HomeSort by relevance Sort by last modified time
    Searched refs:eapol (Results 1 - 25 of 29) sorted by null

1 2

  /external/wpa_supplicant_8/src/eapol_auth/
eapol_auth_sm.c 2 * IEEE 802.1X-2004 Authenticator - EAPOL state machine
27 /* EAPOL state machines are described in IEEE Std 802.1X-2004, Chap. 8.2 */
30 sm->eapol->cb.set_port_authorized(sm->eapol->conf.ctx, sm->sta, 1)
32 sm->eapol->cb.set_port_authorized(sm->eapol->conf.ctx, sm->sta, 0)
38 #define abortAuth() sm->eapol->cb.abort_auth(sm->eapol->conf.ctx, sm->sta)
39 #define txKey() sm->eapol->cb.tx_key(sm->eapol->conf.ctx, sm->sta
877 struct eapol_authenticator *eapol = sm->eapol; local
1112 struct eapol_authenticator *eapol; local
    [all...]
eapol_auth_sm.h 2 * IEEE 802.1X-2004 Authenticator - EAPOL state machine
76 void eapol_auth_deinit(struct eapol_authenticator *eapol);
78 eapol_auth_alloc(struct eapol_authenticator *eapol, const u8 *addr,
eapol_auth_sm_i.h 2 * IEEE 802.1X-2004 Authenticator - EAPOL state machine (internal definitions)
25 * struct eapol_authenticator - Global EAPOL authenticator data
147 /* EAPOL/AAA <-> EAP full authenticator interface */
162 /* Keys for encrypting and signing EAPOL-Key frames */
173 struct eapol_authenticator *eapol; member in struct:eapol_state_machine
  /external/wpa_supplicant_8/src/ap/
pmksa_cache_auth.c 124 struct eapol_state_machine *eapol)
126 if (eapol == NULL)
129 if (eapol->identity) {
130 entry->identity = os_malloc(eapol->identity_len);
132 entry->identity_len = eapol->identity_len;
133 os_memcpy(entry->identity, eapol->identity,
134 eapol->identity_len);
138 if (eapol->radius_cui)
139 entry->cui = wpabuf_dup(eapol->radius_cui);
142 radius_copy_class(&entry->radius_class, &eapol->radius_class)
    [all...]
pmksa_cache_auth.h 51 struct eapol_state_machine *eapol, int akmp);
57 struct eapol_state_machine *eapol);
ieee802_1x.c 154 "and signing EAPOL-Key");
179 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Sending EAPOL-Key to " MACSTR
291 struct eapol_authenticator *eapol = hapd->eapol_auth; local
301 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Sending EAPOL-Key(s) to " MACSTR,
317 if (eapol->default_wep_key) {
318 ieee802_1x_tx_key_one(hapd, sta, eapol->default_wep_key_idx, 1,
319 eapol->default_wep_key,
342 * has ACKed EAPOL-Key frame */
746 * ieee802_1x_receive - Process the EAPOL frames from the Supplicant
748 * @sa: Source address (sender of the EAPOL frame
1557 struct eapol_authenticator *eapol = hapd->eapol_auth; local
1595 struct eapol_authenticator *eapol = hapd->eapol_auth; local
    [all...]
wpa_auth.h 258 int session_timeout, struct eapol_state_machine *eapol);
262 struct eapol_state_machine *eapol);
wpa_auth.c 694 wpa_hexdump(MSG_DEBUG, "FT: FTIE in EAPOL-Key msg 2/4",
711 "received EAPOL-Key Error Request "
764 wpa_printf(MSG_DEBUG, "WPA: Received EAPOL-Key from " MACSTR
768 wpa_printf(MSG_INFO, "WPA: Invalid EAPOL-Key frame - "
782 wpa_printf(MSG_DEBUG, "Workaround: Allow EAPOL-Key "
785 wpa_printf(MSG_DEBUG, "Ignore EAPOL-Key with "
792 wpa_printf(MSG_DEBUG, "Ignore EAPOL-Key with "
804 /* FIX: verify that the EAPOL-Key frame was encrypted if pairwise keys
865 "received EAPOL-Key request with "
883 * WZC) update SNonce for each EAPOL-Key 2/4. Thi
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/tests/
link_test.c 3 * functions should be removed to allow IEEE 802.1X/EAPOL authenticator to
67 struct eapol_state_machine *eapol)
  /external/wpa_supplicant_8/wpa_supplicant/
eapol_test.c 321 printf("WPA: EAPOL processing complete\n");
339 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) {
340 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN);
348 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) {
349 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16);
370 static void eapol_sm_cb(struct eapol_sm *eapol, int success, void *ctx)
470 printf("Failed to allocate EAPOL context.\n");
491 wpa_s->eapol = eapol_sm_init(ctx);
492 if (wpa_s->eapol == NULL) {
494 printf("Failed to initialize EAPOL state machines.\n")
    [all...]
wpa_supplicant.c 246 * wpa_supplicant_initiate_eapol - Configure EAPOL state machine
249 * This function is used to configure EAPOL state machine based on the selected
264 * per-BSSID EAPOL authentication.
266 eapol_sm_notify_portControl(wpa_s->eapol, ForceAuthorized);
267 eapol_sm_notify_eap_success(wpa_s->eapol, TRUE);
