HomeSort by relevance Sort by last modified time
    Searched refs:eapol (Results 1 - 25 of 31) sorted by null

1 2

  /external/wpa_supplicant_6/wpa_supplicant/tests/
link_test.c 3 * functions should be removed to allow IEEE 802.1X/EAPOL authenticator to
67 struct eapol_state_machine *eapol)
  /external/wpa_supplicant/
events.c 65 eapol_sm_invalidate_cached_session(wpa_s->eapol);
93 eapol_sm_notify_portEnabled(wpa_s->eapol, FALSE);
94 eapol_sm_notify_portValid(wpa_s->eapol, FALSE);
96 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE);
114 eapol_sm_notify_pmkid_attempt(wpa_s->eapol, 1);
227 eapol_sm_register_scard_ctx(wpa_s->eapol, wpa_s->scard);
712 * of the SUCCESS state and eapSuccess cleared. Without this, EAPOL PAE
718 eapol_sm_notify_portEnabled(wpa_s->eapol, FALSE);
719 eapol_sm_notify_portValid(wpa_s->eapol, FALSE);
721 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE)
    [all...]
eapol_test.c 279 printf("WPA: EAPOL processing complete\n");
297 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) {
298 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN);
306 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) {
307 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16);
328 static void eapol_sm_cb(struct eapol_sm *eapol, int success, void *ctx)
350 printf("Failed to allocate EAPOL context.\n");
368 wpa_s->eapol = eapol_sm_init(ctx);
369 if (wpa_s->eapol == NULL) {
371 printf("Failed to initialize EAPOL state machines.\n")
    [all...]
wpa_supplicant.c 169 * wpa_supplicant_eapol_send - Send IEEE 802.1X EAPOL packet to Authenticator
172 * @buf: EAPOL payload (after IEEE 802.1X header)
173 * @len: EAPOL payload length
176 * This function adds Ethernet and IEEE 802.1X header and sends the EAPOL frame
193 * EAPOL frames (mainly, EAPOL-Start) from EAPOL state
195 wpa_printf(MSG_DEBUG, "WPA: drop TX EAPOL in non-IEEE 802.1X "
203 /* Trying to use PMKSA caching - do not send EAPOL-Start frames
204 * since they will trigger full EAPOL authentication. *
    [all...]
ctrl_iface.c 48 if (os_strcasecmp(cmd, "EAPOL::heldPeriod") == 0) {
49 eapol_sm_configure(wpa_s->eapol,
51 } else if (os_strcasecmp(cmd, "EAPOL::authPeriod") == 0) {
52 eapol_sm_configure(wpa_s->eapol,
54 } else if (os_strcasecmp(cmd, "EAPOL::startPeriod") == 0) {
55 eapol_sm_configure(wpa_s->eapol,
57 } else if (os_strcasecmp(cmd, "EAPOL::maxStart") == 0) {
58 eapol_sm_configure(wpa_s->eapol,
268 res = eapol_sm_get_status(wpa_s->eapol, pos, end - pos,
755 eapol_sm_invalidate_cached_session(wpa_s->eapol);
    [all...]
wpa.h 123 void wpa_sm_set_eapol(struct wpa_sm *sm, struct eapol_sm *eapol);
201 static inline void wpa_sm_set_eapol(struct wpa_sm *sm, struct eapol_sm *eapol)
preauth.c 84 static void rsn_preauth_eapol_cb(struct eapol_sm *eapol, int success,
93 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
99 res = eapol_sm_get_key(eapol, pmk, 16);
111 "master session key from pre-auth EAPOL state "
155 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL (preauth)", msg, msglen);
169 * -2 on layer 2 packet initialization failure, -3 on EAPOL state machine
212 wpa_printf(MSG_WARNING, "Failed to allocate EAPOL context.");
229 wpa_printf(MSG_WARNING, "RSN: Failed to initialize EAPOL "
242 * preauth EAPOL-Start frame may end up being dropped due to race
500 "EAPOL state machines:\n")
    [all...]
eapol_sm.h 2 * WPA Supplicant / EAPOL state machines
24 * struct eapol_config - Per network configuration for EAPOL state machines
28 * accept_802_1x_keys - Accept IEEE 802.1X (non-WPA) EAPOL-Key frames
30 * This variable should be set to 1 when using EAPOL state machines
33 * process the EAPOL-Key frames.
