/external/wpa_supplicant_8/src/wps/ |
wps_enrollee.c | 19 static int wps_build_wps_state(struct wps_data *wps, struct wpabuf *msg) 22 if (wps->wps->ap) 23 state = wps->wps->wps_state; 26 wpa_printf(MSG_DEBUG, "WPS: * Wi-Fi Protected Setup State (%d)", 35 static int wps_build_e_hash(struct wps_data *wps, struct wpabuf *msg) 41 if (random_get_bytes(wps->snonce, 2 * WPS_SECRET_NONCE_LEN) < 0) 43 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN) [all...] |
wps_registrar.c | 142 struct wps_context *wps; member in struct:wps_registrar 206 wpa_printf(MSG_DEBUG, "WPS: Add authorized MAC " MACSTR, 210 wpa_printf(MSG_DEBUG, "WPS: Authorized MAC was " 218 wpa_hexdump(MSG_DEBUG, "WPS: Authorized MACs", 227 wpa_printf(MSG_DEBUG, "WPS: Remove authorized MAC " MACSTR, 234 wpa_printf(MSG_DEBUG, "WPS: Authorized MAC was not in the " 243 wpa_hexdump(MSG_DEBUG, "WPS: Authorized MACs", 384 wpa_printf(MSG_DEBUG, "WPS: Removing PBC session for " 386 wpa_hexdump(MSG_DEBUG, "WPS: Removed UUID-E", 407 wpa_printf(MSG_DEBUG, "WPS: Checking active PBC sessions for overlap") [all...] |
wps_attr_build.c | 21 int wps_build_public_key(struct wps_data *wps, struct wpabuf *msg) 25 wpa_printf(MSG_DEBUG, "WPS: * Public Key"); 26 wpabuf_free(wps->dh_privkey); 27 wps->dh_privkey = NULL; 28 if (wps->dev_pw_id != DEV_PW_DEFAULT && wps->wps->dh_privkey && 29 wps->wps->dh_ctx) { 30 wpa_printf(MSG_DEBUG, "WPS: Using pre-configured DH keys") [all...] |
wps_i.h | 12 #include "wps.h" 18 * struct wps_data - WPS registration protocol data 25 * wps - Pointer to long term WPS context 27 struct wps_context *wps; member in struct:wps_data 134 int wps_derive_keys(struct wps_data *wps); 135 void wps_derive_psk(struct wps_data *wps, const u8 *dev_passwd, 137 struct wpabuf * wps_decrypt_encr_settings(struct wps_data *wps, const u8 *encr, 139 void wps_fail_event(struct wps_context *wps, enum wps_msg_type msg, 141 void wps_success_event(struct wps_context *wps, const u8 *mac_addr) [all...] |
wps_common.c | 62 int wps_derive_keys(struct wps_data *wps) 70 if (wps->dh_privkey == NULL) { 71 wpa_printf(MSG_DEBUG, "WPS: Own DH private key not available"); 75 pubkey = wps->registrar ? wps->dh_pubkey_e : wps->dh_pubkey_r; 77 wpa_printf(MSG_DEBUG, "WPS: Peer DH public key not available"); 81 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH Private Key", wps->dh_privkey); 82 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH peer Public Key", pubkey) [all...] |
wps_upnp.h | 2 * UPnP WPS Device 19 struct wps_data *wps; member in struct:upnp_wps_peer 37 upnp_wps_device_init(struct upnp_wps_device_ctx *ctx, struct wps_context *wps,
|
wps_er.c | 34 static void wps_er_sta_event(struct wps_context *wps, struct wps_er_sta *sta, 40 if (wps->event_cb == NULL) 55 wps->event_cb(wps->cb_ctx, event, &data); 76 wps_er_sta_event(sta->ap->er->wps, sta, WPS_EV_ER_ENROLLEE_REMOVE); 77 if (sta->wps) 78 wps_deinit(sta->wps); 127 static void wps_er_ap_event(struct wps_context *wps, struct wps_er_ap *ap, 133 if (wps->event_cb == NULL) 150 wps->event_cb(wps->cb_ctx, event, &data) [all...] |
