/hostap-latest/tests/hwsim/ |
D | radius_das.py | 10 import pyrad.packet 12 class DisconnectPacket(pyrad.packet.Packet): 13 def __init__(self, code=pyrad.packet.DisconnectRequest, id=None, 15 pyrad.packet.Packet.__init__(self, code, id, secret, authenticator, 32 class CoAPacket(pyrad.packet.Packet): 33 def __init__(self, code=pyrad.packet.CoARequest, id=None, 35 pyrad.packet.Packet.__init__(self, code, id, secret, authenticator,
|
D | test_radius.py | 482 import pyrad.packet 547 send_and_check_reply(srv, req, pyrad.packet.DisconnectNAK, 401) 554 send_and_check_reply(srv, req, pyrad.packet.DisconnectNAK, 407) 560 send_and_check_reply(srv, req, pyrad.packet.DisconnectNAK, 503) 566 send_and_check_reply(srv, req, pyrad.packet.DisconnectNAK, 503) 572 send_and_check_reply(srv, req, pyrad.packet.DisconnectNAK, 503) 578 send_and_check_reply(srv, req, pyrad.packet.DisconnectNAK, 503) 584 send_and_check_reply(srv, req, pyrad.packet.DisconnectNAK, 503) 590 send_and_check_reply(srv, req, pyrad.packet.DisconnectNAK, 503) 595 send_and_check_reply(srv, req, pyrad.packet.DisconnectNAK, 503) [all …]
|
D | test_eap_proto.py | 107 import pyrad.packet 130 reply.code = pyrad.packet.AccessChallenge 153 except pyrad.packet.PacketError as err:
|
D | test_ap_hs20.py | 6269 import pyrad.packet 6328 if reply.code != pyrad.packet.CoAACK:
|
/hostap-latest/src/ap/ |
D | eth_p_oui.c | 165 u8 *packet, *p; in eth_p_oui_send() local 171 packet = os_zalloc(packet_len); in eth_p_oui_send() 172 if (!packet) in eth_p_oui_send() 174 p = packet; in eth_p_oui_send() 176 ethhdr = (struct l2_ethhdr *) packet; in eth_p_oui_send() 188 ret = l2_packet_send(iface->l2, NULL, 0, packet, packet_len); in eth_p_oui_send() 189 os_free(packet); in eth_p_oui_send()
|
D | wpa_auth_ft.c | 529 u8 **packet, size_t *packet_len) in wpa_ft_rrb_build() argument 536 *packet = NULL; in wpa_ft_rrb_build() 568 *packet = os_zalloc(*packet_len); in wpa_ft_rrb_build() 569 if (!*packet) in wpa_ft_rrb_build() 572 pos = *packet; in wpa_ft_rrb_build() 580 wpa_hexdump(MSG_MSGDUMP, "FT: RRB frame payload", *packet, *packet_len); in wpa_ft_rrb_build() 590 os_free(*packet); in wpa_ft_rrb_build() 591 *packet = NULL; in wpa_ft_rrb_build() 972 u8 *packet = NULL; in wpa_ft_rrb_seq_req() local 1028 &packet, &packet_len) < 0) { in wpa_ft_rrb_seq_req() [all …]
|
/hostap-latest/src/l2_packet/ |
D | l2_packet_freebsd.c | 84 const u_char *packet; in l2_packet_receive() local 89 packet = pcap_next(pcap, &hdr); in l2_packet_receive() 91 if (!l2->rx_callback || !packet || hdr.caplen < sizeof(*ethhdr)) in l2_packet_receive() 94 ethhdr = (struct l2_ethhdr *) packet; in l2_packet_receive()
|
D | l2_packet_pcap.c | 123 const u_char *packet; in l2_packet_receive() local 128 packet = pcap_next(pcap, &hdr); in l2_packet_receive() 130 if (!l2->rx_callback || !packet || hdr.caplen < sizeof(*ethhdr)) in l2_packet_receive() 133 ethhdr = (struct l2_ethhdr *) packet; in l2_packet_receive()
|
/hostap-latest/doc/ |
D | directories.doxygen | 47 \dir src/l2_packet Layer 2 packet interface 49 This module defines an interface for layer 2 (link layer) packet 51 also included here. This is used to port packet access for new
|
D | porting.doxygen | 84 needed functionality for wpa_supplicant. Linux packet socket is an 93 for Linux using packet sockets (\ref l2_packet_linux.c), more portable 111 to provide callbacks on events (registered timeout, received packet, 187 for configuration parsing and layer 2 packet access and does not 197 and layer 2 packet access implementation (l2_packet_*.c). After these
|
D | code_structure.doxygen | 65 Layer 2 (link) access wrapper (includes Linux packet socket 70 packet sockets and \ref l2_packet_pcap.c has a more portable version using
|
D | dbus.doxygen | 978 <p>Disassocicate stations with massive packet loss</p>
|
/hostap-latest/wpa_supplicant/doc/docbook/ |
D | wpa_background.sgml | 40 protect against packet forgery. All these choices have proven to 45 authentication does not protect against bit flipping packet 52 per-packet RC4 keys. In addition, it implements replay protection, 53 keyed packet authentication mechanism (Michael MIC).</para>
|
/hostap-latest/tests/ |
D | cipher-and-key-mgmt-testing.txt | 101 5 packets transmitted, 5 received, 0% packet loss, time 4004ms 110 5 packets transmitted, 0 received, 100% packet loss, time 4033ms 157 clearing its packet number to test replay protection. That can help in 184 that unicast traffic can recover once the packet number from the test 196 frames. Note that broadcast traffic can recover once the packet number 222 traffic can recover once the packet number from the test device
|
/hostap-latest/hostapd/ |
D | hostapd.eap_user | 43 # based on the first PEAP packet from the supplicant. 53 # to the way radius_auth_req_attr is used for Access-Request packet in
|
D | README | 247 24-bit initialization vector (IV), and CRC32 to protect against packet 253 flipping packet data. 259 per-packet RC4 keys. In addition, it implements replay protection, 260 keyed packet authentication mechanism (Michael MIC).
|
D | ChangeLog | 163 * fixed WPA packet number reuse with replayed messages and key 1099 * driver_madwifi: fixed EAPOL packet receive for configuration where 1189 setting if the packet does not pass MIC verification (e.g., due to
|
/hostap-latest/radius_example/ |
D | README | 24 functionality for registering timeouts and received packet
|
/hostap-latest/wpa_supplicant/ |
D | android.config | 261 # Select layer 2 packet implementation 262 # linux = Linux packet socket (default) 270 # Disable Linux packet socket workaround applicable for station interface 272 # is known to not have the regression issue in packet socket behavior with
|
D | defconfig | 310 # Select layer 2 packet implementation 311 # linux = Linux packet socket (default) 319 # Disable Linux packet socket workaround applicable for station interface 321 # is known to not have the regression issue in packet socket behavior with
|
D | eap_testing.txt | 236 packet from Supplicant looks like the one sent in the Phase 1. The 239 fragmentation in the Aegis server(?) The packet seems to include
|
D | README | 152 Optional libraries for layer2 packet processing: 209 24-bit initialization vector (IV), and CRC32 to protect against packet 215 flipping packet data. 221 per-packet RC4 keys. In addition, it implements replay protection, 222 keyed packet authentication mechanism (Michael MIC).
|
D | ChangeLog | 205 * fixed WPA packet number reuse with replayed messages and key 544 * add a workaround for Linux packet socket behavior when interface is in 2166 even if the packet is not fragmented; this may be needed with some 2234 * fixed Windows/cygwin L2 packet handler freeing; previous version
|