Home
last modified time | relevance | path

Searched refs:ver (Results 1 – 25 of 36) sorted by relevance

12

/hostap-3.7.0/wlantest/
Drx_eapol.c34 static int check_mic(const u8 *kck, size_t kck_len, int akmp, int ver, in check_mic() argument
53 if (wpa_eapol_key_mic(kck, kck_len, akmp, ver, buf, len, in check_mic()
96 struct wlantest_sta *sta, u16 ver, in try_pmk() argument
124 check_mic(ptk.kck, ptk.kck_len, sta->key_mgmt, ver, data, in try_pmk()
132 check_mic(ptk.kck, ptk.kck_len, sta->key_mgmt, ver, data, in try_pmk()
169 struct wlantest_sta *sta, u16 ver, in derive_ptk() argument
175 MAC2STR(sta->addr), ver); in derive_ptk()
178 if (try_pmk(wt, bss, sta, ver, data, len, pmk) == 0) in derive_ptk()
184 if (try_pmk(wt, bss, sta, ver, data, len, pmk) == 0) in derive_ptk()
195 sta->key_mgmt, ver, data, len) < 0) in derive_ptk()
[all …]
/hostap-3.7.0/src/tls/
Dtlsv1_common.c289 int tls_version_ok(u16 ver) in tls_version_ok() argument
291 if (ver == TLS_VERSION_1) in tls_version_ok()
294 if (ver == TLS_VERSION_1_1) in tls_version_ok()
298 if (ver == TLS_VERSION_1_2) in tls_version_ok()
306 const char * tls_version_str(u16 ver) in tls_version_str() argument
308 switch (ver) { in tls_version_str()
321 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, in tls_prf() argument
325 if (ver >= TLS_VERSION_1_2) { in tls_prf()
Dtlsv1_common.h258 int tls_version_ok(u16 ver);
259 const char * tls_version_str(u16 ver);
260 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label,
Dtlsv1_client_read.c30 static int tls_version_disabled(struct tlsv1_client *conn, u16 ver) in tls_version_disabled() argument
33 ver == TLS_VERSION_1) || in tls_version_disabled()
35 ver == TLS_VERSION_1_1) || in tls_version_disabled()
37 ver == TLS_VERSION_1_2)); in tls_version_disabled()
/hostap-3.7.0/tests/
DMakefile2 test-rsa-sig-ver \
72 test-rsa-sig-ver: $(call BUILDOBJ,test-rsa-sig-ver.o) $(LIBS)
90 ./test-rsa-sig-ver
/hostap-3.7.0/src/rsn_supp/
Dwpa.c53 int ver, const u8 *dest, u16 proto, in wpa_eapol_key_send() argument
61 MAC2STR(dest), ver, (int) mic_len, sm->key_mgmt); in wpa_eapol_key_send()
85 wpa_eapol_key_mic(ptk->kck, ptk->kck_len, sm->key_mgmt, ver, in wpa_eapol_key_send()
89 ver, sm->key_mgmt); in wpa_eapol_key_send()
185 int key_info, ver; in wpa_sm_key_request() local
197 ver = WPA_KEY_INFO_TYPE_AKM_DEFINED; in wpa_sm_key_request()
200 ver = WPA_KEY_INFO_TYPE_AES_128_CMAC; in wpa_sm_key_request()
202 ver = WPA_KEY_INFO_TYPE_HMAC_SHA1_AES; in wpa_sm_key_request()
204 ver = WPA_KEY_INFO_TYPE_HMAC_MD5_RC4; in wpa_sm_key_request()
222 key_info = WPA_KEY_INFO_REQUEST | ver; in wpa_sm_key_request()
[all …]
Dwpa_i.h485 int ver, const u8 *dest, u16 proto,
489 int ver, const u8 *nonce,
494 u16 ver, u16 key_info,
/hostap-3.7.0/hs20/client/
DAndroid.mk22 ver = $(filter 5.0%,$(PLATFORM_VERSION))
23 ifneq (,$(strip $(ver)))
/hostap-3.7.0/src/eap_server/
Deap_server_sim.c106 u8 ver[2]; in eap_sim_build_start() local
140 ver[0] = 0; in eap_sim_build_start()
141 ver[1] = EAP_SIM_VERSION; in eap_sim_build_start()
142 eap_sim_msg_add(msg, EAP_SIM_AT_VERSION_LIST, sizeof(ver), in eap_sim_build_start()
143 ver, sizeof(ver)); in eap_sim_build_start()
/hostap-3.7.0/src/wps/
Dwps_dev_attr.c394 int wps_process_os_version(struct wps_device_data *dev, const u8 *ver) in wps_process_os_version() argument
396 if (ver == NULL) { in wps_process_os_version()
401 dev->os_version = WPA_GET_BE32(ver); in wps_process_os_version()
Dwps_dev_attr.h31 int wps_process_os_version(struct wps_device_data *dev, const u8 *ver);
/hostap-3.7.0/src/drivers/
Ddriver_hostap.c145 int ver; in handle_frame() local
166 ver = fc & WLAN_FC_PVER; in handle_frame()
171 if (ver == 1 || ver == 2) { in handle_frame()
172 handle_tx_callback(drv, buf, data_len, ver == 2 ? 1 : 0); in handle_frame()
174 } else if (ver != 0) { in handle_frame()