40 * required_keys - Which EAPOL-Key packets are required
42 * This variable determines which EAPOL-Key packets are required before
68 * struct eapol_ctx - Global (for all networks) EAPOL state machine context
79 * This EAPOL state machine is used for IEEE 802.11i/RSN
85 * cb - Function to be called when EAPOL negotiation has been complete
    [all...]
wpa_i.h 29 u8 kck[16]; /* EAPOL-Key Key Confirmation Key (KCK) */
30 u8 kek[16]; /* EAPOL-Key Key Encryption Key (KEK) */
90 struct eapol_sm *eapol; /* EAPOL state machine from upper level code */ member in struct:wpa_sm
wpa.c 2 * WPA Supplicant - WPA state machine and EAPOL-Key processing
93 /* EAPOL-Key Key Data Encapsulation
911 * wpa_eapol_key_mic - Calculate EAPOL-Key MIC
912 * @key: EAPOL-Key Key Confirmation Key (KCK)
914 * @buf: Pointer to the beginning of the EAPOL header (version field)
915 * @len: Length of the EAPOL frame (from EAPOL header to the end of the frame)
916 * @mic: Pointer to the buffer to which the EAPOL-Key MIC is written
918 * Calculate EAPOL-Key MIC for an EAPOL-Key packet. The EAPOL-Key MIC field ha
    [all...]
ctrl_iface_udp.c 256 eapol_sm_notify_ctrl_attached(wpa_s->eapol);
pmksa_cache.c 110 eapol_sm_request_reauth(pmksa->sm->eapol);
wpa_supplicant_i.h 89 * device, the bridge interface may need to be used for receiving EAPOL
91 * receiving of EAPOL frames from an additional interface.
317 struct eapol_sm *eapol; member in struct:wpa_supplicant
325 int eapol_received; /* number of EAPOL packets received after the
  /external/wpa_supplicant_6/wpa_supplicant/
eapol_test.c 322 printf("WPA: EAPOL processing complete\n");
340 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) {
341 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN);
349 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) {
350 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16);
371 static void eapol_sm_cb(struct eapol_sm *eapol, int success, void *ctx)
393 printf("Failed to allocate EAPOL context.\n");
413 wpa_s->eapol = eapol_sm_init(ctx);
414 if (wpa_s->eapol == NULL) {
416 printf("Failed to initialize EAPOL state machines.\n")
    [all...]
events.c 74 eapol_sm_invalidate_cached_session(wpa_s->eapol);
102 eapol_sm_notify_portEnabled(wpa_s->eapol, FALSE);
103 eapol_sm_notify_portValid(wpa_s->eapol, FALSE);
105 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE);
125 eapol_sm_notify_pmkid_attempt(wpa_s->eapol, 1);
238 eapol_sm_register_scard_ctx(wpa_s->eapol, wpa_s->scard);
870 * of the SUCCESS state and eapSuccess cleared. Without this, EAPOL PAE
877 eapol_sm_notify_portEnabled(wpa_s->eapol, FALSE);
878 eapol_sm_notify_portValid(wpa_s->eapol, FALSE);
881 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE)
    [all...]
wpa_supplicant.c 244 * wpa_supplicant_initiate_eapol - Configure EAPOL state machine
247 * This function is used to configure EAPOL state machine based on the selected
256 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE);
257 eapol_sm_notify_eap_fail(wpa_s->eapol, FALSE);
261 eapol_sm_notify_portControl(wpa_s->eapol, ForceAuthorized);
263 eapol_sm_notify_portControl(wpa_s->eapol, Auto);
288 eapol_sm_notify_config(wpa_s->eapol, &ssid->eap, &eapol_conf);
351 eapol_sm_register_scard_ctx(wpa_s->eapol, NULL);
372 eapol_sm_deinit(wpa_s->eapol);
373 wpa_s->eapol = NULL
    [all...]
