HomeSort by relevance Sort by last modified time
    Searched refs:wpa (Results 26 - 50 of 63) sorted by null

12 3

  /external/wpa_supplicant_8/wpa_supplicant/
notify.c 19 #include "rsn_supp/wpa.h"
387 if (wpa_s->wpa)
388 wpa_sm_pmksa_cache_flush(wpa_s->wpa, ssid);
eapol_test.c 2 * WPA Supplicant - test code
24 #include "rsn_supp/wpa.h"
315 printf("WPA: eapol_test_eapol_send(type=%d len=%lu)\n",
345 printf("WPA: EAPOL processing complete\n");
630 wpa_s->wpa = wpa_sm_init(wctx);
631 if (!wpa_s->wpa) {
664 wpa_sm_deinit(wpa_s->wpa);
665 wpa_s->wpa = NULL;
    [all...]
wnm_sta.c 15 #include "rsn_supp/wpa.h"
195 if (key_len_total && !wpa_sm_pmf_enabled(wpa_s->wpa)) {
225 wpa_s->wpa,
236 wpa_wnmsleep_install_key(wpa_s->wpa,
1201 wpa_sm_pmf_enabled(wpa_s->wpa),
    [all...]
nmake.mak 80 $(OBJDIR)\wpa.obj \
mesh.c 2 * WPA Supplicant - Basic mesh mode routines
299 bss->conf->wpa = ssid->proto;
gas_query.c 18 #include "rsn_supp/wpa.h"
271 return wpa_sm_pmf_enabled(wpa_s->wpa);
hs20_supplicant.c 18 #include "rsn_supp/wpa.h"
1176 if (!wpa_sm_pmf_enabled(wpa_s->wpa)) {
  /external/wpa_supplicant_8/src/eapol_auth/
eapol_auth_sm.c 816 if (!eapol->conf.wpa &&
821 if (eapol->conf.wpa)
1188 dst->wpa = src->wpa;
    [all...]
  /external/wpa_supplicant_8/src/ap/
ieee802_11.c 167 if (hapd->conf->wpa)
    [all...]
wpa_auth_glue.c 2 * hostapd / WPA authenticator glue code
36 wconf->wpa = conf->wpa;
84 wconf->wpa = WPA_PROTO_OSEN;
145 wpa_printf(MSG_DEBUG, "%s: WPA authenticator requests disconnect: "
631 wpa_printf(MSG_ERROR, "WPA initialization failed.");
643 wpa_printf(MSG_ERROR, "Failed to configure WPA IE for "
ap_config.h 312 int wpa; /* bitfield of WPA_PROTO_WPA, WPA_PROTO_RSN */ member in struct:hostapd_bss_config
wpa_auth.h 2 * hostapd - IEEE 802.11i-2004 / WPA Authenticator
139 int wpa; member in struct:wpa_auth_config
hostapd.c 96 wpa_printf(MSG_ERROR, "Failed to re-configure WPA PSK "
100 if (hapd->conf->ieee802_1x || hapd->conf->wpa)
105 if ((hapd->conf->wpa || hapd->conf->osen) && hapd->wpa_auth == NULL) {
109 } else if (hapd->conf->wpa) {
115 wpa_printf(MSG_ERROR, "Failed to configure WPA IE for "
1021 wpa_printf(MSG_ERROR, "WPA-PSK setup failed.");
1081 if ((conf->wpa || conf->osen) && hostapd_setup_wpa(hapd))
    [all...]
drv_callbacks.c 85 wpa_printf(MSG_DEBUG, "STA included WPA IE in (Re)AssocReq");
96 "STA did not include WPS/RSN/WPA IE in (Re)AssocReq");
189 if (hapd->conf->wpa) {
194 "STA did not include WPA/RSN IE in (Re)Association Request - possible WPS use");
200 wpa_printf(MSG_DEBUG, "No WPA/RSN IE from STA");
229 "Failed to initialize WPA state machine");
237 "WPA/RSN information element rejected? (res %u)",
355 "Failed to initialize WPA state machine");
365 if (hapd->conf->mbo_enabled && (hapd->conf->wpa & 2) &&
740 "FT: Failed to initialize WPA state machine")
    [all...]
  /external/wpa_supplicant_8/src/drivers/
driver_atheros.c 168 return "WPA";
255 * Configure WPA parameters.
360 wpa_printf(MSG_DEBUG, "%s: enable WPA=0x%x", __func__, params->wpa);
361 if (set80211param(drv, IEEE80211_PARAM_WPA, params->wpa)) {
362 wpa_printf(MSG_INFO, "Unable to set WPA to %u", params->wpa);
383 if (!params->wpa && !params->ieee802_1x) {
384 wpa_printf(MSG_WARNING, "No 802.1X or WPA enabled!");
387 if (params->wpa && atheros_configure_wpa(drv, params) != 0)
    [all...]
  /frameworks/base/packages/SettingsLib/src/com/android/settingslib/wifi/
AccessPoint.java     [all...]
  /external/syslinux/gpxe/src/net/80211/
wpa_ccmp.c 26 #include <gpxe/wpa.h>
32 * Backend for WPA using the CCMP encryption method
