/hostap-latest/tests/hwsim/ |
D | radius_das.py | 13 def __init__(self, code=pyrad.packet.DisconnectRequest, id=None, argument 15 pyrad.packet.Packet.__init__(self, code, id, secret, authenticator, 20 for code, datalst in sorted(self.items()): 22 attr += self._PktEncodeAttribute(code, data) 27 header = struct.pack('!BBH', self.code, self.id, (20 + len(attr))) 33 def __init__(self, code=pyrad.packet.CoARequest, id=None, argument 35 pyrad.packet.Packet.__init__(self, code, id, secret, authenticator, 44 header = struct.pack('!BBH', self.code, self.id, (20 + len(attr)))
|
D | test_dpp3.py | 84 code = "secret" 88 cmd += " code=%s" % code 93 dev0.dpp_pkex_init(identifier=None, code=code, role="enrollee", 257 code = "secret" 260 cmd += " code=%s" % code 269 dev[0].dpp_pkex_init(identifier=None, code=code, role="enrollee")
|
D | test_radius.py | 413 def send_and_check_reply(srv, req, code, error_cause=0): argument 418 if reply.code != code: 816 hmac_obj.update(struct.pack("B", req.code)) 822 for code, datalst in sorted(req.items()): 824 attrs += req._PktEncodeAttribute(code, data) 1093 reply.code = pyrad.packet.AccessAccept 1102 hmac_obj.update(struct.pack("B", reply.code)) 1222 reply.code = pyrad.packet.AccessAccept 1224 reply.code = pyrad.packet.AccessRequest 1226 reply.code = pyrad.packet.AccessReject [all …]
|
/hostap-latest/doc/ |
D | mainpage.doxygen | 4 The goal of this documentation and comments in the source code is to 7 modified, how new drivers can be supported, and how the source code 16 The source code and read-only access to the combined wpa_supplicant 33 OS independent, portable C code for all WPA functionality. The source 34 code is divided into separate C files as shown on the \ref 35 code_structure "code structure page". All hardware/driver specific 71 OS independent, portable C code for all WPA functionality. The source 72 code is divided into separate C files as shown on the \ref 73 code_structure "code structure page". All hardware/driver specific
|
D | testing_tools.doxygen | 7 \ref wpa_trace "Tracing code" ] 18 authentication client code from hostapd. In addition, it has minimal 19 glue code to combine these two components in similar ways to IEEE 88 based on the code that wpa_supplicant is using. As such, it tests 129 exit code if all tests were completed successfully. 132 \section wpa_trace Tracing code for developer debuggin 134 wpa_supplicant and hostapd can be built with tracing code that will 142 The trace code can be enabled with CONFIG_WPA_TRACE=y build
|
D | p2p.doxygen | 29 wpa_supplicant includes code in interact with both the P2P module 32 through these files, i.e., core P2P or WPS code does not interact 44 operations. Glue code is used to bind the P2P module API to the rest 184 the glue code outside the P2P module depends on the architecture used 201 \ref p2p_config::start_listen(). The glue code using the P2P module may 211 upper layer code with the \ref p2p_config::go_neg_req_tx() callback. 222 layer code is responsible for asking the user to provide the PIN to be 224 press for PBC mode. The glue code will need to figure out the intended 241 lower layer code to transmit an Action frame during group owner 250 upper layer management code or the glue code using the P2P module API [all …]
|
D | eap.doxygen | 5 defined in RFC 3748. wpa_supplicant uses a separate code module for EAP 43 messages. This allows code sharing and can avoid missing some of the 60 example showing how EAP peer and server code from wpa_supplicant and 65 \ref eap_example_peer.c shows the initialization and glue code needed to 82 be desirable to replace the debug output code in \ref src/utils/wpa_debug.c
|
