HomeSort by relevance Sort by last modified time
    Searched refs:eapol (Results 1 - 25 of 46) sorted by null

1 2

  /external/wpa_supplicant_8/src/eapol_auth/
eapol_auth_sm.c 2 * IEEE 802.1X-2004 Authenticator - EAPOL state machine
27 /* EAPOL state machines are described in IEEE Std 802.1X-2004, Chap. 8.2 */
30 sm->eapol->cb.set_port_authorized(sm->eapol->conf.ctx, sm->sta, 1)
32 sm->eapol->cb.set_port_authorized(sm->eapol->conf.ctx, sm->sta, 0)
38 #define abortAuth() sm->eapol->cb.abort_auth(sm->eapol->conf.ctx, sm->sta)
39 #define txKey() sm->eapol->cb.tx_key(sm->eapol->conf.ctx, sm->sta
867 struct eapol_authenticator *eapol = sm->eapol; local
1102 struct eapol_authenticator *eapol; local
    [all...]
eapol_auth_sm.h 2 * IEEE 802.1X-2004 Authenticator - EAPOL state machine
76 void eapol_auth_deinit(struct eapol_authenticator *eapol);
78 eapol_auth_alloc(struct eapol_authenticator *eapol, const u8 *addr,
eapol_auth_sm_i.h 2 * IEEE 802.1X-2004 Authenticator - EAPOL state machine (internal definitions)
25 * struct eapol_authenticator - Global EAPOL authenticator data
147 /* EAPOL/AAA <-> EAP full authenticator interface */
161 /* Keys for encrypting and signing EAPOL-Key frames */
172 struct eapol_authenticator *eapol; member in struct:eapol_state_machine
  /external/wpa_supplicant_8/src/ap/
pmksa_cache_auth.c 125 struct eapol_state_machine *eapol)
127 if (eapol == NULL)
130 if (eapol->identity) {
131 entry->identity = os_malloc(eapol->identity_len);
133 entry->identity_len = eapol->identity_len;
134 os_memcpy(entry->identity, eapol->identity,
135 eapol->identity_len);
140 radius_copy_class(&entry->radius_class, &eapol->radius_class);
143 entry->eap_type_authsrv = eapol->eap_type_authsrv;
144 entry->vlan_id = ((struct sta_info *) eapol->sta)->vlan_id
    [all...]
pmksa_cache_auth.h 50 struct eapol_state_machine *eapol, int akmp);
56 struct eapol_state_machine *eapol);
ieee802_1x.c 151 "and signing EAPOL-Key");
176 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Sending EAPOL-Key to " MACSTR
288 struct eapol_authenticator *eapol = hapd->eapol_auth; local
298 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Sending EAPOL-Key(s) to " MACSTR,
314 if (eapol->default_wep_key) {
315 ieee802_1x_tx_key_one(hapd, sta, eapol->default_wep_key_idx, 1,
316 eapol->default_wep_key,
339 * has ACKed EAPOL-Key frame */
654 * ieee802_1x_receive - Process the EAPOL frames from the Supplicant
656 * @sa: Source address (sender of the EAPOL frame
1428 struct eapol_authenticator *eapol = hapd->eapol_auth; local
1466 struct eapol_authenticator *eapol = hapd->eapol_auth; local
    [all...]
wpa_auth.h 254 int session_timeout, struct eapol_state_machine *eapol);
258 struct eapol_state_machine *eapol);
  /external/wpa_supplicant_6/wpa_supplicant/tests/
link_test.c 3 * functions should be removed to allow IEEE 802.1X/EAPOL authenticator to
67 struct eapol_state_machine *eapol)
  /external/wpa_supplicant_8/wpa_supplicant/tests/
link_test.c 3 * functions should be removed to allow IEEE 802.1X/EAPOL authenticator to
67 struct eapol_state_machine *eapol)
  /external/wpa_supplicant_6/wpa_supplicant/
eapol_test.c 322 printf("WPA: EAPOL processing complete\n");
340 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) {
341 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN);
349 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) {
350 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16);
371 static void eapol_sm_cb(struct eapol_sm *eapol, int success, void *ctx)
393 printf("Failed to allocate EAPOL context.\n");
413 wpa_s->eapol = eapol_sm_init(ctx);
414 if (wpa_s->eapol == NULL) {
416 printf("Failed to initialize EAPOL state machines.\n")
    [all...]
