/hostap-latest/tests/fuzzing/sae/ |
D | sae.c | 22 int groups[] = { 19, 0 }; in LLVMFuzzerTestOneInput() local 30 res = sae_parse_commit(&sae, data, size, &token, &token_len, groups, 0, in LLVMFuzzerTestOneInput() 34 res = sae_parse_commit(&sae, data, size, &token, &token_len, groups, 1, in LLVMFuzzerTestOneInput()
|
/hostap-latest/src/p2p/ |
D | p2p_group.c | 49 struct p2p_group *group, **groups; in p2p_group_init() local 55 groups = os_realloc_array(p2p->groups, p2p->num_groups + 1, in p2p_group_init() 57 if (groups == NULL) { in p2p_group_init() 61 groups[p2p->num_groups++] = group; in p2p_group_init() 62 p2p->groups = groups; in p2p_group_init() 109 if (p2p->groups[g] == group) { in p2p_group_deinit() 111 p2p->groups[g] = p2p->groups[g + 1]; in p2p_group_deinit() 1088 if (!group_callback(p2p->groups[i], user_data)) in p2p_loop_on_all_groups()
|
D | p2p_dev_disc.c | 190 if (p2p_group_go_discover(p2p->groups[g], msg.device_id, sa, in p2p_process_dev_disc_req()
|
D | p2p_invitation.c | 34 struct p2p_group *g = p2p->groups[i]; in p2p_build_invitation_req() 128 struct p2p_group *g = p2p->groups[i]; in p2p_build_invitation_resp()
|
D | p2p.c | 86 p2p->groups[i], dev->info.p2p_device_addr)) in p2p_expire_peers() 3063 os_free(p2p->groups); in p2p_deinit() 4563 da, p2p_group_get_interface_addr(p2p->groups[g]))) { in p2p_process_presence_req() 4564 group = p2p->groups[g]; in p2p_process_presence_req() 5106 group = p2p->groups[g]; in p2p_update_wfd_ie_groups() 5337 int freq = p2p_group_get_freq(p2p->groups[0]); in p2p_build_nfc_handover() 5362 p2p_buf_add_group_info(p2p->groups[0], buf, 5); in p2p_build_nfc_handover() 5363 p2p_group_buf_add_id(p2p->groups[0], buf); in p2p_build_nfc_handover()
|
/hostap-latest/src/pasn/ |
D | pasn_responder.c | 47 int groups[] = { pasn->group, 0 }; in pasn_wd_handle_sae_commit() local 97 groups, 0, NULL); in pasn_wd_handle_sae_commit() 609 const int *groups = pasn->pasn_groups; in handle_auth_pasn_1() local 616 if (!groups) in handle_auth_pasn_1() 617 groups = default_groups; in handle_auth_pasn_1() 689 for (i = 0; groups[i] > 0 && groups[i] != pasn_params.group; i++) in handle_auth_pasn_1() 692 if (!pasn_params.group || groups[i] != pasn_params.group) { in handle_auth_pasn_1()
|
D | pasn_initiator.c | 81 int groups[] = { pasn->group, 0 }; in wpas_pasn_wd_sae_rx() local 118 res = sae_parse_commit(&pasn->sae, data + 6, len - 6, NULL, 0, groups, in wpas_pasn_wd_sae_rx()
|
/hostap-latest/wpa_supplicant/ |
D | sme.c | 60 int *groups = wpa_s->conf->sae_groups; in sme_set_sae_group() local 63 if (!groups || groups[0] <= 0) in sme_set_sae_group() 64 groups = default_groups; in sme_set_sae_group() 67 if (!index_within_array(groups, wpa_s->sme.sae_group_index)) in sme_set_sae_group() 71 int group = groups[wpa_s->sme.sae_group_index]; in sme_set_sae_group() 1568 int *groups = wpa_s->conf->sae_groups; in sme_sae_is_group_enabled() local 1572 if (!groups) in sme_sae_is_group_enabled() 1573 groups = default_groups; in sme_sae_is_group_enabled() 1575 for (i = 0; groups[i] > 0; i++) { in sme_sae_is_group_enabled() 1576 if (groups[i] == group) in sme_sae_is_group_enabled() [all …]
|
D | mesh_rsn.c | 316 int *groups = wpa_s->ifmsh->bss[0]->conf->sae_groups; in mesh_rsn_sae_group() local 319 if (!index_within_array(groups, wpa_s->mesh_rsn->sae_group_index)) in mesh_rsn_sae_group() 323 int group = groups[wpa_s->mesh_rsn->sae_group_index]; in mesh_rsn_sae_group()
|
