| /src/external/bsd/wpa/dist/src/rsn_supp/ |
| Makefile | 11 wpa.o \
|
| /src/external/bsd/wpa/dist/wpa_supplicant/ |
| preauth_test.c | 2 * WPA Supplicant - test code for pre-authentication 20 #include "rsn_supp/wpa.h" 193 rsn_preauth_deinit(wpa_s->wpa); 194 pmksa_candidate_free(wpa_s->wpa); 195 wpa_sm_deinit(wpa_s->wpa); 215 if (!rsn_preauth_in_progress(wpa_s->wpa)) 257 wpa_s->wpa = wpa_sm_init(ctx); 258 assert(wpa_s->wpa != NULL); 259 wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_PROTO, WPA_PROTO_RSN); 262 wpa_sm_set_ifname(wpa_s->wpa, wpa_s->ifname, NULL) [all...] |
| events.c | 2 * WPA Supplicant - Driver event processing 13 #include "rsn_supp/wpa.h" 303 wpa_dbg(wpa_s, MSG_DEBUG, "Could not set WPA suites"); 329 wpa_msg(wpa_s, MSG_INFO, "WPA: TKIP countermeasures stopped"); 451 cur_pmksa = pmksa_cache_get_current(wpa_s->wpa); 453 pmksa_cache_clear_current(wpa_s->wpa); 455 if (wpa_sm_parse_own_wpa_ie(wpa_s->wpa, &ie) < 0 || 460 pmksa_set = pmksa_cache_set_current(wpa_s->wpa, 467 wpa_sm_set_pmk_from_pmksa(wpa_s->wpa); 491 pmksa_candidate_add(wpa_s->wpa, data->pmkid_candidate.bssid 1277 bool wpa, check_ssid, osen, rsn_osen = false; local [all...] |
| wpa_supplicant.c | 2 * WPA Supplicant 27 #include "rsn_supp/wpa.h" 170 /* IBSS/WPA-None uses only one key (Group) for both receiving and 174 wpa_msg(wpa_s, MSG_INFO, "WPA: Invalid mode %d (not " 175 "IBSS/ad-hoc) for WPA-None", ssid->mode); 180 wpa_msg(wpa_s, MSG_INFO, "WPA: No PSK configured for " 181 "WPA-None"); 197 /* WPA-None uses the same Michael MIC key for both TX and RX */ 204 wpa_msg(wpa_s, MSG_INFO, "WPA: Invalid group cipher %d for " 205 "WPA-None", wpa_s->group_cipher) [all...] |
| wpas_glue.c | 2 * WPA Supplicant - Glue code to setup EAPOL and RSN modules 14 #include "rsn_supp/wpa.h" 117 int encrypt = wpa_s->wpa && 118 wpa_sm_has_ptk_installed(wpa_s->wpa); 164 wpa_printf(MSG_DEBUG, "WPA: drop TX EAPOL in non-IEEE 802.1X " 170 if (pmksa_cache_get_current(wpa_s->wpa) && 265 wpa_sm_aborted_cached(wpa_s->wpa); 383 wpa_msg(wpa_s, MSG_DEBUG, "WPA: EAPOL processing complete"); 425 if (wpa_sm_set_ap_wpa_ie(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0)) 429 if (wpa_sm_set_ap_rsn_ie(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0) [all...] |
| sme.c | 21 #include "rsn_supp/wpa.h" 699 if (pmksa_cache_set_current(wpa_s->wpa, NULL, 711 wpa_msg(wpa_s, MSG_WARNING, "SME: Failed to set WPA " 719 /* No PMKSA caching, but otherwise similar to RSN/WPA */ 725 wpa_msg(wpa_s, MSG_WARNING, "SME: Failed to set WPA " 734 * Both WPA and non-WPA IEEE 802.1X enabled in configuration - 735 * use non-WPA since the scan results did not indicate that the 736 * AP is using WPA or WPA2. 746 wpa_msg(wpa_s, MSG_WARNING, "SME: Failed to set WPA " [all...] |
| pasn_supplicant.c | 21 #include "rsn_supp/wpa.h" 243 pmksa_cache_get_current(wpa_s->wpa)) { 249 pmksa_cache_clear_current(wpa_s->wpa); 281 pmksa_cache_get_current(wpa_s->wpa)) { 287 pmksa_cache_clear_current(wpa_s->wpa); 632 pasn_set_initiator_pmksa(pasn, wpa_sm_get_pmksa_cache(wpa_s->wpa)); 636 ret = wpa_pasn_ft_derive_pmk_r1(wpa_s->wpa, awork->akmp, 821 wpa_sm_set_cur_pmksa(wpa_s->wpa, pasn->pmksa_entry);
|
