/hostap-latest/wlantest/ |
D | test_vectors.c | 27 u8 frame[] = { in test_vector_tkip() local 54 wpa_hexdump(MSG_INFO, "Plaintext MPDU", frame, sizeof(frame)); in test_vector_tkip() 56 enc = tkip_encrypt(tk, frame, sizeof(frame), 24, NULL, pn, 0, &enc_len); in test_vector_tkip() 75 if (plain_len != sizeof(frame) - 24 || in test_vector_tkip() 76 os_memcmp(plain, frame + 24, plain_len) != 0) { in test_vector_tkip() 90 u8 frame[] = { in test_vector_ccmp() local 107 wpa_hexdump(MSG_INFO, "802.11 Header", frame, 24); in test_vector_ccmp() 108 wpa_hexdump(MSG_INFO, "Plaintext Data", frame + 24, sizeof(frame) - 24); in test_vector_ccmp() 110 enc = ccmp_encrypt(tk, frame, sizeof(frame), 24, NULL, NULL, NULL, NULL, in test_vector_ccmp() 133 if (plain_len != sizeof(frame) - 24 || in test_vector_ccmp() [all …]
|
D | inject.c | 58 static int is_robust_mgmt(u8 *frame, size_t len) in is_robust_mgmt() argument 64 mgmt = (struct ieee80211_mgmt *) frame; in is_robust_mgmt() 83 u8 *frame, size_t len, int incorrect_key) in wlantest_inject_bip() argument 98 frame, len, bss->ipn[bss->igtk_idx], in wlantest_inject_bip() 113 u8 *frame, size_t len, int incorrect_key) in wlantest_inject_prot_bc() argument 124 hdr = (struct ieee80211_hdr *) frame; in wlantest_inject_prot_bc() 141 frame, len, hdrlen, NULL, pn, in wlantest_inject_prot_bc() 146 frame, len, hdrlen, NULL, NULL, NULL, NULL, in wlantest_inject_prot_bc() 160 struct wlantest_sta *sta, u8 *frame, in wlantest_inject_prot() argument 176 hdr = (struct ieee80211_hdr *) frame; in wlantest_inject_prot() [all …]
|
D | process.c | 265 static int check_fcs(const u8 *frame, size_t frame_len, const u8 *fcs) in check_fcs() argument 267 if (WPA_GET_LE32(fcs) != ieee80211_crc32(frame, frame_len)) in check_fcs() 278 const u8 *frame, *fcspos; in wlantest_process() local 325 frame = data + iter._max_length; in wlantest_process() 330 fcspos = frame + frame_len; in wlantest_process() 331 if (check_fcs(frame, frame_len, fcspos) < 0) { in wlantest_process() 342 rx_frame(wt, frame, frame_len); in wlantest_process() 346 tx_status(wt, frame, frame_len, !failed); in wlantest_process() 348 rx_frame(wt, frame, frame_len); in wlantest_process() 356 const u8 *frame, *fcspos; in wlantest_process_prism() local [all …]
|
D | bip.c | 17 u8 * bip_protect(const u8 *igtk, size_t igtk_len, u8 *frame, size_t len, in bip_protect() argument 30 os_memcpy(prot, frame, len); in bip_protect() 47 hdr = (struct ieee80211_hdr *) frame; in bip_protect() 73 u8 * bip_protect_s1g_beacon(const u8 *igtk, size_t igtk_len, const u8 *frame, in bip_protect_s1g_beacon() argument 95 os_memcpy(prot, frame, len); in bip_protect_s1g_beacon() 124 hdr = (struct ieee80211_hdr_s1g_beacon *) frame; in bip_protect_s1g_beacon() 188 u8 * bip_gmac_protect(const u8 *igtk, size_t igtk_len, u8 *frame, size_t len, in bip_gmac_protect() argument 201 os_memcpy(prot, frame, len); in bip_gmac_protect() 218 hdr = (struct ieee80211_hdr *) frame; in bip_gmac_protect() 255 const u8 *frame, size_t len, const u8 *ipn, in bip_gmac_protect_s1g_beacon() argument [all …]
|
