/external/wpa_supplicant_8/wpa_supplicant/tests/ |
test_wpa.c | 2 * Test program for combined WPA authenticator/supplicant 15 #include "rsn_supp/wpa.h" 20 struct wpa { struct 46 struct wpa *wpa = ctx; local 48 os_memcpy(bssid, wpa->auth_addr, ETH_ALEN); 61 struct wpa *wpa = eloop_data; local 64 wpa_receive(wpa->auth_group, wpa->auth, wpa->supp_eapol 72 struct wpa *wpa = ctx; local 121 struct wpa *wpa = ctx; local 223 struct wpa *wpa = eloop_data; local 234 struct wpa *wpa = ctx; local 255 struct wpa *wpa = ctx; local 331 struct wpa wpa; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
preauth_test.c | 2 * WPA Supplicant - test code for pre-authentication 19 #include "rsn_supp/wpa.h" 180 rsn_preauth_deinit(wpa_s->wpa); 181 pmksa_candidate_free(wpa_s->wpa); 182 wpa_sm_deinit(wpa_s->wpa); 204 if (!rsn_preauth_in_progress(wpa_s->wpa)) 245 wpa_s->wpa = wpa_sm_init(ctx); 246 assert(wpa_s->wpa != NULL); 247 wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_PROTO, WPA_PROTO_RSN); 250 wpa_sm_set_ifname(wpa_s->wpa, wpa_s->ifname, NULL) [all...] |
events.c | 2 * WPA Supplicant - Driver event processing 13 #include "rsn_supp/wpa.h" 146 wpa_dbg(wpa_s, MSG_DEBUG, "Could not set WPA suites"); 174 wpa_msg(wpa_s, MSG_INFO, "WPA: TKIP countermeasures stopped"); 237 if (wpa_sm_parse_own_wpa_ie(wpa_s->wpa, &ie) < 0 || 242 pmksa_set = pmksa_cache_set_current(wpa_s->wpa, 270 pmksa_candidate_add(wpa_s->wpa, data->pmkid_candidate.bssid, 359 wpa_sm_set_scard_ctx(wpa_s->wpa, wpa_s->scard); 432 /* Allow TSN if local configuration accepts WEP use without WPA/WPA2 */ 500 wpa_dbg(wpa_s, MSG_DEBUG, " skip WPA IE - parse 746 int wpa; local [all...] |
wpa_supplicant.c | 2 * WPA Supplicant 22 #include "rsn_supp/wpa.h" 138 /* IBSS/WPA-None uses only one key (Group) for both receiving and 142 wpa_msg(wpa_s, MSG_INFO, "WPA: Invalid mode %d (not " 143 "IBSS/ad-hoc) for WPA-None", ssid->mode); 148 wpa_msg(wpa_s, MSG_INFO, "WPA: No PSK configured for " 149 "WPA-None"); 165 /* WPA-None uses the same Michael MIC key for both TX and RX */ 172 wpa_msg(wpa_s, MSG_INFO, "WPA: Invalid group cipher %d for " 173 "WPA-None", wpa_s->group_cipher) [all...] |
wpas_glue.c | 2 * WPA Supplicant - Glue code to setup EAPOL and RSN modules 13 #include "rsn_supp/wpa.h" 137 wpa_printf(MSG_DEBUG, "WPA: drop TX EAPOL in non-IEEE 802.1X " 143 if (pmksa_cache_get_current(wpa_s->wpa) && 234 wpa_sm_aborted_cached(wpa_s->wpa); 340 wpa_msg(wpa_s, MSG_DEBUG, "WPA: EAPOL processing complete"); 375 if (wpa_sm_set_ap_wpa_ie(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0)) 379 if (wpa_sm_set_ap_rsn_ie(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0)) 396 /* No WPA/RSN IE found in the cached scan results. Try to get updated 908 wpa_printf(MSG_ERROR, "Failed to allocate WPA context.") [all...] |
ap.c | 2 * WPA Supplicant - Basic AP mode support routines 216 bss->wpa = ssid->proto; 259 if ((bss->wpa & 2) && bss->rsn_pairwise == 0) 261 bss->wpa_group = wpa_select_ap_group_cipher(bss->wpa, bss->wpa_pairwise, 264 if (bss->wpa && bss->ieee802_1x) 266 else if (bss->wpa) 293 if (bss->wpa_group_rekey < 86400 && (bss->wpa & 2) && 312 * Enable WPS by default for open and WPA/WPA2-Personal network, but 320 (!(bss->rsn_pairwise & WPA_CIPHER_CCMP) || !(bss->wpa & 2))) 321 goto no_wps; /* WPS2 does not allow WPA/TKIP-onl [all...] |
