HomeSort by: relevance | last modified time | path
    Searched refs:wpa (Results 1 - 25 of 57) sorted by relevancy

1 2 3

  /src/external/bsd/wpa/dist/src/rsn_supp/
Makefile 11 wpa.o \
  /src/external/bsd/wpa/dist/wpa_supplicant/
preauth_test.c 2 * WPA Supplicant - test code for pre-authentication
20 #include "rsn_supp/wpa.h"
193 rsn_preauth_deinit(wpa_s->wpa);
194 pmksa_candidate_free(wpa_s->wpa);
195 wpa_sm_deinit(wpa_s->wpa);
215 if (!rsn_preauth_in_progress(wpa_s->wpa))
257 wpa_s->wpa = wpa_sm_init(ctx);
258 assert(wpa_s->wpa != NULL);
259 wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_PROTO, WPA_PROTO_RSN);
262 wpa_sm_set_ifname(wpa_s->wpa, wpa_s->ifname, NULL)
    [all...]
events.c 2 * WPA Supplicant - Driver event processing
13 #include "rsn_supp/wpa.h"
303 wpa_dbg(wpa_s, MSG_DEBUG, "Could not set WPA suites");
329 wpa_msg(wpa_s, MSG_INFO, "WPA: TKIP countermeasures stopped");
451 cur_pmksa = pmksa_cache_get_current(wpa_s->wpa);
453 pmksa_cache_clear_current(wpa_s->wpa);
455 if (wpa_sm_parse_own_wpa_ie(wpa_s->wpa, &ie) < 0 ||
460 pmksa_set = pmksa_cache_set_current(wpa_s->wpa,
467 wpa_sm_set_pmk_from_pmksa(wpa_s->wpa);
491 pmksa_candidate_add(wpa_s->wpa, data->pmkid_candidate.bssid
1277 bool wpa, check_ssid, osen, rsn_osen = false; local
    [all...]
wpa_supplicant.c 2 * WPA Supplicant
27 #include "rsn_supp/wpa.h"
170 /* IBSS/WPA-None uses only one key (Group) for both receiving and
174 wpa_msg(wpa_s, MSG_INFO, "WPA: Invalid mode %d (not "
175 "IBSS/ad-hoc) for WPA-None", ssid->mode);
180 wpa_msg(wpa_s, MSG_INFO, "WPA: No PSK configured for "
181 "WPA-None");
197 /* WPA-None uses the same Michael MIC key for both TX and RX */
204 wpa_msg(wpa_s, MSG_INFO, "WPA: Invalid group cipher %d for "
205 "WPA-None", wpa_s->group_cipher)
    [all...]
wpas_glue.c 2 * WPA Supplicant - Glue code to setup EAPOL and RSN modules
14 #include "rsn_supp/wpa.h"
117 int encrypt = wpa_s->wpa &&
118 wpa_sm_has_ptk_installed(wpa_s->wpa);
164 wpa_printf(MSG_DEBUG, "WPA: drop TX EAPOL in non-IEEE 802.1X "
170 if (pmksa_cache_get_current(wpa_s->wpa) &&
265 wpa_sm_aborted_cached(wpa_s->wpa);
383 wpa_msg(wpa_s, MSG_DEBUG, "WPA: EAPOL processing complete");
425 if (wpa_sm_set_ap_wpa_ie(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0))
429 if (wpa_sm_set_ap_rsn_ie(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0)
    [all...]
sme.c 21 #include "rsn_supp/wpa.h"
699 if (pmksa_cache_set_current(wpa_s->wpa, NULL,
711 wpa_msg(wpa_s, MSG_WARNING, "SME: Failed to set WPA "
719 /* No PMKSA caching, but otherwise similar to RSN/WPA */
725 wpa_msg(wpa_s, MSG_WARNING, "SME: Failed to set WPA "
734 * Both WPA and non-WPA IEEE 802.1X enabled in configuration -
735 * use non-WPA since the scan results did not indicate that the
736 * AP is using WPA or WPA2.
746 wpa_msg(wpa_s, MSG_WARNING, "SME: Failed to set WPA "
    [all...]
