Home | History | Annotate | Download | only in ap

Lines Matching refs:eapol

82 				"EAPOL-TX " MACSTR " %s",
180 "and signing EAPOL-Key");
205 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Sending EAPOL-Key to " MACSTR
217 struct eapol_authenticator *eapol = hapd->eapol_auth;
223 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Sending EAPOL-Key(s) to " MACSTR,
233 if (eapol->default_wep_key) {
234 ieee802_1x_tx_key_one(hapd, sta, eapol->default_wep_key_idx, 1,
235 eapol->default_wep_key,
258 * has ACKed EAPOL-Key frame */
892 * ieee802_1x_receive - Process the EAPOL frames from the Supplicant
894 * @sa: Source address (sender of the EAPOL frame)
895 * @buf: EAPOL frame
898 * This function is called for each incoming EAPOL frame from the interface
923 wpa_printf(MSG_DEBUG, "Saving EAPOL frame from " MACSTR
970 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Ignore EAPOL message - "
977 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Ignore EAPOL message - "
995 * Delay EAPOL frame transmission until a
997 * with EAPOL-Start. Only allow the wait to be
1002 "EAPOL until EAPOL-Start is "
1026 HOSTAPD_LEVEL_DEBUG, "received EAPOL-Start "
1034 "STA sent EAPOL-Start");
1045 HOSTAPD_LEVEL_DEBUG, "received EAPOL-Logoff "
1056 wpa_printf(MSG_DEBUG, " EAPOL-Key");
1065 wpa_printf(MSG_DEBUG, " EAPOL-Encapsulated-ASF-Alert");
1099 * Need to enable IEEE 802.1X/EAPOL state machines for possible
1100 * WPS handshake even if IEEE 802.1X/EAPOL is not used for
1111 * Clear any possible EAPOL authenticator state to support
1122 * Clear any possible EAPOL authenticator state to support
1148 * Delay EAPOL frame transmission until a possible WPS STA
1149 * initiates the handshake with EAPOL-Start. Only allow the
1152 wpa_printf(MSG_DEBUG, "WPS: Do not start EAPOL until "
1153 "EAPOL-Start is received");
1165 /* Setup EAPOL state machines to already authenticated state
1188 /* Setup EAPOL state machines to already authenticated state
1208 /* Setup EAPOL state machines to already authenticated state
1223 * Force EAPOL state machines to start
1225 * Supplicant to send EAPOL-Start.
1917 struct eapol_authenticator *eapol = hapd->eapol_auth;
1922 os_free(eapol->default_wep_key);
1923 eapol->default_wep_key = os_malloc(hapd->conf->default_wep_key_len);
1924 if (eapol->default_wep_key == NULL ||
1925 random_get_bytes(eapol->default_wep_key,
1928 os_free(eapol->default_wep_key);
1929 eapol->default_wep_key = NULL;
1934 eapol->default_wep_key,
1955 struct eapol_authenticator *eapol = hapd->eapol_auth;
1957 if (eapol->default_wep_key_idx >= 3)
1958 eapol->default_wep_key_idx =
1961 eapol->default_wep_key_idx++;
1964 eapol->default_wep_key_idx);
1970 os_free(eapol->default_wep_key);
1971 eapol->default_wep_key = NULL;
1979 eapol->default_wep_key_idx, 1, NULL, 0,
1980 eapol->default_wep_key,
1985 os_free(eapol->default_wep_key);
1986 eapol->default_wep_key = NULL;
2389 /* EAPOL EAP-Packet packets are eventually re-sent by either Supplicant
2390 * or Authenticator state machines, but EAPOL-Key packets are not
2391 * retransmitted in case of failure. Try to re-send failed EAPOL-Key
2397 HOSTAPD_LEVEL_DEBUG, "did not Ack EAPOL-Key "
2401 /* TODO: re-send EAPOL-Key couple of times (with short delay
2409 * to here and change the key only if the EAPOL-Key packet was Acked.
2744 * benefit IEEE 802.1X/EAPOL authentication cases, too since
2745 * the EAPOL PAE state machine would remain in HELD state for
2748 * EAPOL authentication to be started to complete connection.