sme.c | 18 #include "rsn_supp/wpa.h" 238 if (pmksa_cache_set_current(wpa_s->wpa, NULL, bss->bssid, 246 wpa_msg(wpa_s, MSG_WARNING, "SME: Failed to set WPA " 254 * Both WPA and non-WPA IEEE 802.1X enabled in configuration - 255 * use non-WPA since the scan results did not indicate that the 256 * AP is using WPA or WPA2. 265 wpa_msg(wpa_s, MSG_WARNING, "SME: Failed to set WPA " 294 wpa_sm_set_ft_params(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0); 297 wpa_ft_prepare_auth_request(wpa_s->wpa, ie) [all...] |
ctrl_iface.c | 2 * WPA Supplicant / Control interface (shared code for all backends) 20 #include "rsn_supp/wpa.h" 303 if (wpa_sm_set_param(wpa_s->wpa, RSNA_PMK_LIFETIME, 308 if (wpa_sm_set_param(wpa_s->wpa, RSNA_PMK_REAUTH_THRESHOLD, 312 if (wpa_sm_set_param(wpa_s->wpa, RSNA_SA_TIMEOUT, atoi(value))) 358 wpa_tdls_enable(wpa_s->wpa, !disabled); 496 rsn_preauth_deinit(wpa_s->wpa); 497 if (rsn_preauth_init(wpa_s->wpa, bssid, ssid ? &ssid->eap : NULL)) 521 return wpa_sm_stkstart(wpa_s->wpa, peer); 543 if (wpa_tdls_is_external_setup(wpa_s->wpa)) [all...] |
notify.c | 19 #include "rsn_supp/wpa.h" 255 if (wpa_s->wpa) 256 wpa_sm_pmksa_cache_flush(wpa_s->wpa, ssid);
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
wpas-test.py | 68 wpa = "no" 70 wpa = "yes" 83 print " %s :: ssid='%s' wpa=%s wpa2=%s quality=%d%% rate=%d freq=%d" % (bssid, ssid, wpa, wpa2, qual, maxrate, freq)
|
wpas-dbus-new.py | 55 val = net_obj.Get(WPAS_DBUS_BSS_INTERFACE, 'WPA', 57 wpa = "no" 59 wpa = "yes" 76 print " %s :: ssid='%s' wpa=%s wpa2=%s signal=%d rate=%d freq=%d" % (bssid, ssid, wpa, wpa2, signal, maxrate, freq)
|
wpas-dbus-new-signals.py | 62 val = net_obj.Get(WPAS_DBUS_BSS_INTERFACE, 'WPA', 64 wpa = "no" 66 wpa = "yes" 83 print " %s :: ssid='%s' wpa=%s wpa2=%s signal=%d rate=%d freq=%d" % (bssid, ssid, wpa, wpa2, signal, maxrate, freq)
|
/external/wpa_supplicant_8/src/eapol_auth/ |
eapol_auth_sm.h | 19 int wpa; member in struct:eapol_auth_config
|
/external/wpa_supplicant_8/src/ap/ |
ap_config.c | 219 wpa_printf(MSG_ERROR, "WPA PSK file '%s' not found.", fname); 248 wpa_printf(MSG_ERROR, "WPA PSK allocation failed"); 321 wpa_printf(MSG_DEBUG, "Using pre-configured WPA PSK " 324 wpa_printf(MSG_DEBUG, "Deriving WPA PSK based on " 695 if (bss->wpa) { 708 wpa_printf(MSG_ERROR, "WEP configuration in a WPA network is not supported"); 713 if (full_config && bss->wpa && 716 wpa_printf(MSG_ERROR, "WPA-PSK using RADIUS enabled, but no " 721 if (full_config && bss->wpa && (bss->wpa_key_mgmt & WPA_KEY_MGMT_PSK) && 726 wpa_printf(MSG_ERROR, "WPA-PSK enabled, but PSK or passphrase [all...] |
wpa_auth.c | 2 * IEEE 802.11 RSN / WPA Authenticator 30 #define STATE_MACHINE_DEBUG_PREFIX "WPA" 225 wpa_printf(MSG_ERROR, "Failed to get random data for WPA " 334 wpa_printf(MSG_INFO, "WPA: Not enough entropy in random pool " 346 wpa_printf(MSG_ERROR, "Failed to get random data for WPA " 354 wpa_printf(MSG_DEBUG, "WPA: Delay group state machine start " 368 * wpa_init - Initialize WPA authenticator 370 * @conf: Configuration for WPA authenticator 371 * @cb: Callback functions for WPA authenticator 372 * Returns: Pointer to WPA authenticator data or %NULL on failur [all...] |
