HomeSort by relevance Sort by last modified time
    Searched refs:wpa (Results 1 - 25 of 70) sorted by null

1 2 3

  /external/wpa_supplicant_8/wpa_supplicant/
preauth_test.c 2 * WPA Supplicant - test code for pre-authentication
19 #include "rsn_supp/wpa.h"
183 rsn_preauth_deinit(wpa_s->wpa);
184 pmksa_candidate_free(wpa_s->wpa);
185 wpa_sm_deinit(wpa_s->wpa);
207 if (!rsn_preauth_in_progress(wpa_s->wpa))
248 wpa_s->wpa = wpa_sm_init(ctx);
249 assert(wpa_s->wpa != NULL);
250 wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_PROTO, WPA_PROTO_RSN);
253 wpa_sm_set_ifname(wpa_s->wpa, wpa_s->ifname, NULL)
    [all...]
events.c 2 * WPA Supplicant - Driver event processing
13 #include "rsn_supp/wpa.h"
227 wpa_dbg(wpa_s, MSG_DEBUG, "Could not set WPA suites");
255 wpa_msg(wpa_s, MSG_INFO, "WPA: TKIP countermeasures stopped");
331 if (wpa_sm_parse_own_wpa_ie(wpa_s->wpa, &ie) < 0 ||
336 pmksa_set = pmksa_cache_set_current(wpa_s->wpa,
364 pmksa_candidate_add(wpa_s->wpa, data->pmkid_candidate.bssid,
453 wpa_sm_set_scard_ctx(wpa_s->wpa, wpa_s->scard);
526 /* Allow TSN if local configuration accepts WEP use without WPA/WPA2 */
640 " skip WPA IE - parse failed")
967 int wpa; local
    [all...]
wpa_supplicant.c 2 * WPA Supplicant
26 #include "rsn_supp/wpa.h"
156 /* IBSS/WPA-None uses only one key (Group) for both receiving and
160 wpa_msg(wpa_s, MSG_INFO, "WPA: Invalid mode %d (not "
161 "IBSS/ad-hoc) for WPA-None", ssid->mode);
166 wpa_msg(wpa_s, MSG_INFO, "WPA: No PSK configured for "
167 "WPA-None");
183 /* WPA-None uses the same Michael MIC key for both TX and RX */
190 wpa_msg(wpa_s, MSG_INFO, "WPA: Invalid group cipher %d for "
191 "WPA-None", wpa_s->group_cipher)
    [all...]
sme.c 18 #include "rsn_supp/wpa.h"
330 if (pmksa_cache_set_current(wpa_s->wpa, NULL, bss->bssid,
338 wpa_msg(wpa_s, MSG_WARNING, "SME: Failed to set WPA "
346 * Both WPA and non-WPA IEEE 802.1X enabled in configuration -
347 * use non-WPA since the scan results did not indicate that the
348 * AP is using WPA or WPA2.
357 wpa_msg(wpa_s, MSG_WARNING, "SME: Failed to set WPA "
386 wpa_sm_set_ft_params(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0);
389 wpa_ft_prepare_auth_request(wpa_s->wpa, ie)
    [all...]
wpas_glue.c 2 * WPA Supplicant - Glue code to setup EAPOL and RSN modules
14 #include "rsn_supp/wpa.h"
155 wpa_printf(MSG_DEBUG, "WPA: drop TX EAPOL in non-IEEE 802.1X "
161 if (pmksa_cache_get_current(wpa_s->wpa) &&
252 wpa_sm_aborted_cached(wpa_s->wpa);
358 wpa_msg(wpa_s, MSG_DEBUG, "WPA: EAPOL processing complete");
393 if (wpa_sm_set_ap_wpa_ie(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0))
397 if (wpa_sm_set_ap_rsn_ie(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0))
414 /* No WPA/RSN IE found in the cached scan results. Try to get updated
975 wpa_sm_pmksa_cache_flush(wpa_s->wpa, ssid)
    [all...]
ap.c 2 * WPA Supplicant - Basic AP mode support routines
324 bss->wpa = ssid->proto;
403 if ((bss->wpa & 2) && bss->rsn_pairwise == 0)
405 bss->wpa_group = wpa_select_ap_group_cipher(bss->wpa, bss->wpa_pairwise,
408 if (bss->wpa && bss->ieee802_1x)
410 else if (bss->wpa)
437 if (bss->wpa_group_rekey < 86400 && (bss->wpa & 2) &&
456 * Enable WPS by default for open and WPA/WPA2-Personal network, but
465 !(bss->wpa & 2)))
466 goto no_wps; /* WPS2 does not allow WPA/TKIP-onl
    [all...]
