HomeSort by relevance Sort by last modified time
    Searched refs:wpa (Results 1 - 25 of 48) sorted by null

1 2

  /external/wpa_supplicant_8/wpa_supplicant/tests/
test_wpa.c 2 * Test program for combined WPA authenticator/supplicant
15 #include "rsn_supp/wpa.h"
24 struct wpa { struct
50 struct wpa *wpa = ctx; local
52 os_memcpy(bssid, wpa->auth_addr, ETH_ALEN);
65 struct wpa *wpa = eloop_data; local
68 wpa_receive(wpa->auth_group, wpa->auth, wpa->supp_eapol
76 struct wpa *wpa = ctx; local
125 struct wpa *wpa = ctx; local
227 struct wpa *wpa = eloop_data; local
238 struct wpa *wpa = ctx; local
259 struct wpa *wpa = ctx; local
335 struct wpa wpa; local
    [all...]
  /external/chromium_org/chrome/test/functional/
chromeos_onc.py 94 """Test adding WPA network."""
96 'ssid-wpa': 'WPA',
106 'toplevel_wifi_wpa_psk.onc': { 'ssid-wpa': 'WPA' },
122 'ssid-wpa': 'WPA',
136 'ssid-wpa': 'WPA'
  /external/wpa_supplicant_8/wpa_supplicant/
preauth_test.c 2 * WPA Supplicant - test code for pre-authentication
19 #include "rsn_supp/wpa.h"
183 rsn_preauth_deinit(wpa_s->wpa);
184 pmksa_candidate_free(wpa_s->wpa);
185 wpa_sm_deinit(wpa_s->wpa);
207 if (!rsn_preauth_in_progress(wpa_s->wpa))
248 wpa_s->wpa = wpa_sm_init(ctx);
249 assert(wpa_s->wpa != NULL);
250 wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_PROTO, WPA_PROTO_RSN);
253 wpa_sm_set_ifname(wpa_s->wpa, wpa_s->ifname, NULL)
    [all...]
events.c 2 * WPA Supplicant - Driver event processing
13 #include "rsn_supp/wpa.h"
113 wpa_dbg(wpa_s, MSG_DEBUG, "Could not set WPA suites");
138 wpa_msg(wpa_s, MSG_INFO, "WPA: TKIP countermeasures stopped");
204 if (wpa_sm_parse_own_wpa_ie(wpa_s->wpa, &ie) < 0 ||
209 pmksa_set = pmksa_cache_set_current(wpa_s->wpa,
237 pmksa_candidate_add(wpa_s->wpa, data->pmkid_candidate.bssid,
326 wpa_sm_set_scard_ctx(wpa_s->wpa, wpa_s->scard);
396 /* Allow TSN if local configuration accepts WEP use without WPA/WPA2 */
464 wpa_dbg(wpa_s, MSG_DEBUG, " skip WPA IE - parse
709 int wpa; local
    [all...]
wpa_supplicant.c 2 * WPA Supplicant
22 #include "rsn_supp/wpa.h"
139 /* IBSS/WPA-None uses only one key (Group) for both receiving and
143 wpa_msg(wpa_s, MSG_INFO, "WPA: Invalid mode %d (not "
144 "IBSS/ad-hoc) for WPA-None", ssid->mode);
149 wpa_msg(wpa_s, MSG_INFO, "WPA: No PSK configured for "
150 "WPA-None");
166 /* WPA-None uses the same Michael MIC key for both TX and RX */
173 wpa_msg(wpa_s, MSG_INFO, "WPA: Invalid group cipher %d for "
174 "WPA-None", wpa_s->group_cipher)
    [all...]
ap.c 2 * WPA Supplicant - Basic AP mode support routines
168 bss->wpa = ssid->proto;
211 if ((bss->wpa & 2) && bss->rsn_pairwise == 0)
213 bss->wpa_group = wpa_select_ap_group_cipher(bss->wpa, bss->wpa_pairwise,
216 if (bss->wpa && bss->ieee802_1x)
218 else if (bss->wpa)
245 if (bss->wpa_group_rekey < 86400 && (bss->wpa & 2) &&
257 * Enable WPS by default for open and WPA/WPA2-Personal network, but
266 (!(bss->rsn_pairwise & WPA_CIPHER_CCMP) || !(bss->wpa & 2)))
267 goto no_wps; /* WPS2 does not allow WPA/TKIP-onl
    [all...]
wpas_glue.c 2 * WPA Supplicant - Glue code to setup EAPOL and RSN modules
13 #include "rsn_supp/wpa.h"
136 wpa_printf(MSG_DEBUG, "WPA: drop TX EAPOL in non-IEEE 802.1X "
142 if (pmksa_cache_get_current(wpa_s->wpa) &&
215 wpa_sm_aborted_cached(wpa_s->wpa);
300 wpa_msg(wpa_s, MSG_DEBUG, "WPA: EAPOL processing complete");
335 if (wpa_sm_set_ap_wpa_ie(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0))
339 if (wpa_sm_set_ap_rsn_ie(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0))
356 /* No WPA/RSN IE found in the cached scan results. Try to get updated
855 wpa_printf(MSG_ERROR, "Failed to allocate WPA context.")