| wnm_sta.c | 16 #include "rsn_supp/wpa.h" 114 if (action == WNM_SLEEP_MODE_EXIT && wpa_sm_ocv_enabled(wpa_s->wpa)) { 249 if (key_len_total && !wpa_sm_pmf_enabled(wpa_s->wpa)) { 279 wpa_s->wpa, 289 wpa_wnmsleep_install_key(wpa_s->wpa, 298 wpa_wnmsleep_install_key(wpa_s->wpa, 375 wpa_sm_ocv_enabled(wpa_s->wpa)) { 1459 wpa_sm_pmf_enabled(wpa_s->wpa),
|
| /src/external/bsd/wpa/dist/wpa_supplicant/examples/ |
| wpas-dbus-new.py | 55 val = net_obj.Get(WPAS_DBUS_BSS_INTERFACE, 'WPA', 57 wpa = "no" 59 wpa = "yes" 76 print(" %s :: ssid='%s' wpa=%s wpa2=%s signal=%d rate=%d freq=%d" % (bssid, ssid, wpa, wpa2, signal, maxrate, freq))
|
| wpas-dbus-new-signals.py | 62 val = net_obj.Get(WPAS_DBUS_BSS_INTERFACE, 'WPA', 64 wpa = "no" 66 wpa = "yes" 83 print(" %s :: ssid='%s' wpa=%s wpa2=%s signal=%d rate=%d freq=%d" % (bssid, ssid, wpa, wpa2, signal, maxrate, freq))
|
| /src/external/bsd/ |
| Makefile | 63 SUBDIR+= wpa
|
| /src/external/bsd/wpa/dist/src/eapol_auth/ |
| eapol_auth_sm.h | 20 int wpa; member in struct:eapol_auth_config
|
| /src/external/bsd/wpa/dist/src/ap/ |
| ap_config.c | 339 wpa_printf(MSG_ERROR, "WPA PSK file '%s' not found.", fname); 404 wpa_printf(MSG_ERROR, "WPA PSK allocation failed"); 540 wpa_printf(MSG_DEBUG, "Using pre-configured WPA PSK " 543 wpa_printf(MSG_DEBUG, "Deriving WPA PSK based on " 1209 if (bss->wpa != WPA_PROTO_RSN) { 1271 if (bss->wpa) { 1284 wpa_printf(MSG_ERROR, "WEP configuration in a WPA network is not supported"); 1290 if (full_config && bss->wpa && 1294 wpa_printf(MSG_ERROR, "WPA-PSK using RADIUS enabled, but no " 1299 if (full_config && bss->wpa & [all...] |
| wps_hostapd.c | 105 "Received new WPA/WPA2-PSK from WPS for STA " MACSTR, 109 "Received new WPA/WPA2-PSK from WPS for STA " MACSTR 370 bss->wpa = 2; 372 bss->wpa = 0; 376 bss->wpa = 3; 378 bss->wpa = 2; 380 bss->wpa = 1; 382 bss->wpa = 0; 385 if (bss->wpa) { 403 bss->wpa_group = wpa_select_ap_group_cipher(bss->wpa, 463 int wpa; local [all...] |
| wpa_auth_ie.c | 2 * hostapd - WPA/RSN IE and KDE definitions 84 /* WPA Capabilities; use defaults, so no need to include it */ 516 wpa_hexdump(MSG_DEBUG, "WPA: Forced own IE(s) for testing", 533 if (wpa_auth->conf.wpa == WPA_PROTO_OSEN) { 536 if (wpa_auth->conf.wpa & WPA_PROTO_RSN) { 557 if (wpa_auth->conf.wpa & WPA_PROTO_WPA) { 639 if (!(wpa_auth->conf.wpa & version)) { 640 wpa_printf(MSG_DEBUG, "Invalid WPA proto (%d) from " MACSTR, 655 * to incorrectly copy the FT-PSK + WPA-PSK AKMs from AP 764 wpa_printf(MSG_DEBUG, "Failed to parse WPA/RSN IE from [all...] |
| ieee802_1x.c | 456 suite = wpa_cipher_to_suite(((hapd->conf->wpa & 0x2) || 556 if ((hapd->conf->wpa & 2) && 572 if (hapd->conf->wpa && wpa_key_mgmt_ft(hapd->conf->wpa_key_mgmt) && 586 if ((hapd->conf->wpa || hapd->conf->osen) && sta->wpa_sm && 1128 if (!hapd->conf->ieee802_1x && !hapd->conf->wpa && !hapd->conf->osen && 1329 ((hapd->conf->wpa && (sta->flags & WLAN_STA_MAYBE_WPS)) || 1358 * reassociation change from WPA-EAP to PSK. 2566 conf.wpa = hapd->conf->wpa; 2600 if ((hapd->conf->ieee802_1x || hapd->conf->wpa) & 2725 const struct wpa_eapol_key *wpa; local [all...] |
| ieee802_11_shared.c | 436 if ((hapd->conf->wpa & WPA_PROTO_RSN) && 449 if (hapd->conf->wpa && 473 if (hapd->conf->wpa && 974 if (!(hapd->conf->wpa & WPA_PROTO_RSN) || 1103 if (!(hapd->conf->wpa & WPA_PROTO_RSN))