373 DBGC2 ( ctx, "WPA-CCMP %p: encrypted packet %p -> %p\n", ctx,
414 DBGC ( ctx, "WPA-CCMP %p: packet received out of order "
422 DBGC2 ( ctx, "WPA-CCMP %p: RX packet number %012llx\n", ctx, ctx->rx_seq );
444 DBGC2 ( ctx, "WPA-CCMP %p: MIC failure\n", ctx );
449 DBGC2 ( ctx, "WPA-CCMP %p: decrypted packet %p -> %p\n", ctx,
wpa_tkip.c 28 #include <gpxe/wpa.h>
34 * Backend for WPA using the TKIP encryption standard.
431 DBGC2 ( ctx, "WPA-TKIP %p: encrypted packet %p -> %p\n", ctx,
475 DBGC ( ctx, "WPA-TKIP %p: packet received out of order "
501 DBGC ( ctx, "WPA-TKIP %p CRC mismatch: expect %08x, get %08x\n",
511 DBGC ( ctx, "WPA-TKIP %p ALERT! MIC failure\n", ctx );
517 DBGC2 ( ctx, "WPA-TKIP %p: decrypted packet %p -> %p\n", ctx,
wpa.c 23 #include <gpxe/wpa.h>
38 * Handler for the aspects of WPA handshaking that are independent of
42 /** List of WPA contexts in active use. */
49 * @v ctx WPA common context
84 * Find WPA key integrity and encryption handler from key version field
103 * Construct RSN or WPA information element
106 * @ret ie_ret RSN or WPA information element
109 * This function allocates, fills, and returns a RSN or WPA
118 * The returned IE will be of the same type (RSN or WPA) as was
134 DBG ( "WPA: Can't make RSN IE for a non-associating device\n" )
    [all...]
  /external/wpa_supplicant_8/hostapd/
ctrl_iface.c 1095 ret = os_snprintf(pos, end - pos, "WPA-PSK ");
1101 ret = os_snprintf(pos, end - pos, "WPA-EAP ");
1144 ret = os_snprintf(pos, end - pos, "WPA-PSK-SHA256 ");
1150 ret = os_snprintf(pos, end - pos, "WPA-EAP-SHA256 ");
1165 ret = os_snprintf(pos, end - pos, "WPA-EAP-SUITE-B ");
1173 "WPA-EAP-SUITE-B-192 ");
1229 if (hapd->conf->wps_state && hapd->conf->wpa &&
1238 if (hapd->conf->wps_state && hapd->conf->wpa &&
1251 if (hapd->conf->wpa) {
1252 ret = os_snprintf(pos, end - pos, "wpa=%d\n", hapd->conf->wpa)
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/dbus/
dbus_new_handlers.c 2 * WPA Supplicant / dbus-based control interface
17 #include "rsn_supp/wpa.h"
260 wpa_sm_pmksa_cache_flush(wpa_s->wpa, ssid);
    [all...]
dbus_old_handlers.c 2 * WPA Supplicant / dbus-based control interface
16 #include "rsn_supp/wpa.h"
594 "WPA-PSK", "WPA-EAP", "IEEE8021X", "WPA-NONE",
614 &iter_array, "WPA-EAP")) ||
618 &iter_array, "WPA-PSK")) ||
621 &iter_array, "WPA-NONE")) ||
629 /***** WPA protocol */
632 const char *args[] = { "RSN", "WPA" };
    [all...]
  /external/autotest/server/cros/
casey_chromeos7_ap_list.conf 125 security = wpa
  /external/wpa_supplicant_8/src/common/
wpa_common.c 2 * WPA/RSN - Shared functions for supplicant and authenticator
211 wpa_printf(MSG_DEBUG, "WPA: PTK derivation - A1=" MACSTR " A2=" MACSTR,
213 wpa_hexdump(MSG_DEBUG, "WPA: Nonce1", nonce1, WPA_NONCE_LEN);
214 wpa_hexdump(MSG_DEBUG, "WPA: Nonce2", nonce2, WPA_NONCE_LEN);
215 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len);
216 wpa_hexdump_key(MSG_DEBUG, "WPA: PTK", tmp, ptk_len);
219 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len);
222 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len);
225 wpa_hexdump_key(MSG_DEBUG, "WPA: TK", ptk->tk, ptk->tk_len);
    [all...]
wpa_common.h 2 * WPA definitions shared between hostapd and wpa_supplicant
168 /* bit4..5 is used in WPA, but is reserved in IEEE 802.11i/RSN */
204 * struct wpa_ptk - WPA Pairwise Transient Key
229 /* WPA IE version 1
240 * WPA Capabilities (2 octets, little endian) (default: 0)
474 int wpa_select_ap_group_cipher(int wpa, int wpa_pairwise, int rsn_pairwise);

Completed in 1033 milliseconds

12 3