/external/wpa_supplicant_8/wpa_supplicant/ |
notify.c | 19 #include "rsn_supp/wpa.h" 387 if (wpa_s->wpa) 388 wpa_sm_pmksa_cache_flush(wpa_s->wpa, ssid);
|
eapol_test.c | 2 * WPA Supplicant - test code 24 #include "rsn_supp/wpa.h" 315 printf("WPA: eapol_test_eapol_send(type=%d len=%lu)\n", 345 printf("WPA: EAPOL processing complete\n"); 630 wpa_s->wpa = wpa_sm_init(wctx); 631 if (!wpa_s->wpa) { 664 wpa_sm_deinit(wpa_s->wpa); 665 wpa_s->wpa = NULL; [all...] |
wnm_sta.c | 15 #include "rsn_supp/wpa.h" 195 if (key_len_total && !wpa_sm_pmf_enabled(wpa_s->wpa)) { 225 wpa_s->wpa, 236 wpa_wnmsleep_install_key(wpa_s->wpa, 1201 wpa_sm_pmf_enabled(wpa_s->wpa), [all...] |
nmake.mak | 80 $(OBJDIR)\wpa.obj \
|
mesh.c | 2 * WPA Supplicant - Basic mesh mode routines 299 bss->conf->wpa = ssid->proto;
|
gas_query.c | 18 #include "rsn_supp/wpa.h" 271 return wpa_sm_pmf_enabled(wpa_s->wpa);
|
hs20_supplicant.c | 18 #include "rsn_supp/wpa.h" 1176 if (!wpa_sm_pmf_enabled(wpa_s->wpa)) {
|
/external/wpa_supplicant_8/src/eapol_auth/ |
eapol_auth_sm.c | 816 if (!eapol->conf.wpa && 821 if (eapol->conf.wpa) 1188 dst->wpa = src->wpa; [all...] |
/external/wpa_supplicant_8/src/ap/ |
ieee802_11.c | 167 if (hapd->conf->wpa) [all...] |
wpa_auth_glue.c | 2 * hostapd / WPA authenticator glue code 36 wconf->wpa = conf->wpa; 84 wconf->wpa = WPA_PROTO_OSEN; 145 wpa_printf(MSG_DEBUG, "%s: WPA authenticator requests disconnect: " 631 wpa_printf(MSG_ERROR, "WPA initialization failed."); 643 wpa_printf(MSG_ERROR, "Failed to configure WPA IE for "
|
ap_config.h | 312 int wpa; /* bitfield of WPA_PROTO_WPA, WPA_PROTO_RSN */ member in struct:hostapd_bss_config
|
wpa_auth.h | 2 * hostapd - IEEE 802.11i-2004 / WPA Authenticator 139 int wpa; member in struct:wpa_auth_config
|
hostapd.c | 96 wpa_printf(MSG_ERROR, "Failed to re-configure WPA PSK " 100 if (hapd->conf->ieee802_1x || hapd->conf->wpa) 105 if ((hapd->conf->wpa || hapd->conf->osen) && hapd->wpa_auth == NULL) { 109 } else if (hapd->conf->wpa) { 115 wpa_printf(MSG_ERROR, "Failed to configure WPA IE for " 1021 wpa_printf(MSG_ERROR, "WPA-PSK setup failed."); 1081 if ((conf->wpa || conf->osen) && hostapd_setup_wpa(hapd)) [all...] |
drv_callbacks.c | 85 wpa_printf(MSG_DEBUG, "STA included WPA IE in (Re)AssocReq"); 96 "STA did not include WPS/RSN/WPA IE in (Re)AssocReq"); 189 if (hapd->conf->wpa) { 194 "STA did not include WPA/RSN IE in (Re)Association Request - possible WPS use"); 200 wpa_printf(MSG_DEBUG, "No WPA/RSN IE from STA"); 229 "Failed to initialize WPA state machine"); 237 "WPA/RSN information element rejected? (res %u)", 355 "Failed to initialize WPA state machine"); 365 if (hapd->conf->mbo_enabled && (hapd->conf->wpa & 2) && 740 "FT: Failed to initialize WPA state machine") [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_atheros.c | 168 return "WPA"; 255 * Configure WPA parameters. 360 wpa_printf(MSG_DEBUG, "%s: enable WPA=0x%x", __func__, params->wpa); 361 if (set80211param(drv, IEEE80211_PARAM_WPA, params->wpa)) { 362 wpa_printf(MSG_INFO, "Unable to set WPA to %u", params->wpa); 383 if (!params->wpa && !params->ieee802_1x) { 384 wpa_printf(MSG_WARNING, "No 802.1X or WPA enabled!"); 387 if (params->wpa && atheros_configure_wpa(drv, params) != 0) [all...] |
/frameworks/base/packages/SettingsLib/src/com/android/settingslib/wifi/ |
AccessPoint.java | [all...] |
/external/syslinux/gpxe/src/net/80211/ |