268 eapol_sm_notify_eap_fail(wpa_s->eapol, FALSE);
273 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE);
274 eapol_sm_notify_eap_fail(wpa_s->eapol, FALSE);
278 eapol_sm_notify_portControl(wpa_s->eapol, ForceAuthorized);
280 eapol_sm_notify_portControl(wpa_s->eapol, Auto)
    [all...]
events.c 116 eapol_sm_invalidate_cached_session(wpa_s->eapol);
184 eapol_sm_notify_portEnabled(wpa_s->eapol, FALSE);
185 eapol_sm_notify_portValid(wpa_s->eapol, FALSE);
187 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE);
209 eapol_sm_notify_pmkid_attempt(wpa_s->eapol, 1);
328 eapol_sm_register_scard_ctx(wpa_s->eapol, wpa_s->scard);
    [all...]
wpas_glue.c 2 * WPA Supplicant - Glue code to setup EAPOL and RSN modules
110 * wpa_supplicant_eapol_send - Send IEEE 802.1X EAPOL packet to Authenticator
113 * @buf: EAPOL payload (after IEEE 802.1X header)
114 * @len: EAPOL payload length
117 * This function adds Ethernet and IEEE 802.1X header and sends the EAPOL frame
134 * EAPOL frames (mainly, EAPOL-Start) from EAPOL state
136 wpa_printf(MSG_DEBUG, "WPA: drop TX EAPOL in non-IEEE 802.1X "
144 /* Trying to use PMKSA caching - do not send EAPOL-Start frame
    [all...]
ctrl_iface.c 306 if (os_strcasecmp(cmd, "EAPOL::heldPeriod") == 0) {
307 eapol_sm_configure(wpa_s->eapol,
309 } else if (os_strcasecmp(cmd, "EAPOL::authPeriod") == 0) {
310 eapol_sm_configure(wpa_s->eapol,
312 } else if (os_strcasecmp(cmd, "EAPOL::startPeriod") == 0) {
313 eapol_sm_configure(wpa_s->eapol,
315 } else if (os_strcasecmp(cmd, "EAPOL::maxStart") == 0) {
316 eapol_sm_configure(wpa_s->eapol,
    [all...]
ctrl_iface_udp.c 254 eapol_sm_notify_ctrl_attached(wpa_s->eapol);
wpa_supplicant_i.h 102 * device, the bridge interface may need to be used for receiving EAPOL
104 * receiving of EAPOL frames from an additional interface.
390 struct eapol_sm *eapol; member in struct:wpa_supplicant
399 int eapol_received; /* number of EAPOL packets received after the
ctrl_iface_named_pipe.c 342 eapol_sm_notify_ctrl_attached(wpa_s->eapol);
ctrl_iface_unix.c 210 eapol_sm_notify_ctrl_attached(wpa_s->eapol);
  /external/wpa_supplicant_8/src/rsn_supp/
preauth.c 73 static void rsn_preauth_eapol_cb(struct eapol_sm *eapol, int success,
82 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
88 res = eapol_sm_get_key(eapol, pmk, 16);
102 "pre-auth EAPOL state machines");
145 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL (preauth)", msg, msglen);
159 * -2 on layer 2 packet initialization failure, -3 on EAPOL state machine
203 wpa_printf(MSG_WARNING, "Failed to allocate EAPOL context.");
220 wpa_printf(MSG_WARNING, "RSN: Failed to initialize EAPOL "
232 * preauth EAPOL-Start frame may end up being dropped due to race
487 "EAPOL state machines:\n")
    [all...]
wpa.h 111 void wpa_sm_set_eapol(struct wpa_sm *sm, struct eapol_sm *eapol);
194 static inline void wpa_sm_set_eapol(struct wpa_sm *sm, struct eapol_sm *eapol)
wpa.c 2 * WPA Supplicant - WPA state machine and EAPOL-Key processing
27 * wpa_eapol_key_send - Send WPA/RSN EAPOL-Key message
33 * @msg: EAPOL-Key message
35 * @key_mic: Pointer to the buffer to which the EAPOL-Key MIC is written
49 "EAPOL-Key destination address");
54 ") as the destination for EAPOL-Key",
61 "WPA: Failed to generate EAPOL-Key "
67 wpa_hexdump(MSG_MSGDUMP, "WPA: TX EAPOL-Key", msg, msg_len);
69 eapol_sm_notify_tx_eapol_key(sm->eapol);
76 * wpa_sm_key_request - Send EAPOL-Key Reques
    [all...]
wpa_i.h 33 struct eapol_sm *eapol; /* EAPOL state machine from upper level code */ member in struct:wpa_sm
pmksa_cache.c 75 eapol_sm_request_reauth(pmksa->sm->eapol);
  /external/wpa_supplicant_8/src/eapol_supp/
eapol_supp_sm.h 2 * EAPOL supplicant state machines
18 * struct eapol_config - Per network configuration for EAPOL state machines
22 * accept_802_1x_keys - Accept IEEE 802.1X (non-WPA) EAPOL-Key frames
24 * This variable should be set to 1 when using EAPOL state machines
27 * process the EAPOL-Key frames.
34 * required_keys - Which EAPOL-Key packets are required
36 * This variable determines which EAPOL-Key packets are required before
62 * struct eapol_ctx - Global (for all networks) EAPOL state machine context
73 * This EAPOL state machine is used for IEEE 802.11i/RSN
79 * cb - Function to be called when EAPOL negotiation has been complete
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/dbus/
dbus_old_handlers.c     [all...]

Completed in 3648 milliseconds

1 2