/external/wpa_supplicant_8/wpa_supplicant/ |
preauth_test.c | 2 * WPA Supplicant - test code for pre-authentication 19 #include "rsn_supp/wpa.h" 180 rsn_preauth_deinit(wpa_s->wpa); 181 pmksa_candidate_free(wpa_s->wpa); 182 wpa_sm_deinit(wpa_s->wpa); 204 if (!rsn_preauth_in_progress(wpa_s->wpa)) 245 wpa_s->wpa = wpa_sm_init(ctx); 246 assert(wpa_s->wpa != NULL); 247 wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_PROTO, WPA_PROTO_RSN); 250 wpa_sm_set_ifname(wpa_s->wpa, wpa_s->ifname, NULL) [all...] |
events.c | 2 * WPA Supplicant - Driver event processing 13 #include "rsn_supp/wpa.h" 226 wpa_dbg(wpa_s, MSG_DEBUG, "Could not set WPA suites"); 254 wpa_msg(wpa_s, MSG_INFO, "WPA: TKIP countermeasures stopped"); 318 if (wpa_sm_parse_own_wpa_ie(wpa_s->wpa, &ie) < 0 || 323 pmksa_set = pmksa_cache_set_current(wpa_s->wpa, 351 pmksa_candidate_add(wpa_s->wpa, data->pmkid_candidate.bssid, 440 wpa_sm_set_scard_ctx(wpa_s->wpa, wpa_s->scard); 513 /* Allow TSN if local configuration accepts WEP use without WPA/WPA2 */ 597 wpa_dbg(wpa_s, MSG_DEBUG, " skip WPA IE - parse 835 int wpa; local [all...] |
wpa_supplicant.c | 2 * WPA Supplicant 26 #include "rsn_supp/wpa.h" 143 /* IBSS/WPA-None uses only one key (Group) for both receiving and 147 wpa_msg(wpa_s, MSG_INFO, "WPA: Invalid mode %d (not " 148 "IBSS/ad-hoc) for WPA-None", ssid->mode); 153 wpa_msg(wpa_s, MSG_INFO, "WPA: No PSK configured for " 154 "WPA-None"); 170 /* WPA-None uses the same Michael MIC key for both TX and RX */ 177 wpa_msg(wpa_s, MSG_INFO, "WPA: Invalid group cipher %d for " 178 "WPA-None", wpa_s->group_cipher) [all...] |
sme.c | 18 #include "rsn_supp/wpa.h" 303 if (pmksa_cache_set_current(wpa_s->wpa, NULL, bss->bssid, 311 wpa_msg(wpa_s, MSG_WARNING, "SME: Failed to set WPA " 319 * Both WPA and non-WPA IEEE 802.1X enabled in configuration - 320 * use non-WPA since the scan results did not indicate that the 321 * AP is using WPA or WPA2. 330 wpa_msg(wpa_s, MSG_WARNING, "SME: Failed to set WPA " 359 wpa_sm_set_ft_params(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0); 362 wpa_ft_prepare_auth_request(wpa_s->wpa, ie) [all...] |
wpas_glue.c | 2 * WPA Supplicant - Glue code to setup EAPOL and RSN modules 13 #include "rsn_supp/wpa.h" 152 wpa_printf(MSG_DEBUG, "WPA: drop TX EAPOL in non-IEEE 802.1X " 158 if (pmksa_cache_get_current(wpa_s->wpa) && 249 wpa_sm_aborted_cached(wpa_s->wpa); 355 wpa_msg(wpa_s, MSG_DEBUG, "WPA: EAPOL processing complete"); 390 if (wpa_sm_set_ap_wpa_ie(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0)) 394 if (wpa_sm_set_ap_rsn_ie(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0)) 411 /* No WPA/RSN IE found in the cached scan results. Try to get updated 1047 wpa_printf(MSG_ERROR, "Failed to allocate WPA context.") [all...] |
ap.c | 2 * WPA Supplicant - Basic AP mode support routines 289 bss->wpa = ssid->proto; 347 if ((bss->wpa & 2) && bss->rsn_pairwise == 0) 349 bss->wpa_group = wpa_select_ap_group_cipher(bss->wpa, bss->wpa_pairwise, 352 if (bss->wpa && bss->ieee802_1x) 354 else if (bss->wpa) 381 if (bss->wpa_group_rekey < 86400 && (bss->wpa & 2) && 400 * Enable WPS by default for open and WPA/WPA2-Personal network, but 409 !(bss->wpa & 2))) 410 goto no_wps; /* WPS2 does not allow WPA/TKIP-onl [all...] |
