/hostap-latest/src/drivers/ |
D | driver_nl80211_capa.c | 117 info->capa->flags |= WPA_DRIVER_FLAGS_AP; in wiphy_info_supported_iftypes() 120 info->capa->flags |= WPA_DRIVER_FLAGS_MESH; in wiphy_info_supported_iftypes() 123 info->capa->flags |= WPA_DRIVER_FLAGS_IBSS; in wiphy_info_supported_iftypes() 126 info->capa->flags |= in wiphy_info_supported_iftypes() 169 info->capa->flags |= WPA_DRIVER_FLAGS_RADAR; in wiphy_info_iface_comb_process() 511 capa->flags |= WPA_DRIVER_FLAGS_TDLS_SUPPORT; in wiphy_info_tdls() 515 capa->flags |= WPA_DRIVER_FLAGS_TDLS_EXTERNAL_SETUP; in wiphy_info_tdls() 547 capa->flags |= WPA_DRIVER_FLAGS_VHT_IBSS; in wiphy_info_ext_feature_flags() 553 capa->flags |= WPA_DRIVER_FLAGS_SUPPORT_FILS; in wiphy_info_ext_feature_flags() 557 capa->flags |= WPA_DRIVER_FLAGS_BEACON_RATE_LEGACY; in wiphy_info_ext_feature_flags() [all …]
|
D | driver_wired_common.c | 33 static int driver_wired_get_ifflags(const char *ifname, int *flags) in driver_wired_get_ifflags() argument 53 *flags = ifr.ifr_flags & 0xffff; in driver_wired_get_ifflags() 58 static int driver_wired_set_ifflags(const char *ifname, int flags) in driver_wired_set_ifflags() argument 71 ifr.ifr_flags = flags & 0xffff; in driver_wired_set_ifflags() 185 capa->flags = WPA_DRIVER_FLAGS_WIRED; in driver_wired_get_capa() 222 int flags; in driver_wired_init_common() local 235 if (driver_wired_get_ifflags(ifname, &flags) == 0 && in driver_wired_init_common() 236 !(flags & IFF_UP) && in driver_wired_init_common() 237 driver_wired_set_ifflags(ifname, flags | IFF_UP) == 0) in driver_wired_init_common() 252 } else if (driver_wired_get_ifflags(ifname, &flags) < 0) { in driver_wired_init_common() [all …]
|
/hostap-latest/src/eap_peer/ |
D | eap_tls_common.c | 64 params->flags |= TLS_CONN_ALLOW_SIGN_RSA_MD5; in eap_tls_params_flags() 66 params->flags |= TLS_CONN_DISABLE_TIME_CHECKS; in eap_tls_params_flags() 68 params->flags |= TLS_CONN_DISABLE_SESSION_TICKET; in eap_tls_params_flags() 70 params->flags &= ~TLS_CONN_DISABLE_SESSION_TICKET; in eap_tls_params_flags() 72 params->flags |= TLS_CONN_DISABLE_TLSv1_0; in eap_tls_params_flags() 74 params->flags &= ~TLS_CONN_DISABLE_TLSv1_0; in eap_tls_params_flags() 75 params->flags |= TLS_CONN_ENABLE_TLSv1_0; in eap_tls_params_flags() 78 params->flags |= TLS_CONN_DISABLE_TLSv1_1; in eap_tls_params_flags() 80 params->flags &= ~TLS_CONN_DISABLE_TLSv1_1; in eap_tls_params_flags() 81 params->flags |= TLS_CONN_ENABLE_TLSv1_1; in eap_tls_params_flags() [all …]
|