wps_hostapd.c | 105 "Received new WPA/WPA2-PSK from WPS for STA " MACSTR, 109 "Received new WPA/WPA2-PSK from WPS for STA " MACSTR 335 bss->wpa = 3; 337 bss->wpa = 2; 339 bss->wpa = 1; 341 bss->wpa = 0; 343 if (bss->wpa) { 355 bss->wpa_group = wpa_select_ap_group_cipher(bss->wpa, 406 int wpa; local 509 wpa = 3 [all...] |
wpa_auth_ie.c | 2 * hostapd - WPA/RSN IE and KDE definitions 83 /* WPA Capabilities; use defaults, so no need to include it */ 372 if (wpa_auth->conf.wpa == WPA_PROTO_OSEN) { 375 if (wpa_auth->conf.wpa & WPA_PROTO_RSN) { 391 if (wpa_auth->conf.wpa & WPA_PROTO_WPA) { 468 if (!(wpa_auth->conf.wpa & version)) { 469 wpa_printf(MSG_DEBUG, "Invalid WPA proto (%d) from " MACSTR, 538 wpa_printf(MSG_DEBUG, "Failed to parse WPA/RSN IE from " 540 wpa_hexdump(MSG_DEBUG, "WPA/RSN IE", wpa_ie, wpa_ie_len); 545 wpa_printf(MSG_DEBUG, "Invalid WPA group cipher (0x%x) from [all...] |
ieee802_1x.c | 329 suite = wpa_cipher_to_suite((hapd->conf->wpa & 0x2) ? 422 if (hapd->conf->wpa && wpa_key_mgmt_ft(hapd->conf->wpa_key_mgmt) && 436 if (hapd->conf->wpa && sta->wpa_sm && 786 if (!hapd->conf->ieee802_1x && !hapd->conf->wpa && !hapd->conf->osen && 964 if (hapd->conf->wps_state && hapd->conf->wpa && 991 * reassociation change from WPA-EAP to PSK. 2114 const struct wpa_eapol_key *wpa; local [all...] |
wpa_auth_glue.c | 2 * hostapd / WPA authenticator glue code 34 wconf->wpa = conf->wpa; 79 wconf->wpa = WPA_PROTO_OSEN; 133 wpa_printf(MSG_DEBUG, "%s: WPA authenticator requests disconnect: " 564 wpa_printf(MSG_ERROR, "WPA initialization failed."); 576 wpa_printf(MSG_ERROR, "Failed to configure WPA IE for "
|
/device/lge/hammerhead/ |
BoardConfig.mk | 138 wpa.te \
|
/device/asus/fugu/ |
BoardConfig.mk | 169 wpa.te \
|
/external/wpa_supplicant_8/src/drivers/ |
driver_bsd.c | 2 * WPA Supplicant - driver interaction with BSD net80211 layer 63 int prev_wpa; /* wpa state to restore on deinit */ 367 * swap it to match with the byte order used in WPA. 460 wpa_printf(MSG_DEBUG, "%s: enable WPA= 0x%x", __func__, params->wpa); 461 if (set80211param(priv, IEEE80211_IOC_WPA, params->wpa)) { 462 printf("Unable to set WPA to %u\n", params->wpa); 478 if (!params->wpa && !params->ieee802_1x) { 479 wpa_printf(MSG_ERROR, "%s: No 802.1X or WPA enabled" [all...] |
driver_madwifi.c | 228 * Configure WPA parameters. 303 wpa_printf(MSG_DEBUG, "%s: enable WPA=0x%x", __func__, params->wpa); 304 if (set80211param(drv, IEEE80211_PARAM_WPA, params->wpa)) { 305 printf("Unable to set WPA to %u\n", params->wpa); 323 if (!params->wpa && !params->ieee802_1x) { 324 wpa_printf(MSG_WARNING, "No 802.1X or WPA enabled!"); 327 if (params->wpa && madwifi_configure_wpa(drv, params) != 0) { 328 wpa_printf(MSG_WARNING, "Error configuring WPA state!") [all...] |
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
networkconfig.cpp | 74 else if (flags.indexOf("[WPA-EAP") >= 0) 78 else if (flags.indexOf("[WPA-PSK") >= 0) 196 tr("WPA Pre-Shared Key Error"), 197 tr("WPA-PSK requires a passphrase of 8 to 63 " 254 key_mgmt = "WPA-PSK"; 255 proto = "WPA"; 258 key_mgmt = "WPA-EAP"; 259 proto = "WPA"; 262 key_mgmt = "WPA-PSK"; 266 key_mgmt = "WPA-EAP" 524 int wpa = 0; local [all...] |
/packages/apps/Settings/src/com/android/settings/wifi/ |
AccessPoint.java | 97 WPA, 155 case WPA: 179 boolean wpa = result.capabilities.contains("WPA-PSK"); 181 if (wpa2 && wpa) { 185 } else if (wpa) { 186 return PskType.WPA;
|