Home | History | Annotate | Download | only in ap

Lines Matching defs:eapol

158 			   "and signing EAPOL-Key");
183 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Sending EAPOL-Key to " MACSTR
195 struct eapol_authenticator *eapol = hapd->eapol_auth;
201 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Sending EAPOL-Key(s) to " MACSTR,
211 if (eapol->default_wep_key) {
212 ieee802_1x_tx_key_one(hapd, sta, eapol->default_wep_key_idx, 1,
213 eapol->default_wep_key,
236 * has ACKed EAPOL-Key frame */
768 * ieee802_1x_receive - Process the EAPOL frames from the Supplicant
770 * @sa: Source address (sender of the EAPOL frame)
771 * @buf: EAPOL frame
774 * This function is called for each incoming EAPOL frame from the interface
839 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Ignore EAPOL message - "
846 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Ignore EAPOL message - "
864 * Delay EAPOL frame transmission until a
866 * with EAPOL-Start. Only allow the wait to be
871 "EAPOL until EAPOL-Start is "
895 HOSTAPD_LEVEL_DEBUG, "received EAPOL-Start "
903 "STA sent EAPOL-Start");
914 HOSTAPD_LEVEL_DEBUG, "received EAPOL-Logoff "
925 wpa_printf(MSG_DEBUG, " EAPOL-Key");
934 wpa_printf(MSG_DEBUG, " EAPOL-Encapsulated-ASF-Alert");
967 * Need to enable IEEE 802.1X/EAPOL state machines for possible
968 * WPS handshake even if IEEE 802.1X/EAPOL is not used for
979 * Clear any possible EAPOL authenticator state to support
990 * Clear any possible EAPOL authenticator state to support
1016 * Delay EAPOL frame transmission until a possible WPS STA
1017 * initiates the handshake with EAPOL-Start. Only allow the
1020 wpa_printf(MSG_DEBUG, "WPS: Do not start EAPOL until "
1021 "EAPOL-Start is received");
1033 /* Setup EAPOL state machines to already authenticated state
1055 /* Setup EAPOL state machines to already authenticated state
1073 * Force EAPOL state machines to start
1075 * Supplicant to send EAPOL-Start.
1723 struct eapol_authenticator *eapol = hapd->eapol_auth;
1728 os_free(eapol->default_wep_key);
1729 eapol->default_wep_key = os_malloc(hapd->conf->default_wep_key_len);
1730 if (eapol->default_wep_key == NULL ||
1731 random_get_bytes(eapol->default_wep_key,
1734 os_free(eapol->default_wep_key);
1735 eapol->default_wep_key = NULL;
1740 eapol->default_wep_key,
1761 struct eapol_authenticator *eapol = hapd->eapol_auth;
1763 if (eapol->default_wep_key_idx >= 3)
1764 eapol->default_wep_key_idx =
1767 eapol->default_wep_key_idx++;
1770 eapol->default_wep_key_idx);
1776 os_free(eapol->default_wep_key);
1777 eapol->default_wep_key = NULL;
1785 eapol->default_wep_key_idx, 1, NULL, 0,
1786 eapol->default_wep_key,
1791 os_free(eapol->default_wep_key);
1792 eapol->default_wep_key = NULL;
2122 /* EAPOL EAP-Packet packets are eventually re-sent by either Supplicant
2123 * or Authenticator state machines, but EAPOL-Key packets are not
2124 * retransmitted in case of failure. Try to re-send failed EAPOL-Key
2130 HOSTAPD_LEVEL_DEBUG, "did not Ack EAPOL-Key "
2134 /* TODO: re-send EAPOL-Key couple of times (with short delay
2142 * to here and change the key only if the EAPOL-Key packet was Acked.
2455 * benefit IEEE 802.1X/EAPOL authentication cases, too since
2456 * the EAPOL PAE state machine would remain in HELD state for
2459 * EAPOL authentication to be started to complete connection.