D | directories.doxygen | 5 hostapd-specific code for configuration, control interface, and AP 52 operating systems without having to make rest of the source code 87 wpa_supplicant-specific code for configuration, control interface, and
|
D | code_structure.doxygen | 2 \page code_structure Structure of the source code 17 modules. Core code includes functionality for controlling the network 19 WPA code (key handshake, PMKSA caching, pre-authentication), EAPOL 237 Internal definitions for WPA code; not to be included to other modules. 255 Common code for EAP-SIM and EAP-AKA 258 Common code for EAP-PEAP, EAP-TTLS, and EAP-FAST
|
/hostap-latest/src/radius/ |
D | radius_server.c | 901 int code; in radius_server_encapsulate_eap() local 908 code = RADIUS_CODE_ACCESS_REJECT; in radius_server_encapsulate_eap() 911 code = RADIUS_CODE_ACCESS_ACCEPT; in radius_server_encapsulate_eap() 914 code = RADIUS_CODE_ACCESS_CHALLENGE; in radius_server_encapsulate_eap() 917 msg = radius_msg_new(code, hdr->identifier); in radius_server_encapsulate_eap() 929 if (code == RADIUS_CODE_ACCESS_CHALLENGE && in radius_server_encapsulate_eap() 941 if (code == RADIUS_CODE_ACCESS_ACCEPT && sess->eap_if->eapKeyData) { in radius_server_encapsulate_eap() 995 if (code == RADIUS_CODE_ACCESS_ACCEPT && sess->remediation && in radius_server_encapsulate_eap() 1012 } else if (code == RADIUS_CODE_ACCESS_ACCEPT && sess->remediation) { in radius_server_encapsulate_eap() 1019 } else if (code == RADIUS_CODE_ACCESS_ACCEPT && in radius_server_encapsulate_eap() [all …]
|
/hostap-latest/src/eap_common/ |
D | eap_wsc_common.c | 17 struct wpabuf * eap_wsc_build_frag_ack(u8 id, u8 code) in eap_wsc_build_frag_ack() argument 21 msg = eap_msg_alloc(EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC, 2, code, id); in eap_wsc_build_frag_ack()
|
D | eap_common.c | 129 size_t payload_len, u8 code, u8 identifier) in eap_msg_alloc() argument 142 hdr->code = code; in eap_msg_alloc()
|
D | eap_ikev2_common.c | 51 struct wpabuf * eap_ikev2_build_frag_ack(u8 id, u8 code) in eap_ikev2_build_frag_ack() argument 55 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_IKEV2, 0, code, id); in eap_ikev2_build_frag_ack()
|
/hostap-latest/src/common/ |
D | dpp_pkex.c | 43 Qi = dpp_pkex_derive_Qi(curve, v2 ? NULL : pkex->own_mac, pkex->code, in dpp_pkex_build_exchange_req() 175 const char *identifier, const char *code, in dpp_pkex_init() argument 201 pkex->code = os_memdup(code, code_len); in dpp_pkex_init() 202 if (!pkex->code) in dpp_pkex_init() 346 const char *code, size_t code_len, in dpp_pkex_rx_exchange_req() argument 443 Qi = dpp_pkex_derive_Qi(curve, v2 ? NULL : peer_mac, code, code_len, in dpp_pkex_rx_exchange_req() 483 pkex->code = os_memdup(code, code_len); in dpp_pkex_rx_exchange_req() 484 if (!pkex->code) in dpp_pkex_rx_exchange_req() 502 Qr = dpp_pkex_derive_Qr(curve, v2 ? NULL : own_mac, code, code_len, in dpp_pkex_rx_exchange_req() 556 pkex->Nx, curve->prime_len, pkex->code, in dpp_pkex_rx_exchange_req() [all …]
|
D | dpp_i.h | 122 const char *code, size_t code_len, const char *identifier, 126 const char *code, size_t code_len, const char *identifier, 132 const char *code, size_t code_len,
|
D | gas_server.c | 452 u8 action, code, dialog_token; in gas_server_tx_status() local 459 code = *pos++; in gas_server_tx_status() 462 (code != WLAN_PA_GAS_INITIAL_RESP && in gas_server_tx_status() 463 code != WLAN_PA_GAS_COMEBACK_RESP)) in gas_server_tx_status() 468 code == WLAN_PA_GAS_INITIAL_RESP ? "initial" : "comeback", in gas_server_tx_status()
|
/hostap-latest/wlantest/ |
D | wired.c | 41 static const char * radius_code_string(u8 code) in radius_code_string() argument 43 switch (code) { in radius_code_string() 190 radius_code_string(hdr->code)); in process_radius() 192 switch (hdr->code) { in process_radius()
|
/hostap-latest/eap_example/ |
