Home
last modified time | relevance | path

Searched refs:flags (Results 1 – 25 of 172) sorted by relevance

1234567

/hostap-latest/src/drivers/
Ddriver_nl80211_capa.c117 info->capa->flags |= WPA_DRIVER_FLAGS_AP; in wiphy_info_supported_iftypes()
120 info->capa->flags |= WPA_DRIVER_FLAGS_MESH; in wiphy_info_supported_iftypes()
123 info->capa->flags |= WPA_DRIVER_FLAGS_IBSS; in wiphy_info_supported_iftypes()
126 info->capa->flags |= in wiphy_info_supported_iftypes()
169 info->capa->flags |= WPA_DRIVER_FLAGS_RADAR; in wiphy_info_iface_comb_process()
511 capa->flags |= WPA_DRIVER_FLAGS_TDLS_SUPPORT; in wiphy_info_tdls()
515 capa->flags |= WPA_DRIVER_FLAGS_TDLS_EXTERNAL_SETUP; in wiphy_info_tdls()
547 capa->flags |= WPA_DRIVER_FLAGS_VHT_IBSS; in wiphy_info_ext_feature_flags()
553 capa->flags |= WPA_DRIVER_FLAGS_SUPPORT_FILS; in wiphy_info_ext_feature_flags()
557 capa->flags |= WPA_DRIVER_FLAGS_BEACON_RATE_LEGACY; in wiphy_info_ext_feature_flags()
[all …]
Ddriver_wired_common.c33 static int driver_wired_get_ifflags(const char *ifname, int *flags) in driver_wired_get_ifflags() argument
53 *flags = ifr.ifr_flags & 0xffff; in driver_wired_get_ifflags()
58 static int driver_wired_set_ifflags(const char *ifname, int flags) in driver_wired_set_ifflags() argument
71 ifr.ifr_flags = flags & 0xffff; in driver_wired_set_ifflags()
185 capa->flags = WPA_DRIVER_FLAGS_WIRED; in driver_wired_get_capa()
222 int flags; in driver_wired_init_common() local
235 if (driver_wired_get_ifflags(ifname, &flags) == 0 && in driver_wired_init_common()
236 !(flags & IFF_UP) && in driver_wired_init_common()
237 driver_wired_set_ifflags(ifname, flags | IFF_UP) == 0) in driver_wired_init_common()
252 } else if (driver_wired_get_ifflags(ifname, &flags) < 0) { in driver_wired_init_common()
[all …]
/hostap-latest/src/eap_peer/
Deap_tls_common.c64 params->flags |= TLS_CONN_ALLOW_SIGN_RSA_MD5; in eap_tls_params_flags()
66 params->flags |= TLS_CONN_DISABLE_TIME_CHECKS; in eap_tls_params_flags()
68 params->flags |= TLS_CONN_DISABLE_SESSION_TICKET; in eap_tls_params_flags()
70 params->flags &= ~TLS_CONN_DISABLE_SESSION_TICKET; in eap_tls_params_flags()
72 params->flags |= TLS_CONN_DISABLE_TLSv1_0; in eap_tls_params_flags()
74 params->flags &= ~TLS_CONN_DISABLE_TLSv1_0; in eap_tls_params_flags()
75 params->flags |= TLS_CONN_ENABLE_TLSv1_0; in eap_tls_params_flags()
78 params->flags |= TLS_CONN_DISABLE_TLSv1_1; in eap_tls_params_flags()
80 params->flags &= ~TLS_CONN_DISABLE_TLSv1_1; in eap_tls_params_flags()
81 params->flags |= TLS_CONN_ENABLE_TLSv1_1; in eap_tls_params_flags()
[all …]
Deap_tnc.c92 u8 flags; in eap_tnc_build_msg() local
99 flags = EAP_TNC_VERSION; in eap_tnc_build_msg()
103 flags |= EAP_TNC_FLAGS_MORE_FRAGMENTS; in eap_tnc_build_msg()
