Home
last modified time | relevance | path

Searched refs:groups (Results 1 – 25 of 33) sorted by relevance

12

/hostap-3.6.0/tests/fuzzing/sae/
Dsae.c22 int groups[] = { 19, 0 }; in LLVMFuzzerTestOneInput() local
30 res = sae_parse_commit(&sae, data, size, &token, &token_len, groups, 0); in LLVMFuzzerTestOneInput()
33 res = sae_parse_commit(&sae, data, size, &token, &token_len, groups, 1); in LLVMFuzzerTestOneInput()
/hostap-3.6.0/src/p2p/
Dp2p_group.c49 struct p2p_group *group, **groups; in p2p_group_init() local
55 groups = os_realloc_array(p2p->groups, p2p->num_groups + 1, in p2p_group_init()
57 if (groups == NULL) { in p2p_group_init()
61 groups[p2p->num_groups++] = group; in p2p_group_init()
62 p2p->groups = groups; in p2p_group_init()
109 if (p2p->groups[g] == group) { in p2p_group_deinit()
111 p2p->groups[g] = p2p->groups[g + 1]; in p2p_group_deinit()
1088 if (!group_callback(p2p->groups[i], user_data)) in p2p_loop_on_all_groups()
Dp2p_invitation.c33 struct p2p_group *g = p2p->groups[i]; in p2p_build_invitation_req()
124 struct p2p_group *g = p2p->groups[i]; in p2p_build_invitation_resp()
Dp2p_dev_disc.c190 if (p2p_group_go_discover(p2p->groups[g], msg.device_id, sa, in p2p_process_dev_disc_req()
Dp2p.c86 p2p->groups[i], dev->info.p2p_device_addr)) in p2p_expire_peers()
3032 os_free(p2p->groups); in p2p_deinit()
4526 if (os_memcmp(da, p2p_group_get_interface_addr(p2p->groups[g]), in p2p_process_presence_req()
4528 group = p2p->groups[g]; in p2p_process_presence_req()
5070 group = p2p->groups[g]; in p2p_update_wfd_ie_groups()
5301 int freq = p2p_group_get_freq(p2p->groups[0]); in p2p_build_nfc_handover()
5326 p2p_buf_add_group_info(p2p->groups[0], buf, 5); in p2p_build_nfc_handover()
5327 p2p_group_buf_add_id(p2p->groups[0], buf); in p2p_build_nfc_handover()
Dp2p_pd.c268 struct p2p_group *g = p2p->groups[i]; in p2p_build_prov_disc_resp()
624 p2p->groups[i], in p2p_process_prov_disc_req()
/hostap-3.6.0/wpa_supplicant/
Dsme.c58 int *groups = wpa_s->conf->sae_groups; in sme_set_sae_group() local
61 if (!groups || groups[0] <= 0) in sme_set_sae_group()
62 groups = default_groups; in sme_set_sae_group()
65 if (!index_within_array(groups, wpa_s->sme.sae_group_index)) in sme_set_sae_group()
69 int group = groups[wpa_s->sme.sae_group_index]; in sme_set_sae_group()
1206 int *groups = wpa_s->conf->sae_groups; in sme_sae_is_group_enabled() local
1210 if (!groups) in sme_sae_is_group_enabled()
1211 groups = default_groups; in sme_sae_is_group_enabled()
1213 for (i = 0; groups[i] > 0; i++) { in sme_sae_is_group_enabled()
1214 if (groups[i] == group) in sme_sae_is_group_enabled()
[all …]
Dmesh_rsn.c298 int *groups = wpa_s->ifmsh->bss[0]->conf->sae_groups; in mesh_rsn_sae_group() local
301 if (!index_within_array(groups, wpa_s->mesh_rsn->sae_group_index)) in mesh_rsn_sae_group()
305 int group = groups[wpa_s->mesh_rsn->sae_group_index]; in mesh_rsn_sae_group()
DREADME-P2P83 will help in finding new groups or groups missed during the initial
202 P2P Device or Interface address have been used in multiple groups
300 This command can be used to remove the specified client from all groups
662 Disabled(default)/enables use of per-client PSK in the P2P groups. This
735 groups. If enabled, invitations to reinvoke a persistent group will be
784 persistent groups. The identifier in this list is used with
Dpasn_supplicant.c145 int groups[] = { pasn->group, 0 }; in wpas_pasn_wd_sae_rx() local
