/external/wpa_supplicant_6/wpa_supplicant/tests/ |
test_wpa.c | 2 * Test program for combined WPA authenticator/supplicant 21 #include "wpa.h" 23 #include "../hostapd/wpa.h" 30 struct wpa { struct 56 struct wpa *wpa = ctx; local 58 return &wpa->ssid; 64 struct wpa *wpa = ctx; local 66 os_memcpy(bssid, wpa->auth_addr, ETH_ALEN) 79 struct wpa *wpa = eloop_data; local 90 struct wpa *wpa = ctx; local 139 struct wpa *wpa = ctx; local 248 struct wpa *wpa = eloop_data; local 259 struct wpa *wpa = ctx; local 280 struct wpa *wpa = ctx; local 356 struct wpa wpa; local [all...] |
/external/wpa_supplicant/ |
preauth_test.c | 2 * WPA Supplicant - test code for pre-authentication 25 #include "wpa.h" 201 rsn_preauth_deinit(wpa_s->wpa); 202 pmksa_candidate_free(wpa_s->wpa); 203 wpa_sm_deinit(wpa_s->wpa); 225 if (!rsn_preauth_in_progress(wpa_s->wpa)) 267 wpa_s->wpa = wpa_sm_init(ctx); 268 assert(wpa_s->wpa != NULL); 269 wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_PROTO, WPA_PROTO_RSN); 272 wpa_sm_set_ifname(wpa_s->wpa, wpa_s->ifname, NULL) [all...] |
events.c | 2 * WPA Supplicant - Driver event processing 19 #include "wpa.h" 67 wpa_sm_set_config(wpa_s->wpa, wpa_s->current_ssid); 82 wpa_msg(wpa_s, MSG_INFO, "WPA: TKIP countermeasures stopped"); 105 if (wpa_sm_parse_own_wpa_ie(wpa_s->wpa, &ie) < 0 || 110 pmksa_set = pmksa_cache_set_current(wpa_s->wpa, 137 pmksa_candidate_add(wpa_s->wpa, data->pmkid_candidate.bssid, 226 wpa_sm_set_scard_ctx(wpa_s->wpa, wpa_s->scard); 315 wpa_printf(MSG_DEBUG, " skip WPA IE - parse failed"); 319 wpa_printf(MSG_DEBUG, " skip WPA IE - proto [all...] |
wpa_supplicant.c | 2 * WPA Supplicant 24 #include "wpa.h" 195 wpa_printf(MSG_DEBUG, "WPA: drop TX EAPOL in non-IEEE 802.1X " 201 if (pmksa_cache_get_current(wpa_s->wpa) && 276 wpa_sm_aborted_cached(wpa_s->wpa); 319 /* IBSS/WPA-None uses only one key (Group) for both receiving and 323 wpa_printf(MSG_INFO, "WPA: Invalid mode %d (not IBSS/ad-hoc) " 324 "for WPA-None", ssid->mode); 329 wpa_printf(MSG_INFO, "WPA: No PSK configured for WPA-None") [all...] |
ctrl_iface.c | 2 * WPA Supplicant / Control interface (shared code for all backends) 19 #include "wpa.h" 61 if (wpa_sm_set_param(wpa_s->wpa, RSNA_PMK_LIFETIME, 66 if (wpa_sm_set_param(wpa_s->wpa, RSNA_PMK_REAUTH_THRESHOLD, 70 if (wpa_sm_set_param(wpa_s->wpa, RSNA_SA_TIMEOUT, atoi(value))) 92 rsn_preauth_deinit(wpa_s->wpa); 93 if (rsn_preauth_init(wpa_s->wpa, bssid, wpa_s->current_ssid)) 117 return wpa_sm_stkstart(wpa_s->wpa, peer); 250 pos += wpa_sm_get_status(wpa_s->wpa, pos, end - pos, verbose); 274 res = rsn_preauth_get_status(wpa_s->wpa, pos, end - pos, verbose) [all...] |
driver_bsd.c | 2 * WPA Supplicant - driver interaction with BSD net80211 layer 23 #include "wpa.h" /* XXX for RSN_INFO_ELEM */ 40 int prev_wpa; /* wpa state to restore on deinit */ 192 wpa_driver_bsd_set_wpa_internal(void *priv, int wpa, int privacy) 197 wpa_printf(MSG_DEBUG, "%s: wpa=%d privacy=%d", 198 __FUNCTION__, wpa, privacy); 200 if (!wpa && wpa_driver_bsd_set_wpa_ie(drv, NULL, 0) < 0) 204 if (set80211param(drv, IEEE80211_IOC_WPA, wpa) < 0) 373 "%s: ssid '%.*s' wpa ie len %u pairwise %u group %u key mgmt %u" 558 /* WPA/WPA2 support preferred * [all...] |
