/external/wpa_supplicant_8/wpa_supplicant/ |
preauth_test.c | 2 * WPA Supplicant - test code for pre-authentication 19 #include "rsn_supp/wpa.h" 183 rsn_preauth_deinit(wpa_s->wpa); 184 pmksa_candidate_free(wpa_s->wpa); 185 wpa_sm_deinit(wpa_s->wpa); 207 if (!rsn_preauth_in_progress(wpa_s->wpa)) 248 wpa_s->wpa = wpa_sm_init(ctx); 249 assert(wpa_s->wpa != NULL); 250 wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_PROTO, WPA_PROTO_RSN); 253 wpa_sm_set_ifname(wpa_s->wpa, wpa_s->ifname, NULL) [all...] |
events.c | 2 * WPA Supplicant - Driver event processing 13 #include "rsn_supp/wpa.h" 227 wpa_dbg(wpa_s, MSG_DEBUG, "Could not set WPA suites"); 255 wpa_msg(wpa_s, MSG_INFO, "WPA: TKIP countermeasures stopped"); 331 if (wpa_sm_parse_own_wpa_ie(wpa_s->wpa, &ie) < 0 || 336 pmksa_set = pmksa_cache_set_current(wpa_s->wpa, 364 pmksa_candidate_add(wpa_s->wpa, data->pmkid_candidate.bssid, 453 wpa_sm_set_scard_ctx(wpa_s->wpa, wpa_s->scard); 526 /* Allow TSN if local configuration accepts WEP use without WPA/WPA2 */ 640 " skip WPA IE - parse failed") 967 int wpa; local [all...] |
wpa_supplicant.c | 2 * WPA Supplicant 26 #include "rsn_supp/wpa.h" 156 /* IBSS/WPA-None uses only one key (Group) for both receiving and 160 wpa_msg(wpa_s, MSG_INFO, "WPA: Invalid mode %d (not " 161 "IBSS/ad-hoc) for WPA-None", ssid->mode); 166 wpa_msg(wpa_s, MSG_INFO, "WPA: No PSK configured for " 167 "WPA-None"); 183 /* WPA-None uses the same Michael MIC key for both TX and RX */ 190 wpa_msg(wpa_s, MSG_INFO, "WPA: Invalid group cipher %d for " 191 "WPA-None", wpa_s->group_cipher) [all...] |
sme.c | 18 #include "rsn_supp/wpa.h" 330 if (pmksa_cache_set_current(wpa_s->wpa, NULL, bss->bssid, 338 wpa_msg(wpa_s, MSG_WARNING, "SME: Failed to set WPA " 346 * Both WPA and non-WPA IEEE 802.1X enabled in configuration - 347 * use non-WPA since the scan results did not indicate that the 348 * AP is using WPA or WPA2. 357 wpa_msg(wpa_s, MSG_WARNING, "SME: Failed to set WPA " 386 wpa_sm_set_ft_params(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0); 389 wpa_ft_prepare_auth_request(wpa_s->wpa, ie) [all...] |
wpas_glue.c | 2 * WPA Supplicant - Glue code to setup EAPOL and RSN modules 14 #include "rsn_supp/wpa.h" 155 wpa_printf(MSG_DEBUG, "WPA: drop TX EAPOL in non-IEEE 802.1X " 161 if (pmksa_cache_get_current(wpa_s->wpa) && 252 wpa_sm_aborted_cached(wpa_s->wpa); 358 wpa_msg(wpa_s, MSG_DEBUG, "WPA: EAPOL processing complete"); 393 if (wpa_sm_set_ap_wpa_ie(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0)) 397 if (wpa_sm_set_ap_rsn_ie(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0)) 414 /* No WPA/RSN IE found in the cached scan results. Try to get updated 975 wpa_sm_pmksa_cache_flush(wpa_s->wpa, ssid) [all...] |
ap.c | 2 * WPA Supplicant - Basic AP mode support routines 324 bss->wpa = ssid->proto; 403 if ((bss->wpa & 2) && bss->rsn_pairwise == 0) 405 bss->wpa_group = wpa_select_ap_group_cipher(bss->wpa, bss->wpa_pairwise, 408 if (bss->wpa && bss->ieee802_1x) 410 else if (bss->wpa) 437 if (bss->wpa_group_rekey < 86400 && (bss->wpa & 2) && 456 * Enable WPS by default for open and WPA/WPA2-Personal network, but 465 !(bss->wpa & 2))) 466 goto no_wps; /* WPS2 does not allow WPA/TKIP-onl [all...] |
