/external/wpa_supplicant/examples/ |
wpa-psk-tkip.conf | 0 # WPA-PSK/TKIP 6 ssid="example wpa-psk network" 7 key_mgmt=WPA-PSK 8 proto=WPA
|
wpa2-eap-ccmp.conf | 7 key_mgmt=WPA-EAP
|
/external/wpa_supplicant_6/wpa_supplicant/examples/ |
wpa-psk-tkip.conf | 0 # WPA-PSK/TKIP 6 ssid="example wpa-psk network" 7 key_mgmt=WPA-PSK 8 proto=WPA
|
wpa2-eap-ccmp.conf | 7 key_mgmt=WPA-EAP
|
wpas-test.py | 68 wpa = "no" 70 wpa = "yes" 83 print " %s :: ssid='%s' wpa=%s wpa2=%s quality=%d%% rate=%d freq=%d" % (bssid, ssid, wpa, wpa2, qual, maxrate, freq)
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
test_wpa.c | 2 * Test program for combined WPA authenticator/supplicant 21 #include "wpa.h" 23 #include "../hostapd/wpa.h" 30 struct wpa { struct 56 struct wpa *wpa = ctx; local 58 return &wpa->ssid; 64 struct wpa *wpa = ctx; local 66 os_memcpy(bssid, wpa->auth_addr, ETH_ALEN) 79 struct wpa *wpa = eloop_data; local 90 struct wpa *wpa = ctx; local 139 struct wpa *wpa = ctx; local 248 struct wpa *wpa = eloop_data; local 259 struct wpa *wpa = ctx; local 280 struct wpa *wpa = ctx; local 356 struct wpa wpa; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
wpa.c | 2 * WPA Supplicant - WPA state machine and EAPOL-Key processing 20 #include "wpa.h" 58 * @proto: WPA/WPA2 version (WPA_PROTO_*) 66 "WPA2/IEEE 802.1X/EAP" : "WPA/IEEE 802.1X/EAP"; 69 "WPA2-PSK" : "WPA-PSK"; 73 return "IEEE 802.1X (no WPA)"; 93 * wpa_eapol_key_send - Send WPA/RSN EAPOL-Key message 94 * @sm: Pointer to WPA state machine data from wpa_sm_init() 113 wpa_printf(MSG_DEBUG, "WPA: Failed to read BSSID for [all...] |
/external/wpa_supplicant/ |
ThirdPartyProject.prop | 8 keywords=wpa supplicant
|
wpa_supplicant.conf | 94 # parameters (e.g., WPA IE generation); this mode can also be used with 95 # non-WPA drivers when using IEEE 802.1X mode; do not try to associate with 190 # and key_mgmt=WPA-NONE (fixed group key TKIP/CCMP). In addition, ap_scan has 191 # to be set to 2 for IBSS. WPA-None requires following network block options: 192 # proto=WPA, key_mgmt=WPA-NONE, pairwise=NONE, group=TKIP (or CCMP, but not 203 # WPA = WPA/IEEE 802.11i/D3.0 205 # If not set, this defaults to: WPA RSN 208 # WPA-PSK = WPA pre-shared key (this requires 'psk' field [all...] |
defs.h | 2 * WPA Supplicant - Common definitions 40 * wpa_supplicant_set_state(). In WPA state machine (wpa.c and preauth.c), the 88 * (with or without WPA/WPA2), wpa_supplicant remains in this state 94 * WPA_4WAY_HANDSHAKE - WPA 4-Way Key Handshake in progress 96 * This state is entered when WPA/WPA2 4-Way Handshake is started. In 97 * case of WPA-PSK, this happens when receiving the first EAPOL-Key 98 * frame after association. In case of WPA-EAP, this state is entered 104 * WPA_GROUP_HANDSHAKE - WPA Group Key Handshake in progress 118 * successfully completed. With WPA, this state is entered after th [all...] |
