/hostap-3.7.0/wlantest/ |
D | rx_eapol.c | 34 static int check_mic(const u8 *kck, size_t kck_len, int akmp, int ver, in check_mic() argument 53 if (wpa_eapol_key_mic(kck, kck_len, akmp, ver, buf, len, in check_mic() 96 struct wlantest_sta *sta, u16 ver, in try_pmk() argument 124 check_mic(ptk.kck, ptk.kck_len, sta->key_mgmt, ver, data, in try_pmk() 132 check_mic(ptk.kck, ptk.kck_len, sta->key_mgmt, ver, data, in try_pmk() 169 struct wlantest_sta *sta, u16 ver, in derive_ptk() argument 175 MAC2STR(sta->addr), ver); in derive_ptk() 178 if (try_pmk(wt, bss, sta, ver, data, len, pmk) == 0) in derive_ptk() 184 if (try_pmk(wt, bss, sta, ver, data, len, pmk) == 0) in derive_ptk() 195 sta->key_mgmt, ver, data, len) < 0) in derive_ptk() [all …]
|
/hostap-3.7.0/src/tls/ |
D | tlsv1_common.c | 289 int tls_version_ok(u16 ver) in tls_version_ok() argument 291 if (ver == TLS_VERSION_1) in tls_version_ok() 294 if (ver == TLS_VERSION_1_1) in tls_version_ok() 298 if (ver == TLS_VERSION_1_2) in tls_version_ok() 306 const char * tls_version_str(u16 ver) in tls_version_str() argument 308 switch (ver) { in tls_version_str() 321 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, in tls_prf() argument 325 if (ver >= TLS_VERSION_1_2) { in tls_prf()
|
D | tlsv1_common.h | 258 int tls_version_ok(u16 ver); 259 const char * tls_version_str(u16 ver); 260 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label,
|
D | tlsv1_client_read.c | 30 static int tls_version_disabled(struct tlsv1_client *conn, u16 ver) in tls_version_disabled() argument 33 ver == TLS_VERSION_1) || in tls_version_disabled() 35 ver == TLS_VERSION_1_1) || in tls_version_disabled() 37 ver == TLS_VERSION_1_2)); in tls_version_disabled()
|
/hostap-3.7.0/tests/ |
D | Makefile | 2 test-rsa-sig-ver \ 72 test-rsa-sig-ver: $(call BUILDOBJ,test-rsa-sig-ver.o) $(LIBS) 90 ./test-rsa-sig-ver
|
/hostap-3.7.0/src/rsn_supp/ |
D | wpa.c | 53 int ver, const u8 *dest, u16 proto, in wpa_eapol_key_send() argument 61 MAC2STR(dest), ver, (int) mic_len, sm->key_mgmt); in wpa_eapol_key_send() 85 wpa_eapol_key_mic(ptk->kck, ptk->kck_len, sm->key_mgmt, ver, in wpa_eapol_key_send() 89 ver, sm->key_mgmt); in wpa_eapol_key_send() 185 int key_info, ver; in wpa_sm_key_request() local 197 ver = WPA_KEY_INFO_TYPE_AKM_DEFINED; in wpa_sm_key_request() 200 ver = WPA_KEY_INFO_TYPE_AES_128_CMAC; in wpa_sm_key_request() 202 ver = WPA_KEY_INFO_TYPE_HMAC_SHA1_AES; in wpa_sm_key_request() 204 ver = WPA_KEY_INFO_TYPE_HMAC_MD5_RC4; in wpa_sm_key_request() 222 key_info = WPA_KEY_INFO_REQUEST | ver; in wpa_sm_key_request() [all …]
|
D | wpa_i.h | 485 int ver, const u8 *dest, u16 proto, 489 int ver, const u8 *nonce, 494 u16 ver, u16 key_info,
|
/hostap-3.7.0/hs20/client/ |
D | Android.mk | 22 ver = $(filter 5.0%,$(PLATFORM_VERSION)) 23 ifneq (,$(strip $(ver)))
|
/hostap-3.7.0/src/eap_server/ |
D | eap_server_sim.c | 106 u8 ver[2]; in eap_sim_build_start() local 140 ver[0] = 0; in eap_sim_build_start() 141 ver[1] = EAP_SIM_VERSION; in eap_sim_build_start() 142 eap_sim_msg_add(msg, EAP_SIM_AT_VERSION_LIST, sizeof(ver), in eap_sim_build_start() 143 ver, sizeof(ver)); in eap_sim_build_start()
|
/hostap-3.7.0/src/wps/ |
D | wps_dev_attr.c | 394 int wps_process_os_version(struct wps_device_data *dev, const u8 *ver) in wps_process_os_version() argument 396 if (ver == NULL) { in wps_process_os_version() 401 dev->os_version = WPA_GET_BE32(ver); in wps_process_os_version()
|
D | wps_dev_attr.h | 31 int wps_process_os_version(struct wps_device_data *dev, const u8 *ver);
|
/hostap-3.7.0/src/drivers/ |
D | driver_hostap.c | 145 int ver; in handle_frame() local 166 ver = fc & WLAN_FC_PVER; in handle_frame() 171 if (ver == 1 || ver == 2) { in handle_frame() 172 handle_tx_callback(drv, buf, data_len, ver == 2 ? 1 : 0); in handle_frame() 174 } else if (ver != 0) { in handle_frame() 175 printf("unknown protocol version %d\n", ver); in handle_frame()
