/external/wpa_supplicant_6/wpa_supplicant/tests/ |
link_test.c | 3 * functions should be removed to allow IEEE 802.1X/EAPOL authenticator to 67 struct eapol_state_machine *eapol)
|
/external/wpa_supplicant/ |
events.c | 65 eapol_sm_invalidate_cached_session(wpa_s->eapol); 93 eapol_sm_notify_portEnabled(wpa_s->eapol, FALSE); 94 eapol_sm_notify_portValid(wpa_s->eapol, FALSE); 96 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE); 114 eapol_sm_notify_pmkid_attempt(wpa_s->eapol, 1); 227 eapol_sm_register_scard_ctx(wpa_s->eapol, wpa_s->scard); 712 * of the SUCCESS state and eapSuccess cleared. Without this, EAPOL PAE 718 eapol_sm_notify_portEnabled(wpa_s->eapol, FALSE); 719 eapol_sm_notify_portValid(wpa_s->eapol, FALSE); 721 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE) [all...] |
eapol_test.c | 279 printf("WPA: EAPOL processing complete\n"); 297 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { 298 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); 306 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) { 307 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16); 328 static void eapol_sm_cb(struct eapol_sm *eapol, int success, void *ctx) 350 printf("Failed to allocate EAPOL context.\n"); 368 wpa_s->eapol = eapol_sm_init(ctx); 369 if (wpa_s->eapol == NULL) { 371 printf("Failed to initialize EAPOL state machines.\n") [all...] |
wpa_supplicant.c | 169 * wpa_supplicant_eapol_send - Send IEEE 802.1X EAPOL packet to Authenticator 172 * @buf: EAPOL payload (after IEEE 802.1X header) 173 * @len: EAPOL payload length 176 * This function adds Ethernet and IEEE 802.1X header and sends the EAPOL frame 193 * EAPOL frames (mainly, EAPOL-Start) from EAPOL state 195 wpa_printf(MSG_DEBUG, "WPA: drop TX EAPOL in non-IEEE 802.1X " 203 /* Trying to use PMKSA caching - do not send EAPOL-Start frames 204 * since they will trigger full EAPOL authentication. * [all...] |
ctrl_iface.c | 48 if (os_strcasecmp(cmd, "EAPOL::heldPeriod") == 0) { 49 eapol_sm_configure(wpa_s->eapol, 51 } else if (os_strcasecmp(cmd, "EAPOL::authPeriod") == 0) { 52 eapol_sm_configure(wpa_s->eapol, 54 } else if (os_strcasecmp(cmd, "EAPOL::startPeriod") == 0) { 55 eapol_sm_configure(wpa_s->eapol, 57 } else if (os_strcasecmp(cmd, "EAPOL::maxStart") == 0) { 58 eapol_sm_configure(wpa_s->eapol, 268 res = eapol_sm_get_status(wpa_s->eapol, pos, end - pos, 755 eapol_sm_invalidate_cached_session(wpa_s->eapol); [all...] |
wpa.h | 123 void wpa_sm_set_eapol(struct wpa_sm *sm, struct eapol_sm *eapol); 201 static inline void wpa_sm_set_eapol(struct wpa_sm *sm, struct eapol_sm *eapol)
|
preauth.c | 84 static void rsn_preauth_eapol_cb(struct eapol_sm *eapol, int success, 93 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 99 res = eapol_sm_get_key(eapol, pmk, 16); 111 "master session key from pre-auth EAPOL state " 155 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL (preauth)", msg, msglen); 169 * -2 on layer 2 packet initialization failure, -3 on EAPOL state machine 212 wpa_printf(MSG_WARNING, "Failed to allocate EAPOL context."); 229 wpa_printf(MSG_WARNING, "RSN: Failed to initialize EAPOL " 242 * preauth EAPOL-Start frame may end up being dropped due to race 500 "EAPOL state machines:\n") [all...] |