    [all...]
sme.c 18 #include "rsn_supp/wpa.h"
237 if (pmksa_cache_set_current(wpa_s->wpa, NULL, bss->bssid,
245 wpa_msg(wpa_s, MSG_WARNING, "SME: Failed to set WPA "
252 * Both WPA and non-WPA IEEE 802.1X enabled in configuration -
253 * use non-WPA since the scan results did not indicate that the
254 * AP is using WPA or WPA2.
263 wpa_msg(wpa_s, MSG_WARNING, "SME: Failed to set WPA "
291 wpa_sm_set_ft_params(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0);
294 wpa_ft_prepare_auth_request(wpa_s->wpa, ie)
    [all...]
ctrl_iface.c 2 * WPA Supplicant / Control interface (shared code for all backends)
19 #include "rsn_supp/wpa.h"
325 if (wpa_sm_set_param(wpa_s->wpa, RSNA_PMK_LIFETIME,
330 if (wpa_sm_set_param(wpa_s->wpa, RSNA_PMK_REAUTH_THRESHOLD,
334 if (wpa_sm_set_param(wpa_s->wpa, RSNA_SA_TIMEOUT, atoi(value)))
376 wpa_tdls_enable(wpa_s->wpa, !disabled);
500 rsn_preauth_deinit(wpa_s->wpa);
501 if (rsn_preauth_init(wpa_s->wpa, bssid, ssid ? &ssid->eap : NULL))
525 return wpa_sm_stkstart(wpa_s->wpa, peer);
547 if (wpa_tdls_is_external_setup(wpa_s->wpa))
    [all...]
notify.c 19 #include "rsn_supp/wpa.h"
255 if (wpa_s->wpa)
256 wpa_sm_pmksa_cache_flush(wpa_s->wpa, ssid);
  /external/wpa_supplicant_8/wpa_supplicant/examples/
wpas-test.py 68 wpa = "no"
70 wpa = "yes"
83 print " %s :: ssid='%s' wpa=%s wpa2=%s quality=%d%% rate=%d freq=%d" % (bssid, ssid, wpa, wpa2, qual, maxrate, freq)
wpas-dbus-new.py 55 val = net_obj.Get(WPAS_DBUS_BSS_INTERFACE, 'WPA',
57 wpa = "no"
59 wpa = "yes"
76 print " %s :: ssid='%s' wpa=%s wpa2=%s signal=%d rate=%d freq=%d" % (bssid, ssid, wpa, wpa2, signal, maxrate, freq)
wpas-dbus-new-signals.py 62 val = net_obj.Get(WPAS_DBUS_BSS_INTERFACE, 'WPA',
64 wpa = "no"
66 wpa = "yes"
83 print " %s :: ssid='%s' wpa=%s wpa2=%s signal=%d rate=%d freq=%d" % (bssid, ssid, wpa, wpa2, signal, maxrate, freq)
  /external/wpa_supplicant_8/src/eapol_auth/
eapol_auth_sm.h 19 int wpa; member in struct:eapol_auth_config
  /external/wpa_supplicant_8/src/ap/
wpa_auth.c 2 * IEEE 802.11 RSN / WPA Authenticator
29 #define STATE_MACHINE_DEBUG_PREFIX "WPA"
222 wpa_printf(MSG_ERROR, "Failed to get random data for WPA "
331 wpa_printf(MSG_INFO, "WPA: Not enough entropy in random pool "
343 wpa_printf(MSG_ERROR, "Failed to get random data for WPA "
351 wpa_printf(MSG_DEBUG, "WPA: Delay group state machine start "
365 * wpa_init - Initialize WPA authenticator
367 * @conf: Configuration for WPA authenticator
368 * @cb: Callback functions for WPA authenticator
369 * Returns: Pointer to WPA authenticator data or %NULL on failur
    [all...]
wps_hostapd.c 104 "Received new WPA/WPA2-PSK from WPS for STA " MACSTR,
108 "Received new WPA/WPA2-PSK from WPS for STA " MACSTR
320 bss->wpa = 3;
322 bss->wpa = 2;
324 bss->wpa = 1;
326 bss->wpa = 0;
328 if (bss->wpa) {
340 bss->wpa_group = wpa_select_ap_group_cipher(bss->wpa,
420 int wpa; local
521 wpa = 3
    [all...]