D | wlantest.h | 328 u8 * ccmp_encrypt(const u8 *tk, u8 *frame, size_t len, size_t hdrlen, 332 const u8 *frame, size_t len, 339 u8 * ccmp_256_encrypt(const u8 *tk, u8 *frame, size_t len, size_t hdrlen, 351 u8 * tkip_encrypt(const u8 *tk, u8 *frame, size_t len, size_t hdrlen, u8 *qos, 358 u8 * bip_protect(const u8 *igtk, size_t igtk_len, u8 *frame, size_t len, 360 u8 * bip_protect_s1g_beacon(const u8 *igtk, size_t igtk_len, const u8 *frame, 363 u8 * bip_gmac_protect(const u8 *igtk, size_t igtk_len, u8 *frame, size_t len, 366 const u8 *frame, size_t len, const u8 *ipn, 372 u8 * gcmp_encrypt(const u8 *tk, size_t tk_len, const u8 *frame, size_t len, 380 struct wlantest_sta *sta, u8 *frame, size_t len,
|
D | ccmp.c | 207 u8 * ccmp_encrypt(const u8 *tk, u8 *frame, size_t len, size_t hdrlen, in ccmp_encrypt() argument 224 os_memcpy(crypt, frame, hdrlen); in ccmp_encrypt() 242 if (aes_ccm_ae(tk, 16, nonce, 8, frame + hdrlen, plen, aad, aad_len, in ccmp_encrypt() 257 const u8 *frame, size_t len, in ccmp_encrypt_pv1() argument 274 os_memcpy(crypt, frame, hdrlen); in ccmp_encrypt_pv1() 284 if (aes_ccm_ae(tk, 16, nonce, 8, frame + hdrlen, plen, aad, aad_len, in ccmp_encrypt_pv1() 340 u8 * ccmp_256_encrypt(const u8 *tk, u8 *frame, size_t len, size_t hdrlen, in ccmp_256_encrypt() argument 357 os_memcpy(crypt, frame, hdrlen); in ccmp_256_encrypt() 375 if (aes_ccm_ae(tk, 32, nonce, 16, frame + hdrlen, plen, aad, aad_len, in ccmp_256_encrypt()
|
D | gcmp.c | 126 u8 * gcmp_encrypt(const u8 *tk, size_t tk_len, const u8 *frame, size_t len, in gcmp_encrypt() argument 142 os_memcpy(crypt, frame, hdrlen); in gcmp_encrypt() 159 if (aes_gcm_ae(tk, tk_len, nonce, sizeof(nonce), frame + hdrlen, plen, in gcmp_encrypt()
|
D | tkip.c | 438 u8 * tkip_encrypt(const u8 *tk, u8 *frame, size_t len, size_t hdrlen, u8 *qos, in tkip_encrypt() argument 454 hdr = (struct ieee80211_hdr *) frame; in tkip_encrypt() 459 michael_mic(mic_key, michael_hdr, frame + hdrlen, len - hdrlen, mic); in tkip_encrypt() 472 os_memcpy(crypt, frame, hdrlen); in tkip_encrypt() 482 os_memcpy(pos, frame + hdrlen, len - hdrlen); in tkip_encrypt()
|
/hostap-latest/tests/hwsim/ |
D | test_wpas_mesh.py | 958 frame = pkt["_source"]["layers"]["frame_raw"][0] 960 cap = int(frame[(cap_offset * 2):(cap_offset * 2 + 2)], 16) 2060 frame = rx_msg['frame'] 2064 pos = frame.find(b'\x8c\x10') 2069 rx_msg['frame'] = frame[0:pos] 2129 frame = rx_msg['frame'] 2133 pos = frame.find(b'\x75\x14') 2139 rx_msg['frame'] = frame[0:pos + 6] + b'\x00\x00\x00\x00' + frame[pos + 10:] 2170 frame = rx_msg['frame'] 2174 pos = frame.find(b'\x75\x04') [all …]
|
D | example-hostapd.config | 97 #CFLAGS += -fsanitize=address -O1 -fno-omit-frame-pointer -g 98 #LIBS += -fsanitize=address -fno-omit-frame-pointer -g 99 #LIBS_h += -fsanitize=address -fno-omit-frame-pointer -g 100 #LIBS_n += -fsanitize=address -fno-omit-frame-pointer -g 101 #LIBS_c += -fsanitize=address -fno-omit-frame-pointer -g
|
D | test_cfg80211.py | 47 def nl80211_frame(dev, ifindex, frame, freq=None, duration=None, offchannel_tx_ok=False): argument 55 attrs += build_nl80211_attr('FRAME', frame) 75 …frame = binascii.unhexlify("d0000000020000000100" + addr.replace(':', '') + "020000000100000004095… 77 res = nl80211_frame(go, ifindex, frame, freq=2422, duration=500, 85 nl80211_frame(go, ifindex, frame, freq=2412)
|