eapol_sm.h | 2 * WPA Supplicant / EAPOL state machines 24 * struct eapol_config - Per network configuration for EAPOL state machines 28 * accept_802_1x_keys - Accept IEEE 802.1X (non-WPA) EAPOL-Key frames 30 * This variable should be set to 1 when using EAPOL state machines 33 * process the EAPOL-Key frames. 40 * required_keys - Which EAPOL-Key packets are required 42 * This variable determines which EAPOL-Key packets are required before 68 * struct eapol_ctx - Global (for all networks) EAPOL state machine context 79 * This EAPOL state machine is used for IEEE 802.11i/RSN 85 * cb - Function to be called when EAPOL negotiation has been complete [all...] |
wpa_i.h | 29 u8 kck[16]; /* EAPOL-Key Key Confirmation Key (KCK) */ 30 u8 kek[16]; /* EAPOL-Key Key Encryption Key (KEK) */ 90 struct eapol_sm *eapol; /* EAPOL state machine from upper level code */ member in struct:wpa_sm
|
wpa.c | 2 * WPA Supplicant - WPA state machine and EAPOL-Key processing 93 /* EAPOL-Key Key Data Encapsulation 911 * wpa_eapol_key_mic - Calculate EAPOL-Key MIC 912 * @key: EAPOL-Key Key Confirmation Key (KCK) 914 * @buf: Pointer to the beginning of the EAPOL header (version field) 915 * @len: Length of the EAPOL frame (from EAPOL header to the end of the frame) 916 * @mic: Pointer to the buffer to which the EAPOL-Key MIC is written 918 * Calculate EAPOL-Key MIC for an EAPOL-Key packet. The EAPOL-Key MIC field ha [all...] |
ctrl_iface_udp.c | 256 eapol_sm_notify_ctrl_attached(wpa_s->eapol);
|
pmksa_cache.c | 110 eapol_sm_request_reauth(pmksa->sm->eapol);
|
wpa_supplicant_i.h | 89 * device, the bridge interface may need to be used for receiving EAPOL 91 * receiving of EAPOL frames from an additional interface. 317 struct eapol_sm *eapol; member in struct:wpa_supplicant 325 int eapol_received; /* number of EAPOL packets received after the
|
/external/wpa_supplicant_6/wpa_supplicant/ |
eapol_test.c | 322 printf("WPA: EAPOL processing complete\n"); 340 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { 341 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); 349 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) { 350 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16); 371 static void eapol_sm_cb(struct eapol_sm *eapol, int success, void *ctx) 393 printf("Failed to allocate EAPOL context.\n"); 413 wpa_s->eapol = eapol_sm_init(ctx); 414 if (wpa_s->eapol == NULL) { 416 printf("Failed to initialize EAPOL state machines.\n") [all...] |
events.c | 74 eapol_sm_invalidate_cached_session(wpa_s->eapol); 102 eapol_sm_notify_portEnabled(wpa_s->eapol, FALSE); 103 eapol_sm_notify_portValid(wpa_s->eapol, FALSE); 105 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE); 125 eapol_sm_notify_pmkid_attempt(wpa_s->eapol, 1); 238 eapol_sm_register_scard_ctx(wpa_s->eapol, wpa_s->scard); 870 * of the SUCCESS state and eapSuccess cleared. Without this, EAPOL PAE 877 eapol_sm_notify_portEnabled(wpa_s->eapol, FALSE); 878 eapol_sm_notify_portValid(wpa_s->eapol, FALSE); 881 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE) [all...] |
wpa_supplicant.c | 244 * wpa_supplicant_initiate_eapol - Configure EAPOL state machine 247 * This function is used to configure EAPOL state machine based on the selected 256 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE); 257 eapol_sm_notify_eap_fail(wpa_s->eapol, FALSE); 261 eapol_sm_notify_portControl(wpa_s->eapol, ForceAuthorized); 263 eapol_sm_notify_portControl(wpa_s->eapol, Auto); 288 eapol_sm_notify_config(wpa_s->eapol, &ssid->eap, &eapol_conf); 351 eapol_sm_register_scard_ctx(wpa_s->eapol, NULL); 372 eapol_sm_deinit(wpa_s->eapol); 373 wpa_s->eapol = NULL [all...] |
