HomeSort by relevance Sort by last modified time
    Searched refs:eapol (Results 1 - 25 of 32) sorted by null

1 2

  /external/wpa_supplicant_8/src/eapol_auth/
eapol_auth_sm.c 2 * IEEE 802.1X-2004 Authenticator - EAPOL state machine
27 /* EAPOL state machines are described in IEEE Std 802.1X-2004, Chap. 8.2 */
30 sm->eapol->cb.set_port_authorized(sm->eapol->conf.ctx, sm->sta, 1)
32 sm->eapol->cb.set_port_authorized(sm->eapol->conf.ctx, sm->sta, 0)
38 #define abortAuth() sm->eapol->cb.abort_auth(sm->eapol->conf.ctx, sm->sta)
39 #define txKey() sm->eapol->cb.tx_key(sm->eapol->conf.ctx, sm->sta
880 struct eapol_authenticator *eapol = sm->eapol; local
1129 struct eapol_authenticator *eapol; local
    [all...]
eapol_auth_sm.h 2 * IEEE 802.1X-2004 Authenticator - EAPOL state machine
79 void eapol_auth_deinit(struct eapol_authenticator *eapol);
81 eapol_auth_alloc(struct eapol_authenticator *eapol, const u8 *addr,
eapol_auth_sm_i.h 2 * IEEE 802.1X-2004 Authenticator - EAPOL state machine (internal definitions)
25 * struct eapol_authenticator - Global EAPOL authenticator data
147 /* EAPOL/AAA <-> EAP full authenticator interface */
162 /* Keys for encrypting and signing EAPOL-Key frames */
173 struct eapol_authenticator *eapol; member in struct:eapol_state_machine
  /external/wpa_supplicant_8/src/ap/
pmksa_cache_auth.c 126 struct eapol_state_machine *eapol)
128 if (eapol == NULL)
131 if (eapol->identity) {
132 entry->identity = os_malloc(eapol->identity_len);
134 entry->identity_len = eapol->identity_len;
135 os_memcpy(entry->identity, eapol->identity,
136 eapol->identity_len);
140 if (eapol->radius_cui)
141 entry->cui = wpabuf_dup(eapol->radius_cui);
144 radius_copy_class(&entry->radius_class, &eapol->radius_class)
    [all...]
pmksa_cache_auth.h 51 struct eapol_state_machine *eapol, int akmp);
57 struct eapol_state_machine *eapol);
ieee802_1x.c 158 "and signing EAPOL-Key");
183 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Sending EAPOL-Key to " MACSTR
195 struct eapol_authenticator *eapol = hapd->eapol_auth; local
201 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Sending EAPOL-Key(s) to " MACSTR,
211 if (eapol->default_wep_key) {
212 ieee802_1x_tx_key_one(hapd, sta, eapol->default_wep_key_idx, 1,
213 eapol->default_wep_key,
236 * has ACKed EAPOL-Key frame */
768 * ieee802_1x_receive - Process the EAPOL frames from the Supplicant
770 * @sa: Source address (sender of the EAPOL frame
1723 struct eapol_authenticator *eapol = hapd->eapol_auth; local
1761 struct eapol_authenticator *eapol = hapd->eapol_auth; local
    [all...]
wpa_auth.h 274 int session_timeout, struct eapol_state_machine *eapol);
278 struct eapol_state_machine *eapol);
wpa_auth.c 740 wpa_hexdump(MSG_DEBUG, "FT: FTIE in EAPOL-Key msg 2/4",
757 "received EAPOL-Key Error Request "
810 wpa_printf(MSG_DEBUG, "WPA: Received EAPOL-Key from " MACSTR
814 wpa_printf(MSG_INFO, "WPA: Invalid EAPOL-Key frame - "
828 wpa_printf(MSG_DEBUG, "Workaround: Allow EAPOL-Key "
831 wpa_printf(MSG_DEBUG, "Ignore EAPOL-Key with "
838 wpa_printf(MSG_DEBUG, "Ignore EAPOL-Key with "
850 /* FIX: verify that the EAPOL-Key frame was encrypted if pairwise keys
912 "received EAPOL-Key request with "
930 * WZC) update SNonce for each EAPOL-Key 2/4. Thi
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/tests/
link_test.c 3 * functions should be removed to allow IEEE 802.1X/EAPOL authenticator to
67 struct eapol_state_machine *eapol)
  /external/wpa_supplicant_8/wpa_supplicant/
eapol_test.c 332 printf("WPA: EAPOL processing complete\n");
352 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) {
353 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN);
361 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) {
362 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16);
379 sess_id = eapol_sm_get_session_id(e->wpa_s->eapol, &sess_id_len);
405 static void eapol_sm_cb(struct eapol_sm *eapol, enum eapol_supp_result result,
554 printf("Failed to allocate EAPOL context.\n");
576 wpa_s->eapol = eapol_sm_init(ctx);
577 if (wpa_s->eapol == NULL)
    [all...]
wpa_supplicant.c 245 * wpa_supplicant_initiate_eapol - Configure EAPOL state machine
248 * This function is used to configure EAPOL state machine based on the selected
263 * per-BSSID EAPOL authentication.
265 eapol_sm_notify_portControl(wpa_s->eapol, ForceAuthorized);
266 eapol_sm_notify_eap_success(wpa_s->eapol, TRUE);
267 eapol_sm_notify_eap_fail(wpa_s->eapol, FALSE);
272 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE);
