Home
last modified time | relevance | path

Searched refs:groups (Results 1 – 25 of 35) sorted by relevance

12

/hostap-latest/tests/fuzzing/sae/
Dsae.c22 int groups[] = { 19, 0 }; in LLVMFuzzerTestOneInput() local
30 res = sae_parse_commit(&sae, data, size, &token, &token_len, groups, 0, in LLVMFuzzerTestOneInput()
34 res = sae_parse_commit(&sae, data, size, &token, &token_len, groups, 1, in LLVMFuzzerTestOneInput()
/hostap-latest/src/p2p/
Dp2p_group.c49 struct p2p_group *group, **groups; in p2p_group_init() local
55 groups = os_realloc_array(p2p->groups, p2p->num_groups + 1, in p2p_group_init()
57 if (groups == NULL) { in p2p_group_init()
61 groups[p2p->num_groups++] = group; in p2p_group_init()
62 p2p->groups = groups; in p2p_group_init()
109 if (p2p->groups[g] == group) { in p2p_group_deinit()
111 p2p->groups[g] = p2p->groups[g + 1]; in p2p_group_deinit()
1088 if (!group_callback(p2p->groups[i], user_data)) in p2p_loop_on_all_groups()
Dp2p_dev_disc.c190 if (p2p_group_go_discover(p2p->groups[g], msg.device_id, sa, in p2p_process_dev_disc_req()
Dp2p_invitation.c34 struct p2p_group *g = p2p->groups[i]; in p2p_build_invitation_req()
128 struct p2p_group *g = p2p->groups[i]; in p2p_build_invitation_resp()
Dp2p.c86 p2p->groups[i], dev->info.p2p_device_addr)) in p2p_expire_peers()
3063 os_free(p2p->groups); in p2p_deinit()
4563 da, p2p_group_get_interface_addr(p2p->groups[g]))) { in p2p_process_presence_req()
4564 group = p2p->groups[g]; in p2p_process_presence_req()
5106 group = p2p->groups[g]; in p2p_update_wfd_ie_groups()
5337 int freq = p2p_group_get_freq(p2p->groups[0]); in p2p_build_nfc_handover()
5362 p2p_buf_add_group_info(p2p->groups[0], buf, 5); in p2p_build_nfc_handover()
5363 p2p_group_buf_add_id(p2p->groups[0], buf); in p2p_build_nfc_handover()
/hostap-latest/src/pasn/
Dpasn_responder.c47 int groups[] = { pasn->group, 0 }; in pasn_wd_handle_sae_commit() local
97 groups, 0, NULL); in pasn_wd_handle_sae_commit()
609 const int *groups = pasn->pasn_groups; in handle_auth_pasn_1() local
616 if (!groups) in handle_auth_pasn_1()
617 groups = default_groups; in handle_auth_pasn_1()
689 for (i = 0; groups[i] > 0 && groups[i] != pasn_params.group; i++) in handle_auth_pasn_1()
692 if (!pasn_params.group || groups[i] != pasn_params.group) { in handle_auth_pasn_1()
Dpasn_initiator.c81 int groups[] = { pasn->group, 0 }; in wpas_pasn_wd_sae_rx() local
118 res = sae_parse_commit(&pasn->sae, data + 6, len - 6, NULL, 0, groups, in wpas_pasn_wd_sae_rx()
/hostap-latest/wpa_supplicant/
Dsme.c60 int *groups = wpa_s->conf->sae_groups; in sme_set_sae_group() local
63 if (!groups || groups[0] <= 0) in sme_set_sae_group()
64 groups = default_groups; in sme_set_sae_group()
67 if (!index_within_array(groups, wpa_s->sme.sae_group_index)) in sme_set_sae_group()
71 int group = groups[wpa_s->sme.sae_group_index]; in sme_set_sae_group()
1568 int *groups = wpa_s->conf->sae_groups; in sme_sae_is_group_enabled() local
1572 if (!groups) in sme_sae_is_group_enabled()
1573 groups = default_groups; in sme_sae_is_group_enabled()
1575 for (i = 0; groups[i] > 0; i++) { in sme_sae_is_group_enabled()
1576 if (groups[i] == group) in sme_sae_is_group_enabled()
[all …]
Dmesh_rsn.c316 int *groups = wpa_s->ifmsh->bss[0]->conf->sae_groups; in mesh_rsn_sae_group() local
319 if (!index_within_array(groups, wpa_s->mesh_rsn->sae_group_index)) in mesh_rsn_sae_group()
323 int group = groups[wpa_s->mesh_rsn->sae_group_index]; in mesh_rsn_sae_group()
DREADME-P2P83 will help in finding new groups or groups missed during the initial
