HomeSort by relevance Sort by last modified time
    Searched full:wpa (Results 1 - 25 of 349) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/wpa_supplicant/examples/
wpa-psk-tkip.conf 0 # WPA-PSK/TKIP
6 ssid="example wpa-psk network"
7 key_mgmt=WPA-PSK
8 proto=WPA
wpa2-eap-ccmp.conf 7 key_mgmt=WPA-EAP
  /external/wpa_supplicant_6/wpa_supplicant/examples/
wpa-psk-tkip.conf 0 # WPA-PSK/TKIP
6 ssid="example wpa-psk network"
7 key_mgmt=WPA-PSK
8 proto=WPA
wpa2-eap-ccmp.conf 7 key_mgmt=WPA-EAP
wpas-test.py 68 wpa = "no"
70 wpa = "yes"
83 print " %s :: ssid='%s' wpa=%s wpa2=%s quality=%d%% rate=%d freq=%d" % (bssid, ssid, wpa, wpa2, qual, maxrate, freq)
  /external/wpa_supplicant_6/wpa_supplicant/tests/
test_wpa.c 2 * Test program for combined WPA authenticator/supplicant
21 #include "wpa.h"
23 #include "../hostapd/wpa.h"
30 struct wpa { struct
56 struct wpa *wpa = ctx; local
58 return &wpa->ssid;
64 struct wpa *wpa = ctx; local
66 os_memcpy(bssid, wpa->auth_addr, ETH_ALEN)
79 struct wpa *wpa = eloop_data; local
90 struct wpa *wpa = ctx; local
139 struct wpa *wpa = ctx; local
248 struct wpa *wpa = eloop_data; local
259 struct wpa *wpa = ctx; local
280 struct wpa *wpa = ctx; local
356 struct wpa wpa; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
wpa.c 2 * WPA Supplicant - WPA state machine and EAPOL-Key processing
20 #include "wpa.h"
58 * @proto: WPA/WPA2 version (WPA_PROTO_*)
66 "WPA2/IEEE 802.1X/EAP" : "WPA/IEEE 802.1X/EAP";
69 "WPA2-PSK" : "WPA-PSK";
73 return "IEEE 802.1X (no WPA)";
93 * wpa_eapol_key_send - Send WPA/RSN EAPOL-Key message
94 * @sm: Pointer to WPA state machine data from wpa_sm_init()
113 wpa_printf(MSG_DEBUG, "WPA: Failed to read BSSID for
    [all...]
  /external/wpa_supplicant/
ThirdPartyProject.prop 8 keywords=wpa supplicant
wpa_supplicant.conf 94 # parameters (e.g., WPA IE generation); this mode can also be used with
95 # non-WPA drivers when using IEEE 802.1X mode; do not try to associate with
190 # and key_mgmt=WPA-NONE (fixed group key TKIP/CCMP). In addition, ap_scan has
191 # to be set to 2 for IBSS. WPA-None requires following network block options:
192 # proto=WPA, key_mgmt=WPA-NONE, pairwise=NONE, group=TKIP (or CCMP, but not
203 # WPA = WPA/IEEE 802.11i/D3.0
205 # If not set, this defaults to: WPA RSN
208 # WPA-PSK = WPA pre-shared key (this requires 'psk' field
    [all...]
defs.h 2 * WPA Supplicant - Common definitions
40 * wpa_supplicant_set_state(). In WPA state machine (wpa.c and preauth.c), the
88 * (with or without WPA/WPA2), wpa_supplicant remains in this state
94 * WPA_4WAY_HANDSHAKE - WPA 4-Way Key Handshake in progress
96 * This state is entered when WPA/WPA2 4-Way Handshake is started. In
97 * case of WPA-PSK, this happens when receiving the first EAPOL-Key
98 * frame after association. In case of WPA-EAP, this state is entered
104 * WPA_GROUP_HANDSHAKE - WPA Group Key Handshake in progress
118 * successfully completed. With WPA, this state is entered after th
    [all...]
