HomeSort by relevance Sort by last modified time
    Searched refs:eapol (Results 1 - 25 of 31) sorted by null

1 2

  /external/wpa_supplicant_8/src/eapol_auth/
eapol_auth_sm.c 2 * IEEE 802.1X-2004 Authenticator - EAPOL state machine
27 /* EAPOL state machines are described in IEEE Std 802.1X-2004, Chap. 8.2 */
30 sm->eapol->cb.set_port_authorized(sm->eapol->conf.ctx, sm->sta, 1)
32 sm->eapol->cb.set_port_authorized(sm->eapol->conf.ctx, sm->sta, 0)
38 #define abortAuth() sm->eapol->cb.abort_auth(sm->eapol->conf.ctx, sm->sta)
39 #define txKey() sm->eapol->cb.tx_key(sm->eapol->conf.ctx, sm->sta
906 struct eapol_authenticator *eapol = sm->eapol; local
1279 struct eapol_authenticator *eapol; local
    [all...]
eapol_auth_sm.h 2 * IEEE 802.1X-2004 Authenticator - EAPOL state machine
87 void eapol_auth_deinit(struct eapol_authenticator *eapol);
89 eapol_auth_alloc(struct eapol_authenticator *eapol, const u8 *addr,
eapol_auth_sm_i.h 2 * IEEE 802.1X-2004 Authenticator - EAPOL state machine (internal definitions)
25 * struct eapol_authenticator - Global EAPOL authenticator data
147 /* EAPOL/AAA <-> EAP full authenticator interface */
167 struct eapol_authenticator *eapol; member in struct:eapol_state_machine
  /external/wpa_supplicant_8/src/ap/
pmksa_cache_auth.c 142 struct eapol_state_machine *eapol)
146 if (eapol == NULL)
149 if (eapol->identity) {
150 entry->identity = os_malloc(eapol->identity_len);
152 entry->identity_len = eapol->identity_len;
153 os_memcpy(entry->identity, eapol->identity,
154 eapol->identity_len);
158 if (eapol->radius_cui)
159 entry->cui = wpabuf_dup(eapol->radius_cui);
162 radius_copy_class(&entry->radius_class, &eapol->radius_class)
    [all...]
pmksa_cache_auth.h 54 struct eapol_state_machine *eapol, int akmp);
61 struct eapol_state_machine *eapol);
ieee802_1x.c 80 "EAPOL-TX " MACSTR " %s",
178 "and signing EAPOL-Key");
203 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Sending EAPOL-Key to " MACSTR
215 struct eapol_authenticator *eapol = hapd->eapol_auth; local
221 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Sending EAPOL-Key(s) to " MACSTR,
231 if (eapol->default_wep_key) {
232 ieee802_1x_tx_key_one(hapd, sta, eapol->default_wep_key_idx, 1,
233 eapol->default_wep_key,
256 * has ACKed EAPOL-Key frame */
888 * ieee802_1x_receive - Process the EAPOL frames from the Supplican
1878 struct eapol_authenticator *eapol = hapd->eapol_auth; local
1916 struct eapol_authenticator *eapol = hapd->eapol_auth; local
    [all...]
wpa_auth.h 292 int session_timeout, struct eapol_state_machine *eapol);
296 struct eapol_state_machine *eapol);
wpa_auth.c 780 wpa_hexdump(MSG_DEBUG, "FT: FTIE in EAPOL-Key msg 2/4",
797 "received EAPOL-Key Error Request "
910 wpa_printf(MSG_DEBUG, "WPA: Received EAPOL-Key from " MACSTR
914 wpa_printf(MSG_INFO, "WPA: Invalid EAPOL-Key frame - "
928 wpa_printf(MSG_DEBUG, "Workaround: Allow EAPOL-Key "
931 wpa_printf(MSG_DEBUG, "Ignore EAPOL-Key with "
938 wpa_printf(MSG_DEBUG, "Ignore EAPOL-Key with "
950 /* FIX: verify that the EAPOL-Key frame was encrypted if pairwise keys
1010 "did not use EAPOL-Key descriptor version 0 as required for AKM-defined cases");
1020 "received EAPOL-Key request with
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
eapol_test.c 345 printf("WPA: EAPOL processing complete\n");
367 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) {
368 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN);
376 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) {
377 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16);
394 sess_id = eapol_sm_get_session_id(e->wpa_s->eapol, &sess_id_len);
420 static void eapol_sm_cb(struct eapol_sm *eapol, enum eapol_supp_result result,
591 printf("Failed to allocate EAPOL context.\n");
614 wpa_s->eapol = eapol_sm_init(ctx);
615 if (wpa_s->eapol == NULL)
    [all...]
wpas_glue.c 2 * WPA Supplicant - Glue code to setup EAPOL and RSN modules
107 wpa_msg(wpa_s, MSG_INFO, "EAPOL-TX " MACSTR " %s",
126 * wpa_supplicant_eapol_send - Send IEEE 802.1X EAPOL packet to Authenticator
129 * @buf: EAPOL payload (after IEEE 802.1X header)
130 * @len: EAPOL payload length
133 * This function adds Ethernet and IEEE 802.1X header and sends the EAPOL frame
150 * EAPOL frames (mainly, EAPOL-Start) from EAPOL state
152 wpa_printf(MSG_DEBUG, "WPA: drop TX EAPOL in non-IEEE 802.1X
