HomeSort by relevance Sort by last modified time
    Searched refs:eapol (Results 1 - 25 of 34) sorted by null

1 2

  /external/syslinux/gpxe/src/net/
eapol.c 30 #include <gpxe/eapol.h>
35 * Receive EAPOL network-layer packet
46 struct eapol_frame *eapol = iob->data; local
55 if ( handler->type == eapol->type ) {
62 return -( ENOTSUP | ( ( eapol->type & 0x1f ) << 8 ) );
66 * Transcribe EAPOL network-layer address
71 * EAPOL doesn't have network-layer addresses, so we just return the
72 * string @c "<EAPOL>".
76 return "<EAPOL>";
79 /** EAPOL network protocol *
    [all...]
  /external/wpa_supplicant_8/src/eapol_auth/
eapol_auth_sm.c 2 * IEEE 802.1X-2004 Authenticator - EAPOL state machine
27 /* EAPOL state machines are described in IEEE Std 802.1X-2004, Chap. 8.2 */
30 sm->eapol->cb.set_port_authorized(sm->eapol->conf.ctx, sm->sta, 1)
32 sm->eapol->cb.set_port_authorized(sm->eapol->conf.ctx, sm->sta, 0)
38 #define abortAuth() sm->eapol->cb.abort_auth(sm->eapol->conf.ctx, sm->sta)
39 #define txKey() sm->eapol->cb.tx_key(sm->eapol->conf.ctx, sm->sta
906 struct eapol_authenticator *eapol = sm->eapol; local
1279 struct eapol_authenticator *eapol; local
    [all...]
eapol_auth_sm.h 2 * IEEE 802.1X-2004 Authenticator - EAPOL state machine
87 void eapol_auth_deinit(struct eapol_authenticator *eapol);
89 eapol_auth_alloc(struct eapol_authenticator *eapol, const u8 *addr,
eapol_auth_sm_i.h 2 * IEEE 802.1X-2004 Authenticator - EAPOL state machine (internal definitions)
25 * struct eapol_authenticator - Global EAPOL authenticator data
147 /* EAPOL/AAA <-> EAP full authenticator interface */
167 struct eapol_authenticator *eapol; member in struct:eapol_state_machine
  /external/wpa_supplicant_8/src/ap/
pmksa_cache_auth.c 142 struct eapol_state_machine *eapol)
146 if (eapol == NULL)
149 if (eapol->identity) {
150 entry->identity = os_malloc(eapol->identity_len);
152 entry->identity_len = eapol->identity_len;
153 os_memcpy(entry->identity, eapol->identity,
154 eapol->identity_len);
158 if (eapol->radius_cui)
159 entry->cui = wpabuf_dup(eapol->radius_cui);
162 radius_copy_class(&entry->radius_class, &eapol->radius_class)
    [all...]
pmksa_cache_auth.h 54 struct eapol_state_machine *eapol, int akmp);
59 struct eapol_state_machine *eapol, int akmp);
68 struct eapol_state_machine *eapol);
ieee802_1x.c 82 "EAPOL-TX " MACSTR " %s",
180 "and signing EAPOL-Key");
205 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Sending EAPOL-Key to " MACSTR
217 struct eapol_authenticator *eapol = hapd->eapol_auth; local
223 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Sending EAPOL-Key(s) to " MACSTR,
233 if (eapol->default_wep_key) {
234 ieee802_1x_tx_key_one(hapd, sta, eapol->default_wep_key_idx, 1,
235 eapol->default_wep_key,
258 * has ACKed EAPOL-Key frame */
892 * ieee802_1x_receive - Process the EAPOL frames from the Supplican
1917 struct eapol_authenticator *eapol = hapd->eapol_auth; local
1955 struct eapol_authenticator *eapol = hapd->eapol_auth; local
    [all...]
wpa_auth.h 296 int session_timeout, struct eapol_state_machine *eapol);
300 struct eapol_state_machine *eapol);
  /external/wpa_supplicant_8/wpa_supplicant/
eapol_test.c 345 printf("WPA: EAPOL processing complete\n");
367 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) {
368 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN);
376 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) {
377 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16);
394 sess_id = eapol_sm_get_session_id(e->wpa_s->eapol, &sess_id_len);
420 static void eapol_sm_cb(struct eapol_sm *eapol, enum eapol_supp_result result,
591 printf("Failed to allocate EAPOL context.\n");
614 wpa_s->eapol = eapol_sm_init(ctx);
615 if (wpa_s->eapol == NULL)
    [all...]
wpas_glue.c 2 * WPA Supplicant - Glue code to setup EAPOL and RSN modules
108 wpa_msg(wpa_s, MSG_INFO, "EAPOL-TX " MACSTR " %s",
127 * wpa_supplicant_eapol_send - Send IEEE 802.1X EAPOL packet to Authenticator
130 * @buf: EAPOL payload (after IEEE 802.1X header)
131 * @len: EAPOL payload length
134 * This function adds Ethernet and IEEE 802.1X header and sends the EAPOL frame
151 * EAPOL frames (mainly, EAPOL-Start) from EAPOL state
153 wpa_printf(MSG_DEBUG, "WPA: drop TX EAPOL in non-IEEE 802.1X
    [all...]
wpa_supplicant.c 255 * wpa_supplicant_initiate_eapol - Configure EAPOL state machine
258 * This function is used to configure EAPOL state machine based on the selected
273 * per-BSSID EAPOL authentication.
275 eapol_sm_notify_portControl(wpa_s->eapol, ForceAuthorized);
276 eapol_sm_notify_eap_success(wpa_s->eapol, TRUE);
