Home
last modified time | relevance | path

Searched refs:code (Results 1 – 25 of 109) sorted by relevance

12345

/hostap-latest/tests/hwsim/
Dradius_das.py13 def __init__(self, code=pyrad.packet.DisconnectRequest, id=None, argument
15 pyrad.packet.Packet.__init__(self, code, id, secret, authenticator,
20 for code, datalst in sorted(self.items()):
22 attr += self._PktEncodeAttribute(code, data)
27 header = struct.pack('!BBH', self.code, self.id, (20 + len(attr)))
33 def __init__(self, code=pyrad.packet.CoARequest, id=None, argument
35 pyrad.packet.Packet.__init__(self, code, id, secret, authenticator,
44 header = struct.pack('!BBH', self.code, self.id, (20 + len(attr)))
Dtest_dpp3.py84 code = "secret"
88 cmd += " code=%s" % code
93 dev0.dpp_pkex_init(identifier=None, code=code, role="enrollee",
257 code = "secret"
260 cmd += " code=%s" % code
269 dev[0].dpp_pkex_init(identifier=None, code=code, role="enrollee")
Dtest_radius.py413 def send_and_check_reply(srv, req, code, error_cause=0): argument
418 if reply.code != code:
816 hmac_obj.update(struct.pack("B", req.code))
822 for code, datalst in sorted(req.items()):
824 attrs += req._PktEncodeAttribute(code, data)
1093 reply.code = pyrad.packet.AccessAccept
1102 hmac_obj.update(struct.pack("B", reply.code))
1222 reply.code = pyrad.packet.AccessAccept
1224 reply.code = pyrad.packet.AccessRequest
1226 reply.code = pyrad.packet.AccessReject
[all …]
/hostap-latest/doc/
Dmainpage.doxygen4 The goal of this documentation and comments in the source code is to
7 modified, how new drivers can be supported, and how the source code
16 The source code and read-only access to the combined wpa_supplicant
33 OS independent, portable C code for all WPA functionality. The source
34 code is divided into separate C files as shown on the \ref
35 code_structure "code structure page". All hardware/driver specific
71 OS independent, portable C code for all WPA functionality. The source
72 code is divided into separate C files as shown on the \ref
73 code_structure "code structure page". All hardware/driver specific
Dtesting_tools.doxygen7 \ref wpa_trace "Tracing code" ]
18 authentication client code from hostapd. In addition, it has minimal
19 glue code to combine these two components in similar ways to IEEE
88 based on the code that wpa_supplicant is using. As such, it tests
129 exit code if all tests were completed successfully.
132 \section wpa_trace Tracing code for developer debuggin
134 wpa_supplicant and hostapd can be built with tracing code that will
142 The trace code can be enabled with CONFIG_WPA_TRACE=y build
Dp2p.doxygen29 wpa_supplicant includes code in interact with both the P2P module
32 through these files, i.e., core P2P or WPS code does not interact
44 operations. Glue code is used to bind the P2P module API to the rest
184 the glue code outside the P2P module depends on the architecture used
201 \ref p2p_config::start_listen(). The glue code using the P2P module may
211 upper layer code with the \ref p2p_config::go_neg_req_tx() callback.
222 layer code is responsible for asking the user to provide the PIN to be
224 press for PBC mode. The glue code will need to figure out the intended
241 lower layer code to transmit an Action frame during group owner
250 upper layer management code or the glue code using the P2P module API
[all …]
Deap.doxygen5 defined in RFC 3748. wpa_supplicant uses a separate code module for EAP
43 messages. This allows code sharing and can avoid missing some of the
60 example showing how EAP peer and server code from wpa_supplicant and
65 \ref eap_example_peer.c shows the initialization and glue code needed to
82 be desirable to replace the debug output code in \ref src/utils/wpa_debug.c
Ddirectories.doxygen5 hostapd-specific code for configuration, control interface, and AP
