/hostap-3.6.0/tests/fuzzing/sae/ |
D | sae.c | 22 int groups[] = { 19, 0 }; in LLVMFuzzerTestOneInput() local 30 res = sae_parse_commit(&sae, data, size, &token, &token_len, groups, 0); in LLVMFuzzerTestOneInput() 33 res = sae_parse_commit(&sae, data, size, &token, &token_len, groups, 1); in LLVMFuzzerTestOneInput()
|
/hostap-3.6.0/src/p2p/ |
D | p2p_group.c | 49 struct p2p_group *group, **groups; in p2p_group_init() local 55 groups = os_realloc_array(p2p->groups, p2p->num_groups + 1, in p2p_group_init() 57 if (groups == NULL) { in p2p_group_init() 61 groups[p2p->num_groups++] = group; in p2p_group_init() 62 p2p->groups = groups; in p2p_group_init() 109 if (p2p->groups[g] == group) { in p2p_group_deinit() 111 p2p->groups[g] = p2p->groups[g + 1]; in p2p_group_deinit() 1088 if (!group_callback(p2p->groups[i], user_data)) in p2p_loop_on_all_groups()
|
D | p2p_invitation.c | 33 struct p2p_group *g = p2p->groups[i]; in p2p_build_invitation_req() 124 struct p2p_group *g = p2p->groups[i]; in p2p_build_invitation_resp()
|
D | p2p_dev_disc.c | 190 if (p2p_group_go_discover(p2p->groups[g], msg.device_id, sa, in p2p_process_dev_disc_req()
|
D | p2p.c | 86 p2p->groups[i], dev->info.p2p_device_addr)) in p2p_expire_peers() 3032 os_free(p2p->groups); in p2p_deinit() 4526 if (os_memcmp(da, p2p_group_get_interface_addr(p2p->groups[g]), in p2p_process_presence_req() 4528 group = p2p->groups[g]; in p2p_process_presence_req() 5070 group = p2p->groups[g]; in p2p_update_wfd_ie_groups() 5301 int freq = p2p_group_get_freq(p2p->groups[0]); in p2p_build_nfc_handover() 5326 p2p_buf_add_group_info(p2p->groups[0], buf, 5); in p2p_build_nfc_handover() 5327 p2p_group_buf_add_id(p2p->groups[0], buf); in p2p_build_nfc_handover()
|
D | p2p_pd.c | 268 struct p2p_group *g = p2p->groups[i]; in p2p_build_prov_disc_resp() 624 p2p->groups[i], in p2p_process_prov_disc_req()
|
/hostap-3.6.0/wpa_supplicant/ |
D | sme.c | 58 int *groups = wpa_s->conf->sae_groups; in sme_set_sae_group() local 61 if (!groups || groups[0] <= 0) in sme_set_sae_group() 62 groups = default_groups; in sme_set_sae_group() 65 if (!index_within_array(groups, wpa_s->sme.sae_group_index)) in sme_set_sae_group() 69 int group = groups[wpa_s->sme.sae_group_index]; in sme_set_sae_group() 1206 int *groups = wpa_s->conf->sae_groups; in sme_sae_is_group_enabled() local 1210 if (!groups) in sme_sae_is_group_enabled() 1211 groups = default_groups; in sme_sae_is_group_enabled() 1213 for (i = 0; groups[i] > 0; i++) { in sme_sae_is_group_enabled() 1214 if (groups[i] == group) in sme_sae_is_group_enabled() [all …]
|
D | mesh_rsn.c | 298 int *groups = wpa_s->ifmsh->bss[0]->conf->sae_groups; in mesh_rsn_sae_group() local 301 if (!index_within_array(groups, wpa_s->mesh_rsn->sae_group_index)) in mesh_rsn_sae_group() 305 int group = groups[wpa_s->mesh_rsn->sae_group_index]; in mesh_rsn_sae_group()
|
D | README-P2P | 83 will help in finding new groups or groups missed during the initial 202 P2P Device or Interface address have been used in multiple groups 300 This command can be used to remove the specified client from all groups 662 Disabled(default)/enables use of per-client PSK in the P2P groups. This 735 groups. If enabled, invitations to reinvoke a persistent group will be 784 persistent groups. The identifier in this list is used with
|