ctrl_iface.c | 2 * WPA Supplicant / Control interface (shared code for all backends) 27 #include "rsn_supp/wpa.h" 460 if (wpa_sm_set_param(wpa_s->wpa, RSNA_PMK_LIFETIME, 469 if (wpa_sm_set_param(wpa_s->wpa, RSNA_PMK_REAUTH_THRESHOLD, 477 if (wpa_sm_set_param(wpa_s->wpa, RSNA_SA_TIMEOUT, 541 wpa_tdls_enable(wpa_s->wpa, !disabled); 755 wpa_sm_get_anonce(wpa_s->wpa), 782 rsn_preauth_deinit(wpa_s->wpa); 783 if (rsn_preauth_init(wpa_s->wpa, bssid, ssid ? &ssid->eap : NULL)) 808 if (wpa_tdls_is_external_setup(wpa_s->wpa)) [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
Makefile | 22 wpa.o \
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
wpas-test.py | 68 wpa = "no" 70 wpa = "yes" 83 print " %s :: ssid='%s' wpa=%s wpa2=%s quality=%d%% rate=%d freq=%d" % (bssid, ssid, wpa, wpa2, qual, maxrate, freq)
|
wpas-dbus-new.py | 55 val = net_obj.Get(WPAS_DBUS_BSS_INTERFACE, 'WPA', 57 wpa = "no" 59 wpa = "yes" 76 print " %s :: ssid='%s' wpa=%s wpa2=%s signal=%d rate=%d freq=%d" % (bssid, ssid, wpa, wpa2, signal, maxrate, freq)
|
wpas-dbus-new-signals.py | 62 val = net_obj.Get(WPAS_DBUS_BSS_INTERFACE, 'WPA', 64 wpa = "no" 66 wpa = "yes" 83 print " %s :: ssid='%s' wpa=%s wpa2=%s signal=%d rate=%d freq=%d" % (bssid, ssid, wpa, wpa2, signal, maxrate, freq)
|
/external/syslinux/gpxe/src/net/80211/ |
wpa_psk.c | 23 #include <gpxe/wpa.h> 28 * Frontend for WPA using a pre-shared key. 32 * Initialise WPA-PSK state 43 * Start WPA-PSK authentication 60 DBGC ( ctx, "WPA-PSK %p: no passphrase provided!\n", ctx ); 68 DBGC ( ctx, "WPA-PSK %p: derived PMK from passphrase `%s':\n", ctx, 76 * Step WPA-PSK authentication 96 * Do-nothing function; you can't change a WPA key post-authentication 107 * Disable handling of received WPA authentication frames 116 /** WPA-PSK security handshaker * [all...] |
/external/wpa_supplicant_8/src/ap/ |
ap_config.c | 252 wpa_printf(MSG_ERROR, "WPA PSK file '%s' not found.", fname); 281 wpa_printf(MSG_ERROR, "WPA PSK allocation failed"); 354 wpa_printf(MSG_DEBUG, "Using pre-configured WPA PSK " 357 wpa_printf(MSG_DEBUG, "Deriving WPA PSK based on " 813 if (bss->wpa) { 826 wpa_printf(MSG_ERROR, "WEP configuration in a WPA network is not supported"); 831 if (full_config && bss->wpa && 834 wpa_printf(MSG_ERROR, "WPA-PSK using RADIUS enabled, but no " 839 if (full_config && bss->wpa && (bss->wpa_key_mgmt & WPA_KEY_MGMT_PSK) && 844 wpa_printf(MSG_ERROR, "WPA-PSK enabled, but PSK or passphrase [all...] |
wps_hostapd.c | 105 "Received new WPA/WPA2-PSK from WPS for STA " MACSTR, 109 "Received new WPA/WPA2-PSK from WPS for STA " MACSTR 329 bss->wpa = 3; 331 bss->wpa = 2; 333 bss->wpa = 1; 335 bss->wpa = 0; 337 if (bss->wpa) { 353 bss->wpa_group = wpa_select_ap_group_cipher(bss->wpa, 403 int wpa; local 453 wpa_printf(MSG_INFO, "WPS: Invalid key length %lu for WPA/WPA2" [all...] |
wpa_auth.c | 2 * IEEE 802.11 RSN / WPA Authenticator 32 #define STATE_MACHINE_DEBUG_PREFIX "WPA" 262 wpa_printf(MSG_ERROR, "Failed to get random data for WPA " 378 wpa_printf(MSG_INFO, "WPA: Not enough entropy in random pool " 390 wpa_printf(MSG_ERROR, "Failed to get random data for WPA " 398 wpa_printf(MSG_DEBUG, "WPA: Delay group state machine start " 412 * wpa_init - Initialize WPA authenticator 414 * @conf: Configuration for WPA authenticator 415 * @cb: Callback functions for WPA authenticator 416 * Returns: Pointer to WPA authenticator data or %NULL on failur [all...] |