52 operating systems without having to make rest of the source code
87 wpa_supplicant-specific code for configuration, control interface, and
Dcode_structure.doxygen2 \page code_structure Structure of the source code
17 modules. Core code includes functionality for controlling the network
19 WPA code (key handshake, PMKSA caching, pre-authentication), EAPOL
237 Internal definitions for WPA code; not to be included to other modules.
255 Common code for EAP-SIM and EAP-AKA
258 Common code for EAP-PEAP, EAP-TTLS, and EAP-FAST
/hostap-latest/src/radius/
Dradius_server.c901 int code; in radius_server_encapsulate_eap() local
908 code = RADIUS_CODE_ACCESS_REJECT; in radius_server_encapsulate_eap()
911 code = RADIUS_CODE_ACCESS_ACCEPT; in radius_server_encapsulate_eap()
914 code = RADIUS_CODE_ACCESS_CHALLENGE; in radius_server_encapsulate_eap()
917 msg = radius_msg_new(code, hdr->identifier); in radius_server_encapsulate_eap()
929 if (code == RADIUS_CODE_ACCESS_CHALLENGE && in radius_server_encapsulate_eap()
941 if (code == RADIUS_CODE_ACCESS_ACCEPT && sess->eap_if->eapKeyData) { in radius_server_encapsulate_eap()
995 if (code == RADIUS_CODE_ACCESS_ACCEPT && sess->remediation && in radius_server_encapsulate_eap()
1012 } else if (code == RADIUS_CODE_ACCESS_ACCEPT && sess->remediation) { in radius_server_encapsulate_eap()
1019 } else if (code == RADIUS_CODE_ACCESS_ACCEPT && in radius_server_encapsulate_eap()
[all …]
/hostap-latest/src/eap_common/
Deap_wsc_common.c17 struct wpabuf * eap_wsc_build_frag_ack(u8 id, u8 code) in eap_wsc_build_frag_ack() argument
21 msg = eap_msg_alloc(EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC, 2, code, id); in eap_wsc_build_frag_ack()
Deap_common.c129 size_t payload_len, u8 code, u8 identifier) in eap_msg_alloc() argument
142 hdr->code = code; in eap_msg_alloc()
Deap_ikev2_common.c51 struct wpabuf * eap_ikev2_build_frag_ack(u8 id, u8 code) in eap_ikev2_build_frag_ack() argument
55 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_IKEV2, 0, code, id); in eap_ikev2_build_frag_ack()
/hostap-latest/src/common/
Ddpp_pkex.c43 Qi = dpp_pkex_derive_Qi(curve, v2 ? NULL : pkex->own_mac, pkex->code, in dpp_pkex_build_exchange_req()
175 const char *identifier, const char *code, in dpp_pkex_init() argument
201 pkex->code = os_memdup(code, code_len); in dpp_pkex_init()
202 if (!pkex->code) in dpp_pkex_init()
346 const char *code, size_t code_len, in dpp_pkex_rx_exchange_req() argument
443 Qi = dpp_pkex_derive_Qi(curve, v2 ? NULL : peer_mac, code, code_len, in dpp_pkex_rx_exchange_req()
483 pkex->code = os_memdup(code, code_len); in dpp_pkex_rx_exchange_req()
484 if (!pkex->code) in dpp_pkex_rx_exchange_req()
502 Qr = dpp_pkex_derive_Qr(curve, v2 ? NULL : own_mac, code, code_len, in dpp_pkex_rx_exchange_req()
556 pkex->Nx, curve->prime_len, pkex->code, in dpp_pkex_rx_exchange_req()
[all …]
Ddpp_i.h122 const char *code, size_t code_len, const char *identifier,
126 const char *code, size_t code_len, const char *identifier,
132 const char *code, size_t code_len,
Dgas_server.c452 u8 action, code, dialog_token; in gas_server_tx_status() local
459 code = *pos++; in gas_server_tx_status()
462 (code != WLAN_PA_GAS_INITIAL_RESP && in gas_server_tx_status()
463 code != WLAN_PA_GAS_COMEBACK_RESP)) in gas_server_tx_status()
468 code == WLAN_PA_GAS_INITIAL_RESP ? "initial" : "comeback", in gas_server_tx_status()
/hostap-latest/wlantest/
Dwired.c41 static const char * radius_code_string(u8 code) in radius_code_string() argument
43 switch (code) { in radius_code_string()
190 radius_code_string(hdr->code)); in process_radius()
192 switch (hdr->code) { in process_radius()
/hostap-latest/eap_example/