ctrl_iface.c 2 * WPA Supplicant / Control interface (shared code for all backends)
27 #include "rsn_supp/wpa.h"
460 if (wpa_sm_set_param(wpa_s->wpa, RSNA_PMK_LIFETIME,
469 if (wpa_sm_set_param(wpa_s->wpa, RSNA_PMK_REAUTH_THRESHOLD,
477 if (wpa_sm_set_param(wpa_s->wpa, RSNA_SA_TIMEOUT,
541 wpa_tdls_enable(wpa_s->wpa, !disabled);
755 wpa_sm_get_anonce(wpa_s->wpa),
782 rsn_preauth_deinit(wpa_s->wpa);
783 if (rsn_preauth_init(wpa_s->wpa, bssid, ssid ? &ssid->eap : NULL))
808 if (wpa_tdls_is_external_setup(wpa_s->wpa))
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
Makefile 22 wpa.o \
  /external/wpa_supplicant_8/wpa_supplicant/examples/
wpas-test.py 68 wpa = "no"
70 wpa = "yes"
83 print " %s :: ssid='%s' wpa=%s wpa2=%s quality=%d%% rate=%d freq=%d" % (bssid, ssid, wpa, wpa2, qual, maxrate, freq)
wpas-dbus-new.py 55 val = net_obj.Get(WPAS_DBUS_BSS_INTERFACE, 'WPA',
57 wpa = "no"
59 wpa = "yes"
76 print " %s :: ssid='%s' wpa=%s wpa2=%s signal=%d rate=%d freq=%d" % (bssid, ssid, wpa, wpa2, signal, maxrate, freq)
wpas-dbus-new-signals.py 62 val = net_obj.Get(WPAS_DBUS_BSS_INTERFACE, 'WPA',
64 wpa = "no"
66 wpa = "yes"
83 print " %s :: ssid='%s' wpa=%s wpa2=%s signal=%d rate=%d freq=%d" % (bssid, ssid, wpa, wpa2, signal, maxrate, freq)
  /external/syslinux/gpxe/src/net/80211/
wpa_psk.c 23 #include <gpxe/wpa.h>
28 * Frontend for WPA using a pre-shared key.
32 * Initialise WPA-PSK state
43 * Start WPA-PSK authentication
60 DBGC ( ctx, "WPA-PSK %p: no passphrase provided!\n", ctx );
68 DBGC ( ctx, "WPA-PSK %p: derived PMK from passphrase `%s':\n", ctx,
76 * Step WPA-PSK authentication
96 * Do-nothing function; you can't change a WPA key post-authentication
107 * Disable handling of received WPA authentication frames
116 /** WPA-PSK security handshaker *
    [all...]
  /external/wpa_supplicant_8/src/ap/
ap_config.c 252 wpa_printf(MSG_ERROR, "WPA PSK file '%s' not found.", fname);
281 wpa_printf(MSG_ERROR, "WPA PSK allocation failed");
354 wpa_printf(MSG_DEBUG, "Using pre-configured WPA PSK "
357 wpa_printf(MSG_DEBUG, "Deriving WPA PSK based on "
813 if (bss->wpa) {
826 wpa_printf(MSG_ERROR, "WEP configuration in a WPA network is not supported");
831 if (full_config && bss->wpa &&
834 wpa_printf(MSG_ERROR, "WPA-PSK using RADIUS enabled, but no "
839 if (full_config && bss->wpa && (bss->wpa_key_mgmt & WPA_KEY_MGMT_PSK) &&
844 wpa_printf(MSG_ERROR, "WPA-PSK enabled, but PSK or passphrase
    [all...]
wps_hostapd.c 105 "Received new WPA/WPA2-PSK from WPS for STA " MACSTR,
109 "Received new WPA/WPA2-PSK from WPS for STA " MACSTR
329 bss->wpa = 3;
331 bss->wpa = 2;
333 bss->wpa = 1;
335 bss->wpa = 0;
337 if (bss->wpa) {
353 bss->wpa_group = wpa_select_ap_group_cipher(bss->wpa,
403 int wpa; local
453 wpa_printf(MSG_INFO, "WPS: Invalid key length %lu for WPA/WPA2"
    [all...]
wpa_auth.c 2 * IEEE 802.11 RSN / WPA Authenticator
32 #define STATE_MACHINE_DEBUG_PREFIX "WPA"
262 wpa_printf(MSG_ERROR, "Failed to get random data for WPA "
378 wpa_printf(MSG_INFO, "WPA: Not enough entropy in random pool "
390 wpa_printf(MSG_ERROR, "Failed to get random data for WPA "
398 wpa_printf(MSG_DEBUG, "WPA: Delay group state machine start "
412 * wpa_init - Initialize WPA authenticator
414 * @conf: Configuration for WPA authenticator
415 * @cb: Callback functions for WPA authenticator
416 * Returns: Pointer to WPA authenticator data or %NULL on failur
    [all...]
wpa_auth_ie.c 2 * hostapd - WPA/RSN IE and KDE definitions
83 /* WPA Capabilities; use defaults, so no need to include it */
419 wpa_hexdump(MSG_DEBUG, "WPA: Forced own IE(s) for testing",
436 if (wpa_auth->conf.wpa == WPA_PROTO_OSEN) {
439 if (wpa_auth->conf.wpa & WPA_PROTO_RSN) {
455 if (wpa_auth->conf.wpa & WPA_PROTO_WPA) {
533 if (!(wpa_auth->conf.wpa & version)) {
534 wpa_printf(MSG_DEBUG, "Invalid WPA proto (%d) from " MACSTR,
627 wpa_printf(MSG_DEBUG, "Failed to parse WPA/RSN IE from "
629 wpa_hexdump(MSG_DEBUG, "WPA/RSN IE", wpa_ie, wpa_ie_len)
    [all...]
