/hostap-latest/src/eap_server/ |
D | eap_server_sake.c | 91 u8 id, size_t length, u8 subtype) in eap_sake_build_msg() argument 110 sake->subtype = subtype; in eap_sake_build_msg() 241 u8 version, session_id, subtype; in eap_sake_check() local 253 subtype = resp->subtype; in eap_sake_check() 266 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received frame: subtype=%d", subtype); in eap_sake_check() 268 if (data->state == IDENTITY && subtype == EAP_SAKE_SUBTYPE_IDENTITY) in eap_sake_check() 271 if (data->state == CHALLENGE && subtype == EAP_SAKE_SUBTYPE_CHALLENGE) in eap_sake_check() 274 if (data->state == CONFIRM && subtype == EAP_SAKE_SUBTYPE_CONFIRM) in eap_sake_check() 277 if (subtype == EAP_SAKE_SUBTYPE_AUTH_REJECT) in eap_sake_check() 281 subtype, data->state); in eap_sake_check() [all …]
|
D | eap_server_sim.c | 398 u8 subtype) in eap_sim_unexpected_subtype() argument 400 if (subtype == EAP_SIM_SUBTYPE_CLIENT_ERROR) in eap_sim_unexpected_subtype() 405 if (subtype != EAP_SIM_SUBTYPE_START) { in eap_sim_unexpected_subtype() 407 "subtype %d", subtype); in eap_sim_unexpected_subtype() 412 if (subtype != EAP_SIM_SUBTYPE_CHALLENGE) { in eap_sim_unexpected_subtype() 414 "subtype %d", subtype); in eap_sim_unexpected_subtype() 419 if (subtype != EAP_SIM_SUBTYPE_REAUTHENTICATION) { in eap_sim_unexpected_subtype() 421 "subtype %d", subtype); in eap_sim_unexpected_subtype() 426 if (subtype != EAP_SIM_SUBTYPE_NOTIFICATION) { in eap_sim_unexpected_subtype() 428 "subtype %d", subtype); in eap_sim_unexpected_subtype() [all …]
|
D | eap_server_aka.c | 725 static bool eap_aka_subtype_ok(struct eap_aka_data *data, u8 subtype) in eap_aka_subtype_ok() argument 727 if (subtype == EAP_AKA_SUBTYPE_CLIENT_ERROR || in eap_aka_subtype_ok() 728 subtype == EAP_AKA_SUBTYPE_AUTHENTICATION_REJECT) in eap_aka_subtype_ok() 733 if (subtype != EAP_AKA_SUBTYPE_IDENTITY) { in eap_aka_subtype_ok() 735 "subtype %d", subtype); in eap_aka_subtype_ok() 740 if (subtype != EAP_AKA_SUBTYPE_CHALLENGE && in eap_aka_subtype_ok() 741 subtype != EAP_AKA_SUBTYPE_SYNCHRONIZATION_FAILURE) { in eap_aka_subtype_ok() 743 "subtype %d", subtype); in eap_aka_subtype_ok() 748 if (subtype != EAP_AKA_SUBTYPE_REAUTHENTICATION) { in eap_aka_subtype_ok() 750 "subtype %d", subtype); in eap_aka_subtype_ok() [all …]
|
D | eap_server_teap.c | 623 u8 subtype, flags; in eap_teap_build_crypto_binding() local 671 subtype = TEAP_CRYPTO_BINDING_SUBTYPE_REQUEST; in eap_teap_build_crypto_binding() 672 cb->subtype = (flags << 4) | subtype; in eap_teap_build_crypto_binding() 703 cb->version, cb->received_version, flags, subtype); in eap_teap_build_crypto_binding() 1416 u8 flags, subtype; in eap_teap_validate_crypto_binding() local 1418 subtype = cb->subtype & 0x0f; in eap_teap_validate_crypto_binding() 1419 flags = cb->subtype >> 4; in eap_teap_validate_crypto_binding() 1423 cb->version, cb->received_version, flags, subtype); in eap_teap_validate_crypto_binding() 1446 if (subtype != TEAP_CRYPTO_BINDING_SUBTYPE_RESPONSE) { in eap_teap_validate_crypto_binding() 1449 subtype); in eap_teap_validate_crypto_binding()
|