wpas_glue.c 2 * WPA Supplicant - Glue code to setup EAPOL and RSN modules
112 * wpa_supplicant_eapol_send - Send IEEE 802.1X EAPOL packet to Authenticator
115 * @buf: EAPOL payload (after IEEE 802.1X header)
116 * @len: EAPOL payload length
119 * This function adds Ethernet and IEEE 802.1X header and sends the EAPOL frame
136 * EAPOL frames (mainly, EAPOL-Start) from EAPOL state
138 wpa_printf(MSG_DEBUG, "WPA: drop TX EAPOL in non-IEEE 802.1X "
146 /* Trying to use PMKSA caching - do not send EAPOL-Start frame
    [all...]
ctrl_iface.c 52 if (os_strcasecmp(cmd, "EAPOL::heldPeriod") == 0) {
53 eapol_sm_configure(wpa_s->eapol,
55 } else if (os_strcasecmp(cmd, "EAPOL::authPeriod") == 0) {
56 eapol_sm_configure(wpa_s->eapol,
58 } else if (os_strcasecmp(cmd, "EAPOL::startPeriod") == 0) {
59 eapol_sm_configure(wpa_s->eapol,
61 } else if (os_strcasecmp(cmd, "EAPOL::maxStart") == 0) {
62 eapol_sm_configure(wpa_s->eapol,
379 res = eapol_sm_get_status(wpa_s->eapol, pos, end - pos,
1025 eapol_sm_invalidate_cached_session(wpa_s->eapol);
    [all...]
ctrl_iface_dbus_handlers.c     [all...]
ctrl_iface_udp.c 256 eapol_sm_notify_ctrl_attached(wpa_s->eapol);
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
wpa.h 105 void wpa_sm_set_eapol(struct wpa_sm *sm, struct eapol_sm *eapol);
181 static inline void wpa_sm_set_eapol(struct wpa_sm *sm, struct eapol_sm *eapol)
wpa.c 2 * WPA Supplicant - WPA state machine and EAPOL-Key processing
93 * wpa_eapol_key_send - Send WPA/RSN EAPOL-Key message
99 * @msg: EAPOL-Key message
101 * @key_mic: Pointer to the buffer to which the EAPOL-Key MIC is written
114 "EAPOL-Key destination address");
118 ") as the destination for EAPOL-Key",
124 wpa_hexdump(MSG_MSGDUMP, "WPA: TX EAPOL-Key", msg, msg_len);
126 eapol_sm_notify_tx_eapol_key(sm->eapol);
132 * wpa_sm_key_request - Send EAPOL-Key Request
137 * Send an EAPOL-Key Request to the current authenticator. This function i
    [all...]
preauth.c 83 static void rsn_preauth_eapol_cb(struct eapol_sm *eapol, int success,
92 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
98 res = eapol_sm_get_key(eapol, pmk, 16);
111 "master session key from pre-auth EAPOL state "
155 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL (preauth)", msg, msglen);
169 * -2 on layer 2 packet initialization failure, -3 on EAPOL state machine
213 wpa_printf(MSG_WARNING, "Failed to allocate EAPOL context.");
230 wpa_printf(MSG_WARNING, "RSN: Failed to initialize EAPOL "
242 * preauth EAPOL-Start frame may end up being dropped due to race
505 "EAPOL state machines:\n")
    [all...]
wpa_i.h 37 struct eapol_sm *eapol; /* EAPOL state machine from upper level code */ member in struct:wpa_sm
  /external/wpa_supplicant_6/wpa_supplicant/src/eapol_supp/
eapol_supp_sm.h 2 * EAPOL supplicant state machines
24 * struct eapol_config - Per network configuration for EAPOL state machines
28 * accept_802_1x_keys - Accept IEEE 802.1X (non-WPA) EAPOL-Key frames
30 * This variable should be set to 1 when using EAPOL state machines
33 * process the EAPOL-Key frames.
40 * required_keys - Which EAPOL-Key packets are required
42 * This variable determines which EAPOL-Key packets are required before
68 * struct eapol_ctx - Global (for all networks) EAPOL state machine context
79 * This EAPOL state machine is used for IEEE 802.11i/RSN
85 * cb - Function to be called when EAPOL negotiation has been complete
    [all...]

Completed in 55 milliseconds

1 2