|
| wpa_auth.c | 2 * IEEE 802.11 RSN / WPA Authenticator 39 #define STATE_MACHINE_DEBUG_PREFIX "WPA" 479 "Failed to get random data for WPA initialization."); 615 wpa_printf(MSG_DEBUG, "WPA: Start PTK rekeying timer for " 693 "WPA: Not enough entropy in random pool for secure operations - update keys later when the first station connects"); 704 "Failed to get random data for WPA initialization."); 712 "WPA: Delay group state machine start until Beacon frames have been configured"); 725 * wpa_init - Initialize WPA authenticator 727 * @conf: Configuration for WPA authenticator 728 * @cb: Callback functions for WPA authenticato [all...] |
| wpa_auth_i.h | 2 * hostapd - IEEE 802.11i-2004 / WPA Authenticator: Internal definitions 76 bool PInitAKeys; /* WPA only, not in IEEE 802.11i */ 116 WPA_VERSION_NO_WPA = 0 /* WPA not used */, 117 WPA_VERSION_WPA = 1 /* WPA / IEEE 802.11i/D3.0 */, 119 } wpa; member in struct:wpa_state_machine
|
| /src/external/bsd/wpa/bin/wpa_supplicant/ |
| Makefile | 68 wpa.c \
|
| /src/external/bsd/wpa/dist/src/drivers/ |
| driver_bsd.c | 2 * WPA Supplicant - driver interaction with BSD net80211 layer 72 int prev_wpa; /* wpa state to restore on deinit */ 398 * swap it to match with the byte order used in WPA. 496 wpa_printf(MSG_DEBUG, "%s: enable WPA= 0x%x", __func__, params->wpa); 497 if (set80211param(priv, IEEE80211_IOC_WPA, params->wpa)) { 498 wpa_printf(MSG_INFO, "Unable to set WPA to %u", params->wpa); 514 if (!params->wpa && !params->ieee802_1x) { 515 wpa_printf(MSG_ERROR, "%s: No 802.1X or WPA enabled" [all...] |
| /src/external/bsd/wpa/dist/wpa_supplicant/wpa_gui-qt4/ |
| networkconfig.cpp | 75 else if (flags.indexOf("[WPA-EAP") >= 0) 79 else if (flags.indexOf("[WPA-PSK") >= 0) 197 tr("WPA Pre-Shared Key Error"), 198 tr("WPA-PSK requires a passphrase of 8 to 63 " 255 key_mgmt = "WPA-PSK"; 256 proto = "WPA"; 259 key_mgmt = "WPA-EAP"; 260 proto = "WPA"; 263 key_mgmt = "WPA-PSK"; 267 key_mgmt = "WPA-EAP" 525 int wpa = 0; local [all...] |
| /src/sys/net80211/ |
| ieee80211_input.c | 1575 * Convert a WPA cipher selector OUI to an internal 1606 * Convert a WPA key management/authentication algorithm 1628 * Parse a WPA information element to collect parameters 1643 wh, "WPA", "not WPA, flags 0x%x", ic->ic_flags); 1655 wh, "WPA", "too short, len %u", len); 1667 wh, "WPA", "bad version %u", w); 1677 wh, "WPA", "mcast cipher mismatch; got %u, expected %u", 1689 wh, "WPA", "ucast cipher data too short; len %u, n %u", 1702 wh, "WPA", "%s", "ucast cipher set empty") 2537 u_int8_t *ssid, *rates, *xrates, *wpa, *wme; local [all...] |
| /src/sys/rump/ |
| listsrcdirs | 136 lsrc usr /external/bsd/ libnv libpcap tcpdump wpa
|
| /src/sys/dev/ic/ |
| bwfm.c | 392 /* IEEE80211_C_WPA_4WAY */0; /* WPA 4-way handshake in hw */ 670 * WPA handshake ourselves. 1994 * Derive wireless security settings from WPA/RSN IE. 2000 uint8_t *wpa = ic->ic_opt_ie; local 2004 if (wpa[0] != IEEE80211_ELEMID_RSN) { 2012 /* Must contain WPA OUI */ 2013 if (!bwfm_iswpaoui(wpa)) 2016 switch (le32dec(wpa + 8)) { 2032 switch (le32dec(wpa + 10)) { 2052 uint32_t wpa = 0 local [all...] |