D | eap_tnc.c | 92 u8 flags; in eap_tnc_build_msg() local 99 flags = EAP_TNC_VERSION; in eap_tnc_build_msg() 103 flags |= EAP_TNC_FLAGS_MORE_FRAGMENTS; in eap_tnc_build_msg() 105 flags |= EAP_TNC_FLAGS_LENGTH_INCLUDED; in eap_tnc_build_msg() 111 if (flags & EAP_TNC_FLAGS_LENGTH_INCLUDED) in eap_tnc_build_msg() 118 wpabuf_put_u8(resp, flags); /* Flags */ in eap_tnc_build_msg() 119 if (flags & EAP_TNC_FLAGS_LENGTH_INCLUDED) in eap_tnc_build_msg() 169 u8 id, u8 flags, in eap_tnc_process_fragment() argument 174 if (data->in_buf == NULL && !(flags & EAP_TNC_FLAGS_LENGTH_INCLUDED)) { in eap_tnc_process_fragment() 214 u8 flags, id; in eap_tnc_process() local [all …]
|
D | eap_ikev2.c | 138 u8 flags; in eap_ikev2_build_msg() local 145 flags = 0; in eap_ikev2_build_msg() 149 flags |= IKEV2_FLAGS_MORE_FRAGMENTS; in eap_ikev2_build_msg() 151 flags |= IKEV2_FLAGS_LENGTH_INCLUDED; in eap_ikev2_build_msg() 157 if (flags & IKEV2_FLAGS_LENGTH_INCLUDED) in eap_ikev2_build_msg() 163 flags |= IKEV2_FLAGS_ICV_INCLUDED; in eap_ikev2_build_msg() 179 wpabuf_put_u8(resp, flags); /* Flags */ in eap_ikev2_build_msg() 180 if (flags & IKEV2_FLAGS_LENGTH_INCLUDED) in eap_ikev2_build_msg() 187 if (flags & IKEV2_FLAGS_ICV_INCLUDED) { in eap_ikev2_build_msg() 246 u8 flags, const u8 *pos, const u8 **end, in eap_ikev2_process_icv() argument [all …]
|
D | eap_wsc.c | 314 u8 flags; in eap_wsc_build_msg() local 321 flags = 0; in eap_wsc_build_msg() 325 flags |= WSC_FLAGS_MF; in eap_wsc_build_msg() 327 flags |= WSC_FLAGS_LF; in eap_wsc_build_msg() 332 if (flags & WSC_FLAGS_LF) in eap_wsc_build_msg() 340 wpabuf_put_u8(resp, flags); /* Flags */ in eap_wsc_build_msg() 341 if (flags & WSC_FLAGS_LF) in eap_wsc_build_msg() 405 u8 id, u8 flags, u8 op_code, in eap_wsc_process_fragment() argument 410 if (data->in_buf == NULL && !(flags & WSC_FLAGS_LF)) { in eap_wsc_process_fragment() 445 u8 op_code, flags, id; in eap_wsc_process() local [all …]
|
D | eap_teap.c | 647 u8 flags, subtype; in eap_teap_validate_crypto_binding() local 650 flags = cb->subtype >> 4; in eap_teap_validate_crypto_binding() 654 cb->version, cb->received_version, flags, subtype); in eap_teap_validate_crypto_binding() 665 flags < 1 || flags > 3) { in eap_teap_validate_crypto_binding() 668 cb->version, cb->received_version, flags, subtype); in eap_teap_validate_crypto_binding() 688 u8 subtype, flags; in eap_teap_write_crypto_binding() local 698 flags = cmk_emsk ? TEAP_CRYPTO_BINDING_EMSK_AND_MSK_CMAC : in eap_teap_write_crypto_binding() 701 rbind->subtype = (flags << 4) | subtype; in eap_teap_write_crypto_binding() 719 rbind->version, rbind->received_version, flags, subtype); in eap_teap_write_crypto_binding() 831 u8 flags; in eap_teap_process_crypto_binding() local [all …]
|
/hostap-latest/src/eap_server/ |
