Home
last modified time | relevance | path

Searched refs:packet (Results 1 – 23 of 23) sorted by relevance

/hostap-latest/tests/hwsim/
Dradius_das.py10 import pyrad.packet
12 class DisconnectPacket(pyrad.packet.Packet):
13 def __init__(self, code=pyrad.packet.DisconnectRequest, id=None,
15 pyrad.packet.Packet.__init__(self, code, id, secret, authenticator,
32 class CoAPacket(pyrad.packet.Packet):
33 def __init__(self, code=pyrad.packet.CoARequest, id=None,
35 pyrad.packet.Packet.__init__(self, code, id, secret, authenticator,
Dtest_radius.py482 import pyrad.packet
547 send_and_check_reply(srv, req, pyrad.packet.DisconnectNAK, 401)
554 send_and_check_reply(srv, req, pyrad.packet.DisconnectNAK, 407)
560 send_and_check_reply(srv, req, pyrad.packet.DisconnectNAK, 503)
566 send_and_check_reply(srv, req, pyrad.packet.DisconnectNAK, 503)
572 send_and_check_reply(srv, req, pyrad.packet.DisconnectNAK, 503)
578 send_and_check_reply(srv, req, pyrad.packet.DisconnectNAK, 503)
584 send_and_check_reply(srv, req, pyrad.packet.DisconnectNAK, 503)
590 send_and_check_reply(srv, req, pyrad.packet.DisconnectNAK, 503)
595 send_and_check_reply(srv, req, pyrad.packet.DisconnectNAK, 503)
[all …]
Dtest_eap_proto.py107 import pyrad.packet
130 reply.code = pyrad.packet.AccessChallenge
153 except pyrad.packet.PacketError as err:
Dtest_ap_hs20.py6269 import pyrad.packet
6328 if reply.code != pyrad.packet.CoAACK:
/hostap-latest/src/ap/
Deth_p_oui.c165 u8 *packet, *p; in eth_p_oui_send() local
171 packet = os_zalloc(packet_len); in eth_p_oui_send()
172 if (!packet) in eth_p_oui_send()
174 p = packet; in eth_p_oui_send()
176 ethhdr = (struct l2_ethhdr *) packet; in eth_p_oui_send()
188 ret = l2_packet_send(iface->l2, NULL, 0, packet, packet_len); in eth_p_oui_send()
189 os_free(packet); in eth_p_oui_send()
Dwpa_auth_ft.c529 u8 **packet, size_t *packet_len) in wpa_ft_rrb_build() argument
536 *packet = NULL; in wpa_ft_rrb_build()
568 *packet = os_zalloc(*packet_len); in wpa_ft_rrb_build()
569 if (!*packet) in wpa_ft_rrb_build()
572 pos = *packet; in wpa_ft_rrb_build()
580 wpa_hexdump(MSG_MSGDUMP, "FT: RRB frame payload", *packet, *packet_len); in wpa_ft_rrb_build()
590 os_free(*packet); in wpa_ft_rrb_build()
591 *packet = NULL; in wpa_ft_rrb_build()
972 u8 *packet = NULL; in wpa_ft_rrb_seq_req() local
1028 &packet, &packet_len) < 0) { in wpa_ft_rrb_seq_req()
[all …]
/hostap-latest/src/l2_packet/
Dl2_packet_freebsd.c84 const u_char *packet; in l2_packet_receive() local
89 packet = pcap_next(pcap, &hdr); in l2_packet_receive()
91 if (!l2->rx_callback || !packet || hdr.caplen < sizeof(*ethhdr)) in l2_packet_receive()
94 ethhdr = (struct l2_ethhdr *) packet; in l2_packet_receive()
Dl2_packet_pcap.c123 const u_char *packet; in l2_packet_receive() local
128 packet = pcap_next(pcap, &hdr); in l2_packet_receive()
130 if (!l2->rx_callback || !packet || hdr.caplen < sizeof(*ethhdr)) in l2_packet_receive()
133 ethhdr = (struct l2_ethhdr *) packet; in l2_packet_receive()
/hostap-latest/doc/
Ddirectories.doxygen47 \dir src/l2_packet Layer 2 packet interface
49 This module defines an interface for layer 2 (link layer) packet
51 also included here. This is used to port packet access for new
Dporting.doxygen84 needed functionality for wpa_supplicant. Linux packet socket is an
93 for Linux using packet sockets (\ref l2_packet_linux.c), more portable
111 to provide callbacks on events (registered timeout, received packet,
187 for configuration parsing and layer 2 packet access and does not
197 and layer 2 packet access implementation (l2_packet_*.c). After these
Dcode_structure.doxygen65 Layer 2 (link) access wrapper (includes Linux packet socket
70 packet sockets and \ref l2_packet_pcap.c has a more portable version using
Ddbus.doxygen978 <p>Disassocicate stations with massive packet loss</p>
/hostap-latest/wpa_supplicant/doc/docbook/
Dwpa_background.sgml40 protect against packet forgery. All these choices have proven to
45 authentication does not protect against bit flipping packet
52 per-packet RC4 keys. In addition, it implements replay protection,
53 keyed packet authentication mechanism (Michael MIC).</para>
/hostap-latest/tests/
Dcipher-and-key-mgmt-testing.txt101 5 packets transmitted, 5 received, 0% packet loss, time 4004ms
110 5 packets transmitted, 0 received, 100% packet loss, time 4033ms
157 clearing its packet number to test replay protection. That can help in
184 that unicast traffic can recover once the packet number from the test
196 frames. Note that broadcast traffic can recover once the packet number
222 traffic can recover once the packet number from the test device
/hostap-latest/hostapd/
Dhostapd.eap_user43 # based on the first PEAP packet from the supplicant.
53 # to the way radius_auth_req_attr is used for Access-Request packet in
DREADME247 24-bit initialization vector (IV), and CRC32 to protect against packet
253 flipping packet data.
259 per-packet RC4 keys. In addition, it implements replay protection,
260 keyed packet authentication mechanism (Michael MIC).
DChangeLog163 * fixed WPA packet number reuse with replayed messages and key
1099 * driver_madwifi: fixed EAPOL packet receive for configuration where
1189 setting if the packet does not pass MIC verification (e.g., due to
/hostap-latest/radius_example/
DREADME24 functionality for registering timeouts and received packet
/hostap-latest/wpa_supplicant/
Dandroid.config261 # Select layer 2 packet implementation
262 # linux = Linux packet socket (default)
270 # Disable Linux packet socket workaround applicable for station interface
272 # is known to not have the regression issue in packet socket behavior with
Ddefconfig310 # Select layer 2 packet implementation
311 # linux = Linux packet socket (default)
319 # Disable Linux packet socket workaround applicable for station interface
321 # is known to not have the regression issue in packet socket behavior with
Deap_testing.txt236 packet from Supplicant looks like the one sent in the Phase 1. The
239 fragmentation in the Aegis server(?) The packet seems to include
DREADME152 Optional libraries for layer2 packet processing:
209 24-bit initialization vector (IV), and CRC32 to protect against packet
215 flipping packet data.
221 per-packet RC4 keys. In addition, it implements replay protection,
222 keyed packet authentication mechanism (Michael MIC).
DChangeLog205 * fixed WPA packet number reuse with replayed messages and key
544 * add a workaround for Linux packet socket behavior when interface is in
2166 even if the packet is not fragmented; this may be needed with some
2234 * fixed Windows/cygwin L2 packet handler freeing; previous version