/external/wpa_supplicant_8/wpa_supplicant/tests/ |
test_wpa.c | 2 * Test program for combined WPA authenticator/supplicant 15 #include "rsn_supp/wpa.h" 24 struct wpa { struct 50 struct wpa *wpa = ctx; local 52 os_memcpy(bssid, wpa->auth_addr, ETH_ALEN); 65 struct wpa *wpa = eloop_data; local 68 wpa_receive(wpa->auth_group, wpa->auth, wpa->supp_eapol 76 struct wpa *wpa = ctx; local 125 struct wpa *wpa = ctx; local 227 struct wpa *wpa = eloop_data; local 238 struct wpa *wpa = ctx; local 259 struct wpa *wpa = ctx; local 335 struct wpa wpa; local [all...] |
/external/chromium_org/chrome/test/functional/ |
chromeos_onc.py | 94 """Test adding WPA network.""" 96 'ssid-wpa': 'WPA', 106 'toplevel_wifi_wpa_psk.onc': { 'ssid-wpa': 'WPA' }, 122 'ssid-wpa': 'WPA', 136 'ssid-wpa': 'WPA'
|
/external/wpa_supplicant_8/wpa_supplicant/ |
preauth_test.c | 2 * WPA Supplicant - test code for pre-authentication 19 #include "rsn_supp/wpa.h" 183 rsn_preauth_deinit(wpa_s->wpa); 184 pmksa_candidate_free(wpa_s->wpa); 185 wpa_sm_deinit(wpa_s->wpa); 207 if (!rsn_preauth_in_progress(wpa_s->wpa)) 248 wpa_s->wpa = wpa_sm_init(ctx); 249 assert(wpa_s->wpa != NULL); 250 wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_PROTO, WPA_PROTO_RSN); 253 wpa_sm_set_ifname(wpa_s->wpa, wpa_s->ifname, NULL) [all...] |
events.c | 2 * WPA Supplicant - Driver event processing 13 #include "rsn_supp/wpa.h" 113 wpa_dbg(wpa_s, MSG_DEBUG, "Could not set WPA suites"); 138 wpa_msg(wpa_s, MSG_INFO, "WPA: TKIP countermeasures stopped"); 204 if (wpa_sm_parse_own_wpa_ie(wpa_s->wpa, &ie) < 0 || 209 pmksa_set = pmksa_cache_set_current(wpa_s->wpa, 237 pmksa_candidate_add(wpa_s->wpa, data->pmkid_candidate.bssid, 326 wpa_sm_set_scard_ctx(wpa_s->wpa, wpa_s->scard); 396 /* Allow TSN if local configuration accepts WEP use without WPA/WPA2 */ 464 wpa_dbg(wpa_s, MSG_DEBUG, " skip WPA IE - parse 709 int wpa; local [all...] |
wpa_supplicant.c | 2 * WPA Supplicant 22 #include "rsn_supp/wpa.h" 139 /* IBSS/WPA-None uses only one key (Group) for both receiving and 143 wpa_msg(wpa_s, MSG_INFO, "WPA: Invalid mode %d (not " 144 "IBSS/ad-hoc) for WPA-None", ssid->mode); 149 wpa_msg(wpa_s, MSG_INFO, "WPA: No PSK configured for " 150 "WPA-None"); 166 /* WPA-None uses the same Michael MIC key for both TX and RX */ 173 wpa_msg(wpa_s, MSG_INFO, "WPA: Invalid group cipher %d for " 174 "WPA-None", wpa_s->group_cipher) [all...] |
ap.c | 2 * WPA Supplicant - Basic AP mode support routines 168 bss->wpa = ssid->proto; 211 if ((bss->wpa & 2) && bss->rsn_pairwise == 0) 213 bss->wpa_group = wpa_select_ap_group_cipher(bss->wpa, bss->wpa_pairwise, 216 if (bss->wpa && bss->ieee802_1x) 218 else if (bss->wpa) 245 if (bss->wpa_group_rekey < 86400 && (bss->wpa & 2) && 257 * Enable WPS by default for open and WPA/WPA2-Personal network, but 266 (!(bss->rsn_pairwise & WPA_CIPHER_CCMP) || !(bss->wpa & 2))) 267 goto no_wps; /* WPS2 does not allow WPA/TKIP-onl [all...] |
wpas_glue.c | 2 * WPA Supplicant - Glue code to setup EAPOL and RSN modules 13 #include "rsn_supp/wpa.h" 136 wpa_printf(MSG_DEBUG, "WPA: drop TX EAPOL in non-IEEE 802.1X " 142 if (pmksa_cache_get_current(wpa_s->wpa) && 215 wpa_sm_aborted_cached(wpa_s->wpa); 300 wpa_msg(wpa_s, MSG_DEBUG, "WPA: EAPOL processing complete"); 335 if (wpa_sm_set_ap_wpa_ie(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0)) 339 if (wpa_sm_set_ap_rsn_ie(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0)) 356 /* No WPA/RSN IE found in the cached scan results. Try to get updated 855 wpa_printf(MSG_ERROR, "Failed to allocate WPA context.") [all...] |