events.c 74 eapol_sm_invalidate_cached_session(wpa_s->eapol);
103 eapol_sm_notify_portEnabled(wpa_s->eapol, FALSE);
104 eapol_sm_notify_portValid(wpa_s->eapol, FALSE);
106 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE);
126 eapol_sm_notify_pmkid_attempt(wpa_s->eapol, 1);
239 eapol_sm_register_scard_ctx(wpa_s->eapol, wpa_s->scard);
876 * of the SUCCESS state and eapSuccess cleared. Without this, EAPOL PAE
883 eapol_sm_notify_portEnabled(wpa_s->eapol, FALSE);
884 eapol_sm_notify_portValid(wpa_s->eapol, FALSE);
887 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE)
    [all...]
wpa_supplicant.c 241 * wpa_supplicant_initiate_eapol - Configure EAPOL state machine
244 * This function is used to configure EAPOL state machine based on the selected
253 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE);
254 eapol_sm_notify_eap_fail(wpa_s->eapol, FALSE);
258 eapol_sm_notify_portControl(wpa_s->eapol, ForceAuthorized);
260 eapol_sm_notify_portControl(wpa_s->eapol, Auto);
285 eapol_sm_notify_config(wpa_s->eapol, &ssid->eap, &eapol_conf);
348 eapol_sm_register_scard_ctx(wpa_s->eapol, NULL);
369 eapol_sm_deinit(wpa_s->eapol);
370 wpa_s->eapol = NULL
    [all...]
wpas_glue.c 2 * WPA Supplicant - Glue code to setup EAPOL and RSN modules
112 * wpa_supplicant_eapol_send - Send IEEE 802.1X EAPOL packet to Authenticator
115 * @buf: EAPOL payload (after IEEE 802.1X header)
116 * @len: EAPOL payload length
119 * This function adds Ethernet and IEEE 802.1X header and sends the EAPOL frame
136 * EAPOL frames (mainly, EAPOL-Start) from EAPOL state
138 wpa_printf(MSG_DEBUG, "WPA: drop TX EAPOL in non-IEEE 802.1X "
146 /* Trying to use PMKSA caching - do not send EAPOL-Start frame
    [all...]
ctrl_iface.c 52 if (os_strcasecmp(cmd, "EAPOL::heldPeriod") == 0) {
53 eapol_sm_configure(wpa_s->eapol,
55 } else if (os_strcasecmp(cmd, "EAPOL::authPeriod") == 0) {
56 eapol_sm_configure(wpa_s->eapol,
58 } else if (os_strcasecmp(cmd, "EAPOL::startPeriod") == 0) {
59 eapol_sm_configure(wpa_s->eapol,
61 } else if (os_strcasecmp(cmd, "EAPOL::maxStart") == 0) {
62 eapol_sm_configure(wpa_s->eapol,
379 res = eapol_sm_get_status(wpa_s->eapol, pos, end - pos,
1036 eapol_sm_invalidate_cached_session(wpa_s->eapol);
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
eapol_test.c 320 printf("WPA: EAPOL processing complete\n");
338 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) {
339 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN);
347 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) {
348 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16);
369 static void eapol_sm_cb(struct eapol_sm *eapol, int success, void *ctx)
438 printf("Failed to allocate EAPOL context.\n");
458 wpa_s->eapol = eapol_sm_init(ctx);
459 if (wpa_s->eapol == NULL) {
461 printf("Failed to initialize EAPOL state machines.\n")
    [all...]
wpas_glue.c 2 * WPA Supplicant - Glue code to setup EAPOL and RSN modules
110 * wpa_supplicant_eapol_send - Send IEEE 802.1X EAPOL packet to Authenticator
113 * @buf: EAPOL payload (after IEEE 802.1X header)
114 * @len: EAPOL payload length
117 * This function adds Ethernet and IEEE 802.1X header and sends the EAPOL frame
134 * EAPOL frames (mainly, EAPOL-Start) from EAPOL state
136 wpa_printf(MSG_DEBUG, "WPA: drop TX EAPOL in non-IEEE 802.1X "
144 /* Trying to use PMKSA caching - do not send EAPOL-Start frame
    [all...]
wpa_supplicant.c 235 * wpa_supplicant_initiate_eapol - Configure EAPOL state machine
238 * This function is used to configure EAPOL state machine based on the selected
253 * per-BSSID EAPOL authentication.
