/external/wpa_supplicant_8/wpa_supplicant/ |
preauth_test.c | 2 * WPA Supplicant - test code for pre-authentication 19 #include "rsn_supp/wpa.h" 180 rsn_preauth_deinit(wpa_s->wpa); 181 pmksa_candidate_free(wpa_s->wpa); 182 wpa_sm_deinit(wpa_s->wpa); 204 if (!rsn_preauth_in_progress(wpa_s->wpa)) 245 wpa_s->wpa = wpa_sm_init(ctx); 246 assert(wpa_s->wpa != NULL); 247 wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_PROTO, WPA_PROTO_RSN); 250 wpa_sm_set_ifname(wpa_s->wpa, wpa_s->ifname, NULL) [all...] |
events.c | 2 * WPA Supplicant - Driver event processing 13 #include "rsn_supp/wpa.h" 226 wpa_dbg(wpa_s, MSG_DEBUG, "Could not set WPA suites"); 254 wpa_msg(wpa_s, MSG_INFO, "WPA: TKIP countermeasures stopped"); 323 if (wpa_sm_parse_own_wpa_ie(wpa_s->wpa, &ie) < 0 || 328 pmksa_set = pmksa_cache_set_current(wpa_s->wpa, 356 pmksa_candidate_add(wpa_s->wpa, data->pmkid_candidate.bssid, 445 wpa_sm_set_scard_ctx(wpa_s->wpa, wpa_s->scard); 518 /* Allow TSN if local configuration accepts WEP use without WPA/WPA2 */ 624 " skip WPA IE - parse failed") 877 int wpa; local [all...] |
wpa_supplicant.c | 2 * WPA Supplicant 26 #include "rsn_supp/wpa.h" 143 /* IBSS/WPA-None uses only one key (Group) for both receiving and 147 wpa_msg(wpa_s, MSG_INFO, "WPA: Invalid mode %d (not " 148 "IBSS/ad-hoc) for WPA-None", ssid->mode); 153 wpa_msg(wpa_s, MSG_INFO, "WPA: No PSK configured for " 154 "WPA-None"); 170 /* WPA-None uses the same Michael MIC key for both TX and RX */ 177 wpa_msg(wpa_s, MSG_INFO, "WPA: Invalid group cipher %d for " 178 "WPA-None", wpa_s->group_cipher) [all...] |
sme.c | 18 #include "rsn_supp/wpa.h" 308 if (pmksa_cache_set_current(wpa_s->wpa, NULL, bss->bssid, 316 wpa_msg(wpa_s, MSG_WARNING, "SME: Failed to set WPA " 324 * Both WPA and non-WPA IEEE 802.1X enabled in configuration - 325 * use non-WPA since the scan results did not indicate that the 326 * AP is using WPA or WPA2. 335 wpa_msg(wpa_s, MSG_WARNING, "SME: Failed to set WPA " 364 wpa_sm_set_ft_params(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0); 367 wpa_ft_prepare_auth_request(wpa_s->wpa, ie) [all...] |
wpas_glue.c | 2 * WPA Supplicant - Glue code to setup EAPOL and RSN modules 14 #include "rsn_supp/wpa.h" 153 wpa_printf(MSG_DEBUG, "WPA: drop TX EAPOL in non-IEEE 802.1X " 159 if (pmksa_cache_get_current(wpa_s->wpa) && 250 wpa_sm_aborted_cached(wpa_s->wpa); 356 wpa_msg(wpa_s, MSG_DEBUG, "WPA: EAPOL processing complete"); 391 if (wpa_sm_set_ap_wpa_ie(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0)) 395 if (wpa_sm_set_ap_rsn_ie(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0)) 412 /* No WPA/RSN IE found in the cached scan results. Try to get updated 934 wpa_sm_pmksa_cache_flush(wpa_s->wpa, ssid) [all...] |
ap.c | 2 * WPA Supplicant - Basic AP mode support routines 298 bss->wpa = ssid->proto; 360 if ((bss->wpa & 2) && bss->rsn_pairwise == 0) 362 bss->wpa_group = wpa_select_ap_group_cipher(bss->wpa, bss->wpa_pairwise, 365 if (bss->wpa && bss->ieee802_1x) 367 else if (bss->wpa) 394 if (bss->wpa_group_rekey < 86400 && (bss->wpa & 2) && 413 * Enable WPS by default for open and WPA/WPA2-Personal network, but 422 !(bss->wpa & 2))) 423 goto no_wps; /* WPS2 does not allow WPA/TKIP-onl [all...] |