182 res = sae_parse_commit(&pasn->sae, data + 6, len - 6, NULL, 0, groups, in wpas_pasn_wd_sae_rx()
266 int groups[2] = { group, 0 }; in wpas_pasn_sae_setup_pt() local
279 ssid->pt = sae_derive_pt(groups, ssid->ssid, ssid->ssid_len, in wpas_pasn_sae_setup_pt()
DChangeLog35 * fixed OWE key derivation with groups 20 and 21; this breaks backwards
36 compatibility for these groups while the default group 19 remains
58 - disable use of groups using Brainpool curves
62 - disable use of groups using Brainpool curves
63 - allow the set of groups to be configured (eap_pwd_groups)
88 - changed default configuration to enable only groups 19, 20, 21
89 (i.e., disable groups 25 and 26) and disable all unsuitable groups
98 - reject use of unsuitable groups based on new implementation guidance
99 in REVmd (allow only FFC groups with prime >= 3072 bits and ECC
100 groups with prime >= 256)
[all …]
Dwpa_supplicant.c2156 int *groups = conf->sae_groups; in wpa_s_setup_sae_pt() local
2160 if (!groups || groups[0] <= 0) in wpa_s_setup_sae_pt()
2161 groups = default_groups; in wpa_s_setup_sae_pt()
2179 ssid->pt = sae_derive_pt(groups, ssid->ssid, ssid->ssid_len, in wpa_s_setup_sae_pt()
2193 int i, *groups = wpa_s->extra_sae_rejected_groups; in wpa_s_clear_sae_rejected() local
2195 for (i = 0; groups[i]; i++) { in wpa_s_clear_sae_rejected()
2198 groups[i]); in wpa_s_clear_sae_rejected()
2200 groups[i]); in wpa_s_clear_sae_rejected()
/hostap-3.6.0/tests/hwsim/
Dnetlink.py150 def __init__(self, nltype, groups=0, unexpected_msg_handler=None): argument
155 self.descriptor.bind((0, groups))
156 self.pid, self.groups = self.descriptor.getsockname()
Dstart.sh60 if groups | tr ' ' "\n" | grep -q ^admin$; then
62 elif groups | tr ' ' "\n" | grep -q ^wheel$; then
Dtest_sae.py181 groups = [str(g) for g in sae_groups]
185 params['sae_groups'] = ' '.join(groups)
188 for g in groups:
1715 def run_sae_password_id(dev, apdev, groups=None): argument
1719 if groups:
1720 params['sae_groups'] = groups
1722 groups = ""
1728 dev[0].request("SET sae_groups " + groups)
/hostap-3.6.0/src/utils/
Dos_unix.c348 gid_t groups[] = { ANDROID_SETGROUPS_OVERRIDE }; in os_program_init() local
350 gid_t groups[] = { AID_INET, AID_WIFI, AID_KEYSTORE }; in os_program_init() local
355 setgroups(ARRAY_SIZE(groups), groups); in os_program_init()
/hostap-3.6.0/src/ap/
Dieee802_11.c1182 int i, *groups = hapd->conf->sae_groups; in sae_pick_next_group() local
1190 if (!groups) in sae_pick_next_group()
1191 groups = default_groups; in sae_pick_next_group()
1192 for (i = 0; groups[i] > 0; i++) { in sae_pick_next_group()
1193 if (sae->group == groups[i]) in sae_pick_next_group()
1197 if (groups[i] <= 0) { in sae_pick_next_group()
1205 if (groups[i] <= 0) { in sae_pick_next_group()
1211 if (sae_set_group(sae, groups[i]) < 0) in sae_pick_next_group()
1216 wpa_printf(MSG_DEBUG, "SAE: Selected new group: %d", groups[i]); in sae_pick_next_group()
1251 int *groups = hapd->conf->sae_groups; in sae_is_group_enabled() local
[all …]
Dctrl_iface_ap.c288 struct wpabuf *groups = sta->sae->tmp->peer_rejected_groups; in hostapd_ctrl_iface_sta_mib() local
295 if (groups) { in hostapd_ctrl_iface_sta_mib()
296 pos = wpabuf_head(groups); in hostapd_ctrl_iface_sta_mib()
297 count = wpabuf_len(groups) / 2; in hostapd_ctrl_iface_sta_mib()
/hostap-3.6.0/src/common/
Dsae.c1094 struct sae_pt * sae_derive_pt(int *groups, const u8 *ssid, size_t ssid_len, in sae_derive_pt() argument
