/external/wpa_supplicant_8/src/wps/ |
wps_enrollee.c | 19 static int wps_build_wps_state(struct wps_data *wps, struct wpabuf *msg) 22 if (wps->wps->ap) 23 state = wps->wps->wps_state; 26 wpa_printf(MSG_DEBUG, "WPS: * Wi-Fi Protected Setup State (%d)", 35 static int wps_build_e_hash(struct wps_data *wps, struct wpabuf *msg) 41 if (random_get_bytes(wps->snonce, 2 * WPS_SECRET_NONCE_LEN) < 0) 43 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN) [all...] |
wps_registrar.c | 142 struct wps_context *wps; member in struct:wps_registrar 206 wpa_printf(MSG_DEBUG, "WPS: Add authorized MAC " MACSTR, 210 wpa_printf(MSG_DEBUG, "WPS: Authorized MAC was " 218 wpa_hexdump(MSG_DEBUG, "WPS: Authorized MACs", 227 wpa_printf(MSG_DEBUG, "WPS: Remove authorized MAC " MACSTR, 234 wpa_printf(MSG_DEBUG, "WPS: Authorized MAC was not in the " 243 wpa_hexdump(MSG_DEBUG, "WPS: Authorized MACs", 384 wpa_printf(MSG_DEBUG, "WPS: Removing PBC session for " 386 wpa_hexdump(MSG_DEBUG, "WPS: Removed UUID-E", 407 wpa_printf(MSG_DEBUG, "WPS: Checking active PBC sessions for overlap") [all...] |
wps_attr_build.c | 21 int wps_build_public_key(struct wps_data *wps, struct wpabuf *msg) 25 wpa_printf(MSG_DEBUG, "WPS: * Public Key"); 26 wpabuf_free(wps->dh_privkey); 27 wps->dh_privkey = NULL; 28 if (wps->dev_pw_id != DEV_PW_DEFAULT && wps->wps->dh_privkey && 29 wps->wps->dh_ctx) { 30 wpa_printf(MSG_DEBUG, "WPS: Using pre-configured DH keys") [all...] |
wps_i.h | 12 #include "wps.h" 18 * struct wps_data - WPS registration protocol data 25 * wps - Pointer to long term WPS context 27 struct wps_context *wps; member in struct:wps_data 134 int wps_derive_keys(struct wps_data *wps); 135 void wps_derive_psk(struct wps_data *wps, const u8 *dev_passwd, 137 struct wpabuf * wps_decrypt_encr_settings(struct wps_data *wps, const u8 *encr, 139 void wps_fail_event(struct wps_context *wps, enum wps_msg_type msg, 141 void wps_success_event(struct wps_context *wps, const u8 *mac_addr) [all...] |
wps_common.c | 62 int wps_derive_keys(struct wps_data *wps) 70 if (wps->dh_privkey == NULL) { 71 wpa_printf(MSG_DEBUG, "WPS: Own DH private key not available"); 75 pubkey = wps->registrar ? wps->dh_pubkey_e : wps->dh_pubkey_r; 77 wpa_printf(MSG_DEBUG, "WPS: Peer DH public key not available"); 81 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH Private Key", wps->dh_privkey); 82 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH peer Public Key", pubkey) [all...] |
wps_upnp.h | 2 * UPnP WPS Device 22 struct wps_data *wps; member in struct:upnp_wps_peer 40 upnp_wps_device_init(struct upnp_wps_device_ctx *ctx, struct wps_context *wps,
|
wps_er.c | 34 static void wps_er_sta_event(struct wps_context *wps, struct wps_er_sta *sta, 40 if (wps->event_cb == NULL) 55 wps->event_cb(wps->cb_ctx, event, &data); 76 wps_er_sta_event(sta->ap->er->wps, sta, WPS_EV_ER_ENROLLEE_REMOVE); 77 if (sta->wps) 78 wps_deinit(sta->wps); 127 static void wps_er_ap_event(struct wps_context *wps, struct wps_er_ap *ap, 133 if (wps->event_cb == NULL) 150 wps->event_cb(wps->cb_ctx, event, &data) [all...] |