mlme.c | 2 * WPA Supplicant - Client mode MLME 24 #include "wpa.h" 331 u8 *wpa; member in struct:ieee802_11_elems 411 /* OUI Type 1 - WPA IE */ 412 elems->wpa = pos; [all...] |
wpa_supplicant_i.h | 294 /* Selected configuration (based on Beacon/ProbeResp WPA IE) */ 316 struct wpa_sm *wpa; member in struct:wpa_supplicant
|
Android.mk | 610 OBJS += wpa.c preauth.c pmksa_cache.c
|
Makefile | 718 OBJS += wpa.o preauth.o pmksa_cache.o
|
/external/wpa_supplicant_6/wpa_supplicant/ |
preauth_test.c | 2 * WPA Supplicant - test code for pre-authentication 25 #include "wpa.h" 194 rsn_preauth_deinit(wpa_s->wpa); 195 pmksa_candidate_free(wpa_s->wpa); 196 wpa_sm_deinit(wpa_s->wpa); 218 if (!rsn_preauth_in_progress(wpa_s->wpa)) 259 wpa_s->wpa = wpa_sm_init(ctx); 260 assert(wpa_s->wpa != NULL); 261 wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_PROTO, WPA_PROTO_RSN); 264 wpa_sm_set_ifname(wpa_s->wpa, wpa_s->ifname, NULL) [all...] |
wpa_supplicant.c | 2 * WPA Supplicant 24 #include "wpa.h" 147 /* IBSS/WPA-None uses only one key (Group) for both receiving and 151 wpa_printf(MSG_INFO, "WPA: Invalid mode %d (not IBSS/ad-hoc) " 152 "for WPA-None", ssid->mode); 157 wpa_printf(MSG_INFO, "WPA: No PSK configured for WPA-None"); 168 /* WPA-None uses the same Michael MIC key for both TX and RX */ 175 wpa_printf(MSG_INFO, "WPA: Invalid group cipher %d for " 176 "WPA-None", wpa_s->group_cipher) [all...] |
events.c | 2 * WPA Supplicant - Driver event processing 19 #include "wpa.h" 91 wpa_msg(wpa_s, MSG_INFO, "WPA: TKIP countermeasures stopped"); 116 if (wpa_sm_parse_own_wpa_ie(wpa_s->wpa, &ie) < 0 || 121 pmksa_set = pmksa_cache_set_current(wpa_s->wpa, 148 pmksa_candidate_add(wpa_s->wpa, data->pmkid_candidate.bssid, 237 wpa_sm_set_scard_ctx(wpa_s->wpa, wpa_s->scard); 341 wpa_printf(MSG_DEBUG, " skip WPA IE - parse failed"); 345 wpa_printf(MSG_DEBUG, " skip WPA IE - proto " 351 wpa_printf(MSG_DEBUG, " skip WPA IE - PTK cipher [all...] |
wpas_glue.c | 2 * WPA Supplicant - Glue code to setup EAPOL and RSN modules 19 #include "wpa.h" 138 wpa_printf(MSG_DEBUG, "WPA: drop TX EAPOL in non-IEEE 802.1X " 144 if (pmksa_cache_get_current(wpa_s->wpa) && 218 wpa_sm_aborted_cached(wpa_s->wpa); 285 wpa_msg(wpa_s, MSG_DEBUG, "WPA: EAPOL processing complete"); 326 if (wpa_sm_set_ap_wpa_ie(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0)) 330 if (wpa_sm_set_ap_rsn_ie(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0)) 347 /* No WPA/RSN IE found in the cached scan results. Try to get updated 584 wpa_printf(MSG_ERROR, "Failed to allocate WPA context.") [all...] |
ctrl_iface.c | 2 * WPA Supplicant / Control interface (shared code for all backends) 19 #include "wpa.h" 65 if (wpa_sm_set_param(wpa_s->wpa, RSNA_PMK_LIFETIME, 70 if (wpa_sm_set_param(wpa_s->wpa, RSNA_PMK_REAUTH_THRESHOLD, 74 if (wpa_sm_set_param(wpa_s->wpa, RSNA_SA_TIMEOUT, atoi(value))) 97 rsn_preauth_deinit(wpa_s->wpa); 98 if (rsn_preauth_init(wpa_s->wpa, bssid, ssid ? &ssid->eap : NULL)) 122 return wpa_sm_stkstart(wpa_s->wpa, peer); 141 return wpa_ft_start_over_ds(wpa_s->wpa, target_ap); 361 pos += wpa_sm_get_status(wpa_s->wpa, pos, end - pos, verbose) [all...] |