105 flags |= EAP_TNC_FLAGS_LENGTH_INCLUDED; in eap_tnc_build_msg()
111 if (flags & EAP_TNC_FLAGS_LENGTH_INCLUDED) in eap_tnc_build_msg()
118 wpabuf_put_u8(resp, flags); /* Flags */ in eap_tnc_build_msg()
119 if (flags & EAP_TNC_FLAGS_LENGTH_INCLUDED) in eap_tnc_build_msg()
169 u8 id, u8 flags, in eap_tnc_process_fragment() argument
174 if (data->in_buf == NULL && !(flags & EAP_TNC_FLAGS_LENGTH_INCLUDED)) { in eap_tnc_process_fragment()
214 u8 flags, id; in eap_tnc_process() local
[all …]
Deap_ikev2.c138 u8 flags; in eap_ikev2_build_msg() local
145 flags = 0; in eap_ikev2_build_msg()
149 flags |= IKEV2_FLAGS_MORE_FRAGMENTS; in eap_ikev2_build_msg()
151 flags |= IKEV2_FLAGS_LENGTH_INCLUDED; in eap_ikev2_build_msg()
157 if (flags & IKEV2_FLAGS_LENGTH_INCLUDED) in eap_ikev2_build_msg()
163 flags |= IKEV2_FLAGS_ICV_INCLUDED; in eap_ikev2_build_msg()
179 wpabuf_put_u8(resp, flags); /* Flags */ in eap_ikev2_build_msg()
180 if (flags & IKEV2_FLAGS_LENGTH_INCLUDED) in eap_ikev2_build_msg()
187 if (flags & IKEV2_FLAGS_ICV_INCLUDED) { in eap_ikev2_build_msg()
246 u8 flags, const u8 *pos, const u8 **end, in eap_ikev2_process_icv() argument
[all …]
Deap_wsc.c314 u8 flags; in eap_wsc_build_msg() local
321 flags = 0; in eap_wsc_build_msg()
325 flags |= WSC_FLAGS_MF; in eap_wsc_build_msg()
327 flags |= WSC_FLAGS_LF; in eap_wsc_build_msg()
332 if (flags & WSC_FLAGS_LF) in eap_wsc_build_msg()
340 wpabuf_put_u8(resp, flags); /* Flags */ in eap_wsc_build_msg()
341 if (flags & WSC_FLAGS_LF) in eap_wsc_build_msg()
405 u8 id, u8 flags, u8 op_code, in eap_wsc_process_fragment() argument
410 if (data->in_buf == NULL && !(flags & WSC_FLAGS_LF)) { in eap_wsc_process_fragment()
445 u8 op_code, flags, id; in eap_wsc_process() local
[all …]
Deap_teap.c647 u8 flags, subtype; in eap_teap_validate_crypto_binding() local
650 flags = cb->subtype >> 4; in eap_teap_validate_crypto_binding()
654 cb->version, cb->received_version, flags, subtype); in eap_teap_validate_crypto_binding()
665 flags < 1 || flags > 3) { in eap_teap_validate_crypto_binding()
668 cb->version, cb->received_version, flags, subtype); in eap_teap_validate_crypto_binding()
688 u8 subtype, flags; in eap_teap_write_crypto_binding() local
698 flags = cmk_emsk ? TEAP_CRYPTO_BINDING_EMSK_AND_MSK_CMAC : in eap_teap_write_crypto_binding()
701 rbind->subtype = (flags << 4) | subtype; in eap_teap_write_crypto_binding()
719 rbind->version, rbind->received_version, flags, subtype); in eap_teap_write_crypto_binding()
831 u8 flags; in eap_teap_process_crypto_binding() local
[all …]
/hostap-latest/src/eap_server/
Deap_server_tls_common.c50 unsigned int flags = sm->cfg->tls_flags; in eap_server_tls_ssl_init() local
