| /hostap-latest/wlantest/ |
| D | bip.c | 20 u8 *prot, *pos, *buf; in bip_protect() local 27 prot = os_malloc(plen); in bip_protect() 28 if (prot == NULL) in bip_protect() 30 os_memcpy(prot, frame, len); in bip_protect() 31 pos = prot + len; in bip_protect() 42 os_free(prot); in bip_protect() 52 os_memcpy(buf + 20, prot + 24, plen - 24); in bip_protect() 56 os_free(prot); in bip_protect() 66 return prot; in bip_protect() 77 u8 *prot, *pos, *buf; in bip_protect_s1g_beacon() local [all …]
|
| D | test_vectors.c | 360 u8 *prot; in test_vector_bip() local 370 prot = bip_protect(igtk, sizeof(igtk), frame, sizeof(frame), in test_vector_bip() 372 if (prot == NULL) { in test_vector_bip() 377 wpa_hexdump(MSG_INFO, "Protected MPDU (without FCS)", prot, prot_len); in test_vector_bip() 378 os_free(prot); in test_vector_bip() 400 u8 *prot; in test_vector_bip_s1g_beacon() local 410 prot = bip_protect_s1g_beacon(igtk, sizeof(igtk), frame, sizeof(frame), in test_vector_bip_s1g_beacon() 412 if (!prot) { in test_vector_bip_s1g_beacon() 418 wpa_hexdump(MSG_INFO, "Protected MPDU (without FCS)", prot, prot_len); in test_vector_bip_s1g_beacon() 419 os_free(prot); in test_vector_bip_s1g_beacon() [all …]
|
| D | inject.c | 85 u8 *prot; in wlantest_inject_bip() local 96 prot = bip_protect(incorrect_key ? stub : bss->igtk[bss->igtk_idx], in wlantest_inject_bip() 100 if (prot == NULL) in wlantest_inject_bip() 104 ret = inject_frame(wt->monitor_sock, prot, plen); in wlantest_inject_bip() 105 os_free(prot); in wlantest_inject_bip() 276 enum wlantest_inject_protection prot) in wlantest_inject() argument 290 if (prot != WLANTEST_INJECT_UNPROTECTED && bss == NULL) { in wlantest_inject() 301 if ((prot == WLANTEST_INJECT_PROTECTED || in wlantest_inject() 302 prot == WLANTEST_INJECT_INCORRECT_KEY) && bss) { in wlantest_inject() 320 } else if (protectable && prot != WLANTEST_INJECT_UNPROTECTED && bss) { in wlantest_inject() [all …]
|
| D | ctrl.c | 486 enum wlantest_inject_protection prot) in ctrl_inject_auth() argument 490 if (prot != WLANTEST_INJECT_NORMAL && in ctrl_inject_auth() 491 prot != WLANTEST_INJECT_UNPROTECTED) in ctrl_inject_auth() 515 enum wlantest_inject_protection prot) in ctrl_inject_assocreq() argument 521 if (prot != WLANTEST_INJECT_NORMAL && in ctrl_inject_assocreq() 522 prot != WLANTEST_INJECT_UNPROTECTED) in ctrl_inject_assocreq() 561 enum wlantest_inject_protection prot) in ctrl_inject_reassocreq() argument 567 if (prot != WLANTEST_INJECT_NORMAL && in ctrl_inject_reassocreq() 568 prot != WLANTEST_INJECT_UNPROTECTED) in ctrl_inject_reassocreq() 608 enum wlantest_inject_protection prot) in ctrl_inject_deauth() argument [all …]
|
| D | rx_data.c | 57 u16 ethertype, const u8 *data, size_t len, int prot, 62 const u8 *data, size_t len, int prot, in rx_data_vlan() argument 74 data + 4, len - 4, prot, peer_addr); in rx_data_vlan() 80 u16 ethertype, const u8 *data, size_t len, int prot, in rx_data_eth() argument 85 rx_data_eapol(wt, bssid, sta_addr, dst, src, data, len, prot); in rx_data_eth() 95 rx_data_vlan(wt, bssid, sta_addr, dst, src, data, len, prot, in rx_data_eth() 106 const u8 *data, size_t len, int prot, in rx_data_process() argument 144 WPA_GET_BE16(data + 6), data + 8, len - 8, prot, in rx_data_process() 771 int prot = !!(fc & WLAN_FC_ISWEP); in rx_data_bss() local 778 prot ? " Prot" : "", qos[0] & 0x0f, in rx_data_bss() [all …]
|
| D | wlantest_cli.c | 876 enum wlantest_inject_protection prot; in cmd_inject() local 908 prot = WLANTEST_INJECT_NORMAL; in cmd_inject() 910 prot = WLANTEST_INJECT_PROTECTED; in cmd_inject() 912 prot = WLANTEST_INJECT_UNPROTECTED; in cmd_inject() 914 prot = WLANTEST_INJECT_INCORRECT_KEY; in cmd_inject() 921 pos = attr_add_be32(pos, end, WLANTEST_ATTR_INJECT_PROTECTION, prot); in cmd_inject() 1059 enum wlantest_inject_protection prot; in cmd_send() local 1076 prot = WLANTEST_INJECT_NORMAL; in cmd_send() 1078 prot = WLANTEST_INJECT_PROTECTED; in cmd_send() 1080 prot = WLANTEST_INJECT_UNPROTECTED; in cmd_send() [all …]
|
| D | wlantest.h | 294 const u8 *data, size_t len, int prot); 381 enum wlantest_inject_protection prot);
