/hostap-latest/src/common/ |
D | ieee802_11_common.h | 15 struct element { struct 323 for (_elem = (const struct element *) (_data); \ 328 _elem = (const struct element *) (_elem->data + _elem->datalen)) 330 #define for_each_element_id(element, _id, data, datalen) \ argument 331 for_each_element(element, data, datalen) \ 332 if (element->id == (_id)) 334 #define for_each_element_extid(element, extid, _data, _datalen) \ argument 335 for_each_element(element, _data, _datalen) \ 336 if (element->id == WLAN_EID_EXTENSION && \ 337 element->datalen > 0 && \ [all …]
|
D | ieee802_11_common.c | 271 const struct element *elem; in ieee802_11_fragments_length() 436 const struct element *elem; in __ieee802_11_parse_elems() 1133 const struct element *elem; in ieee802_11_ie_count() 1150 const struct element *elem, *found = NULL; in ieee802_11_vendor_ie_concat() 2355 const struct element *elem; in mb_ies_info_by_ies() 2527 const struct element *elem; in get_ie() 2551 const struct element *elem; in get_ie_ext() 2565 const struct element *elem; in get_vendor_ie() 2604 const struct element *elem; in check_multi_ap_ie() 3431 const struct element *elem; in get_ml_ie()
|
/hostap-latest/src/eap_common/ |
D | eap_pwd_common.c | 425 struct crypto_ec_point *element; in eap_pwd_get_element() local 439 element = crypto_ec_point_from_bin(group->group, buf); in eap_pwd_get_element() 440 if (!element) { in eap_pwd_get_element() 446 if (!crypto_ec_point_is_on_curve(group->group, element) || in eap_pwd_get_element() 447 crypto_ec_point_is_at_infinity(group->group, element)) { in eap_pwd_get_element() 453 return element; in eap_pwd_get_element() 455 crypto_ec_point_deinit(element, 0); in eap_pwd_get_element() 456 element = NULL; in eap_pwd_get_element()
|
/hostap-latest/hostapd/ |
D | README-MULTI-AP | 50 features are required. It must send an additional information element in each 64 element in each (Re)Association Response frame, but only to stations that have 67 fronthaul and backhaul at the same time. The additional information element must 76 parses the Multi-AP information element in the Association Request frame. If the 85 without the Multi-AP information element will be denied. 88 with the Multi-AP information element will be denied. That is also the only 90 information element is simply ignored.
|
D | ChangeLog | 46 - added support for the hash-to-element mechanism (sae_pwe=1 or 128 - verify peer scalar/element 156 * OWE: allow Diffie-Hellman Parameter element to be included with DPP 209 - added support for setting Venue URL ANQP-element (venue_url) 211 - added support for Roaming Consortium Selection element 334 * add support for generating BSS Load element (bss_load_update_period) 363 element in which the channel does not match the current operating 395 - Power Constraint element (local_pwr_constraint)
|
/hostap-latest/src/eap_server/ |
D | eap_server_pwd.c | 239 u8 *scalar, *element; in eap_pwd_build_commit_req() local 294 element = wpabuf_put(data->outbuf, 2 * prime_len); in eap_pwd_build_commit_req() 300 if (crypto_ec_point_to_bin(data->grp->group, data->my_element, element, in eap_pwd_build_commit_req() 301 element + prime_len) < 0) { in eap_pwd_build_commit_req()
|
/hostap-latest/src/eap_peer/ |
D | eap_pwd.c | 361 u8 *scalar, *element; in eap_pwd_perform_commit_exchange() local 661 element = wpabuf_put(data->outbuf, 2 * prime_len); in eap_pwd_perform_commit_exchange() 673 if (crypto_ec_point_to_bin(data->grp->group, data->my_element, element, in eap_pwd_perform_commit_exchange() 674 element + prime_len) != 0) { in eap_pwd_perform_commit_exchange()