|
/hostap-3.7.0/src/ap/ |
D | dpp_hostapd.c | 351 enum dpp_pkex_ver ver, in hostapd_dpp_pkex_init() argument 358 bool v2 = ver != PKEX_VER_ONLY_1; in hostapd_dpp_pkex_init() 368 pkex->forced_ver = ver != PKEX_VER_AUTO; in hostapd_dpp_pkex_init() 1844 u8 ver = DPP_VERSION; in hostapd_dpp_send_peer_disc_resp() local 1849 if (conn_ver > 0 && ver != conn_ver) { in hostapd_dpp_send_peer_disc_resp() 1852 conn_ver, ver); in hostapd_dpp_send_peer_disc_resp() 1853 ver = conn_ver; in hostapd_dpp_send_peer_disc_resp() 1860 ver = 1; in hostapd_dpp_send_peer_disc_resp() 1867 wpabuf_put_u8(msg, ver); in hostapd_dpp_send_peer_disc_resp() 2451 enum dpp_pkex_ver ver = PKEX_VER_AUTO; in hostapd_dpp_pkex_add() local [all …]
|
D | ieee802_1x.c | 377 int ver, val; in add_common_radius_sta_attr_rsn() local 379 ver = wpa_auth_sta_wpa_version(sta->wpa_sm); in add_common_radius_sta_attr_rsn() 381 suite = wpa_cipher_to_suite(ver, val); in add_common_radius_sta_attr_rsn() 771 u8 ver = hapd->conf->hs20_release - 1; in ieee802_1x_encapsulate_radius() local 775 &ver, 1)) { in ieee802_1x_encapsulate_radius()
|
/hostap-3.7.0/tests/hwsim/ |
D | test_suite_b.py | 30 for ver in ['1.0.2', '1.1.0', '1.1.1', '3.0']: 31 if "build=OpenSSL " + ver in tls and "run=OpenSSL " + ver in tls: 34 if not dhe and not level128 and "build=OpenSSL " + ver in tls and "run=BoringSSL" in tls:
|
D | test_p2p_service.py | 364 ver = ev.split(' ')[3] 391 if ver == ver2:
|
D | hostapd.py | 511 extra=None, use_id=None, ver=None): argument 520 if ver is not None: 521 cmd += "ver=" + str(ver) + " "
|
D | test_dpp.py | 45 ver = 1 47 ver = int(capa[4:]) 48 if ver < min_ver: 50 return ver 131 ver = 1 133 ver = int(capa[4:]) 134 if "version=%d" % ver not in info.splitlines(): 2285 run_dpp_pkex(dev, apdev, ver=2) 2340 expect_no_resp=False, ver=None): argument 2341 min_ver = 3 if ver else 1 [all …]
|
/hostap-3.7.0/src/eap_peer/ |
D | tncc.h | 34 struct wpabuf * tncc_process_soh_request(int ver, const u8 *data, size_t len);
|
D | tncc.c | 1169 static struct wpabuf * tncc_build_soh(int ver) in tncc_build_soh() argument 1197 wpabuf_put_be16(buf, ver); /* Inner Type */ in tncc_build_soh() 1200 if (ver == 2) { in tncc_build_soh() 1282 struct wpabuf * tncc_process_soh_request(int ver, const u8 *data, size_t len) in tncc_process_soh_request() argument
|
D | eap_sim.c | 669 int ver = pos[0] * 256 + pos[1]; in eap_sim_process_start() local 671 if (eap_sim_supported_ver(ver)) { in eap_sim_process_start() 672 selected_version = ver; in eap_sim_process_start()
|
/hostap-3.7.0/hostapd/ |
D | hostapd.eap_user | 40 # [ver=0] and [ver=1] flags after EAP type PEAP can be used to force PEAP
|
/hostap-3.7.0/wpa_supplicant/ |
D | dpp_supplicant.c | 2761 enum dpp_pkex_ver ver, in wpas_dpp_pkex_init() argument 2768 bool v2 = ver != PKEX_VER_ONLY_1; in wpas_dpp_pkex_init() 2778 pkex->forced_ver = ver != PKEX_VER_AUTO; in wpas_dpp_pkex_init() 3584 u8 ver = DPP_VERSION; in wpas_dpp_check_connect() local 3589 if (conn_ver > 0 && ver != conn_ver) { in wpas_dpp_check_connect() 3592 conn_ver, ver); in wpas_dpp_check_connect() 3593 ver = conn_ver; in wpas_dpp_check_connect() 3600 ver = 1; in wpas_dpp_check_connect() 3607 wpabuf_put_u8(msg, ver); in wpas_dpp_check_connect() 3640 enum dpp_pkex_ver ver = PKEX_VER_AUTO; in wpas_dpp_pkex_add() local [all …]
|
/hostap-3.7.0/src/crypto/ |
D | tls_gnutls.c | 1659 gnutls_protocol_t ver; in tls_get_version() local 1661 ver = gnutls_protocol_get_version(conn->session); in tls_get_version() 1662 if (ver == GNUTLS_TLS1_0) in tls_get_version() 1664 else if (ver == GNUTLS_TLS1_1) in tls_get_version() 1666 else if (ver == GNUTLS_TLS1_2) in tls_get_version()
|
/hostap-3.7.0/src/common/ |
D | dpp_reconfig.c | 134 u8 ver = DPP_VERSION; in dpp_reconfig_build_req() local 155 ver = 1; in dpp_reconfig_build_req() 162 wpabuf_put_u8(msg, ver); in dpp_reconfig_build_req()
|