pasn_supplicant.c 21 #include "rsn_supp/wpa.h"
243 pmksa_cache_get_current(wpa_s->wpa)) {
249 pmksa_cache_clear_current(wpa_s->wpa);
281 pmksa_cache_get_current(wpa_s->wpa)) {
287 pmksa_cache_clear_current(wpa_s->wpa);
632 pasn_set_initiator_pmksa(pasn, wpa_sm_get_pmksa_cache(wpa_s->wpa));
636 ret = wpa_pasn_ft_derive_pmk_r1(wpa_s->wpa, awork->akmp,
821 wpa_sm_set_cur_pmksa(wpa_s->wpa, pasn->pmksa_entry);
wnm_sta.c 16 #include "rsn_supp/wpa.h"
114 if (action == WNM_SLEEP_MODE_EXIT && wpa_sm_ocv_enabled(wpa_s->wpa)) {
249 if (key_len_total && !wpa_sm_pmf_enabled(wpa_s->wpa)) {
279 wpa_s->wpa,
289 wpa_wnmsleep_install_key(wpa_s->wpa,
298 wpa_wnmsleep_install_key(wpa_s->wpa,
375 wpa_sm_ocv_enabled(wpa_s->wpa)) {
1459 wpa_sm_pmf_enabled(wpa_s->wpa),
  /src/external/bsd/wpa/dist/wpa_supplicant/examples/
wpas-dbus-new.py 55 val = net_obj.Get(WPAS_DBUS_BSS_INTERFACE, 'WPA',
57 wpa = "no"
59 wpa = "yes"
76 print(" %s :: ssid='%s' wpa=%s wpa2=%s signal=%d rate=%d freq=%d" % (bssid, ssid, wpa, wpa2, signal, maxrate, freq))
wpas-dbus-new-signals.py 62 val = net_obj.Get(WPAS_DBUS_BSS_INTERFACE, 'WPA',
64 wpa = "no"
66 wpa = "yes"
83 print(" %s :: ssid='%s' wpa=%s wpa2=%s signal=%d rate=%d freq=%d" % (bssid, ssid, wpa, wpa2, signal, maxrate, freq))
  /src/external/bsd/
Makefile 63 SUBDIR+= wpa
  /src/external/bsd/wpa/dist/src/eapol_auth/
eapol_auth_sm.h 20 int wpa; member in struct:eapol_auth_config
  /src/external/bsd/wpa/dist/src/ap/
ap_config.c 339 wpa_printf(MSG_ERROR, "WPA PSK file '%s' not found.", fname);
404 wpa_printf(MSG_ERROR, "WPA PSK allocation failed");
540 wpa_printf(MSG_DEBUG, "Using pre-configured WPA PSK "
543 wpa_printf(MSG_DEBUG, "Deriving WPA PSK based on "
1209 if (bss->wpa != WPA_PROTO_RSN) {
1271 if (bss->wpa) {
1284 wpa_printf(MSG_ERROR, "WEP configuration in a WPA network is not supported");
1290 if (full_config && bss->wpa &&
1294 wpa_printf(MSG_ERROR, "WPA-PSK using RADIUS enabled, but no "
1299 if (full_config && bss->wpa &
    [all...]
wps_hostapd.c 105 "Received new WPA/WPA2-PSK from WPS for STA " MACSTR,
109 "Received new WPA/WPA2-PSK from WPS for STA " MACSTR
370 bss->wpa = 2;
372 bss->wpa = 0;
376 bss->wpa = 3;
378 bss->wpa = 2;
380 bss->wpa = 1;
382 bss->wpa = 0;
385 if (bss->wpa) {
403 bss->wpa_group = wpa_select_ap_group_cipher(bss->wpa,
463 int wpa; local
    [all...]
wpa_auth_ie.c 2 * hostapd - WPA/RSN IE and KDE definitions
84 /* WPA Capabilities; use defaults, so no need to include it */
516 wpa_hexdump(MSG_DEBUG, "WPA: Forced own IE(s) for testing",
533 if (wpa_auth->conf.wpa == WPA_PROTO_OSEN) {
536 if (wpa_auth->conf.wpa & WPA_PROTO_RSN) {
557 if (wpa_auth->conf.wpa & WPA_PROTO_WPA) {
639 if (!(wpa_auth->conf.wpa & version)) {
640 wpa_printf(MSG_DEBUG, "Invalid WPA proto (%d) from " MACSTR,
655 * to incorrectly copy the FT-PSK + WPA-PSK AKMs from AP
764 wpa_printf(MSG_DEBUG, "Failed to parse WPA/RSN IE from
    [all...]
ieee802_1x.c 456 suite = wpa_cipher_to_suite(((hapd->conf->wpa & 0x2) ||
556 if ((hapd->conf->wpa & 2) &&
572 if (hapd->conf->wpa && wpa_key_mgmt_ft(hapd->conf->wpa_key_mgmt) &&
586 if ((hapd->conf->wpa || hapd->conf->osen) && sta->wpa_sm &&
1128 if (!hapd->conf->ieee802_1x && !hapd->conf->wpa && !hapd->conf->osen &&
1329 ((hapd->conf->wpa && (sta->flags & WLAN_STA_MAYBE_WPS)) ||
1358 * reassociation change from WPA-EAP to PSK.