ctrl_iface.c | 2 * WPA Supplicant / Control interface (shared code for all backends) 26 #include "rsn_supp/wpa.h" 339 if (wpa_sm_set_param(wpa_s->wpa, RSNA_PMK_LIFETIME, 344 if (wpa_sm_set_param(wpa_s->wpa, RSNA_PMK_REAUTH_THRESHOLD, 348 if (wpa_sm_set_param(wpa_s->wpa, RSNA_SA_TIMEOUT, atoi(value))) 408 wpa_tdls_enable(wpa_s->wpa, !disabled); 569 rsn_preauth_deinit(wpa_s->wpa); 570 if (rsn_preauth_init(wpa_s->wpa, bssid, ssid ? &ssid->eap : NULL)) 594 return wpa_sm_stkstart(wpa_s->wpa, peer); 616 if (wpa_tdls_is_external_setup(wpa_s->wpa)) [all...] |
notify.c | 20 #include "rsn_supp/wpa.h" 354 if (wpa_s->wpa) 355 wpa_sm_pmksa_cache_flush(wpa_s->wpa, ssid);
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
wpas-test.py | 68 wpa = "no" 70 wpa = "yes" 83 print " %s :: ssid='%s' wpa=%s wpa2=%s quality=%d%% rate=%d freq=%d" % (bssid, ssid, wpa, wpa2, qual, maxrate, freq)
|
wpas-dbus-new.py | 55 val = net_obj.Get(WPAS_DBUS_BSS_INTERFACE, 'WPA', 57 wpa = "no" 59 wpa = "yes" 76 print " %s :: ssid='%s' wpa=%s wpa2=%s signal=%d rate=%d freq=%d" % (bssid, ssid, wpa, wpa2, signal, maxrate, freq)
|
wpas-dbus-new-signals.py | 62 val = net_obj.Get(WPAS_DBUS_BSS_INTERFACE, 'WPA', 64 wpa = "no" 66 wpa = "yes" 83 print " %s :: ssid='%s' wpa=%s wpa2=%s signal=%d rate=%d freq=%d" % (bssid, ssid, wpa, wpa2, signal, maxrate, freq)
|
/external/wpa_supplicant_8/src/rsn_supp/ |
Makefile | 24 wpa.o \
|
/external/wpa_supplicant_8/src/ap/ |
ap_config.c | 219 wpa_printf(MSG_ERROR, "WPA PSK file '%s' not found.", fname); 248 wpa_printf(MSG_ERROR, "WPA PSK allocation failed"); 321 wpa_printf(MSG_DEBUG, "Using pre-configured WPA PSK " 324 wpa_printf(MSG_DEBUG, "Deriving WPA PSK based on " 750 if (bss->wpa) { 763 wpa_printf(MSG_ERROR, "WEP configuration in a WPA network is not supported"); 768 if (full_config && bss->wpa && 771 wpa_printf(MSG_ERROR, "WPA-PSK using RADIUS enabled, but no " 776 if (full_config && bss->wpa && (bss->wpa_key_mgmt & WPA_KEY_MGMT_PSK) && 781 wpa_printf(MSG_ERROR, "WPA-PSK enabled, but PSK or passphrase [all...] |
wps_hostapd.c | 105 "Received new WPA/WPA2-PSK from WPS for STA " MACSTR, 109 "Received new WPA/WPA2-PSK from WPS for STA " MACSTR 335 bss->wpa = 3; 337 bss->wpa = 2; 339 bss->wpa = 1; 341 bss->wpa = 0; 343 if (bss->wpa) { 359 bss->wpa_group = wpa_select_ap_group_cipher(bss->wpa, 409 int wpa; local 459 wpa_printf(MSG_INFO, "WPS: Invalid key length %lu for WPA/WPA2" [all...] |
wpa_auth_ie.c | 2 * hostapd - WPA/RSN IE and KDE definitions 83 /* WPA Capabilities; use defaults, so no need to include it */ 383 wpa_hexdump(MSG_DEBUG, "WPA: Forced own IE(s) for testing", 400 if (wpa_auth->conf.wpa == WPA_PROTO_OSEN) { 403 if (wpa_auth->conf.wpa & WPA_PROTO_RSN) { 419 if (wpa_auth->conf.wpa & WPA_PROTO_WPA) { 496 if (!(wpa_auth->conf.wpa & version)) { 497 wpa_printf(MSG_DEBUG, "Invalid WPA proto (%d) from " MACSTR, 570 wpa_printf(MSG_DEBUG, "Failed to parse WPA/RSN IE from " 572 wpa_hexdump(MSG_DEBUG, "WPA/RSN IE", wpa_ie, wpa_ie_len) [all...] |
