Home
last modified time | relevance | path

Searched refs:subtype (Results 1 – 25 of 29) sorted by relevance

12

/hostap-latest/src/eap_server/
Deap_server_sake.c91 u8 id, size_t length, u8 subtype) in eap_sake_build_msg() argument
110 sake->subtype = subtype; in eap_sake_build_msg()
241 u8 version, session_id, subtype; in eap_sake_check() local
253 subtype = resp->subtype; in eap_sake_check()
266 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received frame: subtype=%d", subtype); in eap_sake_check()
268 if (data->state == IDENTITY && subtype == EAP_SAKE_SUBTYPE_IDENTITY) in eap_sake_check()
271 if (data->state == CHALLENGE && subtype == EAP_SAKE_SUBTYPE_CHALLENGE) in eap_sake_check()
274 if (data->state == CONFIRM && subtype == EAP_SAKE_SUBTYPE_CONFIRM) in eap_sake_check()
277 if (subtype == EAP_SAKE_SUBTYPE_AUTH_REJECT) in eap_sake_check()
281 subtype, data->state); in eap_sake_check()
[all …]
Deap_server_sim.c398 u8 subtype) in eap_sim_unexpected_subtype() argument
400 if (subtype == EAP_SIM_SUBTYPE_CLIENT_ERROR) in eap_sim_unexpected_subtype()
405 if (subtype != EAP_SIM_SUBTYPE_START) { in eap_sim_unexpected_subtype()
407 "subtype %d", subtype); in eap_sim_unexpected_subtype()
412 if (subtype != EAP_SIM_SUBTYPE_CHALLENGE) { in eap_sim_unexpected_subtype()
414 "subtype %d", subtype); in eap_sim_unexpected_subtype()
419 if (subtype != EAP_SIM_SUBTYPE_REAUTHENTICATION) { in eap_sim_unexpected_subtype()
421 "subtype %d", subtype); in eap_sim_unexpected_subtype()
426 if (subtype != EAP_SIM_SUBTYPE_NOTIFICATION) { in eap_sim_unexpected_subtype()
428 "subtype %d", subtype); in eap_sim_unexpected_subtype()
[all …]
Deap_server_aka.c725 static bool eap_aka_subtype_ok(struct eap_aka_data *data, u8 subtype) in eap_aka_subtype_ok() argument
727 if (subtype == EAP_AKA_SUBTYPE_CLIENT_ERROR || in eap_aka_subtype_ok()
728 subtype == EAP_AKA_SUBTYPE_AUTHENTICATION_REJECT) in eap_aka_subtype_ok()
733 if (subtype != EAP_AKA_SUBTYPE_IDENTITY) { in eap_aka_subtype_ok()
735 "subtype %d", subtype); in eap_aka_subtype_ok()
740 if (subtype != EAP_AKA_SUBTYPE_CHALLENGE && in eap_aka_subtype_ok()
741 subtype != EAP_AKA_SUBTYPE_SYNCHRONIZATION_FAILURE) { in eap_aka_subtype_ok()
743 "subtype %d", subtype); in eap_aka_subtype_ok()
748 if (subtype != EAP_AKA_SUBTYPE_REAUTHENTICATION) { in eap_aka_subtype_ok()
750 "subtype %d", subtype); in eap_aka_subtype_ok()
[all …]
Deap_server_teap.c623 u8 subtype, flags; in eap_teap_build_crypto_binding() local
671 subtype = TEAP_CRYPTO_BINDING_SUBTYPE_REQUEST; in eap_teap_build_crypto_binding()
672 cb->subtype = (flags << 4) | subtype; in eap_teap_build_crypto_binding()
703 cb->version, cb->received_version, flags, subtype); in eap_teap_build_crypto_binding()
1416 u8 flags, subtype; in eap_teap_validate_crypto_binding() local
1418 subtype = cb->subtype & 0x0f; in eap_teap_validate_crypto_binding()
1419 flags = cb->subtype >> 4; in eap_teap_validate_crypto_binding()
1423 cb->version, cb->received_version, flags, subtype); in eap_teap_validate_crypto_binding()
1446 if (subtype != TEAP_CRYPTO_BINDING_SUBTYPE_RESPONSE) { in eap_teap_validate_crypto_binding()
1449 subtype); in eap_teap_validate_crypto_binding()