wps_upnp_web.c | 2 * UPnP WPS Device - Web connections 42 * WFA WPS specifications. Extra white space has been removed to save space. 195 s = iface->wps->friendly_name; 196 s = ((s && *s) ? s : "WPS Access Point"); 199 s = iface->wps->dev.manufacturer; 203 if (iface->wps->manufacturer_url) 205 iface->wps->manufacturer_url); 207 if (iface->wps->model_description) 209 iface->wps->model_description); 211 s = iface->wps->dev.model_name [all...] |
wps_er.h | 28 struct wps_data *wps; member in struct:wps_er_sta 40 struct wps_data *wps; member in struct:wps_er_ap 77 struct wps_context *wps; member in struct:wps_er
|
wps.c | 30 * wps_init - Initialize WPS Registration protocol data 31 * @cfg: WPS configuration 34 * This function is used to initialize WPS data for a registration protocol 44 data->wps = cfg->wps; 47 os_memcpy(data->uuid_r, cfg->wps->uuid, WPS_UUID_LEN); 49 os_memcpy(data->mac_addr_e, cfg->wps->dev.mac_addr, ETH_ALEN); 50 os_memcpy(data->uuid_e, cfg->wps->uuid, WPS_UUID_LEN); 61 wpa_hexdump_key(MSG_DEBUG, "WPS: AP PIN dev_password", 70 if (cfg->wps->ap && !cfg->registrar && cfg->wps->ap_nfc_dev_pw_id) [all...] |
wps_attr_process.c | 16 int wps_process_authenticator(struct wps_data *wps, const u8 *authenticator, 24 wpa_printf(MSG_DEBUG, "WPS: No Authenticator attribute " 29 if (wps->last_msg == NULL) { 30 wpa_printf(MSG_DEBUG, "WPS: Last message not available for " 38 addr[0] = wpabuf_head(wps->last_msg); 39 len[0] = wpabuf_len(wps->last_msg); 42 hmac_sha256_vector(wps->authkey, WPS_AUTHKEY_LEN, 2, addr, len, hash); 45 wpa_printf(MSG_DEBUG, "WPS: Incorrect Authenticator"); 53 int wps_process_key_wrap_auth(struct wps_data *wps, struct wpabuf *msg, 61 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute") [all...] |
Makefile | 24 wps.o \
|
/external/wpa_supplicant_8/src/ap/ |
wps_hostapd.c | 2 * hostapd / WPS integration 19 #include "wps/wps.h" 20 #include "wps/wps_defs.h" 21 #include "wps/wps_dev_attr.h" 22 #include "wps/wps_attr_parse.h" 32 #include "wps/wps_upnp.h" 34 struct wps_context *wps); 43 static void hostapd_wps_nfc_clear(struct wps_context *wps); 105 "Received new WPA/WPA2-PSK from WPS for STA " MACSTR 982 struct wps_context *wps; local 1192 struct wps_context *wps = hapd->wps; local 1782 const struct wpabuf *wps = data; local 1836 struct wps_context *wps = hapd->wps; local 1873 struct wpabuf *wps; local 1981 struct wps_context *wps = hapd->wps; local [all...] |
/frameworks/base/wifi/java/android/net/wifi/p2p/ |
WifiP2pConfig.java | 38 public WpsInfo wps; field in class:WifiP2pConfig 59 wps = new WpsInfo(); 60 wps.setup = WpsInfo.PBC; 77 wps = new WpsInfo(); 87 //Based on definitions in wps/wps_defs.h 91 wps.setup = WpsInfo.DISPLAY; 95 wps.setup = WpsInfo.PBC; 99 wps.setup = WpsInfo.KEYPAD; 102 wps.setup = WpsInfo.PBC; 111 sbuf.append("\n wps: ").append(wps) [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