ap_drv_ops.c | 259 if (((!hapd->conf->ieee802_1x && !hapd->conf->wpa) || 278 params.wpa = hapd->conf->wpa; 281 if ((hapd->conf->wpa & (WPA_PROTO_WPA | WPA_PROTO_RSN)) == 285 else if (hapd->conf->wpa & WPA_PROTO_RSN) 287 else if (hapd->conf->wpa & WPA_PROTO_WPA)
|
wpa_auth.c | 2 * IEEE 802.11 RSN / WPA Authenticator 30 #define STATE_MACHINE_DEBUG_PREFIX "WPA" 254 wpa_printf(MSG_ERROR, "Failed to get random data for WPA " 370 wpa_printf(MSG_INFO, "WPA: Not enough entropy in random pool " 382 wpa_printf(MSG_ERROR, "Failed to get random data for WPA " 390 wpa_printf(MSG_DEBUG, "WPA: Delay group state machine start " 404 * wpa_init - Initialize WPA authenticator 406 * @conf: Configuration for WPA authenticator 407 * @cb: Callback functions for WPA authenticator 408 * Returns: Pointer to WPA authenticator data or %NULL on failur [all...] |
ieee802_1x.c | 358 suite = wpa_cipher_to_suite(((hapd->conf->wpa & 0x2) || 459 if ((hapd->conf->wpa & 2) && 475 if (hapd->conf->wpa && wpa_key_mgmt_ft(hapd->conf->wpa_key_mgmt) && 489 if ((hapd->conf->wpa || hapd->conf->osen) && sta->wpa_sm && 906 if (!hapd->conf->ieee802_1x && !hapd->conf->wpa && !hapd->conf->osen && 1092 ((hapd->conf->wpa && (sta->flags & WLAN_STA_MAYBE_WPS)) || 1119 * reassociation change from WPA-EAP to PSK. 2332 const struct wpa_eapol_key *wpa; local [all...] |
wpa_auth_i.h | 2 * hostapd - IEEE 802.11i-2004 / WPA Authenticator: Internal definitions 75 Boolean PInitAKeys; /* WPA only, not in IEEE 802.11i */ 104 WPA_VERSION_NO_WPA = 0 /* WPA not used */, 105 WPA_VERSION_WPA = 1 /* WPA / IEEE 802.11i/D3.0 */, 107 } wpa; member in struct:wpa_state_machine
|
beacon.c | 442 /* RSN, MDIE, WPA */ 1055 /* RSN, MDIE, WPA */ 1168 if ((hapd->conf->wpa & (WPA_PROTO_WPA | WPA_PROTO_RSN)) == 1172 else if (hapd->conf->wpa & WPA_PROTO_RSN) 1174 else if (hapd->conf->wpa & WPA_PROTO_WPA) 1179 params->wpa_version = hapd->conf->wpa [all...] |
/external/wpa_supplicant_8/src/eapol_auth/ |
eapol_auth_sm.h | 19 int wpa; member in struct:eapol_auth_config
|
eapol_auth_sm.c | 816 if (!eapol->conf.wpa && 821 if (eapol->conf.wpa) 1188 dst->wpa = src->wpa; [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_bsd.c | 2 * WPA Supplicant - driver interaction with BSD net80211 layer 74 int prev_wpa; /* wpa state to restore on deinit */ 411 * swap it to match with the byte order used in WPA. 509 wpa_printf(MSG_DEBUG, "%s: enable WPA= 0x%x", __func__, params->wpa); 510 if (set80211param(priv, IEEE80211_IOC_WPA, params->wpa)) { 511 wpa_printf(MSG_INFO, "Unable to set WPA to %u", params->wpa); 527 if (!params->wpa && !params->ieee802_1x) { 528 wpa_printf(MSG_ERROR, "%s: No 802.1X or WPA enabled" [all...] |
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
networkconfig.cpp | 75 else if (flags.indexOf("[WPA-EAP") >= 0) 79 else if (flags.indexOf("[WPA-PSK") >= 0) 197 tr("WPA Pre-Shared Key Error"), 198 tr("WPA-PSK requires a passphrase of 8 to 63 " 255 key_mgmt = "WPA-PSK"; 256 proto = "WPA"; 259 key_mgmt = "WPA-EAP"; 260 proto = "WPA"; 263 key_mgmt = "WPA-PSK"; 267 key_mgmt = "WPA-EAP" 525 int wpa = 0; local [all...] |
/system/sepolicy/ |
system_server.te | 138 unix_socket_send(system_server, wpa, wpa) 354 # Create a socket for receiving info from wpa.
|