events.c | 2 * WPA Supplicant - Driver event processing 19 #include "wpa.h" 67 wpa_sm_set_config(wpa_s->wpa, wpa_s->current_ssid); 82 wpa_msg(wpa_s, MSG_INFO, "WPA: TKIP countermeasures stopped"); 105 if (wpa_sm_parse_own_wpa_ie(wpa_s->wpa, &ie) < 0 || 110 pmksa_set = pmksa_cache_set_current(wpa_s->wpa, 137 pmksa_candidate_add(wpa_s->wpa, data->pmkid_candidate.bssid, 226 wpa_sm_set_scard_ctx(wpa_s->wpa, wpa_s->scard); 315 wpa_printf(MSG_DEBUG, " skip WPA IE - parse failed"); 319 wpa_printf(MSG_DEBUG, " skip WPA IE - proto [all...] |
preauth_test.c | 2 * WPA Supplicant - test code for pre-authentication 25 #include "wpa.h" 201 rsn_preauth_deinit(wpa_s->wpa); 202 pmksa_candidate_free(wpa_s->wpa); 203 wpa_sm_deinit(wpa_s->wpa); 225 if (!rsn_preauth_in_progress(wpa_s->wpa)) 267 wpa_s->wpa = wpa_sm_init(ctx); 268 assert(wpa_s->wpa != NULL); 269 wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_PROTO, WPA_PROTO_RSN); 272 wpa_sm_set_ifname(wpa_s->wpa, wpa_s->ifname, NULL) [all...] |
wpa.c | 2 * WPA Supplicant - WPA state machine and EAPOL-Key processing 22 #include "wpa.h" 47 /* WPA IE version 1 58 * WPA Capabilities (2 octets, little endian) (default: 0) 208 /* bit4..5 is used in WPA, but is reserved in IEEE 802.11i/RSN */ 255 * @proto: WPA/WPA2 version (WPA_PROTO_*) 263 "WPA2/IEEE 802.1X/EAP" : "WPA/IEEE 802.1X/EAP"; 266 "WPA2-PSK" : "WPA-PSK"; 270 return "IEEE 802.1X (no WPA)"; [all...] |
crypto_none.c | 2 * WPA Supplicant / Empty template functions for crypto wrapper
|
README | 0 WPA Supplicant 68 Supported WPA/IEEE 802.11i features: 69 - WPA-PSK ("WPA-Personal") 70 - WPA with EAP (e.g., with RADIUS authentication server) ("WPA-Enterprise") 97 material, they cannot be used with WPA or IEEE 802.1X WEP keying) 119 - minimal size (ca. 50 kB binary, parts of which are already needed for WPA; 132 Linux drivers that support WPA/WPA2 configuration with the generic 144 to work in WPA mode [all...] |
/external/wpa_supplicant_6/wpa_supplicant/ |
wpa_supplicant.c | 2 * WPA Supplicant 24 #include "wpa.h" 147 /* IBSS/WPA-None uses only one key (Group) for both receiving and 151 wpa_printf(MSG_INFO, "WPA: Invalid mode %d (not IBSS/ad-hoc) " 152 "for WPA-None", ssid->mode); 157 wpa_printf(MSG_INFO, "WPA: No PSK configured for WPA-None"); 168 /* WPA-None uses the same Michael MIC key for both TX and RX */ 175 wpa_printf(MSG_INFO, "WPA: Invalid group cipher %d for " 176 "WPA-None", wpa_s->group_cipher) [all...] |
preauth_test.c | 2 * WPA Supplicant - test code for pre-authentication 25 #include "wpa.h" 194 rsn_preauth_deinit(wpa_s->wpa); 195 pmksa_candidate_free(wpa_s->wpa); 196 wpa_sm_deinit(wpa_s->wpa); 218 if (!rsn_preauth_in_progress(wpa_s->wpa)) 259 wpa_s->wpa = wpa_sm_init(ctx); 260 assert(wpa_s->wpa != NULL); 261 wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_PROTO, WPA_PROTO_RSN); 264 wpa_sm_set_ifname(wpa_s->wpa, wpa_s->ifname, NULL) [all...] |
wpa_supplicant.conf | 94 # parameters (e.g., WPA IE generation); this mode can also be used with 95 # non-WPA drivers when using IEEE 802.1X mode; do not try to associate with 246 # and key_mgmt=WPA-NONE (fixed group key TKIP/CCMP). In addition, ap_scan has 247 # to be set to 2 for IBSS. WPA-None requires following network block options: 248 # proto=WPA, key_mgmt=WPA-NONE, pairwise=NONE, group=TKIP (or CCMP, but not 259 # WPA = WPA/IEEE 802.11i/D3.0 261 # If not set, this defaults to: WPA RSN 264 # WPA-PSK = WPA pre-shared key (this requires 'psk' field [all...] |