D | README-P2P | 83 will help in finding new groups or groups missed during the initial 202 P2P Device or Interface address have been used in multiple groups 300 This command can be used to remove the specified client from all groups 662 Disabled(default)/enables use of per-client PSK in the P2P groups. This 735 groups. If enabled, invitations to reinvoke a persistent group will be 784 persistent groups. The identifier in this list is used with
|
D | pasn_supplicant.c | 119 int groups[2] = { group, 0 }; in wpas_pasn_sae_derive_pt() local 129 return sae_derive_pt(groups, ssid->ssid, ssid->ssid_len, in wpas_pasn_sae_derive_pt()
|
D | ChangeLog | 50 * fix SAE H2E rejected groups validation to avoid downgrade attacks 85 * fixed OWE key derivation with groups 20 and 21; this breaks backwards 86 compatibility for these groups while the default group 19 remains 108 - disable use of groups using Brainpool curves 112 - disable use of groups using Brainpool curves 113 - allow the set of groups to be configured (eap_pwd_groups) 138 - changed default configuration to enable only groups 19, 20, 21 139 (i.e., disable groups 25 and 26) and disable all unsuitable groups 148 - reject use of unsuitable groups based on new implementation guidance 149 in REVmd (allow only FFC groups with prime >= 3072 bits and ECC [all …]
|
D | wpa_supplicant.c | 2499 int *groups = conf->sae_groups; in wpa_s_setup_sae_pt() local 2503 if (!groups || groups[0] <= 0) in wpa_s_setup_sae_pt() 2504 groups = default_groups; in wpa_s_setup_sae_pt() 2522 ssid->pt = sae_derive_pt(groups, ssid->ssid, ssid->ssid_len, in wpa_s_setup_sae_pt() 2536 int i, *groups = wpa_s->extra_sae_rejected_groups; in wpa_s_clear_sae_rejected() local 2538 for (i = 0; groups[i]; i++) { in wpa_s_clear_sae_rejected() 2541 groups[i]); in wpa_s_clear_sae_rejected() 2543 groups[i]); in wpa_s_clear_sae_rejected()
|
/hostap-latest/tests/hwsim/ |
D | netlink.py | 150 def __init__(self, nltype, groups=0, unexpected_msg_handler=None): argument 155 self.descriptor.bind((0, groups)) 156 self.pid, self.groups = self.descriptor.getsockname()
|
D | start.sh | 60 if groups | tr ' ' "\n" | grep -q ^admin$; then 62 elif groups | tr ' ' "\n" | grep -q ^wheel$; then
|
D | test_sae.py | 183 groups = [str(g) for g in sae_groups] 187 params['sae_groups'] = ' '.join(groups) 190 for g in groups: 1824 def run_sae_password_id(dev, apdev, groups=None): argument 1828 if groups: 1829 params['sae_groups'] = groups 1831 groups = "" 1837 dev[0].request("SET sae_groups " + groups)
|
/hostap-latest/src/utils/ |
D | os_unix.c | 348 gid_t groups[] = { ANDROID_SETGROUPS_OVERRIDE }; in os_program_init() local 350 gid_t groups[] = { AID_INET, AID_WIFI, AID_KEYSTORE }; in os_program_init() local 355 setgroups(ARRAY_SIZE(groups), groups); in os_program_init()
|
/hostap-latest/src/common/ |
D | sae.c | 1103 struct sae_pt * sae_derive_pt(int *groups, const u8 *ssid, size_t ssid_len, in sae_derive_pt() argument 1111 if (!groups) in sae_derive_pt() 1112 groups = default_groups; in sae_derive_pt() 1113 for (i = 0; groups[i] > 0; i++) { in sae_derive_pt() 1114 tmp = sae_derive_pt_group(groups[i], ssid, ssid_len, password, in sae_derive_pt() 1399 struct wpabuf *groups; in sae_prepare_commit_pt() local 1402 groups = wpabuf_alloc(count * 2); in sae_prepare_commit_pt() 1403 if (!groups) in sae_prepare_commit_pt() 1406 wpabuf_put_le16(groups, rejected_groups[i]); in sae_prepare_commit_pt() 1407 sae->tmp->own_rejected_groups = groups; in sae_prepare_commit_pt()
|