|
/hostap-latest/wpa_supplicant/ |
D | bss.c | 1277 const struct element *elem; in wpa_bss_get_vendor_ie() 1307 const struct element *elem; in wpa_bss_get_vendor_ie_beacon() 1618 const struct element *elem; in wpa_bss_parse_basic_ml_element() 1745 elem = (const struct element *) in wpa_bss_parse_basic_ml_element()
|
D | README-HS20 | 184 # server certificate in SubjectAltName dNSName element(s). If a 302 # Capability ANQP element). This constraint is ignored if the AP does not 628 ANQP-element. 674 list ANQP-element:
|
D | scan.c | 2126 const struct element *elem; in wpa_scan_get_vendor_ie() 2156 const struct element *elem; in wpa_scan_get_vendor_ie_beacon() 2262 const struct element *elem; in wpas_channel_width_tx_pwr()
|
D | ChangeLog | 57 - added support for the hash-to-element mechanism (sae_pwe=1 or 156 - verify server scalar/element 260 - added support for fetching of Operator Icon Metadata ANQP-element 261 - added support for Roaming Consortium Selection element 313 without internal support in wpa_supplicant for the specific element 419 * fixed P2P validation of SSID element length before copying it 437 * modified Extended Capabilities element use in Probe Request frames to 938 * fixed issues in WPA/RSN element validation when roaming with ap_scan=1 942 * fixed WSC element inclusion in cases where P2P is disabled
|
D | README | 1093 procedures. Each QoS Management element in a DSCP Policy Request frame
|
/hostap-latest/doc/ |
D | driver_wrapper.doxygen | 97 Scan results must also include the WPA information element. Support for 99 to provide the full WPA IE (including element id and length) as a hex
|
D | dbus.doxygen | 2245 …d]' where 'id' is the InfoID of the ANQP element as described in IEEE Std 802.11-2020, Table 9-331…
|
/hostap-latest/tests/hwsim/ |
D | test_sae.py | 1205 …element = "0f1d67025e12fc874cf718c35b19d1ab2db858215623f1ce661cbd1d7b1d7a09ceda7dba46866cf37044259… 1207 …CESS freq=2412 datarate=0 ssi_signal=-30 frame=" + hdr + "030001000000" + group + scalar + element) 1987 …element = binascii.unhexlify("954d0f4457066bff3168376a1d7174f4e66620d1792406f613055b98513a7f03a538… 1990 …element = binascii.unhexlify("00580eb4b448ea600ea277d5e66e4ed37db82bb04ac90442e9c3727489f366ba4b82… 2001 frame += scalar + element
|
D | test_eap_proto.py | 7493 …element = binascii.unhexlify("8dcab2862c5396839a6bac0c689ff03d962863108e7c275bbf1d6eedf634ee832a21… 7495 payload = struct.pack(">B", 0x02) + element + scalar 7519 …element = binascii.unhexlify("8dcab2862c5396839a6bac0c689ff03d962863108e7c275bbf1d6eedf634ee832a21… 7521 payload = struct.pack(">B", 0x02) + element + scalar 7855 def run_eap_proto_pwd_invalid_element(dev, apdev, element): argument 7878 payload = struct.pack(">B", 0x02) + element + 31*b'\0' + b'\x02' 8026 def run_eap_proto_pwd_invalid_element_peer(dev, apdev, element): argument 8033 msg = resp[0:20] + element + resp[148:]
|
/hostap-latest/hs20/client/ |
D | oma_dm_client.c | 97 const char *element, const char *uri) in oma_dm_add_locuri() argument 101 node = xml_node_create(ctx->xml, parent, NULL, element); in oma_dm_add_locuri()
|
/hostap-latest/hs20/server/ |
D | hs20-osu-server.txt | 259 authentication server. In addition, the OSU Provider List ANQP element
|
/hostap-latest/src/ap/ |
D | beacon.c | 1344 const struct element *sub; in parse_ml_probe_req()
|
/hostap-latest/wlantest/ |
D | rx_mgmt.c | 66 const struct element *elem; in parse_basic_ml()
|