75 flags |= TLS_CONN_DISABLE_SESSION_TICKET; in eap_server_tls_ssl_init()
79 flags, session_ctx, in eap_server_tls_ssl_init()
204 u8 flags; in eap_server_tls_build_msg() local
213 flags = version; in eap_server_tls_build_msg()
217 flags |= EAP_TLS_FLAGS_MORE_FRAGMENTS; in eap_server_tls_build_msg()
219 flags |= EAP_TLS_FLAGS_LENGTH_INCLUDED; in eap_server_tls_build_msg()
225 if (flags & EAP_TLS_FLAGS_LENGTH_INCLUDED) in eap_server_tls_build_msg()
232 wpabuf_put_u8(req, flags); /* Flags */ in eap_server_tls_build_msg()
233 if (flags & EAP_TLS_FLAGS_LENGTH_INCLUDED) in eap_server_tls_build_msg()
[all …]
Deap_server_ikev2.c136 u8 flags; in eap_ikev2_build_msg() local
141 flags = 0; in eap_ikev2_build_msg()
145 flags |= IKEV2_FLAGS_MORE_FRAGMENTS; in eap_ikev2_build_msg()
147 flags |= IKEV2_FLAGS_LENGTH_INCLUDED; in eap_ikev2_build_msg()
153 if (flags & IKEV2_FLAGS_LENGTH_INCLUDED) in eap_ikev2_build_msg()
159 flags |= IKEV2_FLAGS_ICV_INCLUDED; in eap_ikev2_build_msg()
175 wpabuf_put_u8(req, flags); /* Flags */ in eap_ikev2_build_msg()
176 if (flags & IKEV2_FLAGS_LENGTH_INCLUDED) in eap_ikev2_build_msg()
183 if (flags & IKEV2_FLAGS_ICV_INCLUDED) { in eap_ikev2_build_msg()
258 u8 flags, const u8 *pos, const u8 **end, in eap_ikev2_process_icv() argument
[all …]
Deap_server_tnc.c221 u8 flags; in eap_tnc_build_msg() local
226 flags = EAP_TNC_VERSION; in eap_tnc_build_msg()
230 flags |= EAP_TNC_FLAGS_MORE_FRAGMENTS; in eap_tnc_build_msg()
232 flags |= EAP_TNC_FLAGS_LENGTH_INCLUDED; in eap_tnc_build_msg()
238 if (flags & EAP_TNC_FLAGS_LENGTH_INCLUDED) in eap_tnc_build_msg()
245 wpabuf_put_u8(req, flags); /* Flags */ in eap_tnc_build_msg()
246 if (flags & EAP_TNC_FLAGS_LENGTH_INCLUDED) in eap_tnc_build_msg()
417 u8 flags, u32 message_length, in eap_tnc_process_fragment() argument
421 if (data->in_buf == NULL && !(flags & EAP_TNC_FLAGS_LENGTH_INCLUDED)) { in eap_tnc_process_fragment()
452 u8 flags; in eap_tnc_process() local
[all …]
Deap_server_wsc.c191 u8 flags; in eap_wsc_build_msg() local
194 flags = 0; in eap_wsc_build_msg()
198 flags |= WSC_FLAGS_MF; in eap_wsc_build_msg()
200 flags |= WSC_FLAGS_LF; in eap_wsc_build_msg()
205 if (flags & WSC_FLAGS_LF) in eap_wsc_build_msg()
216 wpabuf_put_u8(req, flags); /* Flags */ in eap_wsc_build_msg()
217 if (flags & WSC_FLAGS_LF) in eap_wsc_build_msg()
320 u8 flags, u8 op_code, u16 message_length, in eap_wsc_process_fragment() argument
324 if (data->in_buf == NULL && !(flags & WSC_FLAGS_LF)) { in eap_wsc_process_fragment()
356 u8 op_code, flags; in eap_wsc_process() local
[all …]
/hostap-latest/src/ap/
Dsta_info.c239 if ((sta->flags & WLAN_STA_WDS) || in ap_free_sta()
240 (sta->flags & WLAN_STA_MULTI_AP && in ap_free_sta()
243 !(sta->flags & WLAN_STA_WPS))) in ap_free_sta()