D | dpp.c | 2754 struct json_token *root, *groups, *netkey, *token; in dpp_parse_connector() local 2766 groups = json_get_member(root, "groups"); in dpp_parse_connector() 2767 if (!groups || groups->type != JSON_ARRAY) { in dpp_parse_connector() 2771 for (token = groups->child; token; token = token->sibling) { in dpp_parse_connector() 4037 struct json_token *groups, *token; in dpp_connector_compatible_group() local 4039 groups = json_get_member(root, "groups"); in dpp_connector_compatible_group() 4040 if (!groups || groups->type != JSON_ARRAY) in dpp_connector_compatible_group() 4043 for (token = groups->child; token; token = token->sibling) { in dpp_connector_compatible_group() 4072 struct json_token *groups, *token; in dpp_connector_match_groups() local 4074 groups = json_get_member(peer_root, "groups"); in dpp_connector_match_groups() [all …]
|
D | sae.h | 149 struct sae_pt * sae_derive_pt(int *groups, const u8 *ssid, size_t ssid_len,
|
/hostap-latest/src/ap/ |
D | ieee802_11.c | 1176 int i, *groups = hapd->conf->sae_groups; in sae_pick_next_group() local 1184 if (!groups) in sae_pick_next_group() 1185 groups = default_groups; in sae_pick_next_group() 1186 for (i = 0; groups[i] > 0; i++) { in sae_pick_next_group() 1187 if (sae->group == groups[i]) in sae_pick_next_group() 1191 if (groups[i] <= 0) { in sae_pick_next_group() 1199 if (groups[i] <= 0) { in sae_pick_next_group() 1205 if (sae_set_group(sae, groups[i]) < 0) in sae_pick_next_group() 1210 wpa_printf(MSG_DEBUG, "SAE: Selected new group: %d", groups[i]); in sae_pick_next_group() 1250 int *groups = hapd->conf->sae_groups; in sae_is_group_enabled() local [all …]
|
D | ctrl_iface_ap.c | 318 struct wpabuf *groups = sta->sae->tmp->peer_rejected_groups; in hostapd_ctrl_iface_sta_mib() local 325 if (groups) { in hostapd_ctrl_iface_sta_mib() 326 pos = wpabuf_head(groups); in hostapd_ctrl_iface_sta_mib() 327 count = wpabuf_len(groups) / 2; in hostapd_ctrl_iface_sta_mib()
|
/hostap-latest/hostapd/ |
D | ChangeLog | 36 * fix SAE H2E rejected groups validation to avoid downgrade attacks 68 * fixed OWE key derivation with groups 20 and 21; this breaks backwards 69 compatibility for these groups while the default group 19 remains 85 - disable use of groups using Brainpool curves 89 - disable use of groups using Brainpool curves 111 (i.e., disable groups 20, 21, 25, 26 from default configuration) and 112 disable all unsuitable groups completely based on REVmd changes 118 - reject use of unsuitable groups based on new implementation guidance 119 in REVmd (allow only FFC groups with prime >= 3072 bits and ECC 120 groups with prime >= 256) [all …]
|
/hostap-latest/doc/ |
D | dbus.doxygen | 1053 <p>Preference list of enabled groups for SAE</p> 1395 …<p>Starts WPS configuration. Note: When used with P2P groups, this needs to be issued on the GO gr… 1695 <p>Remove the client from all groups (operating and persistent) from the local GO.</p> 1870 …to have a P2PDevice property role since there can be multiple concurrent groups and the P2P Device… 1875 …ke much sense to have a P2PDevice property Group since there can be multiple concurrent groups.</p> 1880 …e much sense to have a P2PDevice property PeerGO since there can be multiple concurrent groups.</p> 2369 <p>The current groups in which this peer is connected.</p> 2391 Interface implemented by objects representing active P2P groups. 2469 Interface implemented by objects representing persistent P2P groups. 2476 …luded will be left at its existing value. The following entries are used for persistent groups:</p>
|
D | ctrl_iface.doxygen | 399 new groups (and groups that were not found during the initial scan, 1036 Request. For persistent groups, the parameter after the event prefix
|