wpa_auth_ie.c 2 * hostapd - WPA/RSN IE and KDE definitions
83 /* WPA Capabilities; use defaults, so no need to include it */
305 if (wpa_auth->conf.wpa & WPA_PROTO_RSN) {
321 if (wpa_auth->conf.wpa & WPA_PROTO_WPA) {
398 if (!(wpa_auth->conf.wpa & version)) {
399 wpa_printf(MSG_DEBUG, "Invalid WPA proto (%d) from " MACSTR,
468 wpa_printf(MSG_DEBUG, "Failed to parse WPA/RSN IE from "
470 wpa_hexdump(MSG_DEBUG, "WPA/RSN IE", wpa_ie, wpa_ie_len);
475 wpa_printf(MSG_DEBUG, "Invalid WPA group cipher (0x%x) from "
482 wpa_printf(MSG_DEBUG, "Invalid WPA key mgmt (0x%x) from
    [all...]
ieee802_1x.c 652 if (!hapd->conf->ieee802_1x && !hapd->conf->wpa &&
830 if (hapd->conf->wps_state && hapd->conf->wpa &&
857 * reassociation change from WPA-EAP to PSK.
1830 const struct wpa_eapol_key *wpa; local
    [all...]
hostapd.c 69 wpa_printf(MSG_ERROR, "Failed to re-configure WPA PSK "
73 if (hapd->conf->ieee802_1x || hapd->conf->wpa)
78 if (hapd->conf->wpa && hapd->wpa_auth == NULL) {
82 } else if (hapd->conf->wpa) {
88 wpa_printf(MSG_ERROR, "Failed to configure WPA IE for "
693 wpa_printf(MSG_ERROR, "WPA-PSK setup failed.");
751 if (hapd->conf->wpa && hostapd_setup_wpa(hapd))
1220 bss->wpa = 0;
    [all...]
  /device/lge/mako/
BoardConfig.mk 116 wpa.te
  /external/wpa_supplicant_8/src/drivers/
driver_bsd.c 2 * WPA Supplicant - driver interaction with BSD net80211 layer
63 int prev_wpa; /* wpa state to restore on deinit */
395 * swap it to match with the byte order used in WPA.
488 wpa_printf(MSG_DEBUG, "%s: enable WPA= 0x%x", __func__, params->wpa);
489 if (set80211param(priv, IEEE80211_IOC_WPA, params->wpa)) {
490 printf("Unable to set WPA to %u\n", params->wpa);
506 if (!params->wpa && !params->ieee802_1x) {
507 wpa_printf(MSG_ERROR, "%s: No 802.1X or WPA enabled"
    [all...]
driver_madwifi.c 2 * WPA Supplicant - driver interaction with MADWIFI 802.11 driver
229 * Configure WPA parameters.
304 wpa_printf(MSG_DEBUG, "%s: enable WPA=0x%x", __func__, params->wpa);
305 if (set80211param(drv, IEEE80211_PARAM_WPA, params->wpa)) {
306 printf("Unable to set WPA to %u\n", params->wpa);
324 if (!params->wpa && !params->ieee802_1x) {
326 HOSTAPD_LEVEL_WARNING, "No 802.1X or WPA enabled!");
329 if (params->wpa && madwifi_configure_wpa(drv, params) != 0)
    [all...]
  /packages/apps/Settings/src/com/android/settings/wifi/
AccessPoint.java 55 WPA,
105 case WPA:
129 boolean wpa = result.capabilities.contains("WPA-PSK");
131 if (wpa2 && wpa) {
135 } else if (wpa) {
136 return PskType.WPA;
  /external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
networkconfig.cpp 74 else if (flags.indexOf("[WPA-EAP") >= 0)
78 else if (flags.indexOf("[WPA-PSK") >= 0)
196 tr("WPA Pre-Shared Key Error"),
197 tr("WPA-PSK requires a passphrase of 8 to 63 "
254 key_mgmt = "WPA-PSK";
255 proto = "WPA";
258 key_mgmt = "WPA-EAP";
259 proto = "WPA";
262 key_mgmt = "WPA-PSK";
266 key_mgmt = "WPA-EAP"
524 int wpa = 0; local
    [all...]
  /external/wpa_supplicant_8/hostapd/
ctrl_iface.c 732 if (hapd->conf->wps_state && hapd->conf->wpa &&
741 if (hapd->conf->wps_state && hapd->conf->wpa &&
754 if (hapd->conf->wpa && hapd->conf->wpa_key_mgmt) {
761 ret = os_snprintf(pos, end - pos, "WPA-PSK ");
767 ret = os_snprintf(pos, end - pos, "WPA-EAP ");
788 ret = os_snprintf(pos, end - pos, "WPA-PSK-SHA256 ");
794 ret = os_snprintf(pos, end - pos, "WPA-EAP-SHA256 ");
807 if (hapd->conf->wpa) {
815 if ((hapd->conf->wpa & WPA_PROTO_RSN) && hapd->conf->rsn_pairwise) {
833 if ((hapd->conf->wpa & WPA_PROTO_WPA) && hapd->conf->wpa_pairwise)
    [all...]

Completed in 742 milliseconds

1 2