sme.c | 18 #include "rsn_supp/wpa.h" 237 if (pmksa_cache_set_current(wpa_s->wpa, NULL, bss->bssid, 245 wpa_msg(wpa_s, MSG_WARNING, "SME: Failed to set WPA " 252 * Both WPA and non-WPA IEEE 802.1X enabled in configuration - 253 * use non-WPA since the scan results did not indicate that the 254 * AP is using WPA or WPA2. 263 wpa_msg(wpa_s, MSG_WARNING, "SME: Failed to set WPA " 291 wpa_sm_set_ft_params(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0); 294 wpa_ft_prepare_auth_request(wpa_s->wpa, ie) [all...] |
ctrl_iface.c | 2 * WPA Supplicant / Control interface (shared code for all backends) 19 #include "rsn_supp/wpa.h" 325 if (wpa_sm_set_param(wpa_s->wpa, RSNA_PMK_LIFETIME, 330 if (wpa_sm_set_param(wpa_s->wpa, RSNA_PMK_REAUTH_THRESHOLD, 334 if (wpa_sm_set_param(wpa_s->wpa, RSNA_SA_TIMEOUT, atoi(value))) 376 wpa_tdls_enable(wpa_s->wpa, !disabled); 500 rsn_preauth_deinit(wpa_s->wpa); 501 if (rsn_preauth_init(wpa_s->wpa, bssid, ssid ? &ssid->eap : NULL)) 525 return wpa_sm_stkstart(wpa_s->wpa, peer); 547 if (wpa_tdls_is_external_setup(wpa_s->wpa)) [all...] |
notify.c | 19 #include "rsn_supp/wpa.h" 255 if (wpa_s->wpa) 256 wpa_sm_pmksa_cache_flush(wpa_s->wpa, ssid);
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
wpas-test.py | 68 wpa = "no" 70 wpa = "yes" 83 print " %s :: ssid='%s' wpa=%s wpa2=%s quality=%d%% rate=%d freq=%d" % (bssid, ssid, wpa, wpa2, qual, maxrate, freq)
|
wpas-dbus-new.py | 55 val = net_obj.Get(WPAS_DBUS_BSS_INTERFACE, 'WPA', 57 wpa = "no" 59 wpa = "yes" 76 print " %s :: ssid='%s' wpa=%s wpa2=%s signal=%d rate=%d freq=%d" % (bssid, ssid, wpa, wpa2, signal, maxrate, freq)
|
wpas-dbus-new-signals.py | 62 val = net_obj.Get(WPAS_DBUS_BSS_INTERFACE, 'WPA', 64 wpa = "no" 66 wpa = "yes" 83 print " %s :: ssid='%s' wpa=%s wpa2=%s signal=%d rate=%d freq=%d" % (bssid, ssid, wpa, wpa2, signal, maxrate, freq)
|
/external/wpa_supplicant_8/src/eapol_auth/ |
eapol_auth_sm.h | 19 int wpa; member in struct:eapol_auth_config
|
/external/wpa_supplicant_8/src/ap/ |
wpa_auth.c | 2 * IEEE 802.11 RSN / WPA Authenticator 29 #define STATE_MACHINE_DEBUG_PREFIX "WPA" 222 wpa_printf(MSG_ERROR, "Failed to get random data for WPA " 331 wpa_printf(MSG_INFO, "WPA: Not enough entropy in random pool " 343 wpa_printf(MSG_ERROR, "Failed to get random data for WPA " 351 wpa_printf(MSG_DEBUG, "WPA: Delay group state machine start " 365 * wpa_init - Initialize WPA authenticator 367 * @conf: Configuration for WPA authenticator 368 * @cb: Callback functions for WPA authenticator 369 * Returns: Pointer to WPA authenticator data or %NULL on failur [all...] |
wps_hostapd.c | 104 "Received new WPA/WPA2-PSK from WPS for STA " MACSTR, 108 "Received new WPA/WPA2-PSK from WPS for STA " MACSTR 320 bss->wpa = 3; 322 bss->wpa = 2; 324 bss->wpa = 1; 326 bss->wpa = 0; 328 if (bss->wpa) { 340 bss->wpa_group = wpa_select_ap_group_cipher(bss->wpa, 420 int wpa; local 521 wpa = 3 [all...] |
