/external/wpa_supplicant_8/wpa_supplicant/tests/ |
test_wpa.c | 2 * Test program for combined WPA authenticator/supplicant 15 #include "rsn_supp/wpa.h" 20 struct wpa { struct 46 struct wpa *wpa = ctx; local 48 os_memcpy(bssid, wpa->auth_addr, ETH_ALEN); 61 struct wpa *wpa = eloop_data; local 64 wpa_receive(wpa->auth_group, wpa->auth, wpa->supp_eapol 72 struct wpa *wpa = ctx; local 121 struct wpa *wpa = ctx; local 223 struct wpa *wpa = eloop_data; local 234 struct wpa *wpa = ctx; local 255 struct wpa *wpa = ctx; local 331 struct wpa wpa; local [all...] |
/external/wpa_supplicant_8/src/eapol_auth/ |
eapol_auth_sm.h | 19 int wpa; member in struct:eapol_auth_config
|
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
networkconfig.cpp | 74 else if (flags.indexOf("[WPA-EAP") >= 0) 78 else if (flags.indexOf("[WPA-PSK") >= 0) 196 tr("WPA Pre-Shared Key Error"), 197 tr("WPA-PSK requires a passphrase of 8 to 63 " 254 key_mgmt = "WPA-PSK"; 255 proto = "WPA"; 258 key_mgmt = "WPA-EAP"; 259 proto = "WPA"; 262 key_mgmt = "WPA-PSK"; 266 key_mgmt = "WPA-EAP" 524 int wpa = 0; local [all...] |
/external/wpa_supplicant_8/src/ap/ |
ieee802_1x.c | 329 suite = wpa_cipher_to_suite((hapd->conf->wpa & 0x2) ? 422 if (hapd->conf->wpa && wpa_key_mgmt_ft(hapd->conf->wpa_key_mgmt) && 436 if (hapd->conf->wpa && sta->wpa_sm && 786 if (!hapd->conf->ieee802_1x && !hapd->conf->wpa && !hapd->conf->osen && 964 if (hapd->conf->wps_state && hapd->conf->wpa && 991 * reassociation change from WPA-EAP to PSK. 2114 const struct wpa_eapol_key *wpa; local [all...] |
wpa_auth.h | 2 * hostapd - IEEE 802.11i-2004 / WPA Authenticator 127 int wpa; member in struct:wpa_auth_config
|
wpa_auth_i.h | 2 * hostapd - IEEE 802.11i-2004 / WPA Authenticator: Internal definitions 72 Boolean PInitAKeys; /* WPA only, not in IEEE 802.11i */ 100 WPA_VERSION_NO_WPA = 0 /* WPA not used */, 101 WPA_VERSION_WPA = 1 /* WPA / IEEE 802.11i/D3.0 */, 103 } wpa; member in struct:wpa_state_machine
|
wps_hostapd.c | 105 "Received new WPA/WPA2-PSK from WPS for STA " MACSTR, 109 "Received new WPA/WPA2-PSK from WPS for STA " MACSTR 335 bss->wpa = 3; 337 bss->wpa = 2; 339 bss->wpa = 1; 341 bss->wpa = 0; 343 if (bss->wpa) { 355 bss->wpa_group = wpa_select_ap_group_cipher(bss->wpa, 406 int wpa; local 509 wpa = 3 [all...] |
ap_config.h | 254 int wpa; /* bitfield of WPA_PROTO_WPA, WPA_PROTO_RSN */ member in struct:hostapd_bss_config
|
/external/wpa_supplicant_8/wpa_supplicant/ |
events.c | 2 * WPA Supplicant - Driver event processing 13 #include "rsn_supp/wpa.h" 146 wpa_dbg(wpa_s, MSG_DEBUG, "Could not set WPA suites"); 174 wpa_msg(wpa_s, MSG_INFO, "WPA: TKIP countermeasures stopped"); 237 if (wpa_sm_parse_own_wpa_ie(wpa_s->wpa, &ie) < 0 || 242 pmksa_set = pmksa_cache_set_current(wpa_s->wpa, 270 pmksa_candidate_add(wpa_s->wpa, data->pmkid_candidate.bssid, 359 wpa_sm_set_scard_ctx(wpa_s->wpa, wpa_s->scard); 432 /* Allow TSN if local configuration accepts WEP use without WPA/WPA2 */ 500 wpa_dbg(wpa_s, MSG_DEBUG, " skip WPA IE - parse 746 int wpa; local [all...] |
wpa_supplicant_i.h | 428 /* Selected configuration (based on Beacon/ProbeResp WPA IE) */ 488 struct wpa_sm *wpa; member in struct:wpa_supplicant
|
/external/wpa_supplicant_8/src/drivers/ |
driver.h | 492 * wpa_ie - WPA information element for (Re)Association Request 493 * WPA information element to be included in (Re)Association 495 * of this WPA IE is optional. If the driver generates the WPA 498 * the driver has to notify wpa_supplicant about the used WPA 504 * looking at the first byte of the IE (0xdd for WPA, 0x30 for 507 * When using WPS, wpa_ie is used for WPS IE instead of WPA/RSN IE. 517 * wpa_proto - Bitfield of WPA_PROTO_* values to indicate WPA/WPA2 613 * This value is made available only for WPA/WPA2-Personal (PSK) and 624 * This value is made available only for WPA/WPA2-Personal (PSK) an 1186 int wpa; member in struct:wpa_bss_params [all...] |