251 !(sta->flags & WLAN_STA_PREAUTH)) { in ap_free_sta()
381 !(sta->flags & WLAN_STA_PREAUTH)) { in ap_free_sta()
493 if (sta->flags & WLAN_STA_AUTH) { in hostapd_free_stas()
543 hapd->conf->iface, __func__, MAC2STR(sta->addr), sta->flags, in ap_handle_timer()
556 if ((sta->flags & WLAN_STA_ASSOC) && in ap_handle_timer()
605 if ((sta->flags & WLAN_STA_ASSOC) && in ap_handle_timer()
607 !(sta->flags & WLAN_STA_PENDING_POLL) && in ap_handle_timer()
[all …]
Dieee802_11_vht.c188 if (!vht_capab || !(sta->flags & WLAN_STA_WMM) || in copy_sta_vht_capab()
191 sta->flags &= ~WLAN_STA_VHT; in copy_sta_vht_capab()
204 sta->flags |= WLAN_STA_VHT; in copy_sta_vht_capab()
262 sta->flags |= WLAN_STA_VHT | WLAN_STA_VENDOR_VHT; in copy_sta_vendor_vht()
268 sta->flags &= ~WLAN_STA_VENDOR_VHT; in copy_sta_vendor_vht()
301 sta->flags &= ~WLAN_STA_VHT_OPMODE_ENABLED; in set_sta_vht_opmode()
305 sta->flags |= WLAN_STA_VHT_OPMODE_ENABLED; in set_sta_vht_opmode()
Dieee802_11.c155 if (hapd->iface->current_rates[i].flags & HOSTAPD_RATE_BASIC) in hostapd_eid_supp_rates()
223 if (hapd->iface->current_rates[i].flags & HOSTAPD_RATE_BASIC) in hostapd_eid_ext_supp_rates()
395 sta->flags |= WLAN_STA_AUTH; in auth_shared_key()
532 sta->flags |= WLAN_STA_AUTH; in handle_auth_ft_finish()
965 sta->flags |= WLAN_STA_AUTH; in sae_accept_sta()
2022 sta->flags |= WLAN_STA_PENDING_FILS_ERP; in handle_auth_fils()
2286 sta->flags |= WLAN_STA_AUTH; in handle_auth_fils_finish()
2300 u32 flags = sta->flags; in ieee802_11_finish_fils_auth() local
2302 sta->flags &= ~(WLAN_STA_PENDING_FILS_ERP | in ieee802_11_finish_fils_auth()
2307 if (flags & WLAN_STA_PENDING_FILS_ERP) { in ieee802_11_finish_fils_auth()
[all …]
/hostap-latest/src/eap_common/
Deap_psk_common.h25 #define EAP_PSK_FLAGS_GET_T(flags) (((flags) & 0xc0) >> 6) argument
34 u8 flags; member
41 u8 flags; member
50 u8 flags; member
58 u8 flags; member
/hostap-latest/src/crypto/
Dtls_mbedtls_alt.c161 unsigned int flags; member
647 static int tls_mbedtls_verify_cb(void *arg, mbedtls_x509_crt *crt, int depth, uint32_t *flags);
678 tls_conf->flags |= TLS_CONN_DISABLE_TLSv1_3; in tls_mbedtls_set_allowed_tls_vers()
682 if (tls_conf->flags & TLS_CONN_SUITEB) in tls_mbedtls_set_allowed_tls_vers()
684 tls_conf->flags |= TLS_CONN_DISABLE_TLSv1_0; in tls_mbedtls_set_allowed_tls_vers()
685 tls_conf->flags |= TLS_CONN_DISABLE_TLSv1_1; in tls_mbedtls_set_allowed_tls_vers()
688 const unsigned int flags = tls_conf->flags; in tls_mbedtls_set_allowed_tls_vers() local
692 int min = (flags & TLS_CONN_DISABLE_TLSv1_0) ? in tls_mbedtls_set_allowed_tls_vers()
693 (flags & TLS_CONN_DISABLE_TLSv1_1) ? in tls_mbedtls_set_allowed_tls_vers()
