/external/wpa_supplicant_6/wpa_supplicant/tests/ |
test_wpa.c | 2 * Test program for combined WPA authenticator/supplicant 21 #include "wpa.h" 23 #include "../hostapd/wpa.h" 30 struct wpa { struct 56 struct wpa *wpa = ctx; local 58 return &wpa->ssid; 64 struct wpa *wpa = ctx; local 66 os_memcpy(bssid, wpa->auth_addr, ETH_ALEN) 79 struct wpa *wpa = eloop_data; local 90 struct wpa *wpa = ctx; local 139 struct wpa *wpa = ctx; local 248 struct wpa *wpa = eloop_data; local 259 struct wpa *wpa = ctx; local 280 struct wpa *wpa = ctx; local 356 struct wpa wpa; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/tests/ |
test_wpa.c | 2 * Test program for combined WPA authenticator/supplicant 15 #include "rsn_supp/wpa.h" 17 #include "../hostapd/wpa.h" 24 struct wpa { struct 50 struct wpa *wpa = ctx; local 52 os_memcpy(bssid, wpa->auth_addr, ETH_ALEN); 65 struct wpa *wpa = eloop_data; local 68 wpa_receive(wpa->auth_group, wpa->auth, wpa->supp_eapol 76 struct wpa *wpa = ctx; local 125 struct wpa *wpa = ctx; local 227 struct wpa *wpa = eloop_data; local 238 struct wpa *wpa = ctx; local 259 struct wpa *wpa = ctx; local 335 struct wpa wpa; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/ |
preauth_test.c | 2 * WPA Supplicant - test code for pre-authentication 25 #include "wpa.h" 194 rsn_preauth_deinit(wpa_s->wpa); 195 pmksa_candidate_free(wpa_s->wpa); 196 wpa_sm_deinit(wpa_s->wpa); 218 if (!rsn_preauth_in_progress(wpa_s->wpa)) 259 wpa_s->wpa = wpa_sm_init(ctx); 260 assert(wpa_s->wpa != NULL); 261 wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_PROTO, WPA_PROTO_RSN); 264 wpa_sm_set_ifname(wpa_s->wpa, wpa_s->ifname, NULL) [all...] |
wpa_supplicant.c | 2 * WPA Supplicant 24 #include "wpa.h" 144 /* IBSS/WPA-None uses only one key (Group) for both receiving and 148 wpa_printf(MSG_INFO, "WPA: Invalid mode %d (not IBSS/ad-hoc) " 149 "for WPA-None", ssid->mode); 154 wpa_printf(MSG_INFO, "WPA: No PSK configured for WPA-None"); 165 /* WPA-None uses the same Michael MIC key for both TX and RX */ 172 wpa_printf(MSG_INFO, "WPA: Invalid group cipher %d for " 173 "WPA-None", wpa_s->group_cipher) [all...] |
events.c | 2 * WPA Supplicant - Driver event processing 19 #include "wpa.h" 91 wpa_msg(wpa_s, MSG_INFO, "WPA: TKIP countermeasures stopped"); 117 if (wpa_sm_parse_own_wpa_ie(wpa_s->wpa, &ie) < 0 || 122 pmksa_set = pmksa_cache_set_current(wpa_s->wpa, 149 pmksa_candidate_add(wpa_s->wpa, data->pmkid_candidate.bssid, 238 wpa_sm_set_scard_ctx(wpa_s->wpa, wpa_s->scard); 342 wpa_printf(MSG_DEBUG, " skip WPA IE - parse failed"); 346 wpa_printf(MSG_DEBUG, " skip WPA IE - proto " 352 wpa_printf(MSG_DEBUG, " skip WPA IE - PTK cipher [all...] |
wpas_glue.c | 2 * WPA Supplicant - Glue code to setup EAPOL and RSN modules 19 #include "wpa.h" 138 wpa_printf(MSG_DEBUG, "WPA: drop TX EAPOL in non-IEEE 802.1X " 144 if (pmksa_cache_get_current(wpa_s->wpa) && 218 wpa_sm_aborted_cached(wpa_s->wpa); 285 wpa_msg(wpa_s, MSG_DEBUG, "WPA: EAPOL processing complete"); 326 if (wpa_sm_set_ap_wpa_ie(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0)) 330 if (wpa_sm_set_ap_rsn_ie(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0)) 347 /* No WPA/RSN IE found in the cached scan results. Try to get updated 584 wpa_printf(MSG_ERROR, "Failed to allocate WPA context.") [all...] |
