/external/syslinux/gpxe/src/net/ |
eapol.c | 30 #include <gpxe/eapol.h> 35 * Receive EAPOL network-layer packet 46 struct eapol_frame *eapol = iob->data; local 55 if ( handler->type == eapol->type ) { 62 return -( ENOTSUP | ( ( eapol->type & 0x1f ) << 8 ) ); 66 * Transcribe EAPOL network-layer address 71 * EAPOL doesn't have network-layer addresses, so we just return the 72 * string @c "<EAPOL>". 76 return "<EAPOL>"; 79 /** EAPOL network protocol * [all...] |
/external/wpa_supplicant_8/src/eapol_auth/ |
eapol_auth_sm.c | 2 * IEEE 802.1X-2004 Authenticator - EAPOL state machine 27 /* EAPOL state machines are described in IEEE Std 802.1X-2004, Chap. 8.2 */ 30 sm->eapol->cb.set_port_authorized(sm->eapol->conf.ctx, sm->sta, 1) 32 sm->eapol->cb.set_port_authorized(sm->eapol->conf.ctx, sm->sta, 0) 38 #define abortAuth() sm->eapol->cb.abort_auth(sm->eapol->conf.ctx, sm->sta) 39 #define txKey() sm->eapol->cb.tx_key(sm->eapol->conf.ctx, sm->sta 906 struct eapol_authenticator *eapol = sm->eapol; local 1279 struct eapol_authenticator *eapol; local [all...] |
eapol_auth_sm.h | 2 * IEEE 802.1X-2004 Authenticator - EAPOL state machine 87 void eapol_auth_deinit(struct eapol_authenticator *eapol); 89 eapol_auth_alloc(struct eapol_authenticator *eapol, const u8 *addr,
|
eapol_auth_sm_i.h | 2 * IEEE 802.1X-2004 Authenticator - EAPOL state machine (internal definitions) 25 * struct eapol_authenticator - Global EAPOL authenticator data 147 /* EAPOL/AAA <-> EAP full authenticator interface */ 167 struct eapol_authenticator *eapol; member in struct:eapol_state_machine
|
/external/wpa_supplicant_8/src/ap/ |
pmksa_cache_auth.c | 142 struct eapol_state_machine *eapol) 146 if (eapol == NULL) 149 if (eapol->identity) { 150 entry->identity = os_malloc(eapol->identity_len); 152 entry->identity_len = eapol->identity_len; 153 os_memcpy(entry->identity, eapol->identity, 154 eapol->identity_len); 158 if (eapol->radius_cui) 159 entry->cui = wpabuf_dup(eapol->radius_cui); 162 radius_copy_class(&entry->radius_class, &eapol->radius_class) [all...] |
pmksa_cache_auth.h | 54 struct eapol_state_machine *eapol, int akmp); 59 struct eapol_state_machine *eapol, int akmp); 68 struct eapol_state_machine *eapol);
|
ieee802_1x.c | 82 "EAPOL-TX " MACSTR " %s", 180 "and signing EAPOL-Key"); 205 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Sending EAPOL-Key to " MACSTR 217 struct eapol_authenticator *eapol = hapd->eapol_auth; local 223 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Sending EAPOL-Key(s) to " MACSTR, 233 if (eapol->default_wep_key) { 234 ieee802_1x_tx_key_one(hapd, sta, eapol->default_wep_key_idx, 1, 235 eapol->default_wep_key, 258 * has ACKed EAPOL-Key frame */ 892 * ieee802_1x_receive - Process the EAPOL frames from the Supplican 1917 struct eapol_authenticator *eapol = hapd->eapol_auth; local 1955 struct eapol_authenticator *eapol = hapd->eapol_auth; local [all...] |
wpa_auth.h | 296 int session_timeout, struct eapol_state_machine *eapol); 300 struct eapol_state_machine *eapol);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
eapol_test.c | 345 printf("WPA: EAPOL processing complete\n"); 367 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { 368 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); 376 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) { 377 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16); 394 sess_id = eapol_sm_get_session_id(e->wpa_s->eapol, &sess_id_len); 420 static void eapol_sm_cb(struct eapol_sm *eapol, enum eapol_supp_result result, 591 printf("Failed to allocate EAPOL context.\n"); 614 wpa_s->eapol = eapol_sm_init(ctx); 615 if (wpa_s->eapol == NULL) [all...] |
wpas_glue.c | 2 * WPA Supplicant - Glue code to setup EAPOL and RSN modules 108 wpa_msg(wpa_s, MSG_INFO, "EAPOL-TX " MACSTR " %s", 127 * wpa_supplicant_eapol_send - Send IEEE 802.1X EAPOL packet to Authenticator 130 * @buf: EAPOL payload (after IEEE 802.1X header) 131 * @len: EAPOL payload length 134 * This function adds Ethernet and IEEE 802.1X header and sends the EAPOL frame 151 * EAPOL frames (mainly, EAPOL-Start) from EAPOL state 153 wpa_printf(MSG_DEBUG, "WPA: drop TX EAPOL in non-IEEE 802.1X [all...] |
wpa_supplicant.c | 255 * wpa_supplicant_initiate_eapol - Configure EAPOL state machine 258 * This function is used to configure EAPOL state machine based on the selected 273 * per-BSSID EAPOL authentication. 275 eapol_sm_notify_portControl(wpa_s->eapol, ForceAuthorized); 276 eapol_sm_notify_eap_success(wpa_s->eapol, TRUE); 277 eapol_sm_notify_eap_fail(wpa_s->eapol, FALSE); 282 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE); 283 eapol_sm_notify_eap_fail(wpa_s->eapol, FALSE); 287 eapol_sm_notify_portControl(wpa_s->eapol, ForceAuthorized); 289 eapol_sm_notify_portControl(wpa_s->eapol, Auto) [all...] |