ctrl_iface_dbus_handlers.c | 2 * WPA Supplicant / dbus-based control interface 27 #include "wpa.h" 658 "WPA-PSK", "WPA-EAP", "IEEE8021X", "WPA-NONE", 684 &iter_array, "WPA-EAP")) 691 &iter_array, "WPA-PSK")) 697 &iter_array, "WPA-NONE")) 708 /***** WPA protocol */ 711 const char *args[] = { "RSN", "WPA" }; [all...] |
wpa_supplicant_i.h | 301 /* Selected configuration (based on Beacon/ProbeResp WPA IE) */ 323 struct wpa_sm *wpa; member in struct:wpa_supplicant
|
Android.mk | 638 OBJS_h += hostapd/wpa.c 970 OBJS += src/rsn_supp/wpa.c
|
Makefile | 615 OBJS_h += ../hostapd/wpa.o 947 OBJS += ../src/rsn_supp/wpa.o
|
/external/wpa_supplicant_6/wpa_supplicant/examples/ |
wpas-test.py | 68 wpa = "no" 70 wpa = "yes" 83 print " %s :: ssid='%s' wpa=%s wpa2=%s quality=%d%% rate=%d freq=%d" % (bssid, ssid, wpa, wpa2, qual, maxrate, freq)
|
/external/wpa_supplicant/wpa_gui/ |
networkconfig.ui.h | 44 else if (flags.find("[WPA-EAP") >= 0) 48 else if (flags.find("[WPA-PSK") >= 0) 108 QMessageBox::warning(this, "wpa_gui", "WPA-PSK requires a passphrase " 144 key_mgmt = "WPA-PSK"; 145 proto = "WPA"; 148 key_mgmt = "WPA-EAP"; 149 proto = "WPA"; 152 key_mgmt = "WPA-PSK"; 156 key_mgmt = "WPA-EAP"; 322 int wpa = 0 local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/wpa_gui/ |
networkconfig.ui.h | 44 else if (flags.find("[WPA-EAP") >= 0) 48 else if (flags.find("[WPA-PSK") >= 0) 108 QMessageBox::warning(this, "wpa_gui", "WPA-PSK requires a passphrase " 147 key_mgmt = "WPA-PSK"; 148 proto = "WPA"; 151 key_mgmt = "WPA-EAP"; 152 proto = "WPA"; 155 key_mgmt = "WPA-PSK"; 159 key_mgmt = "WPA-EAP"; 336 int wpa = 0 local [all...] |
/external/wpa_supplicant/wpa_gui-qt4/ |
networkconfig.cpp | 74 else if (flags.find("[WPA-EAP") >= 0) 78 else if (flags.find("[WPA-PSK") >= 0) 139 "WPA-PSK requires a passphrase " 175 key_mgmt = "WPA-PSK"; 176 proto = "WPA"; 179 key_mgmt = "WPA-EAP"; 180 proto = "WPA"; 183 key_mgmt = "WPA-PSK"; 187 key_mgmt = "WPA-EAP"; 361 int wpa = 0 local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/wpa_gui-qt4/ |
networkconfig.cpp | 77 else if (flags.indexOf("[WPA-EAP") >= 0) 81 else if (flags.indexOf("[WPA-PSK") >= 0) 192 QMessageBox::warning(this, "WPA Pre-Shared Key Error", 193 "WPA-PSK requires a passphrase " 246 key_mgmt = "WPA-PSK"; 247 proto = "WPA"; 250 key_mgmt = "WPA-EAP"; 251 proto = "WPA"; 254 key_mgmt = "WPA-PSK"; 258 key_mgmt = "WPA-EAP" 511 int wpa = 0; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver_bsd.c | 2 * WPA Supplicant - driver interaction with BSD net80211 layer 44 int prev_wpa; /* wpa state to restore on deinit */ 196 wpa_driver_bsd_set_wpa_internal(void *priv, int wpa, int privacy) 201 wpa_printf(MSG_DEBUG, "%s: wpa=%d privacy=%d", 202 __FUNCTION__, wpa, privacy); 204 if (!wpa && wpa_driver_bsd_set_wpa_ie(drv, NULL, 0) < 0) 208 if (set80211param(drv, IEEE80211_IOC_WPA, wpa) < 0) 377 "%s: ssid '%.*s' wpa ie len %u pairwise %u group %u key mgmt %u" 561 /* WPA/WPA2 support preferred */ 729 wpa_printf(MSG_DEBUG, "%s: failed to get wpa state: %s" [all...] |