D | eap_server_tls_common.c | 50 unsigned int flags = sm->cfg->tls_flags; in eap_server_tls_ssl_init() local 75 flags |= TLS_CONN_DISABLE_SESSION_TICKET; in eap_server_tls_ssl_init() 79 flags, session_ctx, in eap_server_tls_ssl_init() 204 u8 flags; in eap_server_tls_build_msg() local 213 flags = version; in eap_server_tls_build_msg() 217 flags |= EAP_TLS_FLAGS_MORE_FRAGMENTS; in eap_server_tls_build_msg() 219 flags |= EAP_TLS_FLAGS_LENGTH_INCLUDED; in eap_server_tls_build_msg() 225 if (flags & EAP_TLS_FLAGS_LENGTH_INCLUDED) in eap_server_tls_build_msg() 232 wpabuf_put_u8(req, flags); /* Flags */ in eap_server_tls_build_msg() 233 if (flags & EAP_TLS_FLAGS_LENGTH_INCLUDED) in eap_server_tls_build_msg() [all …]
|
D | eap_server_ikev2.c | 136 u8 flags; in eap_ikev2_build_msg() local 141 flags = 0; in eap_ikev2_build_msg() 145 flags |= IKEV2_FLAGS_MORE_FRAGMENTS; in eap_ikev2_build_msg() 147 flags |= IKEV2_FLAGS_LENGTH_INCLUDED; in eap_ikev2_build_msg() 153 if (flags & IKEV2_FLAGS_LENGTH_INCLUDED) in eap_ikev2_build_msg() 159 flags |= IKEV2_FLAGS_ICV_INCLUDED; in eap_ikev2_build_msg() 175 wpabuf_put_u8(req, flags); /* Flags */ in eap_ikev2_build_msg() 176 if (flags & IKEV2_FLAGS_LENGTH_INCLUDED) in eap_ikev2_build_msg() 183 if (flags & IKEV2_FLAGS_ICV_INCLUDED) { in eap_ikev2_build_msg() 258 u8 flags, const u8 *pos, const u8 **end, in eap_ikev2_process_icv() argument [all …]
|
D | eap_server_tnc.c | 221 u8 flags; in eap_tnc_build_msg() local 226 flags = EAP_TNC_VERSION; in eap_tnc_build_msg() 230 flags |= EAP_TNC_FLAGS_MORE_FRAGMENTS; in eap_tnc_build_msg() 232 flags |= EAP_TNC_FLAGS_LENGTH_INCLUDED; in eap_tnc_build_msg() 238 if (flags & EAP_TNC_FLAGS_LENGTH_INCLUDED) in eap_tnc_build_msg() 245 wpabuf_put_u8(req, flags); /* Flags */ in eap_tnc_build_msg() 246 if (flags & EAP_TNC_FLAGS_LENGTH_INCLUDED) in eap_tnc_build_msg() 417 u8 flags, u32 message_length, in eap_tnc_process_fragment() argument 421 if (data->in_buf == NULL && !(flags & EAP_TNC_FLAGS_LENGTH_INCLUDED)) { in eap_tnc_process_fragment() 452 u8 flags; in eap_tnc_process() local [all …]
|
D | eap_server_wsc.c | 191 u8 flags; in eap_wsc_build_msg() local 194 flags = 0; in eap_wsc_build_msg() 198 flags |= WSC_FLAGS_MF; in eap_wsc_build_msg() 200 flags |= WSC_FLAGS_LF; in eap_wsc_build_msg() 205 if (flags & WSC_FLAGS_LF) in eap_wsc_build_msg() 216 wpabuf_put_u8(req, flags); /* Flags */ in eap_wsc_build_msg() 217 if (flags & WSC_FLAGS_LF) in eap_wsc_build_msg() 320 u8 flags, u8 op_code, u16 message_length, in eap_wsc_process_fragment() argument 324 if (data->in_buf == NULL && !(flags & WSC_FLAGS_LF)) { in eap_wsc_process_fragment() 356 u8 op_code, flags; in eap_wsc_process() local [all …]
|
/hostap-latest/src/ap/ |