D | example-wpa_supplicant.config | 145 #CFLAGS += -fsanitize=address -O1 -fno-omit-frame-pointer -g 146 #LIBS += -fsanitize=address -fno-omit-frame-pointer -g 147 #LIBS_c += -fsanitize=address -fno-omit-frame-pointer -g 148 #LIBS_p += -fsanitize=address -fno-omit-frame-pointer -g
|
D | test_ieee8021x.py | 149 for frame in tests: 150 res = dev[0].request("EAPOL_RX " + bssid + " " + frame) 153 dev[1].request("EAPOL_RX " + bssid + " " + frame) 267 frame = frame_start + zero_sign + frame_end 269 hmac_obj.update(binascii.unhexlify(frame)) 271 frame = frame_start + binascii.hexlify(sign).decode() + frame_end 272 dev.request("EAPOL_RX " + bssid + " " + frame)
|
D | test_sae.py | 1992 frame = binascii.unhexlify("b0003a01") 1993 frame += bssid + addr + bssid 1994 frame += binascii.unhexlify("1000") 1998 frame += struct.pack("<HHHH", auth_alg, transact, status, group) 2000 frame += token 2001 frame += scalar + element 2002 return frame 2007 frame = msg[length:] 2008 if len(frame) < 4: 2010 fc, duration = struct.unpack('<HH', frame[0:4]) [all …]
|
D | test_fils.py | 843 frame = binascii.unhexlify(vals[3].split('=')[1]) 844 proto, = struct.unpack('>H', frame[0:2]) 847 frame = frame[2:] 848 ip = frame[0:20] 851 frame = frame[20:] 852 udp = frame[0:8] 853 frame = frame[8:] 857 dhcp = frame[0:28] 858 frame = frame[28:] 860 chaddr = frame[0:16] [all …]
|
D | test_monitor_interface.py | 86 frame = binascii.unhexlify("48010000" + bssid + addr + bssid + "0000") 87 sock.send(radiotap + frame)
|
/hostap-latest/hostapd/ |
D | README-MULTI-AP | 51 (Re)Association Request frame ([3], section 5.2, paragraph 4). In addition, it 57 (Re)Association Request frame and verifies that it is included in the 58 (Re)Association Response frame. If it is not, association fails. If it is, 64 element in each (Re)Association Response frame, but only to stations that have 76 parses the Multi-AP information element in the Association Request frame. If the 100 2. STA sends Authentication frame (nothing Multi-AP specific). 101 3. AP sends Authentication frame (nothing Multi-AP specific). 102 4. STA sends Association Request frame with Multi-AP IE. 103 5. AP sends Association Response frame with Multi-AP IE. 133 Association Request frame and the M1 message. It then configures the new network [all …]
|
/hostap-latest/src/drivers/ |
D | driver_nl80211_event.c | 26 const u8 *frame, size_t len, 198 const u8 *frame, size_t len) in mlme_event_auth() argument 215 mgmt = (const struct ieee80211_mgmt *) frame; in mlme_event_auth() 260 const u8 *frame, size_t len, struct nlattr *wmm, in mlme_event_assoc() argument 280 mgmt = (const struct ieee80211_mgmt *) frame; in mlme_event_assoc() 308 event.assoc_info.resp_frame = frame; in mlme_event_assoc() 1337 const u8 *frame, size_t len, in mlme_event_mgmt() argument 1348 mgmt = (const struct ieee80211_mgmt *) frame; in mlme_event_mgmt() 1372 event.rx_mgmt.frame = frame; in mlme_event_mgmt() 1384 struct nlattr *cookie, const u8 *frame, in mlme_event_mgmt_tx_status() argument [all …]
|
