/hostap-latest/tests/hwsim/ |
D | test_pmksa_cache.py | 26 dev[0].connect("test-pmksa-cache", proto="RSN", key_mgmt="WPA-EAP", 90 dev[0].connect("test-pmksa-cache", proto="RSN", key_mgmt="WPA-EAP", 141 dev[0].connect("test-pmksa-cache", proto="RSN", key_mgmt="WPA-EAP", 187 dev[0].connect("test-pmksa-cache", proto="RSN", key_mgmt="WPA-EAP", 236 dev[0].connect("test-pmksa-cache", proto="RSN", key_mgmt="WPA-EAP", 288 wpas.connect("test-pmksa-cache", proto="RSN", key_mgmt="WPA-EAP", 338 dev[0].connect("test-pmksa-cache", proto="RSN", key_mgmt="WPA-EAP", 366 dev[0].connect("test-pmksa-cache", proto="RSN", key_mgmt="WPA-EAP", 398 dev[0].connect("cui", proto="RSN", key_mgmt="WPA-EAP", 633 dev[0].connect("test-pmksa-cache", proto="RSN", key_mgmt="WPA-EAP", [all …]
|
D | test_ap_pmf.py | 37 key_mgmt="WPA-PSK WPA-PSK-SHA256", proto="WPA2", 43 key_mgmt="WPA-PSK WPA-PSK-SHA256", proto="WPA2", 88 key_mgmt="WPA-PSK WPA-PSK-SHA256", proto="WPA2", 113 key_mgmt="WPA-PSK WPA-PSK-SHA256", proto="WPA2", 130 key_mgmt="WPA-PSK WPA-PSK-SHA256", proto="WPA2", 145 key_mgmt="WPA-PSK WPA-PSK-SHA256", proto="WPA2", 173 key_mgmt="WPA-PSK WPA-PSK-SHA256", proto="WPA2", 177 key_mgmt="WPA-PSK WPA-PSK-SHA256", proto="WPA2", 197 key_mgmt="WPA-PSK WPA-PSK-SHA256", proto="WPA2", 201 key_mgmt="WPA-PSK WPA-PSK-SHA256", proto="WPA2", [all …]
|
D | test_ap_mixed.py | 30 dev[0].connect(ssid, key_mgmt="WPA-PSK", proto="WPA", pairwise="TKIP", 32 dev[1].connect(ssid, key_mgmt="WPA-EAP-SHA256", proto="WPA2", eap="GPSK", 69 dev[1].connect(ssid, key_mgmt="WPA-EAP", proto="WPA", eap="GPSK",
|
D | test_ap_ft.py | 924 dev[0].connect(ssid, psk=passphrase, key_mgmt="FT-PSK", proto="WPA2", 939 dev[0].connect(ssid, psk=passphrase, key_mgmt="FT-PSK", proto="WPA2", 1909 dev[0].connect(ssid, psk=passphrase, key_mgmt="FT-PSK", proto="WPA2", 2012 dev[0].connect(ssid, key_mgmt="FT-EAP", proto="WPA2", ieee80211w="1", 2083 dev[0].connect(ssid, psk=passphrase, key_mgmt="FT-PSK", proto="WPA2", 2119 dev[0].connect(ssid, psk=passphrase, key_mgmt="FT-PSK", proto="WPA2", 2223 dev[0].connect(ssid, psk=passphrase, key_mgmt="FT-PSK", proto="WPA2", 2301 dev[0].connect(ssid, psk=passphrase, key_mgmt="FT-PSK", proto="WPA2", 2337 dev[0].connect(ssid, psk=passphrase, key_mgmt="FT-PSK", proto="WPA2", 2352 dev[0].connect(ssid, psk=passphrase, key_mgmt="FT-PSK", proto="WPA2", [all …]
|
D | test_wnm.py | 232 key_mgmt="WPA-PSK-SHA256", proto="WPA2", scan_freq="2412") 364 key_mgmt="WPA-PSK-SHA256", proto="WPA2", scan_freq="2412") 376 key_mgmt="WPA-PSK-SHA256", proto="WPA2", scan_freq="2412") 390 key_mgmt="WPA-PSK-SHA256", proto="WPA2", scan_freq="2412") 408 proto="WPA2", ieee80211w="2", scan_freq="2412") 485 key_mgmt="WPA-PSK-SHA256", proto="WPA2", scan_freq="2412") 499 key_mgmt="WPA-PSK-SHA256", proto="WPA2", scan_freq="2412") 804 key_mgmt="WPA-PSK-SHA256", proto="WPA2", scan_freq="2412") 835 key_mgmt="WPA-PSK-SHA256", proto="WPA2", scan_freq="2412", 839 key_mgmt="WPA-PSK-SHA256", proto="WPA2", scan_freq="2412") [all …]
|
D | test_wext.py | 91 wpas.connect("test-pmksa-cache", proto="RSN", key_mgmt="WPA-EAP", 191 key_mgmt="WPA-PSK WPA-PSK-SHA256", proto="WPA2",
|
/hostap-latest/wlantest/ |