694 … (flags & TLS_CONN_DISABLE_TLSv1_2) ? (flags & TLS_CONN_DISABLE_TLSv1_3) ? 4 : 3 : 2 : in tls_mbedtls_set_allowed_tls_vers()
[all …]
Dtls_gnutls.c64 unsigned int flags; member
364 if (params->flags & TLS_CONN_REQUIRE_OCSP_ALL) { in tls_connection_set_params()
370 if (params->flags & TLS_CONN_EXT_CERT_CHECK) { in tls_connection_set_params()
409 conn->flags = params->flags; in tls_connection_set_params()
411 if (params->flags & (TLS_CONN_DISABLE_TLSv1_0 | in tls_connection_set_params()
416 params->flags & TLS_CONN_DISABLE_TLSv1_0 ? in tls_connection_set_params()
418 params->flags & TLS_CONN_DISABLE_TLSv1_1 ? in tls_connection_set_params()
420 params->flags & TLS_CONN_DISABLE_TLSv1_2 ? in tls_connection_set_params()
431 } else if ((params->flags & TLS_CONN_SUITEB) && in tls_connection_set_params()
449 } else if (params->flags & TLS_CONN_SUITEB) { in tls_connection_set_params()
[all …]
Dtls_openssl.c270 unsigned int flags; member
332 int flags; in tls_crl_cert_reload() local
350 flags = check_crl ? X509_V_FLAG_CRL_CHECK : 0; in tls_crl_cert_reload()
352 flags |= X509_V_FLAG_CRL_CHECK_ALL; in tls_crl_cert_reload()
354 X509_STORE_set_flags(store, flags); in tls_crl_cert_reload()
620 rsa_meth->flags = RSA_METHOD_FLAG_NO_CHECK; in tls_cryptoapi_cert()
1538 if (!(conn->flags & TLS_CONN_SUITEB)) in check_server_key_exchange()
2383 if (conn->cert_probe || (conn->flags & TLS_CONN_EXT_CERT_CHECK) || in openssl_tls_cert_event()
2539 if (!preverify_ok && (conn->flags & TLS_CONN_DISABLE_TIME_CHECKS) && in tls_verify_cb()
2684 if (conn->flags & TLS_CONN_SUITEB) { in tls_verify_cb()
[all …]
/hostap-latest/wpa_supplicant/
Dop_classes.c22 unsigned int *flags) in allow_channel() argument
39 if (flags) in allow_channel()
40 *flags = mode->channels[i].flag; in allow_channel()
98 unsigned int flags; in verify_80mhz() local
101 if (allow_channel(mode, op_class, adj_chan, &flags) == in verify_80mhz()
105 if (!(flags & HOSTAPD_CHAN_VHT_80MHZ_SUBCHANNEL)) in verify_80mhz()
108 if (flags & HOSTAPD_CHAN_NO_IR) in verify_80mhz()
167 unsigned int flags; in verify_160mhz() local
170 if (allow_channel(mode, op_class, adj_chan, &flags) == in verify_160mhz()
174 if (!(flags & HOSTAPD_CHAN_VHT_80MHZ_SUBCHANNEL) || in verify_160mhz()
[all …]
/hostap-latest/tests/hwsim/
Dtest_rsn_override.py35 flags = bss['flags']
36 if "PSK" in flags:
37 raise Exception("Unexpected BSS flags: " + flags)
38 if "-SAE+SAE-EXT-KEY-" not in flags:
39 raise Exception("Unexpected BSS flags: " + flags)
40 if "-GCMP-256+CCMP" not in flags:
41 raise Exception("Unexpected BSS flags: " + flags)
73 flags = bss['flags']
74 if "PSK" in flags:
75 raise Exception("Unexpected BSS flags: " + flags)
[all …]
Dnetlink.py109 def __init__(self, msg_type, flags=0, seq=-1, payload=None): argument
111 self.flags = flags