|
| D | rx_eapol.c | 1437 int prot) in rx_data_eapol_key() argument 1705 const u8 *data, size_t len, int prot) in rx_data_eapol() argument 1722 MAC2STR(src), MAC2STR(dst), prot ? " Prot" : "", in rx_data_eapol() 1752 sizeof(*hdr) + length, prot); in rx_data_eapol()
|
| /hostap-latest/tests/hwsim/ |
| D | test_p2p_wifi_display.py | 31 prot = "0001" + "00" 32 dev[0].request("WFD_SUBELEM_SET 5 " + prot) 70 if prot not in ev: 147 if dev[0].request("WFD_SUBELEM_GET 5") != prot: 217 prot = "0001" + "00" 218 dev[0].request("WFD_SUBELEM_SET 5 " + prot)
|
| /hostap-latest/src/eap_common/ |
| D | eap_eke_common.c | 585 u8 *prot, size_t *prot_len) in eap_eke_prot() argument 610 pos = prot; in eap_eke_prot() 632 *prot_len = pos - prot; in eap_eke_prot() 638 const u8 *prot, size_t prot_len, in eap_eke_decrypt_prot() argument 660 if (eap_eke_mac(sess->mac, sess->ki, prot + block_size, in eap_eke_decrypt_prot() 663 if (os_memcmp_const(icv, prot + prot_len - icv_len, icv_len) != 0) { in eap_eke_decrypt_prot() 674 os_memcpy(data, prot + block_size, *data_len); in eap_eke_decrypt_prot() 675 if (aes_128_cbc_decrypt(sess->ke, prot, data, *data_len) < 0) { in eap_eke_decrypt_prot()
|
| D | eap_eke_common.h | 107 u8 *prot, size_t *prot_len); 109 const u8 *prot, size_t prot_len,
|
| /hostap-latest/src/ap/ |
| D | gas_serv.c | 1450 struct anqp_query_info *qi, int prot, in gas_serv_req_local_processing() argument 1495 di->prot = prot; in gas_serv_req_local_processing() 1510 if (prot) in gas_serv_req_local_processing() 1527 int prot, struct wpabuf *buf, int freq) in gas_serv_req_dpp_processing() argument 1555 di->prot = prot; in gas_serv_req_dpp_processing() 1583 if (prot) in gas_serv_req_dpp_processing() 1595 const u8 *data, size_t len, int prot, in gas_serv_rx_gas_initial_req() argument 1658 if (prot) in gas_serv_rx_gas_initial_req() 1691 gas_serv_req_dpp_processing(hapd, sa, dialog_token, prot, msg, in gas_serv_rx_gas_initial_req() 1730 gas_serv_req_local_processing(hapd, sa, dialog_token, &qi, prot, in gas_serv_rx_gas_initial_req() [all …]
|
| D | gas_query_ap.c | 264 int res, prot = pmf_in_use(gas->hapd, query->addr); in gas_query_tx() local 269 query->freq, prot, MAC2STR(query->sa)); in gas_query_tx() 270 if (prot) { in gas_query_tx() 475 int prot, pmf; in gas_query_ap_rx() local 489 prot = categ == WLAN_ACTION_PROTECTED_DUAL; in gas_query_ap_rx() 491 if (prot && !pmf) { in gas_query_ap_rx() 495 if (!prot && pmf) { in gas_query_ap_rx()
|
| D | gas_serv.h | 77 int prot; /* whether Protected Dual of Public Action frame is used */ member 93 int prot, struct wpabuf *buf, int freq);
|
| D | dpp_hostapd.c | 3390 u8 dialog_token, int prot, in hostapd_dpp_relay_gas_resp_tx() argument 3395 gas_serv_req_dpp_processing(hapd, addr, dialog_token, prot, buf, 0); in hostapd_dpp_relay_gas_resp_tx()
|
| /hostap-latest/wpa_supplicant/ |
| D | gas_query.c | 287 int res, prot = pmf_in_use(gas->wpa_s, query->addr); in gas_query_tx() local 296 query->freq, prot, MAC2STR(query->sa)); in gas_query_tx() 297 if (prot) { in gas_query_tx() 526 int prot, pmf; in gas_query_rx() local 540 prot = categ == WLAN_ACTION_PROTECTED_DUAL; in gas_query_rx() 542 if (prot && !pmf) { in gas_query_rx() 546 if (!prot && pmf) { in gas_query_rx()
|
| /hostap-latest/src/common/ |
| D | dpp_i.h | 31 int prot, struct wpabuf *buf);
|
| D | dpp.h | 437 void (*gas_resp_tx)(void *ctx, const u8 *addr, u8 dialog_token, int prot,
|
| D | dpp_tcp.c | 68 int prot, struct wpabuf *buf);
|
| /hostap-latest/src/drivers/ |
| D | driver_nl80211_capa.c | 90 unsigned int prot = 0; in probe_resp_offload_support() local 93 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_WPS; in probe_resp_offload_support() 95 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_WPS2; in probe_resp_offload_support() 97 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_P2P; in probe_resp_offload_support() 99 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_INTERWORKING; in probe_resp_offload_support() 101 return prot; in probe_resp_offload_support()
|