HomeSort by relevance Sort by last modified time
    Searched refs:wpa (Results 1 - 25 of 62) sorted by null

1 2 3

  /external/wpa_supplicant_6/wpa_supplicant/tests/
test_wpa.c 2 * Test program for combined WPA authenticator/supplicant
21 #include "wpa.h"
23 #include "../hostapd/wpa.h"
30 struct wpa { struct
56 struct wpa *wpa = ctx; local
58 return &wpa->ssid;
64 struct wpa *wpa = ctx; local
66 os_memcpy(bssid, wpa->auth_addr, ETH_ALEN)
79 struct wpa *wpa = eloop_data; local
90 struct wpa *wpa = ctx; local
139 struct wpa *wpa = ctx; local
248 struct wpa *wpa = eloop_data; local
259 struct wpa *wpa = ctx; local
280 struct wpa *wpa = ctx; local
356 struct wpa wpa; local
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/tests/
test_wpa.c 2 * Test program for combined WPA authenticator/supplicant
15 #include "rsn_supp/wpa.h"
17 #include "../hostapd/wpa.h"
24 struct wpa { struct
50 struct wpa *wpa = ctx; local
52 os_memcpy(bssid, wpa->auth_addr, ETH_ALEN);
65 struct wpa *wpa = eloop_data; local
68 wpa_receive(wpa->auth_group, wpa->auth, wpa->supp_eapol
76 struct wpa *wpa = ctx; local
125 struct wpa *wpa = ctx; local
227 struct wpa *wpa = eloop_data; local
238 struct wpa *wpa = ctx; local
259 struct wpa *wpa = ctx; local
335 struct wpa wpa; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/
preauth_test.c 2 * WPA Supplicant - test code for pre-authentication
25 #include "wpa.h"
194 rsn_preauth_deinit(wpa_s->wpa);
195 pmksa_candidate_free(wpa_s->wpa);
196 wpa_sm_deinit(wpa_s->wpa);
218 if (!rsn_preauth_in_progress(wpa_s->wpa))
259 wpa_s->wpa = wpa_sm_init(ctx);
260 assert(wpa_s->wpa != NULL);
261 wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_PROTO, WPA_PROTO_RSN);
264 wpa_sm_set_ifname(wpa_s->wpa, wpa_s->ifname, NULL)
    [all...]
wpa_supplicant.c 2 * WPA Supplicant
24 #include "wpa.h"
144 /* IBSS/WPA-None uses only one key (Group) for both receiving and
148 wpa_printf(MSG_INFO, "WPA: Invalid mode %d (not IBSS/ad-hoc) "
149 "for WPA-None", ssid->mode);
154 wpa_printf(MSG_INFO, "WPA: No PSK configured for WPA-None");
165 /* WPA-None uses the same Michael MIC key for both TX and RX */
172 wpa_printf(MSG_INFO, "WPA: Invalid group cipher %d for "
173 "WPA-None", wpa_s->group_cipher)
    [all...]
events.c 2 * WPA Supplicant - Driver event processing
19 #include "wpa.h"
91 wpa_msg(wpa_s, MSG_INFO, "WPA: TKIP countermeasures stopped");
117 if (wpa_sm_parse_own_wpa_ie(wpa_s->wpa, &ie) < 0 ||
122 pmksa_set = pmksa_cache_set_current(wpa_s->wpa,
149 pmksa_candidate_add(wpa_s->wpa, data->pmkid_candidate.bssid,
238 wpa_sm_set_scard_ctx(wpa_s->wpa, wpa_s->scard);
342 wpa_printf(MSG_DEBUG, " skip WPA IE - parse failed");
346 wpa_printf(MSG_DEBUG, " skip WPA IE - proto "
352 wpa_printf(MSG_DEBUG, " skip WPA IE - PTK cipher
    [all...]
wpas_glue.c 2 * WPA Supplicant - Glue code to setup EAPOL and RSN modules
19 #include "wpa.h"
138 wpa_printf(MSG_DEBUG, "WPA: drop TX EAPOL in non-IEEE 802.1X "
144 if (pmksa_cache_get_current(wpa_s->wpa) &&
218 wpa_sm_aborted_cached(wpa_s->wpa);
285 wpa_msg(wpa_s, MSG_DEBUG, "WPA: EAPOL processing complete");
326 if (wpa_sm_set_ap_wpa_ie(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0))
330 if (wpa_sm_set_ap_rsn_ie(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0))
347 /* No WPA/RSN IE found in the cached scan results. Try to get updated
584 wpa_printf(MSG_ERROR, "Failed to allocate WPA context.")