events.c 2 * WPA Supplicant - Driver event processing
19 #include "wpa.h"
67 wpa_sm_set_config(wpa_s->wpa, wpa_s->current_ssid);
82 wpa_msg(wpa_s, MSG_INFO, "WPA: TKIP countermeasures stopped");
105 if (wpa_sm_parse_own_wpa_ie(wpa_s->wpa, &ie) < 0 ||
110 pmksa_set = pmksa_cache_set_current(wpa_s->wpa,
137 pmksa_candidate_add(wpa_s->wpa, data->pmkid_candidate.bssid,
226 wpa_sm_set_scard_ctx(wpa_s->wpa, wpa_s->scard);
315 wpa_printf(MSG_DEBUG, " skip WPA IE - parse failed");
319 wpa_printf(MSG_DEBUG, " skip WPA IE - proto
    [all...]
preauth_test.c 2 * WPA Supplicant - test code for pre-authentication
25 #include "wpa.h"
201 rsn_preauth_deinit(wpa_s->wpa);
202 pmksa_candidate_free(wpa_s->wpa);
203 wpa_sm_deinit(wpa_s->wpa);
225 if (!rsn_preauth_in_progress(wpa_s->wpa))
267 wpa_s->wpa = wpa_sm_init(ctx);
268 assert(wpa_s->wpa != NULL);
269 wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_PROTO, WPA_PROTO_RSN);
272 wpa_sm_set_ifname(wpa_s->wpa, wpa_s->ifname, NULL)
    [all...]
wpa.c 2 * WPA Supplicant - WPA state machine and EAPOL-Key processing
22 #include "wpa.h"
47 /* WPA IE version 1
58 * WPA Capabilities (2 octets, little endian) (default: 0)
208 /* bit4..5 is used in WPA, but is reserved in IEEE 802.11i/RSN */
255 * @proto: WPA/WPA2 version (WPA_PROTO_*)
263 "WPA2/IEEE 802.1X/EAP" : "WPA/IEEE 802.1X/EAP";
266 "WPA2-PSK" : "WPA-PSK";
270 return "IEEE 802.1X (no WPA)";
    [all...]
crypto_none.c 2 * WPA Supplicant / Empty template functions for crypto wrapper
README 0 WPA Supplicant
68 Supported WPA/IEEE 802.11i features:
69 - WPA-PSK ("WPA-Personal")
70 - WPA with EAP (e.g., with RADIUS authentication server) ("WPA-Enterprise")
97 material, they cannot be used with WPA or IEEE 802.1X WEP keying)
119 - minimal size (ca. 50 kB binary, parts of which are already needed for WPA;
132 Linux drivers that support WPA/WPA2 configuration with the generic
144 to work in WPA mode
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/
wpa_supplicant.c 2 * WPA Supplicant
24 #include "wpa.h"
147 /* IBSS/WPA-None uses only one key (Group) for both receiving and
151 wpa_printf(MSG_INFO, "WPA: Invalid mode %d (not IBSS/ad-hoc) "
152 "for WPA-None", ssid->mode);
157 wpa_printf(MSG_INFO, "WPA: No PSK configured for WPA-None");
168 /* WPA-None uses the same Michael MIC key for both TX and RX */
175 wpa_printf(MSG_INFO, "WPA: Invalid group cipher %d for "
176 "WPA-None", wpa_s->group_cipher)
    [all...]
preauth_test.c 2 * WPA Supplicant - test code for pre-authentication
25 #include "wpa.h"
194 rsn_preauth_deinit(wpa_s->wpa);
195 pmksa_candidate_free(wpa_s->wpa);
196 wpa_sm_deinit(wpa_s->wpa);
218 if (!rsn_preauth_in_progress(wpa_s->wpa))
259 wpa_s->wpa = wpa_sm_init(ctx);
260 assert(wpa_s->wpa != NULL);
261 wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_PROTO, WPA_PROTO_RSN);
264 wpa_sm_set_ifname(wpa_s->wpa, wpa_s->ifname, NULL)
    [all...]