wps_upnp_web.c | 2 * UPnP WPS Device - Web connections 42 * WFA WPS specifications. Extra white space has been removed to save space. 195 s = iface->wps->friendly_name; 196 s = ((s && *s) ? s : "WPS Access Point"); 199 s = iface->wps->dev.manufacturer; 203 if (iface->wps->manufacturer_url) 205 iface->wps->manufacturer_url); 207 if (iface->wps->model_description) 209 iface->wps->model_description); 211 s = iface->wps->dev.model_name [all...] |
wps_er.h | 28 struct wps_data *wps; member in struct:wps_er_sta 40 struct wps_data *wps; member in struct:wps_er_ap 77 struct wps_context *wps; member in struct:wps_er
|
wps.c | 26 * wps_init - Initialize WPS Registration protocol data 27 * @cfg: WPS configuration 30 * This function is used to initialize WPS data for a registration protocol 40 data->wps = cfg->wps; 43 os_memcpy(data->uuid_r, cfg->wps->uuid, WPS_UUID_LEN); 45 os_memcpy(data->mac_addr_e, cfg->wps->dev.mac_addr, ETH_ALEN); 46 os_memcpy(data->uuid_e, cfg->wps->uuid, WPS_UUID_LEN); 57 wpa_hexdump_key(MSG_DEBUG, "WPS: AP PIN dev_password", 66 if (cfg->wps->ap && !cfg->registrar && cfg->wps->ap_nfc_dev_pw_id) [all...] |
wps_attr_process.c | 16 int wps_process_authenticator(struct wps_data *wps, const u8 *authenticator, 24 wpa_printf(MSG_DEBUG, "WPS: No Authenticator attribute " 29 if (wps->last_msg == NULL) { 30 wpa_printf(MSG_DEBUG, "WPS: Last message not available for " 38 addr[0] = wpabuf_head(wps->last_msg); 39 len[0] = wpabuf_len(wps->last_msg); 42 hmac_sha256_vector(wps->authkey, WPS_AUTHKEY_LEN, 2, addr, len, hash); 45 wpa_printf(MSG_DEBUG, "WPS: Incorrect Authenticator"); 53 int wps_process_key_wrap_auth(struct wps_data *wps, struct wpabuf *msg, 61 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute") [all...] |
/external/wpa_supplicant_8/src/ap/ |
wps_hostapd.c | 2 * hostapd / WPS integration 19 #include "wps/wps.h" 20 #include "wps/wps_defs.h" 21 #include "wps/wps_dev_attr.h" 22 #include "wps/wps_attr_parse.h" 32 #include "wps/wps_upnp.h" 34 struct wps_context *wps); 43 static void hostapd_wps_nfc_clear(struct wps_context *wps); 105 "Received new WPA/WPA2-PSK from WPS for STA " MACSTR 963 struct wps_context *wps; local 1161 struct wps_context *wps = hapd->wps; local 1716 const struct wpabuf *wps = data; local 1770 struct wps_context *wps = hapd->wps; local 1807 struct wpabuf *wps; local 1915 struct wps_context *wps = hapd->wps; local [all...] |
/frameworks/base/wifi/java/android/net/wifi/p2p/ |
WifiP2pConfig.java | 38 public WpsInfo wps; field in class:WifiP2pConfig 59 wps = new WpsInfo(); 60 wps.setup = WpsInfo.PBC; 77 wps = new WpsInfo(); 87 //Based on definitions in wps/wps_defs.h 91 wps.setup = WpsInfo.DISPLAY; 95 wps.setup = WpsInfo.PBC; 99 wps.setup = WpsInfo.KEYPAD; 102 wps.setup = WpsInfo.PBC; 111 sbuf.append("\n wps: ").append(wps) [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