wpa_ccmp.c | 26 #include <gpxe/wpa.h> 32 * Backend for WPA using the CCMP encryption method 373 DBGC2 ( ctx, "WPA-CCMP %p: encrypted packet %p -> %p\n", ctx, 414 DBGC ( ctx, "WPA-CCMP %p: packet received out of order " 422 DBGC2 ( ctx, "WPA-CCMP %p: RX packet number %012llx\n", ctx, ctx->rx_seq ); 444 DBGC2 ( ctx, "WPA-CCMP %p: MIC failure\n", ctx ); 449 DBGC2 ( ctx, "WPA-CCMP %p: decrypted packet %p -> %p\n", ctx,
|
wpa_tkip.c | 28 #include <gpxe/wpa.h> 34 * Backend for WPA using the TKIP encryption standard. 431 DBGC2 ( ctx, "WPA-TKIP %p: encrypted packet %p -> %p\n", ctx, 475 DBGC ( ctx, "WPA-TKIP %p: packet received out of order " 501 DBGC ( ctx, "WPA-TKIP %p CRC mismatch: expect %08x, get %08x\n", 511 DBGC ( ctx, "WPA-TKIP %p ALERT! MIC failure\n", ctx ); 517 DBGC2 ( ctx, "WPA-TKIP %p: decrypted packet %p -> %p\n", ctx,
|
wpa.c | 23 #include <gpxe/wpa.h> 38 * Handler for the aspects of WPA handshaking that are independent of 42 /** List of WPA contexts in active use. */ 49 * @v ctx WPA common context 84 * Find WPA key integrity and encryption handler from key version field 103 * Construct RSN or WPA information element 106 * @ret ie_ret RSN or WPA information element 109 * This function allocates, fills, and returns a RSN or WPA 118 * The returned IE will be of the same type (RSN or WPA) as was 134 DBG ( "WPA: Can't make RSN IE for a non-associating device\n" ) [all...] |
/external/wpa_supplicant_8/hostapd/ |
ctrl_iface.c | 1095 ret = os_snprintf(pos, end - pos, "WPA-PSK "); 1101 ret = os_snprintf(pos, end - pos, "WPA-EAP "); 1144 ret = os_snprintf(pos, end - pos, "WPA-PSK-SHA256 "); 1150 ret = os_snprintf(pos, end - pos, "WPA-EAP-SHA256 "); 1165 ret = os_snprintf(pos, end - pos, "WPA-EAP-SUITE-B "); 1173 "WPA-EAP-SUITE-B-192 "); 1229 if (hapd->conf->wps_state && hapd->conf->wpa && 1238 if (hapd->conf->wps_state && hapd->conf->wpa && 1251 if (hapd->conf->wpa) { 1252 ret = os_snprintf(pos, end - pos, "wpa=%d\n", hapd->conf->wpa) [all...] |
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_new_handlers.c | 2 * WPA Supplicant / dbus-based control interface 17 #include "rsn_supp/wpa.h" 260 wpa_sm_pmksa_cache_flush(wpa_s->wpa, ssid); [all...] |
dbus_old_handlers.c | 2 * WPA Supplicant / dbus-based control interface 16 #include "rsn_supp/wpa.h" 594 "WPA-PSK", "WPA-EAP", "IEEE8021X", "WPA-NONE", 614 &iter_array, "WPA-EAP")) || 618 &iter_array, "WPA-PSK")) || 621 &iter_array, "WPA-NONE")) || 629 /***** WPA protocol */ 632 const char *args[] = { "RSN", "WPA" }; [all...] |
/external/autotest/server/cros/ |
casey_chromeos7_ap_list.conf | 125 security = wpa
|
/external/wpa_supplicant_8/src/common/ |
wpa_common.c | 2 * WPA/RSN - Shared functions for supplicant and authenticator 211 wpa_printf(MSG_DEBUG, "WPA: PTK derivation - A1=" MACSTR " A2=" MACSTR, 213 wpa_hexdump(MSG_DEBUG, "WPA: Nonce1", nonce1, WPA_NONCE_LEN); 214 wpa_hexdump(MSG_DEBUG, "WPA: Nonce2", nonce2, WPA_NONCE_LEN); 215 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len); 216 wpa_hexdump_key(MSG_DEBUG, "WPA: PTK", tmp, ptk_len); 219 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len); 222 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); 225 wpa_hexdump_key(MSG_DEBUG, "WPA: TK", ptk->tk, ptk->tk_len); [all...] |
wpa_common.h | 2 * WPA definitions shared between hostapd and wpa_supplicant 168 /* bit4..5 is used in WPA, but is reserved in IEEE 802.11i/RSN */ 204 * struct wpa_ptk - WPA Pairwise Transient Key 229 /* WPA IE version 1 240 * WPA Capabilities (2 octets, little endian) (default: 0) 474 int wpa_select_ap_group_cipher(int wpa, int wpa_pairwise, int rsn_pairwise);
|