ctrl_iface.c | 2 * WPA Supplicant / Control interface (shared code for all backends) 19 #include "wpa.h" 65 if (wpa_sm_set_param(wpa_s->wpa, RSNA_PMK_LIFETIME, 70 if (wpa_sm_set_param(wpa_s->wpa, RSNA_PMK_REAUTH_THRESHOLD, 74 if (wpa_sm_set_param(wpa_s->wpa, RSNA_SA_TIMEOUT, atoi(value))) 97 rsn_preauth_deinit(wpa_s->wpa); 98 if (rsn_preauth_init(wpa_s->wpa, bssid, ssid ? &ssid->eap : NULL)) 122 return wpa_sm_stkstart(wpa_s->wpa, peer); 141 return wpa_ft_start_over_ds(wpa_s->wpa, target_ap); 361 pos += wpa_sm_get_status(wpa_s->wpa, pos, end - pos, verbose) [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
preauth_test.c | 2 * WPA Supplicant - test code for pre-authentication 19 #include "rsn_supp/wpa.h" 189 rsn_preauth_deinit(wpa_s->wpa); 190 pmksa_candidate_free(wpa_s->wpa); 191 wpa_sm_deinit(wpa_s->wpa); 213 if (!rsn_preauth_in_progress(wpa_s->wpa)) 255 wpa_s->wpa = wpa_sm_init(ctx); 256 assert(wpa_s->wpa != NULL); 257 wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_PROTO, WPA_PROTO_RSN); 260 wpa_sm_set_ifname(wpa_s->wpa, wpa_s->ifname, NULL) [all...] |
wpa_supplicant.c | 2 * WPA Supplicant 21 #include "rsn_supp/wpa.h" 133 /* IBSS/WPA-None uses only one key (Group) for both receiving and 137 wpa_msg(wpa_s, MSG_INFO, "WPA: Invalid mode %d (not " 138 "IBSS/ad-hoc) for WPA-None", ssid->mode); 143 wpa_msg(wpa_s, MSG_INFO, "WPA: No PSK configured for " 144 "WPA-None"); 155 /* WPA-None uses the same Michael MIC key for both TX and RX */ 162 wpa_msg(wpa_s, MSG_INFO, "WPA: Invalid group cipher %d for " 163 "WPA-None", wpa_s->group_cipher) [all...] |
events.c | 2 * WPA Supplicant - Driver event processing 13 #include "rsn_supp/wpa.h" 96 wpa_msg(wpa_s, MSG_INFO, "WPA: TKIP countermeasures stopped"); 154 if (wpa_sm_parse_own_wpa_ie(wpa_s->wpa, &ie) < 0 || 159 pmksa_set = pmksa_cache_set_current(wpa_s->wpa, 187 pmksa_candidate_add(wpa_s->wpa, data->pmkid_candidate.bssid, 278 wpa_sm_set_scard_ctx(wpa_s->wpa, wpa_s->scard); 337 /* Allow TSN if local configuration accepts WEP use without WPA/WPA2 */ 403 wpa_dbg(wpa_s, MSG_DEBUG, " skip WPA IE - parse " 412 "in WPA IE") 591 int wpa; local [all...] |
wpas_glue.c | 2 * WPA Supplicant - Glue code to setup EAPOL and RSN modules 13 #include "rsn_supp/wpa.h" 136 wpa_printf(MSG_DEBUG, "WPA: drop TX EAPOL in non-IEEE 802.1X " 142 if (pmksa_cache_get_current(wpa_s->wpa) && 215 wpa_sm_aborted_cached(wpa_s->wpa); 300 wpa_msg(wpa_s, MSG_DEBUG, "WPA: EAPOL processing complete"); 335 if (wpa_sm_set_ap_wpa_ie(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0)) 339 if (wpa_sm_set_ap_rsn_ie(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0)) 356 /* No WPA/RSN IE found in the cached scan results. Try to get updated 784 wpa_printf(MSG_ERROR, "Failed to allocate WPA context.") [all...] |
ap.c | 2 * WPA Supplicant - Basic AP mode support routines 152 bss->wpa = ssid->proto; 184 if (bss->wpa & 1) 186 if (bss->wpa & 2) { 196 if (bss->wpa && bss->ieee802_1x) 198 else if (bss->wpa) 227 * Enable WPS by default for open and WPA/WPA2-Personal network, but 236 (!(pairwise & WPA_CIPHER_CCMP) || !(bss->wpa & 2))) 237 goto no_wps; /* WPS2 does not allow WPA/TKIP-only 435 wpa_printf(MSG_WARNING, "WPA: Failed to select pairwise [all...] |