wpa_auth_ie.c | 2 * hostapd - WPA/RSN IE and KDE definitions 83 /* WPA Capabilities; use defaults, so no need to include it */ 419 wpa_hexdump(MSG_DEBUG, "WPA: Forced own IE(s) for testing", 436 if (wpa_auth->conf.wpa == WPA_PROTO_OSEN) { 439 if (wpa_auth->conf.wpa & WPA_PROTO_RSN) { 455 if (wpa_auth->conf.wpa & WPA_PROTO_WPA) { 533 if (!(wpa_auth->conf.wpa & version)) { 534 wpa_printf(MSG_DEBUG, "Invalid WPA proto (%d) from " MACSTR, 627 wpa_printf(MSG_DEBUG, "Failed to parse WPA/RSN IE from " 629 wpa_hexdump(MSG_DEBUG, "WPA/RSN IE", wpa_ie, wpa_ie_len) [all...] |
ap_drv_ops.c | 268 if (((!hapd->conf->ieee802_1x && !hapd->conf->wpa) || 287 params.wpa = hapd->conf->wpa; 290 if ((hapd->conf->wpa & (WPA_PROTO_WPA | WPA_PROTO_RSN)) == 294 else if (hapd->conf->wpa & WPA_PROTO_RSN) 296 else if (hapd->conf->wpa & WPA_PROTO_WPA)
|
ieee802_1x.c | 361 suite = wpa_cipher_to_suite(((hapd->conf->wpa & 0x2) || 463 if ((hapd->conf->wpa & 2) && 479 if (hapd->conf->wpa && wpa_key_mgmt_ft(hapd->conf->wpa_key_mgmt) && 493 if ((hapd->conf->wpa || hapd->conf->osen) && sta->wpa_sm && 910 if (!hapd->conf->ieee802_1x && !hapd->conf->wpa && !hapd->conf->osen && 1098 ((hapd->conf->wpa && (sta->flags & WLAN_STA_MAYBE_WPS)) || 1127 * reassociation change from WPA-EAP to PSK. 2384 const struct wpa_eapol_key *wpa; local [all...] |
ieee802_11_shared.c | 230 if ((hapd->conf->wpa & WPA_PROTO_RSN) && 270 if ((!(hapd->conf->wpa & WPA_PROTO_RSN) || 636 if (!(hapd->conf->wpa & WPA_PROTO_RSN) ||
|
wpa_auth_i.h | 2 * hostapd - IEEE 802.11i-2004 / WPA Authenticator: Internal definitions 72 Boolean PInitAKeys; /* WPA only, not in IEEE 802.11i */ 101 WPA_VERSION_NO_WPA = 0 /* WPA not used */, 102 WPA_VERSION_WPA = 1 /* WPA / IEEE 802.11i/D3.0 */, 104 } wpa; member in struct:wpa_state_machine
|
/external/wpa_supplicant_8/src/eapol_auth/ |
eapol_auth_sm.h | 19 int wpa; member in struct:eapol_auth_config
|
/external/wpa_supplicant_8/wpa_supplicant/hidl/1.0/ |
sta_iface.cpp | 635 if (wpa_tdls_is_external_setup(wpa_s->wpa)) { 636 ret = wpa_tdls_send_discovery_request(wpa_s->wpa, peer); 652 if (wpa_tdls_is_external_setup(wpa_s->wpa) && 654 wpa_tdls_remove(wpa_s->wpa, peer); 655 ret = wpa_tdls_start(wpa_s->wpa, peer); 671 if (wpa_tdls_is_external_setup(wpa_s->wpa) && 674 wpa_s->wpa, peer, WLAN_REASON_TDLS_TEARDOWN_UNSPECIFIED);
|
/external/wpa_supplicant_8/wpa_supplicant/hidl/1.1/ |
sta_iface.cpp | 649 if (wpa_tdls_is_external_setup(wpa_s->wpa)) { 650 ret = wpa_tdls_send_discovery_request(wpa_s->wpa, peer); 666 if (wpa_tdls_is_external_setup(wpa_s->wpa) && 668 wpa_tdls_remove(wpa_s->wpa, peer); 669 ret = wpa_tdls_start(wpa_s->wpa, peer); 685 if (wpa_tdls_is_external_setup(wpa_s->wpa) && 688 wpa_s->wpa, peer, WLAN_REASON_TDLS_TEARDOWN_UNSPECIFIED);
|
/external/wpa_supplicant_8/src/drivers/ |
driver_bsd.c | 2 * WPA Supplicant - driver interaction with BSD net80211 layer 74 int prev_wpa; /* wpa state to restore on deinit */ 411 * swap it to match with the byte order used in WPA. 509 wpa_printf(MSG_DEBUG, "%s: enable WPA= 0x%x", __func__, params->wpa); 510 if (set80211param(priv, IEEE80211_IOC_WPA, params->wpa)) { 511 wpa_printf(MSG_INFO, "Unable to set WPA to %u", params->wpa); 527 if (!params->wpa && !params->ieee802_1x) { 528 wpa_printf(MSG_ERROR, "%s: No 802.1X or WPA enabled" [all...] |
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
networkconfig.cpp | 75 else if (flags.indexOf("[WPA-EAP") >= 0) 79 else if (flags.indexOf("[WPA-PSK") >= 0) 197 tr("WPA Pre-Shared Key Error"), 198 tr("WPA-PSK requires a passphrase of 8 to 63 " 255 key_mgmt = "WPA-PSK"; 256 proto = "WPA"; 259 key_mgmt = "WPA-EAP"; 260 proto = "WPA"; 263 key_mgmt = "WPA-PSK"; 267 key_mgmt = "WPA-EAP" 525 int wpa = 0; local [all...] |