wpa_supplicant.conf 94 # parameters (e.g., WPA IE generation); this mode can also be used with
95 # non-WPA drivers when using IEEE 802.1X mode; do not try to associate with
246 # and key_mgmt=WPA-NONE (fixed group key TKIP/CCMP). In addition, ap_scan has
247 # to be set to 2 for IBSS. WPA-None requires following network block options:
248 # proto=WPA, key_mgmt=WPA-NONE, pairwise=NONE, group=TKIP (or CCMP, but not
259 # WPA = WPA/IEEE 802.11i/D3.0
261 # If not set, this defaults to: WPA RSN
264 # WPA-PSK = WPA pre-shared key (this requires 'psk' field
    [all...]
events.c 2 * WPA Supplicant - Driver event processing
19 #include "wpa.h"
91 wpa_msg(wpa_s, MSG_INFO, "WPA: TKIP countermeasures stopped");
116 if (wpa_sm_parse_own_wpa_ie(wpa_s->wpa, &ie) < 0 ||
121 pmksa_set = pmksa_cache_set_current(wpa_s->wpa,
148 pmksa_candidate_add(wpa_s->wpa, data->pmkid_candidate.bssid,
237 wpa_sm_set_scard_ctx(wpa_s->wpa, wpa_s->scard);
341 wpa_printf(MSG_DEBUG, " skip WPA IE - parse failed");
345 wpa_printf(MSG_DEBUG, " skip WPA IE - proto "
351 wpa_printf(MSG_DEBUG, " skip WPA IE - PTK cipher
    [all...]
wpas_glue.h 2 * WPA Supplicant - Glue code to setup EAPOL and RSN modules
README 0 WPA Supplicant
68 Supported WPA/IEEE 802.11i features:
69 - WPA-PSK ("WPA-Personal")
70 - WPA with EAP (e.g., with RADIUS authentication server) ("WPA-Enterprise")
98 material, they cannot be used with WPA or IEEE 802.1X WEP keying)
120 - minimal size (ca. 50 kB binary, parts of which are already needed for WPA;
133 Linux drivers that support WPA/WPA2 configuration with the generic
145 to work in WPA mode
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/common/
defs.h 2 * WPA Supplicant - Common definitions
99 * wpa_supplicant_set_state(). In WPA state machine (wpa.c and preauth.c), the
147 * (with or without WPA/WPA2), wpa_supplicant remains in this state
153 * WPA_4WAY_HANDSHAKE - WPA 4-Way Key Handshake in progress
155 * This state is entered when WPA/WPA2 4-Way Handshake is started. In
156 * case of WPA-PSK, this happens when receiving the first EAPOL-Key
157 * frame after association. In case of WPA-EAP, this state is entered
163 * WPA_GROUP_HANDSHAKE - WPA Group Key Handshake in progress
177 * successfully completed. With WPA, this state is entered after th
    [all...]
  /hardware/broadcom/wlan/bcm4329/src/include/proto/
eapol.h 52 #define EAPOL_WPA_KEY 254 /* WPA */
80 /* WPA/802.11i/WPA2 EAPOL-Key header field sizes */
90 /* WPA EAPOL-Key */
99 unsigned char id[EAPOL_WPA_KEY_ID_LEN]; /* WPA:Key ID, 802.11i/WPA2: Reserved */
107 /* WPA/802.11i/WPA2 KEY KEY_INFO bits */
118 /* WPA-only KEY KEY_INFO bits */
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
crypto_none.c 2 * WPA Supplicant / Empty template functions for crypto wrapper
  /frameworks/base/wifi/java/android/net/wifi/
SupplicantState.java 75 * (with or without WPA/WPA2), wpa_supplicant remains in this state
81 * WPA 4-Way Key Handshake in progress.
83 * This state is entered when WPA/WPA2 4-Way Handshake is started. In
84 * case of WPA-PSK, this happens when receiving the first EAPOL-Key
85 * frame after association. In case of WPA-EAP, this state is entered
91 * WPA Group Key Handshake in progress.
105 * successfully completed. With WPA, this state is entered after the
106 * Group Key Handshake; with IEEE 802.1X (non-WPA) connection is

Completed in 391 milliseconds

1 2 3 4 5 6 7 8 91011>>