D | sta_info.c | 239 if ((sta->flags & WLAN_STA_WDS) || in ap_free_sta() 240 (sta->flags & WLAN_STA_MULTI_AP && in ap_free_sta() 243 !(sta->flags & WLAN_STA_WPS))) in ap_free_sta() 251 !(sta->flags & WLAN_STA_PREAUTH)) { in ap_free_sta() 381 !(sta->flags & WLAN_STA_PREAUTH)) { in ap_free_sta() 493 if (sta->flags & WLAN_STA_AUTH) { in hostapd_free_stas() 543 hapd->conf->iface, __func__, MAC2STR(sta->addr), sta->flags, in ap_handle_timer() 556 if ((sta->flags & WLAN_STA_ASSOC) && in ap_handle_timer() 605 if ((sta->flags & WLAN_STA_ASSOC) && in ap_handle_timer() 607 !(sta->flags & WLAN_STA_PENDING_POLL) && in ap_handle_timer() [all …]
|
D | ieee802_11_vht.c | 188 if (!vht_capab || !(sta->flags & WLAN_STA_WMM) || in copy_sta_vht_capab() 191 sta->flags &= ~WLAN_STA_VHT; in copy_sta_vht_capab() 204 sta->flags |= WLAN_STA_VHT; in copy_sta_vht_capab() 262 sta->flags |= WLAN_STA_VHT | WLAN_STA_VENDOR_VHT; in copy_sta_vendor_vht() 268 sta->flags &= ~WLAN_STA_VENDOR_VHT; in copy_sta_vendor_vht() 301 sta->flags &= ~WLAN_STA_VHT_OPMODE_ENABLED; in set_sta_vht_opmode() 305 sta->flags |= WLAN_STA_VHT_OPMODE_ENABLED; in set_sta_vht_opmode()
|
D | ieee802_11.c | 155 if (hapd->iface->current_rates[i].flags & HOSTAPD_RATE_BASIC) in hostapd_eid_supp_rates() 223 if (hapd->iface->current_rates[i].flags & HOSTAPD_RATE_BASIC) in hostapd_eid_ext_supp_rates() 395 sta->flags |= WLAN_STA_AUTH; in auth_shared_key() 532 sta->flags |= WLAN_STA_AUTH; in handle_auth_ft_finish() 965 sta->flags |= WLAN_STA_AUTH; in sae_accept_sta() 2022 sta->flags |= WLAN_STA_PENDING_FILS_ERP; in handle_auth_fils() 2286 sta->flags |= WLAN_STA_AUTH; in handle_auth_fils_finish() 2300 u32 flags = sta->flags; in ieee802_11_finish_fils_auth() local 2302 sta->flags &= ~(WLAN_STA_PENDING_FILS_ERP | in ieee802_11_finish_fils_auth() 2307 if (flags & WLAN_STA_PENDING_FILS_ERP) { in ieee802_11_finish_fils_auth() [all …]
|
/hostap-latest/src/eap_common/ |
D | eap_psk_common.h | 25 #define EAP_PSK_FLAGS_GET_T(flags) (((flags) & 0xc0) >> 6) argument 34 u8 flags; member 41 u8 flags; member 50 u8 flags; member 58 u8 flags; member
|
/hostap-latest/src/crypto/ |
D | tls_mbedtls_alt.c | 161 unsigned int flags; member 647 static int tls_mbedtls_verify_cb(void *arg, mbedtls_x509_crt *crt, int depth, uint32_t *flags); 678 tls_conf->flags |= TLS_CONN_DISABLE_TLSv1_3; in tls_mbedtls_set_allowed_tls_vers() 682 if (tls_conf->flags & TLS_CONN_SUITEB) in tls_mbedtls_set_allowed_tls_vers() 684 tls_conf->flags |= TLS_CONN_DISABLE_TLSv1_0; in tls_mbedtls_set_allowed_tls_vers() 685 tls_conf->flags |= TLS_CONN_DISABLE_TLSv1_1; in tls_mbedtls_set_allowed_tls_vers() 688 const unsigned int flags = tls_conf->flags; in tls_mbedtls_set_allowed_tls_vers() local 692 int min = (flags & TLS_CONN_DISABLE_TLSv1_0) ? in tls_mbedtls_set_allowed_tls_vers() 693 (flags & TLS_CONN_DISABLE_TLSv1_1) ? in tls_mbedtls_set_allowed_tls_vers() 694 … (flags & TLS_CONN_DISABLE_TLSv1_2) ? (flags & TLS_CONN_DISABLE_TLSv1_3) ? 4 : 3 : 2 : in tls_mbedtls_set_allowed_tls_vers() [all …]