255 eapol_sm_notify_portControl(wpa_s->eapol, ForceAuthorized);
256 eapol_sm_notify_eap_success(wpa_s->eapol, TRUE);
257 eapol_sm_notify_eap_fail(wpa_s->eapol, FALSE);
262 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE);
263 eapol_sm_notify_eap_fail(wpa_s->eapol, FALSE);
267 eapol_sm_notify_portControl(wpa_s->eapol, ForceAuthorized);
269 eapol_sm_notify_portControl(wpa_s->eapol, Auto)
    [all...]
events.c 77 eapol_sm_invalidate_cached_session(wpa_s->eapol);
140 eapol_sm_notify_portEnabled(wpa_s->eapol, FALSE);
141 eapol_sm_notify_portValid(wpa_s->eapol, FALSE);
143 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE);
163 eapol_sm_notify_pmkid_attempt(wpa_s->eapol, 1);
279 eapol_sm_register_scard_ctx(wpa_s->eapol, wpa_s->scard);
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
wpa.h 105 void wpa_sm_set_eapol(struct wpa_sm *sm, struct eapol_sm *eapol);
181 static inline void wpa_sm_set_eapol(struct wpa_sm *sm, struct eapol_sm *eapol)
wpa.c 2 * WPA Supplicant - WPA state machine and EAPOL-Key processing
93 * wpa_eapol_key_send - Send WPA/RSN EAPOL-Key message
99 * @msg: EAPOL-Key message
101 * @key_mic: Pointer to the buffer to which the EAPOL-Key MIC is written
114 "EAPOL-Key destination address");
118 ") as the destination for EAPOL-Key",
124 wpa_hexdump(MSG_MSGDUMP, "WPA: TX EAPOL-Key", msg, msg_len);
126 eapol_sm_notify_tx_eapol_key(sm->eapol);
132 * wpa_sm_key_request - Send EAPOL-Key Request
137 * Send an EAPOL-Key Request to the current authenticator. This function i
    [all...]
preauth.c 83 static void rsn_preauth_eapol_cb(struct eapol_sm *eapol, int success,
92 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
98 res = eapol_sm_get_key(eapol, pmk, 16);
111 "master session key from pre-auth EAPOL state "
155 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL (preauth)", msg, msglen);
169 * -2 on layer 2 packet initialization failure, -3 on EAPOL state machine
213 wpa_printf(MSG_WARNING, "Failed to allocate EAPOL context.");
230 wpa_printf(MSG_WARNING, "RSN: Failed to initialize EAPOL "
242 * preauth EAPOL-Start frame may end up being dropped due to race
505 "EAPOL state machines:\n")
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
preauth.c 73 static void rsn_preauth_eapol_cb(struct eapol_sm *eapol, int success,
82 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
88 res = eapol_sm_get_key(eapol, pmk, 16);
102 "pre-auth EAPOL state machines");
145 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL (preauth)", msg, msglen);
159 * -2 on layer 2 packet initialization failure, -3 on EAPOL state machine
203 wpa_printf(MSG_WARNING, "Failed to allocate EAPOL context.");
220 wpa_printf(MSG_WARNING, "RSN: Failed to initialize EAPOL "
232 * preauth EAPOL-Start frame may end up being dropped due to race
487 "EAPOL state machines:\n")
    [all...]
wpa.h 107 void wpa_sm_set_eapol(struct wpa_sm *sm, struct eapol_sm *eapol);
190 static inline void wpa_sm_set_eapol(struct wpa_sm *sm, struct eapol_sm *eapol)
  /external/wpa_supplicant_6/wpa_supplicant/src/eapol_supp/
eapol_supp_sm.h 2 * EAPOL supplicant state machines
24 * struct eapol_config - Per network configuration for EAPOL state machines
28 * accept_802_1x_keys - Accept IEEE 802.1X (non-WPA) EAPOL-Key frames
30 * This variable should be set to 1 when using EAPOL state machines
33 * process the EAPOL-Key frames.
40 * required_keys - Which EAPOL-Key packets are required
42 * This variable determines which EAPOL-Key packets are required before
68 * struct eapol_ctx - Global (for all networks) EAPOL state machine context
79 * This EAPOL state machine is used for IEEE 802.11i/RSN
85 * cb - Function to be called when EAPOL negotiation has been complete
    [all...]
  /external/wpa_supplicant_8/src/eapol_supp/
eapol_supp_sm.h 2 * EAPOL supplicant state machines
18 * struct eapol_config - Per network configuration for EAPOL state machines
22 * accept_802_1x_keys - Accept IEEE 802.1X (non-WPA) EAPOL-Key frames
24 * This variable should be set to 1 when using EAPOL state machines
27 * process the EAPOL-Key frames.
34 * required_keys - Which EAPOL-Key packets are required
36 * This variable determines which EAPOL-Key packets are required before
62 * struct eapol_ctx - Global (for all networks) EAPOL state machine context
73 * This EAPOL state machine is used for IEEE 802.11i/RSN
79 * cb - Function to be called when EAPOL negotiation has been complete
    [all...]

Completed in 1526 milliseconds

1 2