130 self.flags, self.seq, self.pid)
135 self.type, self.pid, self.seq, self.flags, repr(self.payload))
165 msglen, msg_type, flags, seq, pid = struct.unpack("IHHII",
167 msg = Message(msg_type, flags, seq, contents[16:])
222 def __init__(self, family, cmd, attrs=[], flags=0): argument
223 Message.__init__(self, family, flags=flags, payload=[GenlHdr(cmd)] + attrs)
230 m = GenlMessage(GENL_ID_CTRL, CTRL_CMD_GETFAMILY, flags=NLM_F_REQUEST, attrs=[a])
/hostap-latest/wpa_supplicant/dbus/
Ddbus_common.c102 unsigned int flags; in add_watch() local
108 flags = dbus_watch_get_flags(watch); in add_watch()
115 if ((flags & DBUS_WATCH_READABLE) && in add_watch()
119 if ((flags & DBUS_WATCH_WRITABLE) && in add_watch()
132 unsigned int flags; in remove_watch() local
135 flags = dbus_watch_get_flags(watch); in remove_watch()
140 if (flags & DBUS_WATCH_READABLE) in remove_watch()
142 if (flags & DBUS_WATCH_WRITABLE) in remove_watch()
/hostap-latest/src/p2p/
Dp2p.c238 peer->flags &= ~P2P_DEV_PEER_WAITING_RESPONSE; in p2p_go_neg_failed()
367 dev->flags &= ~P2P_DEV_REPORTED; in p2p_device_clear_reported()
502 if (dev->flags & (P2P_DEV_GROUP_CLIENT_ONLY | in p2p_add_group_clients()
521 if (dev->flags & P2P_DEV_PROBE_REQ_ONLY) { in p2p_add_group_clients()
522 dev->flags &= ~P2P_DEV_PROBE_REQ_ONLY; in p2p_add_group_clients()
528 dev->flags |= P2P_DEV_GROUP_CLIENT_ONLY; in p2p_add_group_clients()
534 dev->flags |= P2P_DEV_REPORTED | P2P_DEV_REPORTED_ONCE; in p2p_add_group_clients()
543 dev->flags |= P2P_DEV_LAST_SEEN_AS_GROUP_CLIENT; in p2p_add_group_clients()
782 (!(dev->flags & P2P_DEV_LAST_SEEN_AS_GROUP_CLIENT) || in p2p_add_device()
791 dev->flags); in p2p_add_device()
[all …]
Dp2p_go_neg.c164 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) { in p2p_build_go_neg_req()
166 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_RECONN) in p2p_build_go_neg_req()
235 if (dev->flags & P2P_DEV_PD_BEFORE_GO_NEG) { in p2p_connect_send()
271 dev->flags |= P2P_DEV_WAIT_GO_NEG_RESPONSE; in p2p_connect_send()
321 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) { in p2p_build_go_neg_resp()
323 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_RECONN) in p2p_build_go_neg_resp()
574 if (dev->flags & P2P_DEV_FORCE_FREQ) { in p2p_go_select_channel()
583 } else if (!(dev->flags & P2P_DEV_FORCE_FREQ) && in p2p_go_select_channel()
710 (dev->flags & P2P_DEV_FORCE_FREQ) || p2p->cfg->cfg_op_channel) in p2p_check_pref_chan()
898 else if ((dev->flags & P2P_DEV_PROBE_REQ_ONLY) || in p2p_process_go_neg_req()
[all …]
/hostap-latest/tests/remote/
Dconfig.py69 def get_device(devices, name=None, flags=None, lock=False): argument
70 if name is None and flags is None:
80 if device_flags.find(flags) != -1:

1234567