ap_drv_ops.c 268 if (((!hapd->conf->ieee802_1x && !hapd->conf->wpa) ||
287 params.wpa = hapd->conf->wpa;
290 if ((hapd->conf->wpa & (WPA_PROTO_WPA | WPA_PROTO_RSN)) ==
294 else if (hapd->conf->wpa & WPA_PROTO_RSN)
296 else if (hapd->conf->wpa & WPA_PROTO_WPA)
ieee802_1x.c 361 suite = wpa_cipher_to_suite(((hapd->conf->wpa & 0x2) ||
463 if ((hapd->conf->wpa & 2) &&
479 if (hapd->conf->wpa && wpa_key_mgmt_ft(hapd->conf->wpa_key_mgmt) &&
493 if ((hapd->conf->wpa || hapd->conf->osen) && sta->wpa_sm &&
910 if (!hapd->conf->ieee802_1x && !hapd->conf->wpa && !hapd->conf->osen &&
1098 ((hapd->conf->wpa && (sta->flags & WLAN_STA_MAYBE_WPS)) ||
1127 * reassociation change from WPA-EAP to PSK.
2384 const struct wpa_eapol_key *wpa; local
    [all...]
ieee802_11_shared.c 230 if ((hapd->conf->wpa & WPA_PROTO_RSN) &&
270 if ((!(hapd->conf->wpa & WPA_PROTO_RSN) ||
636 if (!(hapd->conf->wpa & WPA_PROTO_RSN) ||
wpa_auth_i.h 2 * hostapd - IEEE 802.11i-2004 / WPA Authenticator: Internal definitions
72 Boolean PInitAKeys; /* WPA only, not in IEEE 802.11i */
101 WPA_VERSION_NO_WPA = 0 /* WPA not used */,
102 WPA_VERSION_WPA = 1 /* WPA / IEEE 802.11i/D3.0 */,
104 } wpa; member in struct:wpa_state_machine
  /external/wpa_supplicant_8/src/eapol_auth/
eapol_auth_sm.h 19 int wpa; member in struct:eapol_auth_config
  /external/wpa_supplicant_8/wpa_supplicant/hidl/1.0/
sta_iface.cpp 635 if (wpa_tdls_is_external_setup(wpa_s->wpa)) {
636 ret = wpa_tdls_send_discovery_request(wpa_s->wpa, peer);
652 if (wpa_tdls_is_external_setup(wpa_s->wpa) &&
654 wpa_tdls_remove(wpa_s->wpa, peer);
655 ret = wpa_tdls_start(wpa_s->wpa, peer);
671 if (wpa_tdls_is_external_setup(wpa_s->wpa) &&
674 wpa_s->wpa, peer, WLAN_REASON_TDLS_TEARDOWN_UNSPECIFIED);
  /external/wpa_supplicant_8/wpa_supplicant/hidl/1.1/
sta_iface.cpp 649 if (wpa_tdls_is_external_setup(wpa_s->wpa)) {
650 ret = wpa_tdls_send_discovery_request(wpa_s->wpa, peer);
666 if (wpa_tdls_is_external_setup(wpa_s->wpa) &&
668 wpa_tdls_remove(wpa_s->wpa, peer);
669 ret = wpa_tdls_start(wpa_s->wpa, peer);
685 if (wpa_tdls_is_external_setup(wpa_s->wpa) &&
688 wpa_s->wpa, peer, WLAN_REASON_TDLS_TEARDOWN_UNSPECIFIED);
  /external/wpa_supplicant_8/src/drivers/
driver_bsd.c 2 * WPA Supplicant - driver interaction with BSD net80211 layer
74 int prev_wpa; /* wpa state to restore on deinit */
411 * swap it to match with the byte order used in WPA.
509 wpa_printf(MSG_DEBUG, "%s: enable WPA= 0x%x", __func__, params->wpa);
510 if (set80211param(priv, IEEE80211_IOC_WPA, params->wpa)) {
511 wpa_printf(MSG_INFO, "Unable to set WPA to %u", params->wpa);
527 if (!params->wpa && !params->ieee802_1x) {
528 wpa_printf(MSG_ERROR, "%s: No 802.1X or WPA enabled"
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
networkconfig.cpp 75 else if (flags.indexOf("[WPA-EAP") >= 0)
79 else if (flags.indexOf("[WPA-PSK") >= 0)
197 tr("WPA Pre-Shared Key Error"),
198 tr("WPA-PSK requires a passphrase of 8 to 63 "
255 key_mgmt = "WPA-PSK";
256 proto = "WPA";
259 key_mgmt = "WPA-EAP";
260 proto = "WPA";
263 key_mgmt = "WPA-PSK";
267 key_mgmt = "WPA-EAP"
525 int wpa = 0; local
    [all...]

Completed in 680 milliseconds

1 2 3