175 printf("unknown protocol version %d\n", ver); in handle_frame()
/hostap-3.7.0/src/ap/
Ddpp_hostapd.c351 enum dpp_pkex_ver ver, in hostapd_dpp_pkex_init() argument
358 bool v2 = ver != PKEX_VER_ONLY_1; in hostapd_dpp_pkex_init()
368 pkex->forced_ver = ver != PKEX_VER_AUTO; in hostapd_dpp_pkex_init()
1844 u8 ver = DPP_VERSION; in hostapd_dpp_send_peer_disc_resp() local
1849 if (conn_ver > 0 && ver != conn_ver) { in hostapd_dpp_send_peer_disc_resp()
1852 conn_ver, ver); in hostapd_dpp_send_peer_disc_resp()
1853 ver = conn_ver; in hostapd_dpp_send_peer_disc_resp()
1860 ver = 1; in hostapd_dpp_send_peer_disc_resp()
1867 wpabuf_put_u8(msg, ver); in hostapd_dpp_send_peer_disc_resp()
2451 enum dpp_pkex_ver ver = PKEX_VER_AUTO; in hostapd_dpp_pkex_add() local
[all …]
Dieee802_1x.c377 int ver, val; in add_common_radius_sta_attr_rsn() local
379 ver = wpa_auth_sta_wpa_version(sta->wpa_sm); in add_common_radius_sta_attr_rsn()
381 suite = wpa_cipher_to_suite(ver, val); in add_common_radius_sta_attr_rsn()
771 u8 ver = hapd->conf->hs20_release - 1; in ieee802_1x_encapsulate_radius() local
775 &ver, 1)) { in ieee802_1x_encapsulate_radius()
/hostap-3.7.0/tests/hwsim/
Dtest_suite_b.py30 for ver in ['1.0.2', '1.1.0', '1.1.1', '3.0']:
31 if "build=OpenSSL " + ver in tls and "run=OpenSSL " + ver in tls:
34 if not dhe and not level128 and "build=OpenSSL " + ver in tls and "run=BoringSSL" in tls:
Dtest_p2p_service.py364 ver = ev.split(' ')[3]
391 if ver == ver2:
Dhostapd.py511 extra=None, use_id=None, ver=None): argument
520 if ver is not None:
521 cmd += "ver=" + str(ver) + " "
Dtest_dpp.py45 ver = 1
47 ver = int(capa[4:])
48 if ver < min_ver:
50 return ver
131 ver = 1
133 ver = int(capa[4:])
134 if "version=%d" % ver not in info.splitlines():
2285 run_dpp_pkex(dev, apdev, ver=2)
2340 expect_no_resp=False, ver=None): argument
2341 min_ver = 3 if ver else 1
[all …]
/hostap-3.7.0/src/eap_peer/
Dtncc.h34 struct wpabuf * tncc_process_soh_request(int ver, const u8 *data, size_t len);
Dtncc.c1169 static struct wpabuf * tncc_build_soh(int ver) in tncc_build_soh() argument
1197 wpabuf_put_be16(buf, ver); /* Inner Type */ in tncc_build_soh()
1200 if (ver == 2) { in tncc_build_soh()
1282 struct wpabuf * tncc_process_soh_request(int ver, const u8 *data, size_t len) in tncc_process_soh_request() argument
Deap_sim.c669 int ver = pos[0] * 256 + pos[1]; in eap_sim_process_start() local
671 if (eap_sim_supported_ver(ver)) { in eap_sim_process_start()
672 selected_version = ver; in eap_sim_process_start()
/hostap-3.7.0/hostapd/
Dhostapd.eap_user40 # [ver=0] and [ver=1] flags after EAP type PEAP can be used to force PEAP
/hostap-3.7.0/wpa_supplicant/
Ddpp_supplicant.c2761 enum dpp_pkex_ver ver, in wpas_dpp_pkex_init() argument
2768 bool v2 = ver != PKEX_VER_ONLY_1; in wpas_dpp_pkex_init()
2778 pkex->forced_ver = ver != PKEX_VER_AUTO; in wpas_dpp_pkex_init()
3584 u8 ver = DPP_VERSION; in wpas_dpp_check_connect() local
3589 if (conn_ver > 0 && ver != conn_ver) { in wpas_dpp_check_connect()
3592 conn_ver, ver); in wpas_dpp_check_connect()
3593 ver = conn_ver; in wpas_dpp_check_connect()
3600 ver = 1; in wpas_dpp_check_connect()
3607 wpabuf_put_u8(msg, ver); in wpas_dpp_check_connect()
3640 enum dpp_pkex_ver ver = PKEX_VER_AUTO; in wpas_dpp_pkex_add() local
[all …]
/hostap-3.7.0/src/crypto/
Dtls_gnutls.c1659 gnutls_protocol_t ver; in tls_get_version() local
1661 ver = gnutls_protocol_get_version(conn->session); in tls_get_version()
1662 if (ver == GNUTLS_TLS1_0) in tls_get_version()
1664 else if (ver == GNUTLS_TLS1_1) in tls_get_version()
1666 else if (ver == GNUTLS_TLS1_2) in tls_get_version()
/hostap-3.7.0/src/common/
Ddpp_reconfig.c134 u8 ver = DPP_VERSION; in dpp_reconfig_build_req() local
155 ver = 1; in dpp_reconfig_build_req()
162 wpabuf_put_u8(msg, ver); in dpp_reconfig_build_req()

12