    [all...]
ctrl_iface.c 2 * WPA Supplicant / Control interface (shared code for all backends)
19 #include "wpa.h"
65 if (wpa_sm_set_param(wpa_s->wpa, RSNA_PMK_LIFETIME,
70 if (wpa_sm_set_param(wpa_s->wpa, RSNA_PMK_REAUTH_THRESHOLD,
74 if (wpa_sm_set_param(wpa_s->wpa, RSNA_SA_TIMEOUT, atoi(value)))
97 rsn_preauth_deinit(wpa_s->wpa);
98 if (rsn_preauth_init(wpa_s->wpa, bssid, ssid ? &ssid->eap : NULL))
122 return wpa_sm_stkstart(wpa_s->wpa, peer);
141 return wpa_ft_start_over_ds(wpa_s->wpa, target_ap);
361 pos += wpa_sm_get_status(wpa_s->wpa, pos, end - pos, verbose)
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
preauth_test.c 2 * WPA Supplicant - test code for pre-authentication
19 #include "rsn_supp/wpa.h"
189 rsn_preauth_deinit(wpa_s->wpa);
190 pmksa_candidate_free(wpa_s->wpa);
191 wpa_sm_deinit(wpa_s->wpa);
213 if (!rsn_preauth_in_progress(wpa_s->wpa))
255 wpa_s->wpa = wpa_sm_init(ctx);
256 assert(wpa_s->wpa != NULL);
257 wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_PROTO, WPA_PROTO_RSN);
260 wpa_sm_set_ifname(wpa_s->wpa, wpa_s->ifname, NULL)
    [all...]
wpa_supplicant.c 2 * WPA Supplicant
21 #include "rsn_supp/wpa.h"
133 /* IBSS/WPA-None uses only one key (Group) for both receiving and
137 wpa_msg(wpa_s, MSG_INFO, "WPA: Invalid mode %d (not "
138 "IBSS/ad-hoc) for WPA-None", ssid->mode);
143 wpa_msg(wpa_s, MSG_INFO, "WPA: No PSK configured for "
144 "WPA-None");
155 /* WPA-None uses the same Michael MIC key for both TX and RX */
162 wpa_msg(wpa_s, MSG_INFO, "WPA: Invalid group cipher %d for "
163 "WPA-None", wpa_s->group_cipher)
    [all...]
events.c 2 * WPA Supplicant - Driver event processing
13 #include "rsn_supp/wpa.h"
96 wpa_msg(wpa_s, MSG_INFO, "WPA: TKIP countermeasures stopped");
154 if (wpa_sm_parse_own_wpa_ie(wpa_s->wpa, &ie) < 0 ||
159 pmksa_set = pmksa_cache_set_current(wpa_s->wpa,
187 pmksa_candidate_add(wpa_s->wpa, data->pmkid_candidate.bssid,
278 wpa_sm_set_scard_ctx(wpa_s->wpa, wpa_s->scard);
337 /* Allow TSN if local configuration accepts WEP use without WPA/WPA2 */
403 wpa_dbg(wpa_s, MSG_DEBUG, " skip WPA IE - parse "
412 "in WPA IE")
591 int wpa; local
    [all...]
wpas_glue.c 2 * WPA Supplicant - Glue code to setup EAPOL and RSN modules
13 #include "rsn_supp/wpa.h"
136 wpa_printf(MSG_DEBUG, "WPA: drop TX EAPOL in non-IEEE 802.1X "
142 if (pmksa_cache_get_current(wpa_s->wpa) &&
215 wpa_sm_aborted_cached(wpa_s->wpa);
300 wpa_msg(wpa_s, MSG_DEBUG, "WPA: EAPOL processing complete");
335 if (wpa_sm_set_ap_wpa_ie(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0))
339 if (wpa_sm_set_ap_rsn_ie(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0))
356 /* No WPA/RSN IE found in the cached scan results. Try to get updated
784 wpa_printf(MSG_ERROR, "Failed to allocate WPA context.")
    [all...]
ap.c 2 * WPA Supplicant - Basic AP mode support routines
152 bss->wpa = ssid->proto;
184 if (bss->wpa & 1)
186 if (bss->wpa & 2) {
196 if (bss->wpa && bss->ieee802_1x)
198 else if (bss->wpa)
227 * Enable WPS by default for open and WPA/WPA2-Personal network, but
236 (!(pairwise & WPA_CIPHER_CCMP) || !(bss->wpa & 2)))
237 goto no_wps; /* WPS2 does not allow WPA/TKIP-only
435 wpa_printf(MSG_WARNING, "WPA: Failed to select pairwise
    [all...]