    [all...]
wpas_kay.c 255 session_id = eapol_sm_get_session_id(wpa_s->eapol, &id_len);
258 "Failed to get SessionID from EAPOL state machines");
283 sm = wpa_s->eapol;
291 "Failed to get MSK from EAPOL state machines");
wpa_supplicant.c 252 * wpa_supplicant_initiate_eapol - Configure EAPOL state machine
255 * This function is used to configure EAPOL state machine based on the selected
270 * per-BSSID EAPOL authentication.
272 eapol_sm_notify_portControl(wpa_s->eapol, ForceAuthorized);
273 eapol_sm_notify_eap_success(wpa_s->eapol, TRUE);
274 eapol_sm_notify_eap_fail(wpa_s->eapol, FALSE);
279 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE);
280 eapol_sm_notify_eap_fail(wpa_s->eapol, FALSE);
284 eapol_sm_notify_portControl(wpa_s->eapol, ForceAuthorized);
286 eapol_sm_notify_portControl(wpa_s->eapol, Auto)
    [all...]
events.c 232 eapol_sm_invalidate_cached_session(wpa_s->eapol);
298 eapol_sm_notify_portEnabled(wpa_s->eapol, FALSE);
299 eapol_sm_notify_portValid(wpa_s->eapol, FALSE);
301 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE);
304 eapol_sm_notify_config(wpa_s->eapol, NULL, NULL);
327 eapol_sm_notify_pmkid_attempt(wpa_s->eapol);
441 eapol_sm_register_scard_ctx(wpa_s->eapol, wpa_s->scard);
    [all...]
ctrl_iface.c 326 if (os_strcasecmp(cmd, "EAPOL::heldPeriod") == 0) {
327 eapol_sm_configure(wpa_s->eapol,
329 } else if (os_strcasecmp(cmd, "EAPOL::authPeriod") == 0) {
330 eapol_sm_configure(wpa_s->eapol,
332 } else if (os_strcasecmp(cmd, "EAPOL::startPeriod") == 0) {
333 eapol_sm_configure(wpa_s->eapol,
335 } else if (os_strcasecmp(cmd, "EAPOL::maxStart") == 0) {
336 eapol_sm_configure(wpa_s->eapol,
    [all...]
ctrl_iface_named_pipe.c 342 eapol_sm_notify_ctrl_attached(wpa_s->eapol);
ctrl_iface_udp.c 343 eapol_sm_notify_ctrl_attached(wpa_s->eapol);
ap.c 755 eapol_sm_notify_config(wpa_s->eapol, NULL, NULL);
779 eapol_sm_notify_config(wpa_s->eapol, NULL, NULL);
    [all...]
ctrl_iface_unix.c 226 eapol_sm_notify_ctrl_attached(wpa_s->eapol);
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
preauth.c 73 static void rsn_preauth_eapol_cb(struct eapol_sm *eapol,
83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
89 res = eapol_sm_get_key(eapol, pmk, 16);
104 "pre-auth EAPOL state machines");
148 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL (preauth)", msg, msglen);
162 * -2 on layer 2 packet initialization failure, -3 on EAPOL state machine
208 wpa_printf(MSG_WARNING, "Failed to allocate EAPOL context.");
226 wpa_printf(MSG_WARNING, "RSN: Failed to initialize EAPOL "
239 * preauth EAPOL-Start frame may end up being dropped due to race
517 "EAPOL state machines:\n")
    [all...]
wpa.c 2 * WPA Supplicant - WPA state machine and EAPOL-Key processing
31 * wpa_eapol_key_send - Send WPA/RSN EAPOL-Key message
38 * @msg: EAPOL-Key message
40 * @key_mic: Pointer to the buffer to which the EAPOL-Key MIC is written
58 "EAPOL-Key destination address");
63 ") as the destination for EAPOL-Key",
71 "WPA: Failed to generate EAPOL-Key version %d key_mgmt 0x%x MIC",
77 wpa_hexdump(MSG_MSGDUMP, "WPA: TX EAPOL-Key", msg, msg_len);
79 eapol_sm_notify_tx_eapol_key(sm->eapol);
87 * wpa_sm_key_request - Send EAPOL-Key Reques
    [all...]
wpa.h 125 void wpa_sm_set_eapol(struct wpa_sm *sm, struct eapol_sm *eapol);
215 static inline void wpa_sm_set_eapol(struct wpa_sm *sm, struct eapol_sm *eapol)
pmksa_cache.c 75 eapol_sm_request_reauth(pmksa->sm->eapol);
wpa_i.h 35 struct eapol_sm *eapol; /* EAPOL state machine from upper level code */ member in struct:wpa_sm
  /external/wpa_supplicant_8/src/eapol_supp/
eapol_supp_sm.h 2 * EAPOL supplicant state machines
18 * struct eapol_config - Per network configuration for EAPOL state machines
22 * accept_802_1x_keys - Accept IEEE 802.1X (non-WPA) EAPOL-Key frames
24 * This variable should be set to 1 when using EAPOL state machines
27 * process the EAPOL-Key frames.
34 * required_keys - Which EAPOL-Key packets are required
36 * This variable determines which EAPOL-Key packets are required before
80 * struct eapol_ctx - Global (for all networks) EAPOL state machine context
91 * This EAPOL state machine is used for IEEE 802.11i/RSN
97 * cb - Function to be called when EAPOL negotiation has been complete
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/dbus/
dbus_old_handlers.c     [all...]

Completed in 380 milliseconds

1 2