D | driver_zephyr.c | 59 char *frame = os_zalloc(data->tx_status.data_len); in hostapd_event_wrapper() local 61 if (!frame) { in hostapd_event_wrapper() 68 os_memcpy(frame, data->tx_status.data, data->tx_status.data_len); in hostapd_event_wrapper() 69 data_tmp->tx_status.data = frame; in hostapd_event_wrapper() 70 hdr = (const struct ieee80211_hdr *) frame; in hostapd_event_wrapper() 76 if (data->rx_mgmt.frame) { in hostapd_event_wrapper() 77 char *frame = os_zalloc(data->rx_mgmt.frame_len); in hostapd_event_wrapper() local 79 if (!frame) { in hostapd_event_wrapper() 86 os_memcpy(frame, data->rx_mgmt.frame, data->rx_mgmt.frame_len); in hostapd_event_wrapper() 87 data_tmp->rx_mgmt.frame = frame; in hostapd_event_wrapper() [all …]
|
D | driver_zephyr.h | 186 const u8 *frame, size_t len, bool ack); 198 char *frame, int frame_len, int frequency, int rx_signal_dbm); 235 char *frame, int frame_len, int frequency, int rx_signal_dbm); 241 const u8 *frame, size_t len, bool ack);
|
/hostap-latest/src/utils/ |
D | crc32.c | 75 u32 ieee80211_crc32(const u8 *frame, size_t frame_len) in ieee80211_crc32() argument 82 crc = crc32_table[(crc ^ frame[i]) & 0xff] ^ (crc >> 8); in ieee80211_crc32()
|
D | browser.c | 221 WebKitWebFrame *frame, in view_cb_resource_request_starting() argument 238 WebKitWebView *view, WebKitWebFrame *frame, WebKitNetworkRequest *req, in view_cb_mime_type_policy_decision() argument 279 static void view_cb_title_changed(WebKitWebView *view, WebKitWebFrame *frame, in view_cb_title_changed() argument
|
/hostap-latest/src/pasn/ |
D | pasn_initiator.c | 881 struct wpabuf *frame; in wpas_pasn_send_auth_1() local 921 frame = wpas_pasn_build_auth_1(pasn, comeback, verify); in wpas_pasn_send_auth_1() 922 if (!frame) { in wpas_pasn_send_auth_1() 928 wpabuf_head(frame), wpabuf_len(frame), 0, in wpas_pasn_send_auth_1() 931 wpabuf_free(frame); in wpas_pasn_send_auth_1() 1067 struct wpabuf *wrapped_data = NULL, *secret = NULL, *frame = NULL; in wpa_pasn_auth_rx() local 1326 frame = wpas_pasn_build_auth_3(pasn); in wpa_pasn_auth_rx() 1327 if (!frame) { in wpa_pasn_auth_rx() 1333 wpabuf_head(frame), wpabuf_len(frame), 0, in wpa_pasn_auth_rx() 1335 wpabuf_free(frame); in wpa_pasn_auth_rx()
|
/hostap-latest/src/ap/ |
D | wpa_auth_ft.c | 3743 struct ft_rrb_frame *frame; in wpa_ft_action_rx() local 3796 frame = os_malloc(sizeof(*frame) + len); in wpa_ft_action_rx() 3797 if (frame == NULL) in wpa_ft_action_rx() 3799 frame->frame_type = RSN_REMOTE_FRAME_TYPE_FT_RRB; in wpa_ft_action_rx() 3800 frame->packet_type = FT_PACKET_REQUEST; in wpa_ft_action_rx() 3801 frame->action_length = host_to_le16(len); in wpa_ft_action_rx() 3802 os_memcpy(frame->ap_address, sm->wpa_auth->addr, ETH_ALEN); in wpa_ft_action_rx() 3803 os_memcpy(frame + 1, data, len); in wpa_ft_action_rx() 3805 wpa_ft_rrb_send(sm->wpa_auth, target_ap, (u8 *) frame, in wpa_ft_action_rx() 3806 sizeof(*frame) + len); in wpa_ft_action_rx() [all …]
|
/hostap-latest/tests/ |
D | cipher-and-key-mgmt-testing.txt | 158 checking whether the DUT actually replies to a frame that it was 352 Testing FT Reassociation Request frame retransmission on an AP device 368 In the sniffer capture, find the last Reassociation Request frame from 370 the only one that should not have Authentication frame exchange before 371 it). Look at the last used PN in a unicast Data frame from the AP to the 372 test station before the last Reassociation Request frame and the PN in 373 the following unicast Data frame after the last Reassociation Request 374 frame. If the PN goes down (e.g., is reset to 1), this would be a sign
|