DREADME17 code from wpa_supplicant and hostapd can be used as a library. The
21 eap_example_peer.c shows the initialization and glue code needed to
39 be desirable to replace the debug output code in src/utils/wpa_debug.c
/hostap-latest/wpa_supplicant/
Deapol_test.c205 if (len > sizeof(*hdr) && hdr->code == EAP_CODE_RESPONSE && in ieee802_1x_encapsulate_radius()
292 radius_msg_get_hdr(e->last_recv_radius)->code == in ieee802_1x_encapsulate_radius()
715 eap->code = EAP_CODE_REQUEST; in send_eap_request_identity()
805 switch (hdr->code) { in ieee802_1x_decapsulate_radius()
835 hdr->code, hdr->identifier, be_to_host16(hdr->length), in ieee802_1x_decapsulate_radius()
927 if (hdr->code == RADIUS_CODE_ACCESS_REJECT && in ieee802_1x_receive_auth()
940 if (hdr->code != RADIUS_CODE_ACCESS_ACCEPT && in ieee802_1x_receive_auth()
941 hdr->code != RADIUS_CODE_ACCESS_REJECT && in ieee802_1x_receive_auth()
942 hdr->code != RADIUS_CODE_ACCESS_CHALLENGE) { in ieee802_1x_receive_auth()
953 switch (hdr->code) { in ieee802_1x_receive_auth()
[all …]
DREADME-DPP14 methods like QR code based authentication (detailed below), PKEX based
102 Generate QR code for the device. Store the QR code id returned by the
130 > dpp_auth_init peer=<qr-code-id> conf=<ap-dpp|sta-dpp> ssid=<SSID hexdump> configurator=<configura…
132 > dpp_auth_init peer=<qr-code-id> conf=sta-psk ssid=<SSID hexdump> pass=<passphrase hexdump>
/hostap-latest/src/ap/
Dieee802_1x.c408 (hdr->code == EAP_CODE_RESPONSE && in ieee802_1x_learn_identity()
410 (hdr->code == EAP_CODE_INITIATE && in ieee802_1x_learn_identity()
412 (hdr->code != EAP_CODE_RESPONSE && in ieee802_1x_learn_identity()
413 hdr->code != EAP_CODE_INITIATE)) in ieee802_1x_learn_identity()
805 radius_msg_get_hdr(sm->last_recv_radius)->code == in ieee802_1x_encapsulate_radius()
942 eap->code, eap->identifier, be_to_host16(eap->length), in handle_eap_response()
975 eap->code, eap->identifier, be_to_host16(eap->length), in handle_eap_initiate()
986 static const char * eap_code_str(u8 code) in eap_code_str() argument
988 switch (code) { in eap_code_str()
1024 eap->code, eap_code_str(eap->code), eap->identifier, in handle_eap()
[all …]
/hostap-latest/src/eap_peer/
Deap_peap.c850 if (wpabuf_len(in_decrypted) == 5 && hdr->code == EAP_CODE_REQUEST && in eap_peap_decrypt()
857 if (wpabuf_len(in_decrypted) >= 5 && hdr->code == EAP_CODE_REQUEST && in eap_peap_decrypt()
872 nhdr->code = req->code; in eap_peap_decrypt()
906 "identifier=%d length=%lu", hdr->code, hdr->identifier, in eap_peap_decrypt()
908 switch (hdr->code) { in eap_peap_decrypt()
951 rhdr->code = EAP_CODE_SUCCESS; in eap_peap_decrypt()
976 rhdr->code = EAP_CODE_FAILURE; in eap_peap_decrypt()
983 "Phase 2 EAP header", hdr->code); in eap_peap_decrypt()
/hostap-latest/tests/hwsim/vm/
DREADME47 Code Coverage Analysis for user space code
60 Code Coverage Analysis for kernel code
62 In order to do code coverage analysis, reconfigure the kernel to include
/hostap-latest/src/eap_server/
Deap_server_tls_common.c22 u8 code, u8 identifier) in eap_tls_msg_alloc() argument
27 code, identifier); in eap_tls_msg_alloc()
31 code, identifier); in eap_tls_msg_alloc()
32 return eap_msg_alloc(EAP_VENDOR_IETF, type, payload_len, code, in eap_tls_msg_alloc()
Deap_server_eke.c68 static void eap_eke_fail(struct eap_eke_data *data, u32 code) in eap_eke_fail() argument
70 wpa_printf(MSG_DEBUG, "EAP-EKE: Failure - code 0x%x", code); in eap_eke_fail()
71 data->failure_code = code; in eap_eke_fail()
668 u32 code; in eap_eke_process_failure() local
678 code = WPA_GET_BE32(payload); in eap_eke_process_failure()
679 wpa_printf(MSG_DEBUG, "EAP-EKE: Peer reported failure code 0x%x", code); in eap_eke_process_failure()

12345