sme.c | 17 #include "rsn_supp/wpa.h" 116 if (pmksa_cache_set_current(wpa_s->wpa, NULL, bss->bssid, 124 wpa_msg(wpa_s, MSG_WARNING, "SME: Failed to set WPA " 133 wpa_msg(wpa_s, MSG_WARNING, "SME: Failed to set WPA " 161 wpa_sm_set_ft_params(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0); 164 wpa_ft_prepare_auth_request(wpa_s->wpa, ie); 184 wpa_sm_has_ptk(wpa_s->wpa)) { 412 wpa_sm_set_assoc_wpa_ie(wpa_s->wpa, elems.rsn_ie - 2, 416 wpa_sm_set_assoc_wpa_ie(wpa_s->wpa, elems.wpa_ie - 2, 419 wpa_sm_set_assoc_wpa_ie(wpa_s->wpa, NULL, 0) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/examples/ |
wpas-test.py | 68 wpa = "no" 70 wpa = "yes" 83 print " %s :: ssid='%s' wpa=%s wpa2=%s quality=%d%% rate=%d freq=%d" % (bssid, ssid, wpa, wpa2, qual, maxrate, freq)
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
wpas-test.py | 68 wpa = "no" 70 wpa = "yes" 83 print " %s :: ssid='%s' wpa=%s wpa2=%s quality=%d%% rate=%d freq=%d" % (bssid, ssid, wpa, wpa2, qual, maxrate, freq)
|
wpas-dbus-new.py | 55 val = net_obj.Get(WPAS_DBUS_BSS_INTERFACE, 'WPA', 57 wpa = "no" 59 wpa = "yes" 76 print " %s :: ssid='%s' wpa=%s wpa2=%s signal=%d rate=%d freq=%d" % (bssid, ssid, wpa, wpa2, signal, maxrate, freq)
|
wpas-dbus-new-signals.py | 62 val = net_obj.Get(WPAS_DBUS_BSS_INTERFACE, 'WPA', 64 wpa = "no" 66 wpa = "yes" 83 print " %s :: ssid='%s' wpa=%s wpa2=%s signal=%d rate=%d freq=%d" % (bssid, ssid, wpa, wpa2, signal, maxrate, freq)
|
/external/wpa_supplicant_8/src/ap/ |
ap_list.h | 32 int wpa; member in struct:ap_info
|
wpa_auth.c | 2 * IEEE 802.11 RSN / WPA Authenticator 29 #define STATE_MACHINE_DEBUG_PREFIX "WPA" 218 wpa_printf(MSG_ERROR, "Failed to get random data for WPA " 345 wpa_printf(MSG_INFO, "WPA: Not enough entropy in random pool " 357 wpa_printf(MSG_ERROR, "Failed to get random data for WPA " 365 wpa_printf(MSG_DEBUG, "WPA: Delay group state machine start " 379 * wpa_init - Initialize WPA authenticator 381 * @conf: Configuration for WPA authenticator 382 * @cb: Callback functions for WPA authenticator 383 * Returns: Pointer to WPA authenticator data or %NULL on failur [all...] |
ieee802_1x.c | 672 if (!hapd->conf->ieee802_1x && !hapd->conf->wpa && 850 if (hapd->conf->wps_state && hapd->conf->wpa && 1811 const struct wpa_eapol_key *wpa; local [all...] |
/external/wpa_supplicant_8/src/eapol_auth/ |
eapol_auth_sm.h | 19 int wpa; member in struct:eapol_auth_config
|
/external/wpa_supplicant_6/wpa_supplicant/wpa_gui/ |
networkconfig.ui.h | 44 else if (flags.find("[WPA-EAP") >= 0) 48 else if (flags.find("[WPA-PSK") >= 0) 108 QMessageBox::warning(this, "wpa_gui", "WPA-PSK requires a passphrase " 147 key_mgmt = "WPA-PSK"; 148 proto = "WPA"; 151 key_mgmt = "WPA-EAP"; 152 proto = "WPA"; 155 key_mgmt = "WPA-PSK"; 159 key_mgmt = "WPA-EAP"; 336 int wpa = 0 local [all...] |
/external/sepolicy/ |
system.te | 90 unix_socket_send(system, wpa, wpa) 156 # Create a socket for receiving info from wpa.
|
/external/wpa_supplicant_8/src/drivers/ |
driver_bsd.c | 2 * WPA Supplicant - driver interaction with BSD net80211 layer 69 int prev_wpa; /* wpa state to restore on deinit */ 352 * swap it to match with the byte order used in WPA. 445 wpa_printf(MSG_DEBUG, "%s: enable WPA= 0x%x", __func__, params->wpa); 446 if (set80211param(priv, IEEE80211_IOC_WPA, params->wpa)) { 447 printf("Unable to set WPA to %u\n", params->wpa); 463 if (!params->wpa && !params->ieee802_1x) { 464 wpa_printf(MSG_ERROR, "%s: No 802.1X or WPA enabled" [all...] |
/packages/apps/Settings/src/com/android/settings/wifi/ |
AccessPoint.java | 55 WPA, 105 case WPA: 129 boolean wpa = result.capabilities.contains("WPA-PSK"); 131 if (wpa2 && wpa) { 135 } else if (wpa) { 136 return PskType.WPA;
|