wpas_glue.c | 2 * WPA Supplicant - Glue code to setup EAPOL and RSN modules 112 * wpa_supplicant_eapol_send - Send IEEE 802.1X EAPOL packet to Authenticator 115 * @buf: EAPOL payload (after IEEE 802.1X header) 116 * @len: EAPOL payload length 119 * This function adds Ethernet and IEEE 802.1X header and sends the EAPOL frame 136 * EAPOL frames (mainly, EAPOL-Start) from EAPOL state 138 wpa_printf(MSG_DEBUG, "WPA: drop TX EAPOL in non-IEEE 802.1X " 146 /* Trying to use PMKSA caching - do not send EAPOL-Start frame [all...] |
ctrl_iface.c | 52 if (os_strcasecmp(cmd, "EAPOL::heldPeriod") == 0) { 53 eapol_sm_configure(wpa_s->eapol, 55 } else if (os_strcasecmp(cmd, "EAPOL::authPeriod") == 0) { 56 eapol_sm_configure(wpa_s->eapol, 58 } else if (os_strcasecmp(cmd, "EAPOL::startPeriod") == 0) { 59 eapol_sm_configure(wpa_s->eapol, 61 } else if (os_strcasecmp(cmd, "EAPOL::maxStart") == 0) { 62 eapol_sm_configure(wpa_s->eapol, 379 res = eapol_sm_get_status(wpa_s->eapol, pos, end - pos, 1025 eapol_sm_invalidate_cached_session(wpa_s->eapol); [all...] |
ctrl_iface_dbus_handlers.c | [all...] |
ctrl_iface_udp.c | 256 eapol_sm_notify_ctrl_attached(wpa_s->eapol);
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
wpa.h | 105 void wpa_sm_set_eapol(struct wpa_sm *sm, struct eapol_sm *eapol); 181 static inline void wpa_sm_set_eapol(struct wpa_sm *sm, struct eapol_sm *eapol)
|
wpa.c | 2 * WPA Supplicant - WPA state machine and EAPOL-Key processing 93 * wpa_eapol_key_send - Send WPA/RSN EAPOL-Key message 99 * @msg: EAPOL-Key message 101 * @key_mic: Pointer to the buffer to which the EAPOL-Key MIC is written 114 "EAPOL-Key destination address"); 118 ") as the destination for EAPOL-Key", 124 wpa_hexdump(MSG_MSGDUMP, "WPA: TX EAPOL-Key", msg, msg_len); 126 eapol_sm_notify_tx_eapol_key(sm->eapol); 132 * wpa_sm_key_request - Send EAPOL-Key Request 137 * Send an EAPOL-Key Request to the current authenticator. This function i [all...] |
preauth.c | 83 static void rsn_preauth_eapol_cb(struct eapol_sm *eapol, int success, 92 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 98 res = eapol_sm_get_key(eapol, pmk, 16); 111 "master session key from pre-auth EAPOL state " 155 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL (preauth)", msg, msglen); 169 * -2 on layer 2 packet initialization failure, -3 on EAPOL state machine 213 wpa_printf(MSG_WARNING, "Failed to allocate EAPOL context."); 230 wpa_printf(MSG_WARNING, "RSN: Failed to initialize EAPOL " 242 * preauth EAPOL-Start frame may end up being dropped due to race 505 "EAPOL state machines:\n") [all...] |
wpa_i.h | 37 struct eapol_sm *eapol; /* EAPOL state machine from upper level code */ member in struct:wpa_sm
|
/external/wpa_supplicant_6/wpa_supplicant/src/eapol_supp/ |
eapol_supp_sm.h | 2 * EAPOL supplicant state machines 24 * struct eapol_config - Per network configuration for EAPOL state machines 28 * accept_802_1x_keys - Accept IEEE 802.1X (non-WPA) EAPOL-Key frames 30 * This variable should be set to 1 when using EAPOL state machines 33 * process the EAPOL-Key frames. 40 * required_keys - Which EAPOL-Key packets are required 42 * This variable determines which EAPOL-Key packets are required before 68 * struct eapol_ctx - Global (for all networks) EAPOL state machine context 79 * This EAPOL state machine is used for IEEE 802.11i/RSN 85 * cb - Function to be called when EAPOL negotiation has been complete [all...] |