|
D | tls_gnutls.c | 64 unsigned int flags; member 364 if (params->flags & TLS_CONN_REQUIRE_OCSP_ALL) { in tls_connection_set_params() 370 if (params->flags & TLS_CONN_EXT_CERT_CHECK) { in tls_connection_set_params() 409 conn->flags = params->flags; in tls_connection_set_params() 411 if (params->flags & (TLS_CONN_DISABLE_TLSv1_0 | in tls_connection_set_params() 416 params->flags & TLS_CONN_DISABLE_TLSv1_0 ? in tls_connection_set_params() 418 params->flags & TLS_CONN_DISABLE_TLSv1_1 ? in tls_connection_set_params() 420 params->flags & TLS_CONN_DISABLE_TLSv1_2 ? in tls_connection_set_params() 431 } else if ((params->flags & TLS_CONN_SUITEB) && in tls_connection_set_params() 449 } else if (params->flags & TLS_CONN_SUITEB) { in tls_connection_set_params() [all …]
|
D | tls_openssl.c | 270 unsigned int flags; member 332 int flags; in tls_crl_cert_reload() local 350 flags = check_crl ? X509_V_FLAG_CRL_CHECK : 0; in tls_crl_cert_reload() 352 flags |= X509_V_FLAG_CRL_CHECK_ALL; in tls_crl_cert_reload() 354 X509_STORE_set_flags(store, flags); in tls_crl_cert_reload() 620 rsa_meth->flags = RSA_METHOD_FLAG_NO_CHECK; in tls_cryptoapi_cert() 1538 if (!(conn->flags & TLS_CONN_SUITEB)) in check_server_key_exchange() 2383 if (conn->cert_probe || (conn->flags & TLS_CONN_EXT_CERT_CHECK) || in openssl_tls_cert_event() 2539 if (!preverify_ok && (conn->flags & TLS_CONN_DISABLE_TIME_CHECKS) && in tls_verify_cb() 2684 if (conn->flags & TLS_CONN_SUITEB) { in tls_verify_cb() [all …]
|
/hostap-latest/wpa_supplicant/ |
D | op_classes.c | 22 unsigned int *flags) in allow_channel() argument 39 if (flags) in allow_channel() 40 *flags = mode->channels[i].flag; in allow_channel() 98 unsigned int flags; in verify_80mhz() local 101 if (allow_channel(mode, op_class, adj_chan, &flags) == in verify_80mhz() 105 if (!(flags & HOSTAPD_CHAN_VHT_80MHZ_SUBCHANNEL)) in verify_80mhz() 108 if (flags & HOSTAPD_CHAN_NO_IR) in verify_80mhz() 167 unsigned int flags; in verify_160mhz() local 170 if (allow_channel(mode, op_class, adj_chan, &flags) == in verify_160mhz() 174 if (!(flags & HOSTAPD_CHAN_VHT_80MHZ_SUBCHANNEL) || in verify_160mhz() [all …]
|
/hostap-latest/tests/hwsim/ |
D | test_rsn_override.py | 35 flags = bss['flags'] 36 if "PSK" in flags: 37 raise Exception("Unexpected BSS flags: " + flags) 38 if "-SAE+SAE-EXT-KEY-" not in flags: 39 raise Exception("Unexpected BSS flags: " + flags) 40 if "-GCMP-256+CCMP" not in flags: 41 raise Exception("Unexpected BSS flags: " + flags) 73 flags = bss['flags'] 74 if "PSK" in flags: 75 raise Exception("Unexpected BSS flags: " + flags) [all …]
|