events.c | 2 * WPA Supplicant - Driver event processing 19 #include "wpa.h" 91 wpa_msg(wpa_s, MSG_INFO, "WPA: TKIP countermeasures stopped"); 116 if (wpa_sm_parse_own_wpa_ie(wpa_s->wpa, &ie) < 0 || 121 pmksa_set = pmksa_cache_set_current(wpa_s->wpa, 148 pmksa_candidate_add(wpa_s->wpa, data->pmkid_candidate.bssid, 237 wpa_sm_set_scard_ctx(wpa_s->wpa, wpa_s->scard); 341 wpa_printf(MSG_DEBUG, " skip WPA IE - parse failed"); 345 wpa_printf(MSG_DEBUG, " skip WPA IE - proto " 351 wpa_printf(MSG_DEBUG, " skip WPA IE - PTK cipher [all...] |
wpas_glue.h | 2 * WPA Supplicant - Glue code to setup EAPOL and RSN modules
|
README | 0 WPA Supplicant 68 Supported WPA/IEEE 802.11i features: 69 - WPA-PSK ("WPA-Personal") 70 - WPA with EAP (e.g., with RADIUS authentication server) ("WPA-Enterprise") 98 material, they cannot be used with WPA or IEEE 802.1X WEP keying) 120 - minimal size (ca. 50 kB binary, parts of which are already needed for WPA; 133 Linux drivers that support WPA/WPA2 configuration with the generic 145 to work in WPA mode [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/common/ |
defs.h | 2 * WPA Supplicant - Common definitions 99 * wpa_supplicant_set_state(). In WPA state machine (wpa.c and preauth.c), the 147 * (with or without WPA/WPA2), wpa_supplicant remains in this state 153 * WPA_4WAY_HANDSHAKE - WPA 4-Way Key Handshake in progress 155 * This state is entered when WPA/WPA2 4-Way Handshake is started. In 156 * case of WPA-PSK, this happens when receiving the first EAPOL-Key 157 * frame after association. In case of WPA-EAP, this state is entered 163 * WPA_GROUP_HANDSHAKE - WPA Group Key Handshake in progress 177 * successfully completed. With WPA, this state is entered after th [all...] |
/hardware/broadcom/wlan/bcm4329/src/include/proto/ |
eapol.h | 52 #define EAPOL_WPA_KEY 254 /* WPA */ 80 /* WPA/802.11i/WPA2 EAPOL-Key header field sizes */ 90 /* WPA EAPOL-Key */ 99 unsigned char id[EAPOL_WPA_KEY_ID_LEN]; /* WPA:Key ID, 802.11i/WPA2: Reserved */ 107 /* WPA/802.11i/WPA2 KEY KEY_INFO bits */ 118 /* WPA-only KEY KEY_INFO bits */
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
crypto_none.c | 2 * WPA Supplicant / Empty template functions for crypto wrapper
|
/frameworks/base/wifi/java/android/net/wifi/ |
SupplicantState.java | 75 * (with or without WPA/WPA2), wpa_supplicant remains in this state 81 * WPA 4-Way Key Handshake in progress. 83 * This state is entered when WPA/WPA2 4-Way Handshake is started. In 84 * case of WPA-PSK, this happens when receiving the first EAPOL-Key 85 * frame after association. In case of WPA-EAP, this state is entered 91 * WPA Group Key Handshake in progress. 105 * successfully completed. With WPA, this state is entered after the 106 * Group Key Handshake; with IEEE 802.1X (non-WPA) connection is
|