D | sta.c | 196 sta->proto = WPA_PROTO_OSEN; in sta_update_assoc() 203 sta->proto = 0; in sta_update_assoc() 212 sta->proto = data.proto; in sta_update_assoc() 216 if (bss->proto && (sta->proto & bss->proto) == 0) { in sta_update_assoc() 219 MAC2STR(sta->addr), sta->proto, in sta_update_assoc() 220 MAC2STR(bss->bssid), bss->proto); in sta_update_assoc() 229 if (sta->proto && data.group_cipher != bss->group_cipher && in sta_update_assoc() 256 sta->proto == 0 ? "OPEN " : "", in sta_update_assoc() 257 sta->proto & WPA_PROTO_WPA ? "WPA " : "", in sta_update_assoc() 258 sta->proto & WPA_PROTO_RSN ? "WPA2 " : "", in sta_update_assoc() [all …]
|
D | bss.c | 281 bss->proto = 0; in bss_update() 294 bss->proto |= data.proto; in bss_update() 309 bss->proto |= data.proto; in bss_update() 319 bss->proto |= WPA_PROTO_OSEN; in bss_update() 325 if (!(bss->proto & WPA_PROTO_RSN) || in bss_update() 341 bss->proto == 0 ? "OPEN " : "", in bss_update() 342 bss->proto & WPA_PROTO_WPA ? "WPA " : "", in bss_update() 343 bss->proto & WPA_PROTO_RSN ? "WPA2 " : "", in bss_update() 344 bss->proto & WPA_PROTO_OSEN ? "OSEN " : "", in bss_update()
|
/hostap-latest/wpa_supplicant/ |
D | wpa_supplicant.conf | 1797 proto=WPA 1808 proto=WPA 1820 proto=RSN 1896 proto=WPA RSN 2026 proto=RSN 2039 proto=WPA 2087 proto=RSN
|
D | wpa_priv.c | 477 static int wpa_priv_allowed_l2_proto(u16 proto) in wpa_priv_allowed_l2_proto() argument 479 return proto == ETH_P_EAPOL || proto == ETH_P_RSN_PREAUTH || in wpa_priv_allowed_l2_proto() 480 proto == ETH_P_80211_ENCAP; in wpa_priv_allowed_l2_proto() 492 u16 proto; in wpa_priv_cmd_l2_register() local 501 proto = reg_cmd[0]; in wpa_priv_cmd_l2_register() 502 if (!wpa_priv_allowed_l2_proto(proto)) { in wpa_priv_cmd_l2_register() 504 "ethertype 0x%x", proto); in wpa_priv_cmd_l2_register() 522 iface->l2[idx] = l2_packet_init(iface->ifname, NULL, proto, in wpa_priv_cmd_l2_register() 527 "instance for protocol %d", proto); in wpa_priv_cmd_l2_register() 586 u16 proto; in wpa_priv_cmd_l2_send() local [all …]
|
D | wpas_glue.c | 99 u16 proto, const u8 *buf, size_t len) in wpa_ether_send() argument 102 if (wpa_s->ext_eapol_frame_io && proto == ETH_P_EAPOL) { in wpa_ether_send() 120 return wpa_drv_tx_control_port(wpa_s, dest, proto, buf, len, in wpa_ether_send() 125 return l2_packet_send(wpa_s->l2, dest, proto, buf, len); in wpa_ether_send() 483 static int _wpa_ether_send(void *wpa_s, const u8 *dest, u16 proto, in _wpa_ether_send() argument 486 return wpa_ether_send(wpa_s, dest, proto, buf, len); in _wpa_ether_send() 1308 ssid->proto &= ~WPA_PROTO_WPA; in disable_wpa_wpa2() 1309 ssid->proto |= WPA_PROTO_RSN; in disable_wpa_wpa2()
|
D | wpas_glue.h | 19 u16 proto, const u8 *buf, size_t len);
|
D | wps_supplicant.c | 241 if (ie == NULL && (ssid->proto & WPA_PROTO_WPA) && in wpas_wps_security_workaround() 268 if (wpa2 && !(ssid->proto & WPA_PROTO_RSN) && in wpas_wps_security_workaround() 269 (ssid->proto & WPA_PROTO_WPA) && in wpas_wps_security_workaround() 274 ssid->proto |= WPA_PROTO_RSN; in wpas_wps_security_workaround() 276 ssid->proto = WPA_PROTO_RSN; in wpas_wps_security_workaround() 354 new_ssid->proto |= ssid->proto; in wpas_wps_remove_dup_network() 361 if (ssid->proto != new_ssid->proto || in wpas_wps_remove_dup_network() 526 ssid->proto = 0; in wpa_supplicant_wps_cred() 541 ssid->proto = WPA_PROTO_WPA | WPA_PROTO_RSN; in wpa_supplicant_wps_cred() 556 ssid->proto = WPA_PROTO_RSN; in wpa_supplicant_wps_cred() [all …]
|
D | win_example.reg | 33 "proto"="WPA"
|
/hostap-latest/src/l2_packet/ |