D | README | 17 code from wpa_supplicant and hostapd can be used as a library. The 21 eap_example_peer.c shows the initialization and glue code needed to 39 be desirable to replace the debug output code in src/utils/wpa_debug.c
|
/hostap-latest/wpa_supplicant/ |
D | eapol_test.c | 205 if (len > sizeof(*hdr) && hdr->code == EAP_CODE_RESPONSE && in ieee802_1x_encapsulate_radius() 292 radius_msg_get_hdr(e->last_recv_radius)->code == in ieee802_1x_encapsulate_radius() 715 eap->code = EAP_CODE_REQUEST; in send_eap_request_identity() 805 switch (hdr->code) { in ieee802_1x_decapsulate_radius() 835 hdr->code, hdr->identifier, be_to_host16(hdr->length), in ieee802_1x_decapsulate_radius() 927 if (hdr->code == RADIUS_CODE_ACCESS_REJECT && in ieee802_1x_receive_auth() 940 if (hdr->code != RADIUS_CODE_ACCESS_ACCEPT && in ieee802_1x_receive_auth() 941 hdr->code != RADIUS_CODE_ACCESS_REJECT && in ieee802_1x_receive_auth() 942 hdr->code != RADIUS_CODE_ACCESS_CHALLENGE) { in ieee802_1x_receive_auth() 953 switch (hdr->code) { in ieee802_1x_receive_auth() [all …]
|
D | README-DPP | 14 methods like QR code based authentication (detailed below), PKEX based 102 Generate QR code for the device. Store the QR code id returned by the 130 > dpp_auth_init peer=<qr-code-id> conf=<ap-dpp|sta-dpp> ssid=<SSID hexdump> configurator=<configura… 132 > dpp_auth_init peer=<qr-code-id> conf=sta-psk ssid=<SSID hexdump> pass=<passphrase hexdump>
|
/hostap-latest/src/ap/ |
D | ieee802_1x.c | 408 (hdr->code == EAP_CODE_RESPONSE && in ieee802_1x_learn_identity() 410 (hdr->code == EAP_CODE_INITIATE && in ieee802_1x_learn_identity() 412 (hdr->code != EAP_CODE_RESPONSE && in ieee802_1x_learn_identity() 413 hdr->code != EAP_CODE_INITIATE)) in ieee802_1x_learn_identity() 805 radius_msg_get_hdr(sm->last_recv_radius)->code == in ieee802_1x_encapsulate_radius() 942 eap->code, eap->identifier, be_to_host16(eap->length), in handle_eap_response() 975 eap->code, eap->identifier, be_to_host16(eap->length), in handle_eap_initiate() 986 static const char * eap_code_str(u8 code) in eap_code_str() argument 988 switch (code) { in eap_code_str() 1024 eap->code, eap_code_str(eap->code), eap->identifier, in handle_eap() [all …]
|
/hostap-latest/src/eap_peer/ |
D | eap_peap.c | 850 if (wpabuf_len(in_decrypted) == 5 && hdr->code == EAP_CODE_REQUEST && in eap_peap_decrypt() 857 if (wpabuf_len(in_decrypted) >= 5 && hdr->code == EAP_CODE_REQUEST && in eap_peap_decrypt() 872 nhdr->code = req->code; in eap_peap_decrypt() 906 "identifier=%d length=%lu", hdr->code, hdr->identifier, in eap_peap_decrypt() 908 switch (hdr->code) { in eap_peap_decrypt() 951 rhdr->code = EAP_CODE_SUCCESS; in eap_peap_decrypt() 976 rhdr->code = EAP_CODE_FAILURE; in eap_peap_decrypt() 983 "Phase 2 EAP header", hdr->code); in eap_peap_decrypt()
|
/hostap-latest/tests/hwsim/vm/ |
D | README | 47 Code Coverage Analysis for user space code 60 Code Coverage Analysis for kernel code 62 In order to do code coverage analysis, reconfigure the kernel to include
|
/hostap-latest/src/eap_server/ |
D | eap_server_tls_common.c | 22 u8 code, u8 identifier) in eap_tls_msg_alloc() argument 27 code, identifier); in eap_tls_msg_alloc() 31 code, identifier); in eap_tls_msg_alloc() 32 return eap_msg_alloc(EAP_VENDOR_IETF, type, payload_len, code, in eap_tls_msg_alloc()
|
D | eap_server_eke.c | 68 static void eap_eke_fail(struct eap_eke_data *data, u32 code) in eap_eke_fail() argument 70 wpa_printf(MSG_DEBUG, "EAP-EKE: Failure - code 0x%x", code); in eap_eke_fail() 71 data->failure_code = code; in eap_eke_fail() 668 u32 code; in eap_eke_process_failure() local 678 code = WPA_GET_BE32(payload); in eap_eke_process_failure() 679 wpa_printf(MSG_DEBUG, "EAP-EKE: Peer reported failure code 0x%x", code); in eap_eke_process_failure()
|