D | eap_server_fast.c | 635 binding->subtype = EAP_TLV_CRYPTO_BINDING_SUBTYPE_REQUEST; in eap_fast_build_crypto_binding() 663 binding->subtype); in eap_fast_build_crypto_binding() 1192 b->version, b->received_version, b->subtype); in eap_fast_validate_crypto_binding() 1207 if (b->subtype != EAP_TLV_CRYPTO_BINDING_SUBTYPE_RESPONSE) { in eap_fast_validate_crypto_binding() 1209 "Crypto-Binding: %d", b->subtype); in eap_fast_validate_crypto_binding()
|
D | tncs.c | 490 unsigned int vendor, subtype; in tncs_supported_type() local 496 subtype = type & 0xff; in tncs_supported_type() 503 (subtype == ssubtype || ssubtype == TNC_SUBTYPE_ANY)) in tncs_supported_type()
|
/hostap-latest/src/eap_peer/ |
D | eap_sake.c | 115 int id, size_t length, u8 subtype) in eap_sake_build_msg() argument 134 sake->subtype = subtype; in eap_sake_build_msg() 379 u8 subtype, session_id, id; in eap_sake_process() local 390 subtype = req->subtype; in eap_sake_process() 395 "session_id %d", subtype, session_id); in eap_sake_process() 413 switch (subtype) { in eap_sake_process() 428 "unknown subtype %d", subtype); in eap_sake_process()
|
D | eap_teap.c | 647 u8 flags, subtype; in eap_teap_validate_crypto_binding() local 649 subtype = cb->subtype & 0x0f; in eap_teap_validate_crypto_binding() 650 flags = cb->subtype >> 4; in eap_teap_validate_crypto_binding() 654 cb->version, cb->received_version, flags, subtype); in eap_teap_validate_crypto_binding() 664 subtype != TEAP_CRYPTO_BINDING_SUBTYPE_REQUEST || in eap_teap_validate_crypto_binding() 668 cb->version, cb->received_version, flags, subtype); in eap_teap_validate_crypto_binding() 688 u8 subtype, flags; in eap_teap_write_crypto_binding() local 700 subtype = TEAP_CRYPTO_BINDING_SUBTYPE_RESPONSE; in eap_teap_write_crypto_binding() 701 rbind->subtype = (flags << 4) | subtype; in eap_teap_write_crypto_binding() 719 rbind->version, rbind->received_version, flags, subtype); in eap_teap_write_crypto_binding() [all …]
|
D | eap_sim.c | 1198 u8 subtype, id; in eap_sim_process() local 1226 subtype = *pos++; in eap_sim_process() 1227 wpa_printf(MSG_DEBUG, "EAP-SIM: Subtype=%d", subtype); in eap_sim_process() 1237 switch (subtype) { in eap_sim_process() 1258 wpa_printf(MSG_DEBUG, "EAP-SIM: Unknown subtype=%d", subtype); in eap_sim_process()
|
D | eap_aka.c | 1470 u8 subtype, id; in eap_aka_process() local 1499 subtype = *pos++; in eap_aka_process() 1500 wpa_printf(MSG_DEBUG, "EAP-AKA: Subtype=%d", subtype); in eap_aka_process() 1511 switch (subtype) { in eap_aka_process() 1532 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown subtype=%d", subtype); in eap_aka_process()
|
D | eap_fast.c | 621 _bind->version, _bind->received_version, _bind->subtype); in eap_fast_validate_crypto_binding() 629 _bind->subtype != EAP_TLV_CRYPTO_BINDING_SUBTYPE_REQUEST) { in eap_fast_validate_crypto_binding() 634 _bind->subtype); in eap_fast_validate_crypto_binding() 652 rbind->subtype = EAP_TLV_CRYPTO_BINDING_SUBTYPE_RESPONSE; in eap_fast_write_crypto_binding() 660 rbind->version, rbind->received_version, rbind->subtype); in eap_fast_write_crypto_binding()
|
D | tncc.c | 465 unsigned int vendor, subtype; in tncc_supported_type() local 471 subtype = type & 0xff; in tncc_supported_type() 478 (subtype == ssubtype || ssubtype == TNC_SUBTYPE_ANY)) in tncc_supported_type()