Deap_server_fast.c635 binding->subtype = EAP_TLV_CRYPTO_BINDING_SUBTYPE_REQUEST; in eap_fast_build_crypto_binding()
663 binding->subtype); in eap_fast_build_crypto_binding()
1192 b->version, b->received_version, b->subtype); in eap_fast_validate_crypto_binding()
1207 if (b->subtype != EAP_TLV_CRYPTO_BINDING_SUBTYPE_RESPONSE) { in eap_fast_validate_crypto_binding()
1209 "Crypto-Binding: %d", b->subtype); in eap_fast_validate_crypto_binding()
Dtncs.c490 unsigned int vendor, subtype; in tncs_supported_type() local
496 subtype = type & 0xff; in tncs_supported_type()
503 (subtype == ssubtype || ssubtype == TNC_SUBTYPE_ANY)) in tncs_supported_type()
/hostap-latest/src/eap_peer/
Deap_sake.c115 int id, size_t length, u8 subtype) in eap_sake_build_msg() argument
134 sake->subtype = subtype; in eap_sake_build_msg()
379 u8 subtype, session_id, id; in eap_sake_process() local
390 subtype = req->subtype; in eap_sake_process()
395 "session_id %d", subtype, session_id); in eap_sake_process()
413 switch (subtype) { in eap_sake_process()
428 "unknown subtype %d", subtype); in eap_sake_process()
Deap_teap.c647 u8 flags, subtype; in eap_teap_validate_crypto_binding() local
649 subtype = cb->subtype & 0x0f; in eap_teap_validate_crypto_binding()
650 flags = cb->subtype >> 4; in eap_teap_validate_crypto_binding()
654 cb->version, cb->received_version, flags, subtype); in eap_teap_validate_crypto_binding()
664 subtype != TEAP_CRYPTO_BINDING_SUBTYPE_REQUEST || in eap_teap_validate_crypto_binding()
668 cb->version, cb->received_version, flags, subtype); in eap_teap_validate_crypto_binding()
688 u8 subtype, flags; in eap_teap_write_crypto_binding() local
700 subtype = TEAP_CRYPTO_BINDING_SUBTYPE_RESPONSE; in eap_teap_write_crypto_binding()
701 rbind->subtype = (flags << 4) | subtype; in eap_teap_write_crypto_binding()
719 rbind->version, rbind->received_version, flags, subtype); in eap_teap_write_crypto_binding()
[all …]
Deap_sim.c1198 u8 subtype, id; in eap_sim_process() local
1226 subtype = *pos++; in eap_sim_process()
1227 wpa_printf(MSG_DEBUG, "EAP-SIM: Subtype=%d", subtype); in eap_sim_process()
1237 switch (subtype) { in eap_sim_process()
1258 wpa_printf(MSG_DEBUG, "EAP-SIM: Unknown subtype=%d", subtype); in eap_sim_process()
Deap_aka.c1470 u8 subtype, id; in eap_aka_process() local
1499 subtype = *pos++; in eap_aka_process()
1500 wpa_printf(MSG_DEBUG, "EAP-AKA: Subtype=%d", subtype); in eap_aka_process()
1511 switch (subtype) { in eap_aka_process()
1532 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown subtype=%d", subtype); in eap_aka_process()
Deap_fast.c621 _bind->version, _bind->received_version, _bind->subtype); in eap_fast_validate_crypto_binding()
629 _bind->subtype != EAP_TLV_CRYPTO_BINDING_SUBTYPE_REQUEST) { in eap_fast_validate_crypto_binding()
634 _bind->subtype); in eap_fast_validate_crypto_binding()
652 rbind->subtype = EAP_TLV_CRYPTO_BINDING_SUBTYPE_RESPONSE; in eap_fast_write_crypto_binding()
660 rbind->version, rbind->received_version, rbind->subtype); in eap_fast_write_crypto_binding()
Dtncc.c465 unsigned int vendor, subtype; in tncc_supported_type() local