wps_supplicant.c | 2 * wpa_supplicant / WPS integration 24 #include "wps/wps_attr_parse.h" 43 * The minimum time in seconds before trying to associate to a WPS PIN AP that 68 wpa_printf(MSG_DEBUG, "WPS: Continuing association after eapol_cb"); 94 wpa_printf(MSG_DEBUG, "WPS: PIN registration with " MACSTR 121 wpa_printf(MSG_DEBUG, "WPS: Network configuration replaced - " 128 wpa_printf(MSG_DEBUG, "WPS: Current network is " 137 wpa_printf(MSG_DEBUG, "WPS: Checking whether fast association " 141 struct wpabuf *wps; local 144 wps = wpa_bss_get_vendor_ie_multi(bss 1503 struct wps_context *wps; local 1823 unsigned int pbc = 0, auth = 0, pin = 0, wps = 0; local 2145 struct wps_context *wps = wpa_s->wps; local 2274 struct wps_context *wps = wpa_s->wps; local 2421 const struct wpabuf *wps = data; local 2489 struct wps_context *wps = wpa_s->wps; local 2553 struct wpabuf *wps; local 2692 struct wpabuf *wps; local 2832 struct wpabuf *wps; local [all...] |
/external/wpa_supplicant_8/src/ |
Makefile | 1 SUBDIRS=ap common crypto drivers eapol_auth eapol_supp eap_common eap_peer eap_server l2_packet p2p pae radius rsn_supp tls utils wps
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
wps-ap-cli | 43 $CLI status wps 48 echo "WPS AP" 53 echo "0: Exit wps-ap-cli"
|
wpas-dbus-new-wps.py | 14 WPAS_DBUS_WPS_INTERFACE = "fi.w1.wpa_supplicant1.Interface.WPS" 30 print "WPS event: %s" % (name) 34 print "WPS credentials: %s" % (cred) 73 wps = dbus.Interface(if_obj, WPAS_DBUS_WPS_INTERFACE) 74 wps.Start({'Role': 'enrollee', 'Type': 'pbc'})
|
/external/wpa_supplicant_8/hs20/client/ |
Makefile | 49 OBJS += ../../src/wps/httpread.o 50 OBJS += ../../src/wps/http_server.o 98 rm -f ../../src/wps/*.o 99 rm -f ../../src/wps/*.d
|
/external/wpa_supplicant_8/src/radius/ |
radius_server.h | 176 * wps - Wi-Fi Protected Setup context 178 * If WPS is used with an external RADIUS server (which is quite 179 * unlikely configuration), this is used to provide a pointer to WPS 182 struct wps_context *wps; member in struct:radius_server_conf
|
/system/connectivity/shill/wifi/ |
wifi_endpoint_unittest.cc | 136 vector<uint8_t>* wps) { 137 wps->push_back(type >> 8); // type MSByte 138 wps->push_back(type); // type LSByte 140 wps->push_back((value.size() >> 8) & 0xff); // length MSByte 141 wps->push_back(value.size() & 0xff); // length LSByte 142 wps->insert(wps->end(), value.begin(), value.end()); 476 HasSubstr("WPS element extends past containing PDU"))) 479 vector<uint8_t> wps; local 480 AddWPSElement(IEEE_80211::kWPSElementManufacturer, "foo", &wps); 492 vector<uint8_t> wps; local 524 vector<uint8_t> wps; local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_wsc.c | 16 #include "wps/wps.h" 27 struct wps_data *wps; member in struct:eap_wsc_data 106 cfg.wps = sm->wps; 109 if (sm->wps == NULL || sm->wps->registrar == NULL) { 110 wpa_printf(MSG_INFO, "EAP-WSC: WPS Registrar not " 119 * Windows 7 uses Registrar mode to probe AP's WPS 142 data->wps = wps_init(&cfg) [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_wsc.c | 15 #include "wps/wps.h" 16 #include "wps/wps_defs.h" 27 struct wps_data *wps; member in struct:eap_wsc_data 147 struct wps_context *wps; local 153 wps = sm->wps; 154 if (wps == NULL) { 155 wpa_printf(MSG_ERROR, "EAP-WSC: WPS context not available"); 178 data->wps_ctx = wps; [all...] |
/hardware/broadcom/wlan/bcmdhd/wpa_supplicant_8_lib/ |
Android.mk | 34 $(WPA_SUPPL_DIR)/src/wps \
|
/hardware/qcom/wlan/qcwcn/wpa_supplicant_8_lib/ |
Android.mk | 34 $(WPA_SUPPL_DIR)/src/wps \
|