wps_supplicant.c | 2 * wpa_supplicant / WPS integration 24 #include "wps/wps_attr_parse.h" 60 wpa_printf(MSG_DEBUG, "WPS: Continuing association after eapol_cb"); 86 wpa_printf(MSG_DEBUG, "WPS: PIN registration with " MACSTR 113 wpa_printf(MSG_DEBUG, "WPS: Network configuration replaced - " 119 wpa_printf(MSG_DEBUG, "WPS: Current network is " 128 wpa_printf(MSG_DEBUG, "WPS: Checking whether fast association " 132 struct wpabuf *wps; local 135 wps = wpa_bss_get_vendor_ie_multi(bss, 137 if (wps && wps_parse_msg(wps, &attr) == 0 & 1358 struct wps_context *wps; local 1678 unsigned int pbc = 0, auth = 0, pin = 0, wps = 0; local 1998 struct wps_context *wps = wpa_s->wps; local 2127 struct wps_context *wps = wpa_s->wps; local 2274 const struct wpabuf *wps = data; local 2342 struct wps_context *wps = wpa_s->wps; local 2406 struct wpabuf *wps; local 2541 struct wpabuf *wps; local 2681 struct wpabuf *wps; local [all...] |
ap.c | 29 #include "wps/wps.h" 312 * Enable WPS by default for open and WPA/WPA2-Personal network, but 346 os_memcpy(bss->uuid, wpa_s->wps->uuid, WPS_UUID_LEN); 764 if (!wpa_s->ap_iface || !wpa_s->ap_iface->bss[0]->wps) 767 reg = wpa_s->ap_iface->bss[0]->wps->registrar; 773 wpa_printf(MSG_DEBUG, "No WPS operation in progress at this " 779 * There are 2 cases to return wps cancel as success: 780 * 1. When wps cancel was initiated but no connection has been 782 * 2. Client is in the middle of exchanging WPS messages 1168 struct wps_context *wps; local [all...] |
/external/wpa_supplicant_8/src/ |
Makefile | 1 SUBDIRS=ap common crypto drivers eapol_auth eapol_supp eap_common eap_peer eap_server l2_packet p2p pae radius rsn_supp tls utils wps
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
wps-ap-cli | 41 $CLI status wps 46 echo "WPS AP" 51 echo "0: Exit wps-ap-cli"
|
wpas-dbus-new-wps.py | 14 WPAS_DBUS_WPS_INTERFACE = "fi.w1.wpa_supplicant1.Interface.WPS" 30 print "WPS event: %s" % (name) 34 print "WPS credentials: %s" % (cred) 73 wps = dbus.Interface(if_obj, WPAS_DBUS_WPS_INTERFACE) 74 wps.Start({'Role': 'enrollee', 'Type': 'pbc'})
|
/external/wpa_supplicant_8/hs20/client/ |
Makefile | 49 OBJS += ../../src/wps/httpread.o 50 OBJS += ../../src/wps/http_server.o 91 rm -f ../../src/wps/*.o 92 rm -f ../../src/wps/*.d
|
Android.mk | 40 OBJS += ../../src/wps/httpread.c 41 OBJS += ../../src/wps/http_server.c
|
/external/wpa_supplicant_8/src/radius/ |
radius_server.h | 162 * wps - Wi-Fi Protected Setup context 164 * If WPS is used with an external RADIUS server (which is quite 165 * unlikely configuration), this is used to provide a pointer to WPS 168 struct wps_context *wps; member in struct:radius_server_conf
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_wsc.c | 16 #include "wps/wps.h" 27 struct wps_data *wps; member in struct:eap_wsc_data 106 cfg.wps = sm->wps; 109 if (sm->wps == NULL || sm->wps->registrar == NULL) { 110 wpa_printf(MSG_INFO, "EAP-WSC: WPS Registrar not " 119 * Windows 7 uses Registrar mode to probe AP's WPS 142 data->wps = wps_init(&cfg) [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_wsc.c | 15 #include "wps/wps.h" 16 #include "wps/wps_defs.h" 27 struct wps_data *wps; member in struct:eap_wsc_data 151 struct wps_context *wps; local 157 wps = sm->wps; 158 if (wps == NULL) { 159 wpa_printf(MSG_ERROR, "EAP-WSC: WPS context not available"); 182 data->wps_ctx = wps; [all...] |
/hardware/broadcom/wlan/bcmdhd/wpa_supplicant_8_lib/ |
Android.mk | 34 $(WPA_SUPPL_DIR)/src/wps \
|
/hardware/qcom/wlan/qcwcn/wpa_supplicant_8_lib/ |
Android.mk | 34 $(WPA_SUPPL_DIR)/src/wps \
|