Home
last modified time | relevance | path

Searched refs:element (Results 1 – 20 of 20) sorted by relevance

/hostap-latest/src/common/
Dieee802_11_common.h15 struct element { struct
323 for (_elem = (const struct element *) (_data); \
328 _elem = (const struct element *) (_elem->data + _elem->datalen))
330 #define for_each_element_id(element, _id, data, datalen) \ argument
331 for_each_element(element, data, datalen) \
332 if (element->id == (_id))
334 #define for_each_element_extid(element, extid, _data, _datalen) \ argument
335 for_each_element(element, _data, _datalen) \
336 if (element->id == WLAN_EID_EXTENSION && \
337 element->datalen > 0 && \
[all …]
Dieee802_11_common.c271 const struct element *elem; in ieee802_11_fragments_length()
436 const struct element *elem; in __ieee802_11_parse_elems()
1133 const struct element *elem; in ieee802_11_ie_count()
1150 const struct element *elem, *found = NULL; in ieee802_11_vendor_ie_concat()
2355 const struct element *elem; in mb_ies_info_by_ies()
2527 const struct element *elem; in get_ie()
2551 const struct element *elem; in get_ie_ext()
2565 const struct element *elem; in get_vendor_ie()
2604 const struct element *elem; in check_multi_ap_ie()
3431 const struct element *elem; in get_ml_ie()
/hostap-latest/src/eap_common/
Deap_pwd_common.c425 struct crypto_ec_point *element; in eap_pwd_get_element() local
439 element = crypto_ec_point_from_bin(group->group, buf); in eap_pwd_get_element()
440 if (!element) { in eap_pwd_get_element()
446 if (!crypto_ec_point_is_on_curve(group->group, element) || in eap_pwd_get_element()
447 crypto_ec_point_is_at_infinity(group->group, element)) { in eap_pwd_get_element()
453 return element; in eap_pwd_get_element()
455 crypto_ec_point_deinit(element, 0); in eap_pwd_get_element()
456 element = NULL; in eap_pwd_get_element()
/hostap-latest/hostapd/
DREADME-MULTI-AP50 features are required. It must send an additional information element in each
64 element in each (Re)Association Response frame, but only to stations that have
67 fronthaul and backhaul at the same time. The additional information element must
76 parses the Multi-AP information element in the Association Request frame. If the
85 without the Multi-AP information element will be denied.
88 with the Multi-AP information element will be denied. That is also the only
90 information element is simply ignored.
DChangeLog46 - added support for the hash-to-element mechanism (sae_pwe=1 or
128 - verify peer scalar/element
156 * OWE: allow Diffie-Hellman Parameter element to be included with DPP
209 - added support for setting Venue URL ANQP-element (venue_url)
211 - added support for Roaming Consortium Selection element
334 * add support for generating BSS Load element (bss_load_update_period)
363 element in which the channel does not match the current operating
395 - Power Constraint element (local_pwr_constraint)
/hostap-latest/src/eap_server/
Deap_server_pwd.c239 u8 *scalar, *element; in eap_pwd_build_commit_req() local
294 element = wpabuf_put(data->outbuf, 2 * prime_len); in eap_pwd_build_commit_req()
300 if (crypto_ec_point_to_bin(data->grp->group, data->my_element, element, in eap_pwd_build_commit_req()
301 element + prime_len) < 0) { in eap_pwd_build_commit_req()
/hostap-latest/src/eap_peer/
Deap_pwd.c361 u8 *scalar, *element; in eap_pwd_perform_commit_exchange() local
661 element = wpabuf_put(data->outbuf, 2 * prime_len); in eap_pwd_perform_commit_exchange()
673 if (crypto_ec_point_to_bin(data->grp->group, data->my_element, element, in eap_pwd_perform_commit_exchange()
674 element + prime_len) != 0) { in eap_pwd_perform_commit_exchange()
/hostap-latest/wpa_supplicant/
Dbss.c1277 const struct element *elem; in wpa_bss_get_vendor_ie()
1307 const struct element *elem; in wpa_bss_get_vendor_ie_beacon()
1618 const struct element *elem; in wpa_bss_parse_basic_ml_element()
1745 elem = (const struct element *) in wpa_bss_parse_basic_ml_element()
DREADME-HS20184 # server certificate in SubjectAltName dNSName element(s). If a
302 # Capability ANQP element). This constraint is ignored if the AP does not
628 ANQP-element.
674 list ANQP-element:
Dscan.c2126 const struct element *elem; in wpa_scan_get_vendor_ie()
2156 const struct element *elem; in wpa_scan_get_vendor_ie_beacon()
2262 const struct element *elem; in wpas_channel_width_tx_pwr()
DChangeLog57 - added support for the hash-to-element mechanism (sae_pwe=1 or
156 - verify server scalar/element
260 - added support for fetching of Operator Icon Metadata ANQP-element
261 - added support for Roaming Consortium Selection element
313 without internal support in wpa_supplicant for the specific element
419 * fixed P2P validation of SSID element length before copying it
437 * modified Extended Capabilities element use in Probe Request frames to
938 * fixed issues in WPA/RSN element validation when roaming with ap_scan=1
942 * fixed WSC element inclusion in cases where P2P is disabled
DREADME1093 procedures. Each QoS Management element in a DSCP Policy Request frame
/hostap-latest/doc/
Ddriver_wrapper.doxygen97 Scan results must also include the WPA information element. Support for
99 to provide the full WPA IE (including element id and length) as a hex
Ddbus.doxygen2245 …d]' where 'id' is the InfoID of the ANQP element as described in IEEE Std 802.11-2020, Table 9-331…
/hostap-latest/tests/hwsim/
Dtest_sae.py1205element = "0f1d67025e12fc874cf718c35b19d1ab2db858215623f1ce661cbd1d7b1d7a09ceda7dba46866cf37044259…
1207 …CESS freq=2412 datarate=0 ssi_signal=-30 frame=" + hdr + "030001000000" + group + scalar + element)
1987element = binascii.unhexlify("954d0f4457066bff3168376a1d7174f4e66620d1792406f613055b98513a7f03a538…
1990element = binascii.unhexlify("00580eb4b448ea600ea277d5e66e4ed37db82bb04ac90442e9c3727489f366ba4b82…
2001 frame += scalar + element
Dtest_eap_proto.py7493element = binascii.unhexlify("8dcab2862c5396839a6bac0c689ff03d962863108e7c275bbf1d6eedf634ee832a21…
7495 payload = struct.pack(">B", 0x02) + element + scalar
7519element = binascii.unhexlify("8dcab2862c5396839a6bac0c689ff03d962863108e7c275bbf1d6eedf634ee832a21…
7521 payload = struct.pack(">B", 0x02) + element + scalar
7855 def run_eap_proto_pwd_invalid_element(dev, apdev, element): argument
7878 payload = struct.pack(">B", 0x02) + element + 31*b'\0' + b'\x02'
8026 def run_eap_proto_pwd_invalid_element_peer(dev, apdev, element): argument
8033 msg = resp[0:20] + element + resp[148:]
/hostap-latest/hs20/client/
Doma_dm_client.c97 const char *element, const char *uri) in oma_dm_add_locuri() argument
101 node = xml_node_create(ctx->xml, parent, NULL, element); in oma_dm_add_locuri()
/hostap-latest/hs20/server/
Dhs20-osu-server.txt259 authentication server. In addition, the OSU Provider List ANQP element
/hostap-latest/src/ap/
Dbeacon.c1344 const struct element *sub; in parse_ml_probe_req()
/hostap-latest/wlantest/
Drx_mgmt.c66 const struct element *elem; in parse_basic_ml()