Home | History | Annotate | Download | only in ap

Lines Matching defs:eapol

151 			   "and signing EAPOL-Key");
176 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Sending EAPOL-Key to " MACSTR
288 struct eapol_authenticator *eapol = hapd->eapol_auth;
298 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Sending EAPOL-Key(s) to " MACSTR,
314 if (eapol->default_wep_key) {
315 ieee802_1x_tx_key_one(hapd, sta, eapol->default_wep_key_idx, 1,
316 eapol->default_wep_key,
339 * has ACKed EAPOL-Key frame */
731 * ieee802_1x_receive - Process the EAPOL frames from the Supplicant
733 * @sa: Source address (sender of the EAPOL frame)
734 * @buf: EAPOL frame
737 * This function is called for each incoming EAPOL frame from the interface
802 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Ignore EAPOL message - "
809 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Ignore EAPOL message - "
827 * Delay EAPOL frame transmission until a
829 * with EAPOL-Start. Only allow the wait to be
834 "EAPOL until EAPOL-Start is "
858 HOSTAPD_LEVEL_DEBUG, "received EAPOL-Start "
866 "STA sent EAPOL-Start");
877 HOSTAPD_LEVEL_DEBUG, "received EAPOL-Logoff "
888 wpa_printf(MSG_DEBUG, " EAPOL-Key");
897 wpa_printf(MSG_DEBUG, " EAPOL-Encapsulated-ASF-Alert");
930 * Need to enable IEEE 802.1X/EAPOL state machines for possible
931 * WPS handshake even if IEEE 802.1X/EAPOL is not used for
942 * Clear any possible EAPOL authenticator state to support
953 * Clear any possible EAPOL authenticator state to support
978 * Delay EAPOL frame transmission until a possible WPS STA
979 * initiates the handshake with EAPOL-Start. Only allow the
982 wpa_printf(MSG_DEBUG, "WPS: Do not start EAPOL until "
983 "EAPOL-Start is received");
995 /* Setup EAPOL state machines to already authenticated state
1017 /* Setup EAPOL state machines to already authenticated state
1035 * Force EAPOL state machines to start
1037 * Supplicant to send EAPOL-Start.
1542 struct eapol_authenticator *eapol = hapd->eapol_auth;
1547 os_free(eapol->default_wep_key);
1548 eapol->default_wep_key = os_malloc(hapd->conf->default_wep_key_len);
1549 if (eapol->default_wep_key == NULL ||
1550 random_get_bytes(eapol->default_wep_key,
1553 os_free(eapol->default_wep_key);
1554 eapol->default_wep_key = NULL;
1559 eapol->default_wep_key,
1580 struct eapol_authenticator *eapol = hapd->eapol_auth;
1582 if (eapol->default_wep_key_idx >= 3)
1583 eapol->default_wep_key_idx =
1586 eapol->default_wep_key_idx++;
1589 eapol->default_wep_key_idx);
1595 os_free(eapol->default_wep_key);
1596 eapol->default_wep_key = NULL;
1604 eapol->default_wep_key_idx, 1, NULL, 0,
1605 eapol->default_wep_key,
1610 os_free(eapol->default_wep_key);
1611 eapol->default_wep_key = NULL;
1933 /* EAPOL EAP-Packet packets are eventually re-sent by either Supplicant
1934 * or Authenticator state machines, but EAPOL-Key packets are not
1935 * retransmitted in case of failure. Try to re-send failed EAPOL-Key
1941 HOSTAPD_LEVEL_DEBUG, "did not Ack EAPOL-Key "
1945 /* TODO: re-send EAPOL-Key couple of times (with short delay
1953 * to here and change the key only if the EAPOL-Key packet was Acked.
2212 * benefit IEEE 802.1X/EAPOL authentication cases, too since
2213 * the EAPOL PAE state machine would remain in HELD state for
2216 * EAPOL authentication to be started to complete connection.