ctrl_iface.c | 2 * WPA Supplicant / Control interface (shared code for all backends) 27 #include "rsn_supp/wpa.h" 436 if (wpa_sm_set_param(wpa_s->wpa, RSNA_PMK_LIFETIME, 445 if (wpa_sm_set_param(wpa_s->wpa, RSNA_PMK_REAUTH_THRESHOLD, 453 if (wpa_sm_set_param(wpa_s->wpa, RSNA_SA_TIMEOUT, 517 wpa_tdls_enable(wpa_s->wpa, !disabled); 704 rsn_preauth_deinit(wpa_s->wpa); 705 if (rsn_preauth_init(wpa_s->wpa, bssid, ssid ? &ssid->eap : NULL)) 729 return wpa_sm_stkstart(wpa_s->wpa, peer); 751 if (wpa_tdls_is_external_setup(wpa_s->wpa)) [all...] |
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
wpas-test.py | 68 wpa = "no" 70 wpa = "yes" 83 print " %s :: ssid='%s' wpa=%s wpa2=%s quality=%d%% rate=%d freq=%d" % (bssid, ssid, wpa, wpa2, qual, maxrate, freq)
|
wpas-dbus-new.py | 55 val = net_obj.Get(WPAS_DBUS_BSS_INTERFACE, 'WPA', 57 wpa = "no" 59 wpa = "yes" 76 print " %s :: ssid='%s' wpa=%s wpa2=%s signal=%d rate=%d freq=%d" % (bssid, ssid, wpa, wpa2, signal, maxrate, freq)
|
wpas-dbus-new-signals.py | 62 val = net_obj.Get(WPAS_DBUS_BSS_INTERFACE, 'WPA', 64 wpa = "no" 66 wpa = "yes" 83 print " %s :: ssid='%s' wpa=%s wpa2=%s signal=%d rate=%d freq=%d" % (bssid, ssid, wpa, wpa2, signal, maxrate, freq)
|
/external/wpa_supplicant_8/src/rsn_supp/ |
Makefile | 24 wpa.o \
|
/external/syslinux/gpxe/src/net/80211/ |
wpa_psk.c | 23 #include <gpxe/wpa.h> 28 * Frontend for WPA using a pre-shared key. 32 * Initialise WPA-PSK state 43 * Start WPA-PSK authentication 60 DBGC ( ctx, "WPA-PSK %p: no passphrase provided!\n", ctx ); 68 DBGC ( ctx, "WPA-PSK %p: derived PMK from passphrase `%s':\n", ctx, 76 * Step WPA-PSK authentication 96 * Do-nothing function; you can't change a WPA key post-authentication 107 * Disable handling of received WPA authentication frames 116 /** WPA-PSK security handshaker * [all...] |
/external/wpa_supplicant_8/src/ap/ |
ap_config.c | 231 wpa_printf(MSG_ERROR, "WPA PSK file '%s' not found.", fname); 260 wpa_printf(MSG_ERROR, "WPA PSK allocation failed"); 333 wpa_printf(MSG_DEBUG, "Using pre-configured WPA PSK " 336 wpa_printf(MSG_DEBUG, "Deriving WPA PSK based on " 780 if (bss->wpa) { 793 wpa_printf(MSG_ERROR, "WEP configuration in a WPA network is not supported"); 798 if (full_config && bss->wpa && 801 wpa_printf(MSG_ERROR, "WPA-PSK using RADIUS enabled, but no " 806 if (full_config && bss->wpa && (bss->wpa_key_mgmt & WPA_KEY_MGMT_PSK) && 811 wpa_printf(MSG_ERROR, "WPA-PSK enabled, but PSK or passphrase [all...] |
wps_hostapd.c | 105 "Received new WPA/WPA2-PSK from WPS for STA " MACSTR, 109 "Received new WPA/WPA2-PSK from WPS for STA " MACSTR 329 bss->wpa = 3; 331 bss->wpa = 2; 333 bss->wpa = 1; 335 bss->wpa = 0; 337 if (bss->wpa) { 353 bss->wpa_group = wpa_select_ap_group_cipher(bss->wpa, 403 int wpa; local 453 wpa_printf(MSG_INFO, "WPS: Invalid key length %lu for WPA/WPA2" [all...] |
wpa_auth_ie.c | 2 * hostapd - WPA/RSN IE and KDE definitions 83 /* WPA Capabilities; use defaults, so no need to include it */ 407 wpa_hexdump(MSG_DEBUG, "WPA: Forced own IE(s) for testing", 424 if (wpa_auth->conf.wpa == WPA_PROTO_OSEN) { 427 if (wpa_auth->conf.wpa & WPA_PROTO_RSN) { 443 if (wpa_auth->conf.wpa & WPA_PROTO_WPA) { 520 if (!(wpa_auth->conf.wpa & version)) { 521 wpa_printf(MSG_DEBUG, "Invalid WPA proto (%d) from " MACSTR, 606 wpa_printf(MSG_DEBUG, "Failed to parse WPA/RSN IE from " 608 wpa_hexdump(MSG_DEBUG, "WPA/RSN IE", wpa_ie, wpa_ie_len) [all...] |