277 eapol_sm_notify_eap_fail(wpa_s->eapol, FALSE);
282 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE);
283 eapol_sm_notify_eap_fail(wpa_s->eapol, FALSE);
287 eapol_sm_notify_portControl(wpa_s->eapol, ForceAuthorized);
289 eapol_sm_notify_portControl(wpa_s->eapol, Auto)
    [all...]
wpas_kay.c 265 session_id = eapol_sm_get_session_id(wpa_s->eapol, &id_len);
268 "Failed to get SessionID from EAPOL state machines");
293 sm = wpa_s->eapol;
301 "Failed to get MSK from EAPOL state machines");
events.c 232 eapol_sm_invalidate_cached_session(wpa_s->eapol);
303 eapol_sm_notify_portEnabled(wpa_s->eapol, FALSE);
304 eapol_sm_notify_portValid(wpa_s->eapol, FALSE);
306 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE);
309 eapol_sm_notify_config(wpa_s->eapol, NULL, NULL);
332 eapol_sm_notify_pmkid_attempt(wpa_s->eapol);
446 eapol_sm_register_scard_ctx(wpa_s->eapol, wpa_s->scard);
    [all...]
ctrl_iface.c 423 if (os_strcasecmp(cmd, "EAPOL::heldPeriod") == 0) {
424 eapol_sm_configure(wpa_s->eapol,
426 } else if (os_strcasecmp(cmd, "EAPOL::authPeriod") == 0) {
427 eapol_sm_configure(wpa_s->eapol,
429 } else if (os_strcasecmp(cmd, "EAPOL::startPeriod") == 0) {
430 eapol_sm_configure(wpa_s->eapol,
432 } else if (os_strcasecmp(cmd, "EAPOL::maxStart") == 0) {
433 eapol_sm_configure(wpa_s->eapol,
    [all...]
ctrl_iface_named_pipe.c 342 eapol_sm_notify_ctrl_attached(wpa_s->eapol);
ctrl_iface_udp.c 343 eapol_sm_notify_ctrl_attached(wpa_s->eapol);
  /external/syslinux/gpxe/src/net/80211/
wpa.c 24 #include <gpxe/eapol.h>
86 * @v ver Version bits of EAPOL-Key info field
380 * @v rsc Receive sequence counter field in EAPOL-Key packet
400 * @v rsc Receive sequence counter field in EAPOL-Key packet
438 * Allocate I/O buffer for construction of outgoing EAPOL-Key frame
444 * EAPOL headers, and will have @c iob->tail pointing to the start of
465 * Send EAPOL-Key packet
479 struct eapol_frame *eapol = iob_push ( iob, EAPOL_HDR_LEN ); local
485 eapol->version = EAPOL_THIS_VERSION;
486 eapol->type = EAPOL_TYPE_KEY
973 REQUIRE_OBJECT ( eapol ); variable
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
preauth.c 73 static void rsn_preauth_eapol_cb(struct eapol_sm *eapol,
83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
89 res = eapol_sm_get_key(eapol, pmk, 16);
104 "pre-auth EAPOL state machines");
148 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL (preauth)", msg, msglen);
162 * -2 on layer 2 packet initialization failure, -3 on EAPOL state machine
208 wpa_printf(MSG_WARNING, "Failed to allocate EAPOL context.");
226 wpa_printf(MSG_WARNING, "RSN: Failed to initialize EAPOL "
239 * preauth EAPOL-Start frame may end up being dropped due to race
517 "EAPOL state machines:\n")
    [all...]
wpa.c 2 * WPA Supplicant - WPA state machine and EAPOL-Key processing
35 * wpa_eapol_key_send - Send WPA/RSN EAPOL-Key message
41 * @msg: EAPOL-Key message
43 * @key_mic: Pointer to the buffer to which the EAPOL-Key MIC is written
61 "EAPOL-Key destination address");
66 ") as the destination for EAPOL-Key",
79 "WPA: Failed to generate EAPOL-Key version %d key_mgmt 0x%x MIC",
115 /* Update EAPOL header to include AES-SIV overhead */
131 /* AES-SIV AAD from EAPOL protocol version field (inclusive) to
153 wpa_hexdump(MSG_MSGDUMP, "WPA: TX EAPOL-Key", msg, msg_len)
    [all...]
wpa.h 129 void wpa_sm_set_eapol(struct wpa_sm *sm, struct eapol_sm *eapol);
223 static inline void wpa_sm_set_eapol(struct wpa_sm *sm, struct eapol_sm *eapol)
pmksa_cache.c 76 eapol_sm_request_reauth(pmksa->sm->eapol);
wpa_i.h 40 struct eapol_sm *eapol; /* EAPOL state machine from upper level code */ member in struct:wpa_sm
  /external/wpa_supplicant_8/src/eapol_supp/
eapol_supp_sm.h 2 * EAPOL supplicant state machines
18 * struct eapol_config - Per network configuration for EAPOL state machines
22 * accept_802_1x_keys - Accept IEEE 802.1X (non-WPA) EAPOL-Key frames
24 * This variable should be set to 1 when using EAPOL state machines
27 * process the EAPOL-Key frames.
34 * required_keys - Which EAPOL-Key packets are required
36 * This variable determines which EAPOL-Key packets are required before
80 * struct eapol_ctx - Global (for all networks) EAPOL state machine context
91 * This EAPOL state machine is used for IEEE 802.11i/RSN
97 * cb - Function to be called when EAPOL negotiation has been complete
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/hidl/1.0/
sta_network.cpp     [all...]
  /external/wpa_supplicant_8/wpa_supplicant/dbus/
dbus_old_handlers.c     [all...]

Completed in 661 milliseconds

1 2