273 eapol_sm_notify_eap_fail(wpa_s->eapol, FALSE);
277 eapol_sm_notify_portControl(wpa_s->eapol, ForceAuthorized);
279 eapol_sm_notify_portControl(wpa_s->eapol, Auto)
    [all...]
events.c 152 eapol_sm_invalidate_cached_session(wpa_s->eapol);
220 eapol_sm_notify_portEnabled(wpa_s->eapol, FALSE);
221 eapol_sm_notify_portValid(wpa_s->eapol, FALSE);
223 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE);
226 eapol_sm_notify_config(wpa_s->eapol, NULL, NULL);
246 eapol_sm_notify_pmkid_attempt(wpa_s->eapol, 1);
360 eapol_sm_register_scard_ctx(wpa_s->eapol, wpa_s->scard);
    [all...]
wpas_kay.c 255 session_id = eapol_sm_get_session_id(wpa_s->eapol, &id_len);
258 "Failed to get SessionID from EAPOL state machines");
283 sm = wpa_s->eapol;
291 "Failed to get MSK from EAPOL state machines");
wpas_glue.c 2 * WPA Supplicant - Glue code to setup EAPOL and RSN modules
111 * wpa_supplicant_eapol_send - Send IEEE 802.1X EAPOL packet to Authenticator
114 * @buf: EAPOL payload (after IEEE 802.1X header)
115 * @len: EAPOL payload length
118 * This function adds Ethernet and IEEE 802.1X header and sends the EAPOL frame
135 * EAPOL frames (mainly, EAPOL-Start) from EAPOL state
137 wpa_printf(MSG_DEBUG, "WPA: drop TX EAPOL in non-IEEE 802.1X "
146 * We were trying to use PMKSA caching and sending EAPOL-Star
    [all...]
ctrl_iface.c 290 if (os_strcasecmp(cmd, "EAPOL::heldPeriod") == 0) {
291 eapol_sm_configure(wpa_s->eapol,
293 } else if (os_strcasecmp(cmd, "EAPOL::authPeriod") == 0) {
294 eapol_sm_configure(wpa_s->eapol,
296 } else if (os_strcasecmp(cmd, "EAPOL::startPeriod") == 0) {
297 eapol_sm_configure(wpa_s->eapol,
299 } else if (os_strcasecmp(cmd, "EAPOL::maxStart") == 0) {
300 eapol_sm_configure(wpa_s->eapol,
    [all...]
ctrl_iface_named_pipe.c 342 eapol_sm_notify_ctrl_attached(wpa_s->eapol);
ctrl_iface_udp.c 320 eapol_sm_notify_ctrl_attached(wpa_s->eapol);
wpa_supplicant_i.h 115 * device, the bridge interface may need to be used for receiving EAPOL
117 * receiving of EAPOL frames from an additional interface.
489 struct eapol_sm *eapol; member in struct:wpa_supplicant
499 int eapol_received; /* number of EAPOL packets received after the
  /external/wpa_supplicant_8/src/rsn_supp/
preauth.c 73 static void rsn_preauth_eapol_cb(struct eapol_sm *eapol,
83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
89 res = eapol_sm_get_key(eapol, pmk, 16);
103 "pre-auth EAPOL state machines");
147 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL (preauth)", msg, msglen);
161 * -2 on layer 2 packet initialization failure, -3 on EAPOL state machine
205 wpa_printf(MSG_WARNING, "Failed to allocate EAPOL context.");
222 wpa_printf(MSG_WARNING, "RSN: Failed to initialize EAPOL "
234 * preauth EAPOL-Start frame may end up being dropped due to race
489 "EAPOL state machines:\n")
    [all...]
wpa.c 2 * WPA Supplicant - WPA state machine and EAPOL-Key processing
27 * wpa_eapol_key_send - Send WPA/RSN EAPOL-Key message
33 * @msg: EAPOL-Key message
35 * @key_mic: Pointer to the buffer to which the EAPOL-Key MIC is written
49 "EAPOL-Key destination address");
54 ") as the destination for EAPOL-Key",
61 "WPA: Failed to generate EAPOL-Key "
67 wpa_hexdump(MSG_MSGDUMP, "WPA: TX EAPOL-Key", msg, msg_len);
69 eapol_sm_notify_tx_eapol_key(sm->eapol);
76 * wpa_sm_key_request - Send EAPOL-Key Reques
    [all...]
wpa.h 116 void wpa_sm_set_eapol(struct wpa_sm *sm, struct eapol_sm *eapol);
200 static inline void wpa_sm_set_eapol(struct wpa_sm *sm, struct eapol_sm *eapol)
wpa_i.h 33 struct eapol_sm *eapol; /* EAPOL state machine from upper level code */ member in struct:wpa_sm
pmksa_cache.c 75 eapol_sm_request_reauth(pmksa->sm->eapol);
  /external/wpa_supplicant_8/src/eapol_supp/
eapol_supp_sm.h 2 * EAPOL supplicant state machines
18 * struct eapol_config - Per network configuration for EAPOL state machines
22 * accept_802_1x_keys - Accept IEEE 802.1X (non-WPA) EAPOL-Key frames
24 * This variable should be set to 1 when using EAPOL state machines
27 * process the EAPOL-Key frames.
34 * required_keys - Which EAPOL-Key packets are required
36 * This variable determines which EAPOL-Key packets are required before
78 * struct eapol_ctx - Global (for all networks) EAPOL state machine context
89 * This EAPOL state machine is used for IEEE 802.11i/RSN
95 * cb - Function to be called when EAPOL negotiation has been complete
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/dbus/
dbus_old_handlers.c     [all...]

Completed in 3646 milliseconds

1 2