wpa_auth.c | 2 * IEEE 802.11 RSN / WPA Authenticator 32 #define STATE_MACHINE_DEBUG_PREFIX "WPA" 259 wpa_printf(MSG_ERROR, "Failed to get random data for WPA " 375 wpa_printf(MSG_INFO, "WPA: Not enough entropy in random pool " 387 wpa_printf(MSG_ERROR, "Failed to get random data for WPA " 395 wpa_printf(MSG_DEBUG, "WPA: Delay group state machine start " 409 * wpa_init - Initialize WPA authenticator 411 * @conf: Configuration for WPA authenticator 412 * @cb: Callback functions for WPA authenticator 413 * Returns: Pointer to WPA authenticator data or %NULL on failur [all...] |
ap_drv_ops.c | 260 if (((!hapd->conf->ieee802_1x && !hapd->conf->wpa) || 279 params.wpa = hapd->conf->wpa; 282 if ((hapd->conf->wpa & (WPA_PROTO_WPA | WPA_PROTO_RSN)) == 286 else if (hapd->conf->wpa & WPA_PROTO_RSN) 288 else if (hapd->conf->wpa & WPA_PROTO_WPA)
|
ieee802_1x.c | 361 suite = wpa_cipher_to_suite(((hapd->conf->wpa & 0x2) || 463 if ((hapd->conf->wpa & 2) && 479 if (hapd->conf->wpa && wpa_key_mgmt_ft(hapd->conf->wpa_key_mgmt) && 493 if ((hapd->conf->wpa || hapd->conf->osen) && sta->wpa_sm && 910 if (!hapd->conf->ieee802_1x && !hapd->conf->wpa && !hapd->conf->osen && 1096 ((hapd->conf->wpa && (sta->flags & WLAN_STA_MAYBE_WPS)) || 1123 * reassociation change from WPA-EAP to PSK. 2381 const struct wpa_eapol_key *wpa; local [all...] |
ieee802_11_shared.c | 230 if ((hapd->conf->wpa & WPA_PROTO_RSN) && 270 if ((!(hapd->conf->wpa & WPA_PROTO_RSN) || 611 if (!(hapd->conf->wpa & WPA_PROTO_RSN) ||
|
wpa_auth_i.h | 2 * hostapd - IEEE 802.11i-2004 / WPA Authenticator: Internal definitions 69 Boolean PInitAKeys; /* WPA only, not in IEEE 802.11i */ 98 WPA_VERSION_NO_WPA = 0 /* WPA not used */, 99 WPA_VERSION_WPA = 1 /* WPA / IEEE 802.11i/D3.0 */, 101 } wpa; member in struct:wpa_state_machine
|
beacon.c | 453 /* RSN, MDIE, WPA */ 1131 /* RSN, MDIE, WPA */ [all...] |
/external/wpa_supplicant_8/src/eapol_auth/ |
eapol_auth_sm.h | 19 int wpa; member in struct:eapol_auth_config
|
/external/wpa_supplicant_8/wpa_supplicant/hidl/1.0/ |
sta_iface.cpp | 635 if (wpa_tdls_is_external_setup(wpa_s->wpa)) { 636 ret = wpa_tdls_send_discovery_request(wpa_s->wpa, peer); 652 if (wpa_tdls_is_external_setup(wpa_s->wpa) && 654 wpa_tdls_remove(wpa_s->wpa, peer); 655 ret = wpa_tdls_start(wpa_s->wpa, peer); 671 if (wpa_tdls_is_external_setup(wpa_s->wpa) && 674 wpa_s->wpa, peer, WLAN_REASON_TDLS_TEARDOWN_UNSPECIFIED);
|
/external/wpa_supplicant_8/src/drivers/ |
driver_bsd.c | 2 * WPA Supplicant - driver interaction with BSD net80211 layer 74 int prev_wpa; /* wpa state to restore on deinit */ 411 * swap it to match with the byte order used in WPA. 509 wpa_printf(MSG_DEBUG, "%s: enable WPA= 0x%x", __func__, params->wpa); 510 if (set80211param(priv, IEEE80211_IOC_WPA, params->wpa)) { 511 wpa_printf(MSG_INFO, "Unable to set WPA to %u", params->wpa); 527 if (!params->wpa && !params->ieee802_1x) { 528 wpa_printf(MSG_ERROR, "%s: No 802.1X or WPA enabled" [all...] |
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
networkconfig.cpp | 75 else if (flags.indexOf("[WPA-EAP") >= 0) 79 else if (flags.indexOf("[WPA-PSK") >= 0) 197 tr("WPA Pre-Shared Key Error"), 198 tr("WPA-PSK requires a passphrase of 8 to 63 " 255 key_mgmt = "WPA-PSK"; 256 proto = "WPA"; 259 key_mgmt = "WPA-EAP"; 260 proto = "WPA"; 263 key_mgmt = "WPA-PSK"; 267 key_mgmt = "WPA-EAP" 525 int wpa = 0; local [all...] |