/hostap-latest/src/common/ |
D | common_module_tests.c | 525 } valid[] = { in sae_pk_tests() local 544 for (i = 0; valid[i].pw; i++) { in sae_pk_tests() 548 const char *pw = valid[i].pw; in sae_pk_tests() 549 const u8 *val = valid[i].val; in sae_pk_tests() 566 valid[i].pw); in sae_pk_tests() 573 valid[i].pw); in sae_pk_tests()
|
/hostap-latest/wlantest/ |
D | rx_mgmt.c | 939 int valid) in rx_mgmt_deauth() argument 965 reason, valid); in rx_mgmt_deauth() 969 if (valid && mgmt->da[0] == 0xff) in rx_mgmt_deauth() 975 sta->counters[valid ? WLANTEST_STA_COUNTER_VALID_DEAUTH_RX : in rx_mgmt_deauth() 988 sta->counters[valid ? WLANTEST_STA_COUNTER_VALID_DEAUTH_TX : in rx_mgmt_deauth() 991 if (!valid) { in rx_mgmt_deauth() 2520 int valid) in rx_mgmt_disassoc() argument 2546 reason, valid); in rx_mgmt_disassoc() 2550 if (valid && mgmt->da[0] == 0xff) in rx_mgmt_disassoc() 2556 sta->counters[valid ? WLANTEST_STA_COUNTER_VALID_DISASSOC_RX : in rx_mgmt_disassoc() [all …]
|
/hostap-latest/src/fst/ |
D | fst_ctrl_iface.h | 33 int fst_read_next_int_param(const char *params, bool *valid, char **endp);
|
D | fst_ctrl_iface.c | 821 int fst_read_next_int_param(const char *params, bool *valid, char **endp) in fst_read_next_int_param() argument 826 *valid = false; in fst_read_next_int_param() 832 *valid = true; in fst_read_next_int_param()
|
/hostap-latest/src/eapol_supp/ |
D | eapol_supp_sm.h | 342 void eapol_sm_notify_portValid(struct eapol_sm *sm, bool valid); 418 bool valid) in eapol_sm_notify_portValid() argument
|
D | eapol_supp_sm.c | 1486 void eapol_sm_notify_portValid(struct eapol_sm *sm, bool valid) in eapol_sm_notify_portValid() argument 1491 "portValid=%d", valid); in eapol_sm_notify_portValid() 1492 sm->portValid = valid; in eapol_sm_notify_portValid()
|
/hostap-latest/src/ap/ |
D | wpa_auth_i.h | 73 bool valid; member 185 bool valid; member
|
D | gas_serv.h | 72 u8 valid; member
|
D | ieee802_11_eht.c | 549 if (link_id == hapd->mld_link_id || !link->valid) in hostapd_eid_eht_basic_ml_common() 759 if (!link->valid) in hostapd_eid_eht_ml_len() 1053 if (!info->links[link_id].valid || link_id == hapd->mld_link_id) in hostapd_mld_validate_assoc_info() 1256 info->links[hapd->mld_link_id].valid = 1; in hostapd_process_ml_assoc_req() 1387 link_info->valid = true; in hostapd_process_ml_assoc_req()
|
D | ieee802_1x.h | 46 void ieee802_1x_notify_port_valid(struct eapol_state_machine *sm, bool valid);
|
D | wpa_auth.c | 1136 if (!ctr[i].valid) 1151 if (ctr[i].valid && 1155 ctr[i].valid = false; 1523 if (!sm->key_replay[i].valid) 2051 sm->key_replay[i].valid = sm->key_replay[i - 1].valid; 2061 sm->key_replay[0].valid = true; 3596 if (!sm->mld_links[i].valid || i == sm->mld_assoc_link_id) { 4278 if (!sm->mld_links[link_id].valid) 4334 if (!sm->mld_links[link_id].valid) 4344 if (!sm->mld_links[link_id].valid || [all …]
|
D | gas_serv.c | 90 if (sta->gas_dialog[i].valid) in gas_dialog_create() 93 dia->valid = 1; in gas_dialog_create() 122 !sta->gas_dialog[i].valid) in gas_serv_dialog_find() 151 if (sta->gas_dialog[i].valid) in gas_serv_free_dialogs()
|
D | sta_info.h | 85 u8 valid:1; member
|
D | drv_callbacks.c | 369 info->links[link_id].valid = true; in hostapd_notif_assoc() 384 if (info->links[i].valid) in hostapd_notif_assoc() 938 if (!sta->mld_info.links[link_id].valid) in hostapd_notif_disassoc_mld() 2352 info->links[link_id].valid = true; in hostapd_notif_update_dh_ie()
|
D | wpa_auth.h | 679 if (sm->mld_links[link_id].valid && \
|
D | ieee802_1x.c | 167 if (!link->valid) in ieee802_1x_ml_set_sta_authorized() 2826 void ieee802_1x_notify_port_valid(struct eapol_state_machine *sm, bool valid) in ieee802_1x_notify_port_valid() argument 2830 sm->portValid = valid; in ieee802_1x_notify_port_valid()
|
D | wnm_ap.c | 1038 if (sta->mld_info.links[i].valid) in wnm_send_bss_tm_req()
|
/hostap-latest/hs20/server/ |
D | spp_server.c | 1291 const char *urn, int *valid, char **ret_err) in spp_get_mo() argument 1299 *valid = -1; in spp_get_mo() 1334 *valid = 1; in spp_get_mo() 1340 *valid = 1; in spp_get_mo() 1342 *valid = 0; in spp_get_mo() 2082 int valid; in hs20_spp_post_dev_data() local 2142 devinfo = spp_get_mo(ctx, node, URN_OMA_DM_DEVINFO, &valid, &err); in hs20_spp_post_dev_data() 2155 if (valid == 0) { in hs20_spp_post_dev_data() 2168 devdetail = spp_get_mo(ctx, node, URN_OMA_DM_DEVDETAIL, &valid, &err); in hs20_spp_post_dev_data() 2181 if (valid == 0) { in hs20_spp_post_dev_data() [all …]
|
/hostap-latest/tests/hwsim/ |
D | test_ap_ft.py | 2776 valid = "0601" + _addr + _bssid1 2782 valid, 2783 valid + "01", 2784 valid + "3700", 2785 valid + "3600", 2786 valid + "3603ffffff", 2787 valid + "3603a1b2ff", 2788 valid + "3603a1b2ff" + "3700", 2789 valid + "3603a1b2ff" + "37520000" + 16*"00" + 32*"00" + 32*"00", 2790 valid + "3603a1b2ff" + "37520001" + 16*"00" + 32*"00" + 32*"00", [all …]
|
/hostap-latest/src/drivers/ |
D | driver_macsec_qca.c | 703 entry.valid = 1; in macsec_qca_create_receive_sc() 889 entry.valid = 1; in macsec_qca_create_transmit_sc()
|
/hostap-latest/wpa_supplicant/doc/docbook/ |
D | wpa_supplicant.conf.sgml | 55 # home network; allow all valid ciphers
|
/hostap-latest/hostapd/ |
D | README-WPS | 130 characters removed) if the PIN is valid. 264 i.e., it will have to include valid WPS attributes. extra_cred can
|
/hostap-latest/wpa_supplicant/ |
D | eap_testing.txt | 237 server generates a valid looking reply in the same way as in Phase
|
D | README-Windows.txt | 219 (close to wide open, but you have to be a valid user on
|
D | README-P2P | 302 can rejoin the group if it is in possession of a valid key. See p2p_set 669 learned previously is still valid. It should be noted that the default
|