D | l2_packet_ndis.c | 91 int l2_packet_send(struct l2_packet_data *l2, const u8 *dst_addr, u16 proto, in l2_packet_send() argument 123 eth->h_proto = htons(proto); in l2_packet_send() 333 USHORT proto = htons(protocol); in l2_ndisuio_set_ether_type() local 337 IOCTL_NDISUIO_SET_ETHER_TYPE, &proto, in l2_ndisuio_set_ether_type() 338 sizeof(proto), NULL, 0, &written, NULL)) { in l2_ndisuio_set_ether_type()
|
D | l2_packet_zephyr.c | 41 int l2_packet_send(struct l2_packet_data *l2, const u8 *dst_addr, u16 proto, in l2_packet_send() argument 62 ll.sll_protocol = htons(proto); in l2_packet_send()
|
D | l2_packet_privsep.c | 62 int l2_packet_send(struct l2_packet_data *l2, const u8 *dst_addr, u16 proto, in l2_packet_send() argument 73 io[2].iov_base = &proto; in l2_packet_send()
|
D | l2_packet.h | 114 int l2_packet_send(struct l2_packet_data *l2, const u8 *dst_addr, u16 proto,
|
/hostap-latest/wpa_supplicant/wpa_gui-qt4/ |
D | networkconfig.cpp | 244 const char *key_mgmt = NULL, *proto = NULL, *pairwise = NULL; in addNetwork() local 256 proto = "WPA"; in addNetwork() 260 proto = "WPA"; in addNetwork() 264 proto = "WPA2"; in addNetwork() 268 proto = "WPA2"; in addNetwork() 286 if (proto) in addNetwork() 287 setNetworkParam(id, "proto", proto, false); in addNetwork()
|
/hostap-latest/src/rsn_supp/ |
D | wpa.c | 92 int ver, const u8 *dest, u16 proto, in wpa_eapol_key_send() argument 202 ret = wpa_sm_ether_send(sm, dest, proto, msg, msg_len); in wpa_eapol_key_send() 258 reply->type = (sm->proto == WPA_PROTO_RSN || in wpa_sm_key_request() 259 sm->proto == WPA_PROTO_OSEN) ? in wpa_sm_key_request() 390 if (sm->proto == WPA_PROTO_RSN && in wpa_supplicant_get_pmk() 427 if (sm->proto == WPA_PROTO_RSN && in wpa_supplicant_get_pmk() 639 reply->type = (sm->proto == WPA_PROTO_RSN || in wpa_supplicant_send_2_of_4() 640 sm->proto == WPA_PROTO_OSEN) ? in wpa_supplicant_send_2_of_4() 643 if (sm->ptk_set && sm->proto != WPA_PROTO_WPA) in wpa_supplicant_send_2_of_4() 654 if (sm->proto == WPA_PROTO_RSN || sm->proto == WPA_PROTO_OSEN) in wpa_supplicant_send_2_of_4() [all …]
|
D | wpa_i.h | 100 unsigned int proto; member 289 u16 proto, const u8 *buf, size_t len) in wpa_sm_ether_send() argument 292 return sm->ctx->ether_send(sm->ctx->ctx, dest, proto, buf, len); in wpa_sm_ether_send() 534 int ver, const u8 *dest, u16 proto,
|
/hostap-latest/hs20/client/ |
D | osu_client.c | 141 char *proto; in osu_get_certificate() local 144 proto = xml_node_get_attr_value(ctx->xml, getcert, in osu_get_certificate() 146 if (!proto) in osu_get_certificate() 148 wpa_printf(MSG_INFO, "getCertificate - enrollmentProtocol=%s", proto); in osu_get_certificate() 149 write_summary(ctx, "getCertificate - enrollmentProtocol=%s", proto); in osu_get_certificate() 150 if (os_strcasecmp(proto, "EST") != 0) { in osu_get_certificate() 152 xml_node_get_attr_value_free(ctx->xml, proto); in osu_get_certificate() 155 xml_node_get_attr_value_free(ctx->xml, proto); in osu_get_certificate() 160 xml_node_get_attr_value_free(ctx->xml, proto); in osu_get_certificate() 982 char *proto, *port; in set_pps_cred_policy_required_proto_port() local [all …]
|
/hostap-latest/wpa_supplicant/examples/ |
D | wpa-psk-tkip.conf | 8 proto=WPA
|
D | wpa2-eap-ccmp.conf | 8 proto=WPA2
|
/hostap-latest/tests/fuzzing/eapol-key-supp/ |
D | eapol-key-supp.c | 109 static int supp_ether_send(void *ctx, const u8 *dest, u16 proto, const u8 *buf, in supp_ether_send() argument 116 __func__, MAC2STR(dest), proto, (unsigned long) len); in supp_ether_send()
|