202 P2P Device or Interface address have been used in multiple groups
300 This command can be used to remove the specified client from all groups
662 Disabled(default)/enables use of per-client PSK in the P2P groups. This
735 groups. If enabled, invitations to reinvoke a persistent group will be
784 persistent groups. The identifier in this list is used with
Dpasn_supplicant.c119 int groups[2] = { group, 0 }; in wpas_pasn_sae_derive_pt() local
129 return sae_derive_pt(groups, ssid->ssid, ssid->ssid_len, in wpas_pasn_sae_derive_pt()
DChangeLog50 * fix SAE H2E rejected groups validation to avoid downgrade attacks
85 * fixed OWE key derivation with groups 20 and 21; this breaks backwards
86 compatibility for these groups while the default group 19 remains
108 - disable use of groups using Brainpool curves
112 - disable use of groups using Brainpool curves
113 - allow the set of groups to be configured (eap_pwd_groups)
138 - changed default configuration to enable only groups 19, 20, 21
139 (i.e., disable groups 25 and 26) and disable all unsuitable groups
148 - reject use of unsuitable groups based on new implementation guidance
149 in REVmd (allow only FFC groups with prime >= 3072 bits and ECC
[all …]
Dwpa_supplicant.c2499 int *groups = conf->sae_groups; in wpa_s_setup_sae_pt() local
2503 if (!groups || groups[0] <= 0) in wpa_s_setup_sae_pt()
2504 groups = default_groups; in wpa_s_setup_sae_pt()
2522 ssid->pt = sae_derive_pt(groups, ssid->ssid, ssid->ssid_len, in wpa_s_setup_sae_pt()
2536 int i, *groups = wpa_s->extra_sae_rejected_groups; in wpa_s_clear_sae_rejected() local
2538 for (i = 0; groups[i]; i++) { in wpa_s_clear_sae_rejected()
2541 groups[i]); in wpa_s_clear_sae_rejected()
2543 groups[i]); in wpa_s_clear_sae_rejected()
/hostap-latest/tests/hwsim/
Dnetlink.py150 def __init__(self, nltype, groups=0, unexpected_msg_handler=None): argument
155 self.descriptor.bind((0, groups))
156 self.pid, self.groups = self.descriptor.getsockname()
Dstart.sh60 if groups | tr ' ' "\n" | grep -q ^admin$; then
62 elif groups | tr ' ' "\n" | grep -q ^wheel$; then
Dtest_sae.py183 groups = [str(g) for g in sae_groups]
187 params['sae_groups'] = ' '.join(groups)
190 for g in groups:
1824 def run_sae_password_id(dev, apdev, groups=None): argument
1828 if groups:
1829 params['sae_groups'] = groups
1831 groups = ""
1837 dev[0].request("SET sae_groups " + groups)
/hostap-latest/src/utils/
Dos_unix.c348 gid_t groups[] = { ANDROID_SETGROUPS_OVERRIDE }; in os_program_init() local
350 gid_t groups[] = { AID_INET, AID_WIFI, AID_KEYSTORE }; in os_program_init() local
355 setgroups(ARRAY_SIZE(groups), groups); in os_program_init()
/hostap-latest/src/common/
Dsae.c1103 struct sae_pt * sae_derive_pt(int *groups, const u8 *ssid, size_t ssid_len, in sae_derive_pt() argument
1111 if (!groups) in sae_derive_pt()
1112 groups = default_groups; in sae_derive_pt()
1113 for (i = 0; groups[i] > 0; i++) { in sae_derive_pt()
1114 tmp = sae_derive_pt_group(groups[i], ssid, ssid_len, password, in sae_derive_pt()
1399 struct wpabuf *groups; in sae_prepare_commit_pt() local
1402 groups = wpabuf_alloc(count * 2); in sae_prepare_commit_pt()
1403 if (!groups) in sae_prepare_commit_pt()
1406 wpabuf_put_le16(groups, rejected_groups[i]); in sae_prepare_commit_pt()
1407 sae->tmp->own_rejected_groups = groups; in sae_prepare_commit_pt()
Ddpp.c2754 struct json_token *root, *groups, *netkey, *token; in dpp_parse_connector() local
2766 groups = json_get_member(root, "groups"); in dpp_parse_connector()