D | netlink.py | 109 def __init__(self, msg_type, flags=0, seq=-1, payload=None): argument 111 self.flags = flags 130 self.flags, self.seq, self.pid) 135 self.type, self.pid, self.seq, self.flags, repr(self.payload)) 165 msglen, msg_type, flags, seq, pid = struct.unpack("IHHII", 167 msg = Message(msg_type, flags, seq, contents[16:]) 222 def __init__(self, family, cmd, attrs=[], flags=0): argument 223 Message.__init__(self, family, flags=flags, payload=[GenlHdr(cmd)] + attrs) 230 m = GenlMessage(GENL_ID_CTRL, CTRL_CMD_GETFAMILY, flags=NLM_F_REQUEST, attrs=[a])
|
/hostap-latest/wpa_supplicant/dbus/ |
D | dbus_common.c | 102 unsigned int flags; in add_watch() local 108 flags = dbus_watch_get_flags(watch); in add_watch() 115 if ((flags & DBUS_WATCH_READABLE) && in add_watch() 119 if ((flags & DBUS_WATCH_WRITABLE) && in add_watch() 132 unsigned int flags; in remove_watch() local 135 flags = dbus_watch_get_flags(watch); in remove_watch() 140 if (flags & DBUS_WATCH_READABLE) in remove_watch() 142 if (flags & DBUS_WATCH_WRITABLE) in remove_watch()
|
/hostap-latest/src/p2p/ |
D | p2p.c | 238 peer->flags &= ~P2P_DEV_PEER_WAITING_RESPONSE; in p2p_go_neg_failed() 367 dev->flags &= ~P2P_DEV_REPORTED; in p2p_device_clear_reported() 502 if (dev->flags & (P2P_DEV_GROUP_CLIENT_ONLY | in p2p_add_group_clients() 521 if (dev->flags & P2P_DEV_PROBE_REQ_ONLY) { in p2p_add_group_clients() 522 dev->flags &= ~P2P_DEV_PROBE_REQ_ONLY; in p2p_add_group_clients() 528 dev->flags |= P2P_DEV_GROUP_CLIENT_ONLY; in p2p_add_group_clients() 534 dev->flags |= P2P_DEV_REPORTED | P2P_DEV_REPORTED_ONCE; in p2p_add_group_clients() 543 dev->flags |= P2P_DEV_LAST_SEEN_AS_GROUP_CLIENT; in p2p_add_group_clients() 782 (!(dev->flags & P2P_DEV_LAST_SEEN_AS_GROUP_CLIENT) || in p2p_add_device() 791 dev->flags); in p2p_add_device() [all …]
|
D | p2p_go_neg.c | 164 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) { in p2p_build_go_neg_req() 166 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_RECONN) in p2p_build_go_neg_req() 235 if (dev->flags & P2P_DEV_PD_BEFORE_GO_NEG) { in p2p_connect_send() 271 dev->flags |= P2P_DEV_WAIT_GO_NEG_RESPONSE; in p2p_connect_send() 321 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) { in p2p_build_go_neg_resp() 323 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_RECONN) in p2p_build_go_neg_resp() 574 if (dev->flags & P2P_DEV_FORCE_FREQ) { in p2p_go_select_channel() 583 } else if (!(dev->flags & P2P_DEV_FORCE_FREQ) && in p2p_go_select_channel() 710 (dev->flags & P2P_DEV_FORCE_FREQ) || p2p->cfg->cfg_op_channel) in p2p_check_pref_chan() 898 else if ((dev->flags & P2P_DEV_PROBE_REQ_ONLY) || in p2p_process_go_neg_req() [all …]
|
/hostap-latest/tests/remote/ |
D | config.py | 69 def get_device(devices, name=None, flags=None, lock=False): argument 70 if name is None and flags is None: 80 if device_flags.find(flags) != -1:
|