D | pasn_supplicant.c | 145 int groups[] = { pasn->group, 0 }; in wpas_pasn_wd_sae_rx() local 182 res = sae_parse_commit(&pasn->sae, data + 6, len - 6, NULL, 0, groups, in wpas_pasn_wd_sae_rx() 266 int groups[2] = { group, 0 }; in wpas_pasn_sae_setup_pt() local 279 ssid->pt = sae_derive_pt(groups, ssid->ssid, ssid->ssid_len, in wpas_pasn_sae_setup_pt()
|
D | ChangeLog | 35 * fixed OWE key derivation with groups 20 and 21; this breaks backwards 36 compatibility for these groups while the default group 19 remains 58 - disable use of groups using Brainpool curves 62 - disable use of groups using Brainpool curves 63 - allow the set of groups to be configured (eap_pwd_groups) 88 - changed default configuration to enable only groups 19, 20, 21 89 (i.e., disable groups 25 and 26) and disable all unsuitable groups 98 - reject use of unsuitable groups based on new implementation guidance 99 in REVmd (allow only FFC groups with prime >= 3072 bits and ECC 100 groups with prime >= 256) [all …]
|
D | wpa_supplicant.c | 2156 int *groups = conf->sae_groups; in wpa_s_setup_sae_pt() local 2160 if (!groups || groups[0] <= 0) in wpa_s_setup_sae_pt() 2161 groups = default_groups; in wpa_s_setup_sae_pt() 2179 ssid->pt = sae_derive_pt(groups, ssid->ssid, ssid->ssid_len, in wpa_s_setup_sae_pt() 2193 int i, *groups = wpa_s->extra_sae_rejected_groups; in wpa_s_clear_sae_rejected() local 2195 for (i = 0; groups[i]; i++) { in wpa_s_clear_sae_rejected() 2198 groups[i]); in wpa_s_clear_sae_rejected() 2200 groups[i]); in wpa_s_clear_sae_rejected()
|
/hostap-3.6.0/tests/hwsim/ |
D | netlink.py | 150 def __init__(self, nltype, groups=0, unexpected_msg_handler=None): argument 155 self.descriptor.bind((0, groups)) 156 self.pid, self.groups = self.descriptor.getsockname()
|
D | start.sh | 60 if groups | tr ' ' "\n" | grep -q ^admin$; then 62 elif groups | tr ' ' "\n" | grep -q ^wheel$; then
|
D | test_sae.py | 181 groups = [str(g) for g in sae_groups] 185 params['sae_groups'] = ' '.join(groups) 188 for g in groups: 1715 def run_sae_password_id(dev, apdev, groups=None): argument 1719 if groups: 1720 params['sae_groups'] = groups 1722 groups = "" 1728 dev[0].request("SET sae_groups " + groups)
|
/hostap-3.6.0/src/utils/ |
D | os_unix.c | 348 gid_t groups[] = { ANDROID_SETGROUPS_OVERRIDE }; in os_program_init() local 350 gid_t groups[] = { AID_INET, AID_WIFI, AID_KEYSTORE }; in os_program_init() local 355 setgroups(ARRAY_SIZE(groups), groups); in os_program_init()
|
/hostap-3.6.0/src/ap/ |
D | ieee802_11.c | 1182 int i, *groups = hapd->conf->sae_groups; in sae_pick_next_group() local 1190 if (!groups) in sae_pick_next_group() 1191 groups = default_groups; in sae_pick_next_group() 1192 for (i = 0; groups[i] > 0; i++) { in sae_pick_next_group() 1193 if (sae->group == groups[i]) in sae_pick_next_group() 1197 if (groups[i] <= 0) { in sae_pick_next_group() 1205 if (groups[i] <= 0) { in sae_pick_next_group() 1211 if (sae_set_group(sae, groups[i]) < 0) in sae_pick_next_group() 1216 wpa_printf(MSG_DEBUG, "SAE: Selected new group: %d", groups[i]); in sae_pick_next_group() 1251 int *groups = hapd->conf->sae_groups; in sae_is_group_enabled() local [all …]
|
D | ctrl_iface_ap.c | 288 struct wpabuf *groups = sta->sae->tmp->peer_rejected_groups; in hostapd_ctrl_iface_sta_mib() local 295 if (groups) { in hostapd_ctrl_iface_sta_mib() 296 pos = wpabuf_head(groups); in hostapd_ctrl_iface_sta_mib() 297 count = wpabuf_len(groups) / 2; in hostapd_ctrl_iface_sta_mib()
|
/hostap-3.6.0/src/common/ |