2767 if (!groups || groups->type != JSON_ARRAY) { in dpp_parse_connector()
2771 for (token = groups->child; token; token = token->sibling) { in dpp_parse_connector()
4037 struct json_token *groups, *token; in dpp_connector_compatible_group() local
4039 groups = json_get_member(root, "groups"); in dpp_connector_compatible_group()
4040 if (!groups || groups->type != JSON_ARRAY) in dpp_connector_compatible_group()
4043 for (token = groups->child; token; token = token->sibling) { in dpp_connector_compatible_group()
4072 struct json_token *groups, *token; in dpp_connector_match_groups() local
4074 groups = json_get_member(peer_root, "groups"); in dpp_connector_match_groups()
[all …]
Dsae.h149 struct sae_pt * sae_derive_pt(int *groups, const u8 *ssid, size_t ssid_len,
/hostap-latest/src/ap/
Dieee802_11.c1176 int i, *groups = hapd->conf->sae_groups; in sae_pick_next_group() local
1184 if (!groups) in sae_pick_next_group()
1185 groups = default_groups; in sae_pick_next_group()
1186 for (i = 0; groups[i] > 0; i++) { in sae_pick_next_group()
1187 if (sae->group == groups[i]) in sae_pick_next_group()
1191 if (groups[i] <= 0) { in sae_pick_next_group()
1199 if (groups[i] <= 0) { in sae_pick_next_group()
1205 if (sae_set_group(sae, groups[i]) < 0) in sae_pick_next_group()
1210 wpa_printf(MSG_DEBUG, "SAE: Selected new group: %d", groups[i]); in sae_pick_next_group()
1250 int *groups = hapd->conf->sae_groups; in sae_is_group_enabled() local
[all …]
Dctrl_iface_ap.c318 struct wpabuf *groups = sta->sae->tmp->peer_rejected_groups; in hostapd_ctrl_iface_sta_mib() local
325 if (groups) { in hostapd_ctrl_iface_sta_mib()
326 pos = wpabuf_head(groups); in hostapd_ctrl_iface_sta_mib()
327 count = wpabuf_len(groups) / 2; in hostapd_ctrl_iface_sta_mib()
/hostap-latest/hostapd/
DChangeLog36 * fix SAE H2E rejected groups validation to avoid downgrade attacks
68 * fixed OWE key derivation with groups 20 and 21; this breaks backwards
69 compatibility for these groups while the default group 19 remains
85 - disable use of groups using Brainpool curves
89 - disable use of groups using Brainpool curves
111 (i.e., disable groups 20, 21, 25, 26 from default configuration) and
112 disable all unsuitable groups completely based on REVmd changes
118 - reject use of unsuitable groups based on new implementation guidance
119 in REVmd (allow only FFC groups with prime >= 3072 bits and ECC
120 groups with prime >= 256)
[all …]
/hostap-latest/doc/
Ddbus.doxygen1053 <p>Preference list of enabled groups for SAE</p>
1395 …<p>Starts WPS configuration. Note: When used with P2P groups, this needs to be issued on the GO gr…
1695 <p>Remove the client from all groups (operating and persistent) from the local GO.</p>
1870 …to have a P2PDevice property role since there can be multiple concurrent groups and the P2P Device…
1875 …ke much sense to have a P2PDevice property Group since there can be multiple concurrent groups.</p>
1880 …e much sense to have a P2PDevice property PeerGO since there can be multiple concurrent groups.</p>
2369 <p>The current groups in which this peer is connected.</p>
2391 Interface implemented by objects representing active P2P groups.
2469 Interface implemented by objects representing persistent P2P groups.
2476 …luded will be left at its existing value. The following entries are used for persistent groups:</p>
Dctrl_iface.doxygen399 new groups (and groups that were not found during the initial scan,
1036 Request. For persistent groups, the parameter after the event prefix

12