2566 conf.wpa = hapd->conf->wpa;
2600 if ((hapd->conf->ieee802_1x || hapd->conf->wpa) &
2725 const struct wpa_eapol_key *wpa; local
    [all...]
ieee802_11_shared.c 436 if ((hapd->conf->wpa & WPA_PROTO_RSN) &&
449 if (hapd->conf->wpa &&
473 if (hapd->conf->wpa &&
974 if (!(hapd->conf->wpa & WPA_PROTO_RSN) ||
1103 if (!(hapd->conf->wpa & WPA_PROTO_RSN))
wpa_auth.c 2 * IEEE 802.11 RSN / WPA Authenticator
39 #define STATE_MACHINE_DEBUG_PREFIX "WPA"
479 "Failed to get random data for WPA initialization.");
615 wpa_printf(MSG_DEBUG, "WPA: Start PTK rekeying timer for "
693 "WPA: Not enough entropy in random pool for secure operations - update keys later when the first station connects");
704 "Failed to get random data for WPA initialization.");
712 "WPA: Delay group state machine start until Beacon frames have been configured");
725 * wpa_init - Initialize WPA authenticator
727 * @conf: Configuration for WPA authenticator
728 * @cb: Callback functions for WPA authenticato
    [all...]
wpa_auth_i.h 2 * hostapd - IEEE 802.11i-2004 / WPA Authenticator: Internal definitions
76 bool PInitAKeys; /* WPA only, not in IEEE 802.11i */
116 WPA_VERSION_NO_WPA = 0 /* WPA not used */,
117 WPA_VERSION_WPA = 1 /* WPA / IEEE 802.11i/D3.0 */,
119 } wpa; member in struct:wpa_state_machine
  /src/external/bsd/wpa/bin/wpa_supplicant/
Makefile 68 wpa.c \
  /src/external/bsd/wpa/dist/src/drivers/
driver_bsd.c 2 * WPA Supplicant - driver interaction with BSD net80211 layer
72 int prev_wpa; /* wpa state to restore on deinit */
398 * swap it to match with the byte order used in WPA.
496 wpa_printf(MSG_DEBUG, "%s: enable WPA= 0x%x", __func__, params->wpa);
497 if (set80211param(priv, IEEE80211_IOC_WPA, params->wpa)) {
498 wpa_printf(MSG_INFO, "Unable to set WPA to %u", params->wpa);
514 if (!params->wpa && !params->ieee802_1x) {
515 wpa_printf(MSG_ERROR, "%s: No 802.1X or WPA enabled"
    [all...]
  /src/external/bsd/wpa/dist/wpa_supplicant/wpa_gui-qt4/
networkconfig.cpp 75 else if (flags.indexOf("[WPA-EAP") >= 0)
79 else if (flags.indexOf("[WPA-PSK") >= 0)
197 tr("WPA Pre-Shared Key Error"),
198 tr("WPA-PSK requires a passphrase of 8 to 63 "
255 key_mgmt = "WPA-PSK";
256 proto = "WPA";
259 key_mgmt = "WPA-EAP";
260 proto = "WPA";
263 key_mgmt = "WPA-PSK";
267 key_mgmt = "WPA-EAP"
525 int wpa = 0; local
    [all...]
  /src/sys/net80211/
ieee80211_input.c 1575 * Convert a WPA cipher selector OUI to an internal
1606 * Convert a WPA key management/authentication algorithm
1628 * Parse a WPA information element to collect parameters
1643 wh, "WPA", "not WPA, flags 0x%x", ic->ic_flags);
1655 wh, "WPA", "too short, len %u", len);
1667 wh, "WPA", "bad version %u", w);
1677 wh, "WPA", "mcast cipher mismatch; got %u, expected %u",
1689 wh, "WPA", "ucast cipher data too short; len %u, n %u",
1702 wh, "WPA", "%s", "ucast cipher set empty")
2537 u_int8_t *ssid, *rates, *xrates, *wpa, *wme; local
    [all...]
  /src/sys/rump/
listsrcdirs 136 lsrc usr /external/bsd/ libnv libpcap tcpdump wpa
  /src/sys/dev/ic/
bwfm.c 392 /* IEEE80211_C_WPA_4WAY */0; /* WPA 4-way handshake in hw */
670 * WPA handshake ourselves.
1994 * Derive wireless security settings from WPA/RSN IE.
2000 uint8_t *wpa = ic->ic_opt_ie; local
2004 if (wpa[0] != IEEE80211_ELEMID_RSN) {
2012 /* Must contain WPA OUI */
2013 if (!bwfm_iswpaoui(wpa))
2016 switch (le32dec(wpa + 8)) {
2032 switch (le32dec(wpa + 10)) {
2052 uint32_t wpa = 0 local
    [all...]

Completed in 83 milliseconds

1 2 3