|
/hostap-latest/src/ap/ |
D | gas_serv.c | 1221 static void rx_anqp_hs_query_list(struct hostapd_data *hapd, u8 subtype, in rx_anqp_hs_query_list() argument 1224 switch (subtype) { in rx_anqp_hs_query_list() 1264 subtype); in rx_anqp_hs_query_list() 1308 u8 subtype; in rx_anqp_vendor_specific_hs20() local 1313 subtype = *pos++; in rx_anqp_vendor_specific_hs20() 1315 switch (subtype) { in rx_anqp_vendor_specific_hs20() 1331 "%u", subtype); in rx_anqp_vendor_specific_hs20() 1359 static void rx_anqp_mbo_query_list(struct hostapd_data *hapd, u8 subtype, in rx_anqp_mbo_query_list() argument 1362 switch (subtype) { in rx_anqp_mbo_query_list() 1370 subtype); in rx_anqp_mbo_query_list() [all …]
|
/hostap-latest/wpa_supplicant/ |
D | mbo.c | 672 u8 subtype; in mbo_parse_rx_anqp_resp() local 677 subtype = *pos++; in mbo_parse_rx_anqp_resp() 680 switch (subtype) { in mbo_parse_rx_anqp_resp() 689 subtype); in mbo_parse_rx_anqp_resp()
|
D | hs20_supplicant.c | 594 u8 subtype; in hs20_parse_rx_hs20_anqp_resp() local 604 subtype = *pos++; in hs20_parse_rx_hs20_anqp_resp() 610 switch (subtype) { in hs20_parse_rx_hs20_anqp_resp() 708 wpa_printf(MSG_DEBUG, "HS20: Unsupported subtype %u", subtype); in hs20_parse_rx_hs20_anqp_resp()
|
/hostap-latest/src/eap_common/ |
D | eap_tlv_common.h | 75 u8 subtype; member
|
D | eap_sake_common.h | 50 u8 subtype; member
|
D | eap_teap_common.h | 76 u8 subtype; /* Flags[4b] and Sub-Type[4b] */ member
|
D | eap_sim_common.h | 213 struct eap_sim_msg * eap_sim_msg_init(int code, int id, int type, int subtype);
|
/hostap-latest/src/p2p/ |
D | p2p_build.c | 19 void p2p_buf_add_action_hdr(struct wpabuf *buf, u8 subtype, u8 dialog_token) in p2p_buf_add_action_hdr() argument 24 wpabuf_put_u8(buf, subtype); /* OUI Subtype */ in p2p_buf_add_action_hdr() 30 void p2p_buf_add_public_action_hdr(struct wpabuf *buf, u8 subtype, in p2p_buf_add_public_action_hdr() argument 37 wpabuf_put_u8(buf, subtype); /* OUI Subtype */ in p2p_buf_add_public_action_hdr()
|
D | p2p_i.h | 747 void p2p_buf_add_action_hdr(struct wpabuf *buf, u8 subtype, u8 dialog_token); 748 void p2p_buf_add_public_action_hdr(struct wpabuf *buf, u8 subtype,
|
/hostap-latest/tests/hwsim/ |
D | test_dscp.py | 26 subtype = 13 44 msg['subtype'] = subtype
|
D | test_p2p_messages.py | 166 (oui1, oui2, oui3, subtype) = struct.unpack('BBBB', pos[0:4]) 167 if oui1 != 0x50 or oui2 != 0x6f or oui3 != 0x9a or subtype != 9: 170 (subtype, dialog_token) = struct.unpack('BB', pos[0:2]) 172 p2p['subtype'] = subtype 184 (oui1, oui2, oui3, subtype) = struct.unpack('BBBB', pos[0:4]) 185 if oui1 == 0x50 and oui2 == 0x6f and oui3 == 0x9a and subtype == 9: 190 if oui1 == 0x00 and oui2 == 0x50 and oui3 == 0xf2 and subtype == 4:
|
/hostap-latest/src/radius/ |
D | radius.c | 1081 u8 subtype, size_t *alen) in radius_msg_get_vendor_attr() argument 1118 if (vhdr->vendor_type != subtype) { in radius_msg_get_vendor_attr() 1418 int radius_msg_add_wfa(struct radius_msg *msg, u8 subtype, const u8 *data, in radius_msg_add_wfa() argument 1432 *pos++ = subtype; in radius_msg_add_wfa()
|
D | radius.h | 314 int radius_msg_add_wfa(struct radius_msg *msg, u8 subtype, const u8 *data,
|