471 subtype = type & 0xff; in tncc_supported_type()
478 (subtype == ssubtype || ssubtype == TNC_SUBTYPE_ANY)) in tncc_supported_type()
/hostap-latest/src/ap/
Dgas_serv.c1221 static void rx_anqp_hs_query_list(struct hostapd_data *hapd, u8 subtype, in rx_anqp_hs_query_list() argument
1224 switch (subtype) { in rx_anqp_hs_query_list()
1264 subtype); in rx_anqp_hs_query_list()
1308 u8 subtype; in rx_anqp_vendor_specific_hs20() local
1313 subtype = *pos++; in rx_anqp_vendor_specific_hs20()
1315 switch (subtype) { in rx_anqp_vendor_specific_hs20()
1331 "%u", subtype); in rx_anqp_vendor_specific_hs20()
1359 static void rx_anqp_mbo_query_list(struct hostapd_data *hapd, u8 subtype, in rx_anqp_mbo_query_list() argument
1362 switch (subtype) { in rx_anqp_mbo_query_list()
1370 subtype); in rx_anqp_mbo_query_list()
[all …]
/hostap-latest/wpa_supplicant/
Dmbo.c672 u8 subtype; in mbo_parse_rx_anqp_resp() local
677 subtype = *pos++; in mbo_parse_rx_anqp_resp()
680 switch (subtype) { in mbo_parse_rx_anqp_resp()
689 subtype); in mbo_parse_rx_anqp_resp()
Dhs20_supplicant.c594 u8 subtype; in hs20_parse_rx_hs20_anqp_resp() local
604 subtype = *pos++; in hs20_parse_rx_hs20_anqp_resp()
610 switch (subtype) { in hs20_parse_rx_hs20_anqp_resp()
708 wpa_printf(MSG_DEBUG, "HS20: Unsupported subtype %u", subtype); in hs20_parse_rx_hs20_anqp_resp()
/hostap-latest/src/eap_common/
Deap_tlv_common.h75 u8 subtype; member
Deap_sake_common.h50 u8 subtype; member
Deap_teap_common.h76 u8 subtype; /* Flags[4b] and Sub-Type[4b] */ member
Deap_sim_common.h213 struct eap_sim_msg * eap_sim_msg_init(int code, int id, int type, int subtype);
/hostap-latest/src/p2p/
Dp2p_build.c19 void p2p_buf_add_action_hdr(struct wpabuf *buf, u8 subtype, u8 dialog_token) in p2p_buf_add_action_hdr() argument
24 wpabuf_put_u8(buf, subtype); /* OUI Subtype */ in p2p_buf_add_action_hdr()
30 void p2p_buf_add_public_action_hdr(struct wpabuf *buf, u8 subtype, in p2p_buf_add_public_action_hdr() argument
37 wpabuf_put_u8(buf, subtype); /* OUI Subtype */ in p2p_buf_add_public_action_hdr()
Dp2p_i.h747 void p2p_buf_add_action_hdr(struct wpabuf *buf, u8 subtype, u8 dialog_token);
748 void p2p_buf_add_public_action_hdr(struct wpabuf *buf, u8 subtype,
/hostap-latest/tests/hwsim/
Dtest_dscp.py26 subtype = 13
44 msg['subtype'] = subtype
Dtest_p2p_messages.py166 (oui1, oui2, oui3, subtype) = struct.unpack('BBBB', pos[0:4])
167 if oui1 != 0x50 or oui2 != 0x6f or oui3 != 0x9a or subtype != 9:
170 (subtype, dialog_token) = struct.unpack('BB', pos[0:2])
172 p2p['subtype'] = subtype
184 (oui1, oui2, oui3, subtype) = struct.unpack('BBBB', pos[0:4])
185 if oui1 == 0x50 and oui2 == 0x6f and oui3 == 0x9a and subtype == 9:
190 if oui1 == 0x00 and oui2 == 0x50 and oui3 == 0xf2 and subtype == 4:
/hostap-latest/src/radius/
Dradius.c1081 u8 subtype, size_t *alen) in radius_msg_get_vendor_attr() argument
1118 if (vhdr->vendor_type != subtype) { in radius_msg_get_vendor_attr()
1418 int radius_msg_add_wfa(struct radius_msg *msg, u8 subtype, const u8 *data, in radius_msg_add_wfa() argument
1432 *pos++ = subtype; in radius_msg_add_wfa()
Dradius.h314 int radius_msg_add_wfa(struct radius_msg *msg, u8 subtype, const u8 *data,

12