1102 if (!groups) in sae_derive_pt()
1103 groups = default_groups; in sae_derive_pt()
1104 for (i = 0; groups[i] > 0; i++) { in sae_derive_pt()
1105 tmp = sae_derive_pt_group(groups[i], ssid, ssid_len, password, in sae_derive_pt()
1390 struct wpabuf *groups; in sae_prepare_commit_pt() local
1393 groups = wpabuf_alloc(count * 2); in sae_prepare_commit_pt()
1394 if (!groups) in sae_prepare_commit_pt()
1397 wpabuf_put_le16(groups, rejected_groups[i]); in sae_prepare_commit_pt()
1398 sae->tmp->own_rejected_groups = groups; in sae_prepare_commit_pt()
Ddpp.c2525 struct json_token *root, *groups, *netkey, *token; in dpp_parse_connector() local
2537 groups = json_get_member(root, "groups"); in dpp_parse_connector()
2538 if (!groups || groups->type != JSON_ARRAY) { in dpp_parse_connector()
2542 for (token = groups->child; token; token = token->sibling) { in dpp_parse_connector()
3808 struct json_token *groups, *token; in dpp_connector_compatible_group() local
3810 groups = json_get_member(root, "groups"); in dpp_connector_compatible_group()
3811 if (!groups || groups->type != JSON_ARRAY) in dpp_connector_compatible_group()
3814 for (token = groups->child; token; token = token->sibling) { in dpp_connector_compatible_group()
3843 struct json_token *groups, *token; in dpp_connector_match_groups() local
3845 groups = json_get_member(peer_root, "groups"); in dpp_connector_match_groups()
[all …]
Dsae.h141 struct sae_pt * sae_derive_pt(int *groups, const u8 *ssid, size_t ssid_len,
/hostap-3.6.0/hostapd/
DChangeLog31 * fixed OWE key derivation with groups 20 and 21; this breaks backwards
32 compatibility for these groups while the default group 19 remains
48 - disable use of groups using Brainpool curves
52 - disable use of groups using Brainpool curves
74 (i.e., disable groups 20, 21, 25, 26 from default configuration) and
75 disable all unsuitable groups completely based on REVmd changes
81 - reject use of unsuitable groups based on new implementation guidance
82 in REVmd (allow only FFC groups with prime >= 3072 bits and ECC
83 groups with prime >= 256)
97 - disallow ECC groups with a prime under 256 bits (groups 25, 26, and
/hostap-3.6.0/doc/
Ddbus.doxygen1003 <p>Preference list of enabled groups for SAE</p>
1310 …<p>Starts WPS configuration. Note: When used with P2P groups, this needs to be issued on the GO gr…
1602 <p>Remove the client from all groups (operating and persistent) from the local GO.</p>
1777 …to have a P2PDevice property role since there can be multiple concurrent groups and the P2P Device…
1782 …ke much sense to have a P2PDevice property Group since there can be multiple concurrent groups.</p>
1787 …e much sense to have a P2PDevice property PeerGO since there can be multiple concurrent groups.</p>
2252 <p>The current groups in which this peer is connected.</p>
2274 Interface implemented by objects representing active P2P groups.
2352 Interface implemented by objects representing persistent P2P groups.
2359 …luded will be left at its existing value. The following entries are used for persistent groups:</p>
Dctrl_iface.doxygen399 new groups (and groups that were not found during the initial scan,
1036 Request. For persistent groups, the parameter after the event prefix
Dp2p.doxygen19 groups. It takes care of Device Discovery, Service Discovery, Group
352 frame request a reply only from groups that include a specific device

12