wps_device_send_event() argument 494 if (dl_list_empty(&sm->subscriptions)) { in upnp_wps_device_send_event() 500 if (now.sec != sm->last_event_sec) { in upnp_wps_device_send_event() 501 sm->last_event_sec = now.sec; in upnp_wps_device_send_event() 502 sm->num_events_in_sec = 1; in upnp_wps_device_send_event() 504 sm->num_events_in_sec++; in upnp_wps_device_send_event() [all …]
|