wpa_auth_ie.c | 2 * hostapd - WPA/RSN IE and KDE definitions 83 /* WPA Capabilities; use defaults, so no need to include it */ 305 if (wpa_auth->conf.wpa & WPA_PROTO_RSN) { 321 if (wpa_auth->conf.wpa & WPA_PROTO_WPA) { 398 if (!(wpa_auth->conf.wpa & version)) { 399 wpa_printf(MSG_DEBUG, "Invalid WPA proto (%d) from " MACSTR, 468 wpa_printf(MSG_DEBUG, "Failed to parse WPA/RSN IE from " 470 wpa_hexdump(MSG_DEBUG, "WPA/RSN IE", wpa_ie, wpa_ie_len); 475 wpa_printf(MSG_DEBUG, "Invalid WPA group cipher (0x%x) from " 482 wpa_printf(MSG_DEBUG, "Invalid WPA key mgmt (0x%x) from [all...] |
ieee802_1x.c | 652 if (!hapd->conf->ieee802_1x && !hapd->conf->wpa && 830 if (hapd->conf->wps_state && hapd->conf->wpa && 857 * reassociation change from WPA-EAP to PSK. 1830 const struct wpa_eapol_key *wpa; local [all...] |
hostapd.c | 69 wpa_printf(MSG_ERROR, "Failed to re-configure WPA PSK " 73 if (hapd->conf->ieee802_1x || hapd->conf->wpa) 78 if (hapd->conf->wpa && hapd->wpa_auth == NULL) { 82 } else if (hapd->conf->wpa) { 88 wpa_printf(MSG_ERROR, "Failed to configure WPA IE for " 693 wpa_printf(MSG_ERROR, "WPA-PSK setup failed."); 751 if (hapd->conf->wpa && hostapd_setup_wpa(hapd)) 1220 bss->wpa = 0; [all...] |
/device/lge/mako/ |
BoardConfig.mk | 116 wpa.te
|
/external/wpa_supplicant_8/src/drivers/ |
driver_bsd.c | 2 * WPA Supplicant - driver interaction with BSD net80211 layer 63 int prev_wpa; /* wpa state to restore on deinit */ 395 * swap it to match with the byte order used in WPA. 488 wpa_printf(MSG_DEBUG, "%s: enable WPA= 0x%x", __func__, params->wpa); 489 if (set80211param(priv, IEEE80211_IOC_WPA, params->wpa)) { 490 printf("Unable to set WPA to %u\n", params->wpa); 506 if (!params->wpa && !params->ieee802_1x) { 507 wpa_printf(MSG_ERROR, "%s: No 802.1X or WPA enabled" [all...] |
driver_madwifi.c | 2 * WPA Supplicant - driver interaction with MADWIFI 802.11 driver 229 * Configure WPA parameters. 304 wpa_printf(MSG_DEBUG, "%s: enable WPA=0x%x", __func__, params->wpa); 305 if (set80211param(drv, IEEE80211_PARAM_WPA, params->wpa)) { 306 printf("Unable to set WPA to %u\n", params->wpa); 324 if (!params->wpa && !params->ieee802_1x) { 326 HOSTAPD_LEVEL_WARNING, "No 802.1X or WPA enabled!"); 329 if (params->wpa && madwifi_configure_wpa(drv, params) != 0) [all...] |
/packages/apps/Settings/src/com/android/settings/wifi/ |
AccessPoint.java | 55 WPA, 105 case WPA: 129 boolean wpa = result.capabilities.contains("WPA-PSK"); 131 if (wpa2 && wpa) { 135 } else if (wpa) { 136 return PskType.WPA;
|
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
networkconfig.cpp | 74 else if (flags.indexOf("[WPA-EAP") >= 0) 78 else if (flags.indexOf("[WPA-PSK") >= 0) 196 tr("WPA Pre-Shared Key Error"), 197 tr("WPA-PSK requires a passphrase of 8 to 63 " 254 key_mgmt = "WPA-PSK"; 255 proto = "WPA"; 258 key_mgmt = "WPA-EAP"; 259 proto = "WPA"; 262 key_mgmt = "WPA-PSK"; 266 key_mgmt = "WPA-EAP" 524 int wpa = 0; local [all...] |
/external/wpa_supplicant_8/hostapd/ |
ctrl_iface.c | 732 if (hapd->conf->wps_state && hapd->conf->wpa && 741 if (hapd->conf->wps_state && hapd->conf->wpa && 754 if (hapd->conf->wpa && hapd->conf->wpa_key_mgmt) { 761 ret = os_snprintf(pos, end - pos, "WPA-PSK "); 767 ret = os_snprintf(pos, end - pos, "WPA-EAP "); 788 ret = os_snprintf(pos, end - pos, "WPA-PSK-SHA256 "); 794 ret = os_snprintf(pos, end - pos, "WPA-EAP-SHA256 "); 807 if (hapd->conf->wpa) { 815 if ((hapd->conf->wpa & WPA_PROTO_RSN) && hapd->conf->rsn_pairwise) { 833 if ((hapd->conf->wpa & WPA_PROTO_WPA) && hapd->conf->wpa_pairwise) [all...] |