D | sae.c | 1094 struct sae_pt * sae_derive_pt(int *groups, const u8 *ssid, size_t ssid_len, in sae_derive_pt() argument 1102 if (!groups) in sae_derive_pt() 1103 groups = default_groups; in sae_derive_pt() 1104 for (i = 0; groups[i] > 0; i++) { in sae_derive_pt() 1105 tmp = sae_derive_pt_group(groups[i], ssid, ssid_len, password, in sae_derive_pt() 1390 struct wpabuf *groups; in sae_prepare_commit_pt() local 1393 groups = wpabuf_alloc(count * 2); in sae_prepare_commit_pt() 1394 if (!groups) in sae_prepare_commit_pt() 1397 wpabuf_put_le16(groups, rejected_groups[i]); in sae_prepare_commit_pt() 1398 sae->tmp->own_rejected_groups = groups; in sae_prepare_commit_pt()
|
D | dpp.c | 2525 struct json_token *root, *groups, *netkey, *token; in dpp_parse_connector() local 2537 groups = json_get_member(root, "groups"); in dpp_parse_connector() 2538 if (!groups || groups->type != JSON_ARRAY) { in dpp_parse_connector() 2542 for (token = groups->child; token; token = token->sibling) { in dpp_parse_connector() 3808 struct json_token *groups, *token; in dpp_connector_compatible_group() local 3810 groups = json_get_member(root, "groups"); in dpp_connector_compatible_group() 3811 if (!groups || groups->type != JSON_ARRAY) in dpp_connector_compatible_group() 3814 for (token = groups->child; token; token = token->sibling) { in dpp_connector_compatible_group() 3843 struct json_token *groups, *token; in dpp_connector_match_groups() local 3845 groups = json_get_member(peer_root, "groups"); in dpp_connector_match_groups() [all …]
|
D | sae.h | 141 struct sae_pt * sae_derive_pt(int *groups, const u8 *ssid, size_t ssid_len,
|
/hostap-3.6.0/hostapd/ |
D | ChangeLog | 31 * fixed OWE key derivation with groups 20 and 21; this breaks backwards 32 compatibility for these groups while the default group 19 remains 48 - disable use of groups using Brainpool curves 52 - disable use of groups using Brainpool curves 74 (i.e., disable groups 20, 21, 25, 26 from default configuration) and 75 disable all unsuitable groups completely based on REVmd changes 81 - reject use of unsuitable groups based on new implementation guidance 82 in REVmd (allow only FFC groups with prime >= 3072 bits and ECC 83 groups with prime >= 256) 97 - disallow ECC groups with a prime under 256 bits (groups 25, 26, and
|
/hostap-3.6.0/doc/ |
D | dbus.doxygen | 1003 <p>Preference list of enabled groups for SAE</p> 1310 …<p>Starts WPS configuration. Note: When used with P2P groups, this needs to be issued on the GO gr… 1602 <p>Remove the client from all groups (operating and persistent) from the local GO.</p> 1777 …to have a P2PDevice property role since there can be multiple concurrent groups and the P2P Device… 1782 …ke much sense to have a P2PDevice property Group since there can be multiple concurrent groups.</p> 1787 …e much sense to have a P2PDevice property PeerGO since there can be multiple concurrent groups.</p> 2252 <p>The current groups in which this peer is connected.</p> 2274 Interface implemented by objects representing active P2P groups. 2352 Interface implemented by objects representing persistent P2P groups. 2359 …luded will be left at its existing value. The following entries are used for persistent groups:</p>
|
D | ctrl_iface.doxygen | 399 new groups (and groups that were not found during the initial scan, 1036 Request. For persistent groups, the parameter after the event prefix
|
D | p2p.doxygen | 19 groups. It takes care of Device Discovery, Service Discovery, Group 352 frame request a reply only from groups that include a specific device
|