| /src/external/bsd/wpa/dist/src/eapol_auth/ |
| eapol_auth_sm.h | 20 int wpa; member in struct:eapol_auth_config
|
| /src/external/bsd/wpa/dist/wpa_supplicant/wpa_gui-qt4/ |
| networkconfig.cpp | 75 else if (flags.indexOf("[WPA-EAP") >= 0) 79 else if (flags.indexOf("[WPA-PSK") >= 0) 197 tr("WPA Pre-Shared Key Error"), 198 tr("WPA-PSK requires a passphrase of 8 to 63 " 255 key_mgmt = "WPA-PSK"; 256 proto = "WPA"; 259 key_mgmt = "WPA-EAP"; 260 proto = "WPA"; 263 key_mgmt = "WPA-PSK"; 267 key_mgmt = "WPA-EAP" 525 int wpa = 0; local [all...] |
| /src/sys/net80211/ |
| ieee80211_input.c | 1575 * Convert a WPA cipher selector OUI to an internal 1606 * Convert a WPA key management/authentication algorithm 1628 * Parse a WPA information element to collect parameters 1643 wh, "WPA", "not WPA, flags 0x%x", ic->ic_flags); 1655 wh, "WPA", "too short, len %u", len); 1667 wh, "WPA", "bad version %u", w); 1677 wh, "WPA", "mcast cipher mismatch; got %u, expected %u", 1689 wh, "WPA", "ucast cipher data too short; len %u, n %u", 1702 wh, "WPA", "%s", "ucast cipher set empty") 2537 u_int8_t *ssid, *rates, *xrates, *wpa, *wme; local [all...] |
| /src/external/bsd/wpa/dist/src/ap/ |
| wps_hostapd.c | 105 "Received new WPA/WPA2-PSK from WPS for STA " MACSTR, 109 "Received new WPA/WPA2-PSK from WPS for STA " MACSTR 370 bss->wpa = 2; 372 bss->wpa = 0; 376 bss->wpa = 3; 378 bss->wpa = 2; 380 bss->wpa = 1; 382 bss->wpa = 0; 385 if (bss->wpa) { 403 bss->wpa_group = wpa_select_ap_group_cipher(bss->wpa, 463 int wpa; local [all...] |
| ieee802_1x.c | 456 suite = wpa_cipher_to_suite(((hapd->conf->wpa & 0x2) || 556 if ((hapd->conf->wpa & 2) && 572 if (hapd->conf->wpa && wpa_key_mgmt_ft(hapd->conf->wpa_key_mgmt) && 586 if ((hapd->conf->wpa || hapd->conf->osen) && sta->wpa_sm && 1128 if (!hapd->conf->ieee802_1x && !hapd->conf->wpa && !hapd->conf->osen && 1329 ((hapd->conf->wpa && (sta->flags & WLAN_STA_MAYBE_WPS)) || 1358 * reassociation change from WPA-EAP to PSK. 2566 conf.wpa = hapd->conf->wpa; 2600 if ((hapd->conf->ieee802_1x || hapd->conf->wpa) & 2725 const struct wpa_eapol_key *wpa; local [all...] |
| wpa_auth.h | 2 * hostapd - IEEE 802.11i-2004 / WPA Authenticator 173 int wpa; member in struct:wpa_auth_config
|
| wpa_auth_i.h | 2 * hostapd - IEEE 802.11i-2004 / WPA Authenticator: Internal definitions 76 bool PInitAKeys; /* WPA only, not in IEEE 802.11i */ 116 WPA_VERSION_NO_WPA = 0 /* WPA not used */, 117 WPA_VERSION_WPA = 1 /* WPA / IEEE 802.11i/D3.0 */, 119 } wpa; member in struct:wpa_state_machine
|
| ap_config.h | 358 int wpa; /* bitfield of WPA_PROTO_WPA, WPA_PROTO_RSN */ member in struct:hostapd_bss_config
|
| /src/sys/dev/ic/ |
| bwfm.c | 392 /* IEEE80211_C_WPA_4WAY */0; /* WPA 4-way handshake in hw */ 670 * WPA handshake ourselves. 1994 * Derive wireless security settings from WPA/RSN IE. 2000 uint8_t *wpa = ic->ic_opt_ie; local 2004 if (wpa[0] != IEEE80211_ELEMID_RSN) { 2012 /* Must contain WPA OUI */ 2013 if (!bwfm_iswpaoui(wpa)) 2016 switch (le32dec(wpa + 8)) { 2032 switch (le32dec(wpa + 10)) { 2052 uint32_t wpa = 0 local [all...] |
| /src/external/bsd/wpa/dist/wpa_supplicant/ |
| events.c | 2 * WPA Supplicant - Driver event processing 13 #include "rsn_supp/wpa.h" 303 wpa_dbg(wpa_s, MSG_DEBUG, "Could not set WPA suites"); 329 wpa_msg(wpa_s, MSG_INFO, "WPA: TKIP countermeasures stopped"); 451 cur_pmksa = pmksa_cache_get_current(wpa_s->wpa); 453 pmksa_cache_clear_current(wpa_s->wpa); 455 if (wpa_sm_parse_own_wpa_ie(wpa_s->wpa, &ie) < 0 || 460 pmksa_set = pmksa_cache_set_current(wpa_s->wpa, 467 wpa_sm_set_pmk_from_pmksa(wpa_s->wpa); 491 pmksa_candidate_add(wpa_s->wpa, data->pmkid_candidate.bssid 1277 bool wpa, check_ssid, osen, rsn_osen = false; local [all...] |
| wpa_supplicant_i.h | 744 /* Selected configuration (based on Beacon/ProbeResp WPA IE) */ 812 struct wpa_sm *wpa; member in struct:wpa_supplicant
|
| /src/external/bsd/tmux/dist/ |
| format.c | 4622 const struct window_pane *wpa = *a; local 4627 result = wpb->id - wpa->id; 4629 result = wpa->id - wpb->id;
|
| /src/external/bsd/wpa/dist/src/drivers/ |
| driver.h | 1030 * wpa_ie - WPA information element for (Re)Association Request 1031 * WPA information element to be included in (Re)Association 1033 * of this WPA IE is optional. If the driver generates the WPA 1036 * the driver has to notify wpa_supplicant about the used WPA 1042 * looking at the first byte of the IE (0xdd for WPA, 0x30 for 1045 * When using WPS, wpa_ie is used for WPS IE instead of WPA/RSN IE. 1055 * wpa_proto - Bitfield of WPA_PROTO_* values to indicate WPA/WPA2 1132 * This value is made available only for WPA/WPA2-Personal (PSK) and 1143 * This value is made available only for WPA/WPA2-Personal (PSK) an 2590 int wpa; member in struct:wpa_bss_params [all...] |