sme.c 17 #include "rsn_supp/wpa.h"
116 if (pmksa_cache_set_current(wpa_s->wpa, NULL, bss->bssid,
124 wpa_msg(wpa_s, MSG_WARNING, "SME: Failed to set WPA "
133 wpa_msg(wpa_s, MSG_WARNING, "SME: Failed to set WPA "
161 wpa_sm_set_ft_params(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0);
164 wpa_ft_prepare_auth_request(wpa_s->wpa, ie);
184 wpa_sm_has_ptk(wpa_s->wpa)) {
412 wpa_sm_set_assoc_wpa_ie(wpa_s->wpa, elems.rsn_ie - 2,
416 wpa_sm_set_assoc_wpa_ie(wpa_s->wpa, elems.wpa_ie - 2,
419 wpa_sm_set_assoc_wpa_ie(wpa_s->wpa, NULL, 0)
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/examples/
wpas-test.py 68 wpa = "no"
70 wpa = "yes"
83 print " %s :: ssid='%s' wpa=%s wpa2=%s quality=%d%% rate=%d freq=%d" % (bssid, ssid, wpa, wpa2, qual, maxrate, freq)
  /external/wpa_supplicant_8/wpa_supplicant/examples/
wpas-test.py 68 wpa = "no"
70 wpa = "yes"
83 print " %s :: ssid='%s' wpa=%s wpa2=%s quality=%d%% rate=%d freq=%d" % (bssid, ssid, wpa, wpa2, qual, maxrate, freq)
wpas-dbus-new.py 55 val = net_obj.Get(WPAS_DBUS_BSS_INTERFACE, 'WPA',
57 wpa = "no"
59 wpa = "yes"
76 print " %s :: ssid='%s' wpa=%s wpa2=%s signal=%d rate=%d freq=%d" % (bssid, ssid, wpa, wpa2, signal, maxrate, freq)
wpas-dbus-new-signals.py 62 val = net_obj.Get(WPAS_DBUS_BSS_INTERFACE, 'WPA',
64 wpa = "no"
66 wpa = "yes"
83 print " %s :: ssid='%s' wpa=%s wpa2=%s signal=%d rate=%d freq=%d" % (bssid, ssid, wpa, wpa2, signal, maxrate, freq)
  /external/wpa_supplicant_8/src/ap/
ap_list.h 32 int wpa; member in struct:ap_info
wpa_auth.c 2 * IEEE 802.11 RSN / WPA Authenticator
29 #define STATE_MACHINE_DEBUG_PREFIX "WPA"
218 wpa_printf(MSG_ERROR, "Failed to get random data for WPA "
345 wpa_printf(MSG_INFO, "WPA: Not enough entropy in random pool "
357 wpa_printf(MSG_ERROR, "Failed to get random data for WPA "
365 wpa_printf(MSG_DEBUG, "WPA: Delay group state machine start "
379 * wpa_init - Initialize WPA authenticator
381 * @conf: Configuration for WPA authenticator
382 * @cb: Callback functions for WPA authenticator
383 * Returns: Pointer to WPA authenticator data or %NULL on failur
    [all...]
ieee802_1x.c 672 if (!hapd->conf->ieee802_1x && !hapd->conf->wpa &&
850 if (hapd->conf->wps_state && hapd->conf->wpa &&
1811 const struct wpa_eapol_key *wpa; local
    [all...]
  /external/wpa_supplicant_8/src/eapol_auth/
eapol_auth_sm.h 19 int wpa; member in struct:eapol_auth_config
  /external/wpa_supplicant_6/wpa_supplicant/wpa_gui/
networkconfig.ui.h 44 else if (flags.find("[WPA-EAP") >= 0)
48 else if (flags.find("[WPA-PSK") >= 0)
108 QMessageBox::warning(this, "wpa_gui", "WPA-PSK requires a passphrase "
147 key_mgmt = "WPA-PSK";
148 proto = "WPA";
151 key_mgmt = "WPA-EAP";
152 proto = "WPA";
155 key_mgmt = "WPA-PSK";
159 key_mgmt = "WPA-EAP";
336 int wpa = 0 local
    [all...]
  /external/sepolicy/
system.te 90 unix_socket_send(system, wpa, wpa)
156 # Create a socket for receiving info from wpa.
  /external/wpa_supplicant_8/src/drivers/
driver_bsd.c 2 * WPA Supplicant - driver interaction with BSD net80211 layer
69 int prev_wpa; /* wpa state to restore on deinit */
352 * swap it to match with the byte order used in WPA.
445 wpa_printf(MSG_DEBUG, "%s: enable WPA= 0x%x", __func__, params->wpa);
446 if (set80211param(priv, IEEE80211_IOC_WPA, params->wpa)) {
447 printf("Unable to set WPA to %u\n", params->wpa);
463 if (!params->wpa && !params->ieee802_1x) {
464 wpa_printf(MSG_ERROR, "%s: No 802.1X or WPA enabled"
    [all...]
  /packages/apps/Settings/src/com/android/settings/wifi/
AccessPoint.java 55 WPA,
105 case WPA:
129 boolean wpa = result.capabilities.contains("WPA-PSK");
131 if (wpa2 && wpa) {
135 } else if (wpa) {
136 return PskType.WPA;

Completed in 520 milliseconds

1 2 3