wpas_kay.c | 265 session_id = eapol_sm_get_session_id(wpa_s->eapol, &id_len); 268 "Failed to get SessionID from EAPOL state machines"); 293 sm = wpa_s->eapol; 301 "Failed to get MSK from EAPOL state machines");
|
events.c | 232 eapol_sm_invalidate_cached_session(wpa_s->eapol); 303 eapol_sm_notify_portEnabled(wpa_s->eapol, FALSE); 304 eapol_sm_notify_portValid(wpa_s->eapol, FALSE); 306 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE); 309 eapol_sm_notify_config(wpa_s->eapol, NULL, NULL); 332 eapol_sm_notify_pmkid_attempt(wpa_s->eapol); 446 eapol_sm_register_scard_ctx(wpa_s->eapol, wpa_s->scard); [all...] |
ctrl_iface.c | 423 if (os_strcasecmp(cmd, "EAPOL::heldPeriod") == 0) { 424 eapol_sm_configure(wpa_s->eapol, 426 } else if (os_strcasecmp(cmd, "EAPOL::authPeriod") == 0) { 427 eapol_sm_configure(wpa_s->eapol, 429 } else if (os_strcasecmp(cmd, "EAPOL::startPeriod") == 0) { 430 eapol_sm_configure(wpa_s->eapol, 432 } else if (os_strcasecmp(cmd, "EAPOL::maxStart") == 0) { 433 eapol_sm_configure(wpa_s->eapol, [all...] |
ctrl_iface_named_pipe.c | 342 eapol_sm_notify_ctrl_attached(wpa_s->eapol);
|
ctrl_iface_udp.c | 343 eapol_sm_notify_ctrl_attached(wpa_s->eapol);
|
/external/syslinux/gpxe/src/net/80211/ |
wpa.c | 24 #include <gpxe/eapol.h> 86 * @v ver Version bits of EAPOL-Key info field 380 * @v rsc Receive sequence counter field in EAPOL-Key packet 400 * @v rsc Receive sequence counter field in EAPOL-Key packet 438 * Allocate I/O buffer for construction of outgoing EAPOL-Key frame 444 * EAPOL headers, and will have @c iob->tail pointing to the start of 465 * Send EAPOL-Key packet 479 struct eapol_frame *eapol = iob_push ( iob, EAPOL_HDR_LEN ); local 485 eapol->version = EAPOL_THIS_VERSION; 486 eapol->type = EAPOL_TYPE_KEY 973 REQUIRE_OBJECT ( eapol ); variable [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
preauth.c | 73 static void rsn_preauth_eapol_cb(struct eapol_sm *eapol, 83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 89 res = eapol_sm_get_key(eapol, pmk, 16); 104 "pre-auth EAPOL state machines"); 148 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL (preauth)", msg, msglen); 162 * -2 on layer 2 packet initialization failure, -3 on EAPOL state machine 208 wpa_printf(MSG_WARNING, "Failed to allocate EAPOL context."); 226 wpa_printf(MSG_WARNING, "RSN: Failed to initialize EAPOL " 239 * preauth EAPOL-Start frame may end up being dropped due to race 517 "EAPOL state machines:\n") [all...] |
wpa.c | 2 * WPA Supplicant - WPA state machine and EAPOL-Key processing 35 * wpa_eapol_key_send - Send WPA/RSN EAPOL-Key message 41 * @msg: EAPOL-Key message 43 * @key_mic: Pointer to the buffer to which the EAPOL-Key MIC is written 61 "EAPOL-Key destination address"); 66 ") as the destination for EAPOL-Key", 79 "WPA: Failed to generate EAPOL-Key version %d key_mgmt 0x%x MIC", 115 /* Update EAPOL header to include AES-SIV overhead */ 131 /* AES-SIV AAD from EAPOL protocol version field (inclusive) to 153 wpa_hexdump(MSG_MSGDUMP, "WPA: TX EAPOL-Key", msg, msg_len) [all...] |
wpa.h | 129 void wpa_sm_set_eapol(struct wpa_sm *sm, struct eapol_sm *eapol); 223 static inline void wpa_sm_set_eapol(struct wpa_sm *sm, struct eapol_sm *eapol)
|
pmksa_cache.c | 76 eapol_sm_request_reauth(pmksa->sm->eapol);
|
wpa_i.h | 40 struct eapol_sm *eapol; /* EAPOL state machine from upper level code */ member in struct:wpa_sm
|
/external/wpa_supplicant_8/src/eapol_supp/ |
eapol_supp_sm.h | 2 * EAPOL supplicant state machines 18 * struct eapol_config - Per network configuration for EAPOL state machines 22 * accept_802_1x_keys - Accept IEEE 802.1X (non-WPA) EAPOL-Key frames 24 * This variable should be set to 1 when using EAPOL state machines 27 * process the EAPOL-Key frames. 34 * required_keys - Which EAPOL-Key packets are required 36 * This variable determines which EAPOL-Key packets are required before 80 * struct eapol_ctx - Global (for all networks) EAPOL state machine context 91 * This EAPOL state machine is used for IEEE 802.11i/RSN 97 * cb - Function to be called when EAPOL negotiation has been complete [all...] |
/external/wpa_supplicant_8/wpa_supplicant/hidl/1.0/ |
sta_network.cpp | [all...] |
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_old_handlers.c | [all...] |