Home
last modified time | relevance | path

Searched refs:valid (Results 1 – 25 of 36) sorted by relevance

12

/hostap-latest/src/common/
Dcommon_module_tests.c525 } valid[] = { in sae_pk_tests() local
544 for (i = 0; valid[i].pw; i++) { in sae_pk_tests()
548 const char *pw = valid[i].pw; in sae_pk_tests()
549 const u8 *val = valid[i].val; in sae_pk_tests()
566 valid[i].pw); in sae_pk_tests()
573 valid[i].pw); in sae_pk_tests()
/hostap-latest/wlantest/
Drx_mgmt.c939 int valid) in rx_mgmt_deauth() argument
965 reason, valid); in rx_mgmt_deauth()
969 if (valid && mgmt->da[0] == 0xff) in rx_mgmt_deauth()
975 sta->counters[valid ? WLANTEST_STA_COUNTER_VALID_DEAUTH_RX : in rx_mgmt_deauth()
988 sta->counters[valid ? WLANTEST_STA_COUNTER_VALID_DEAUTH_TX : in rx_mgmt_deauth()
991 if (!valid) { in rx_mgmt_deauth()
2520 int valid) in rx_mgmt_disassoc() argument
2546 reason, valid); in rx_mgmt_disassoc()
2550 if (valid && mgmt->da[0] == 0xff) in rx_mgmt_disassoc()
2556 sta->counters[valid ? WLANTEST_STA_COUNTER_VALID_DISASSOC_RX : in rx_mgmt_disassoc()
[all …]
/hostap-latest/src/fst/
Dfst_ctrl_iface.h33 int fst_read_next_int_param(const char *params, bool *valid, char **endp);
Dfst_ctrl_iface.c821 int fst_read_next_int_param(const char *params, bool *valid, char **endp) in fst_read_next_int_param() argument
826 *valid = false; in fst_read_next_int_param()
832 *valid = true; in fst_read_next_int_param()
/hostap-latest/src/eapol_supp/
Deapol_supp_sm.h342 void eapol_sm_notify_portValid(struct eapol_sm *sm, bool valid);
418 bool valid) in eapol_sm_notify_portValid() argument
Deapol_supp_sm.c1486 void eapol_sm_notify_portValid(struct eapol_sm *sm, bool valid) in eapol_sm_notify_portValid() argument
1491 "portValid=%d", valid); in eapol_sm_notify_portValid()
1492 sm->portValid = valid; in eapol_sm_notify_portValid()
/hostap-latest/src/ap/
Dwpa_auth_i.h73 bool valid; member
185 bool valid; member
Dgas_serv.h72 u8 valid; member
Dieee802_11_eht.c549 if (link_id == hapd->mld_link_id || !link->valid) in hostapd_eid_eht_basic_ml_common()
759 if (!link->valid) in hostapd_eid_eht_ml_len()
1053 if (!info->links[link_id].valid || link_id == hapd->mld_link_id) in hostapd_mld_validate_assoc_info()
1256 info->links[hapd->mld_link_id].valid = 1; in hostapd_process_ml_assoc_req()
1387 link_info->valid = true; in hostapd_process_ml_assoc_req()
Dieee802_1x.h46 void ieee802_1x_notify_port_valid(struct eapol_state_machine *sm, bool valid);
Dwpa_auth.c1136 if (!ctr[i].valid)
1151 if (ctr[i].valid &&
1155 ctr[i].valid = false;
1523 if (!sm->key_replay[i].valid)
2051 sm->key_replay[i].valid = sm->key_replay[i - 1].valid;
2061 sm->key_replay[0].valid = true;
3596 if (!sm->mld_links[i].valid || i == sm->mld_assoc_link_id) {
4278 if (!sm->mld_links[link_id].valid)
4334 if (!sm->mld_links[link_id].valid)
4344 if (!sm->mld_links[link_id].valid ||
[all …]
Dgas_serv.c90 if (sta->gas_dialog[i].valid) in gas_dialog_create()
93 dia->valid = 1; in gas_dialog_create()
122 !sta->gas_dialog[i].valid) in gas_serv_dialog_find()
151 if (sta->gas_dialog[i].valid) in gas_serv_free_dialogs()
Dsta_info.h85 u8 valid:1; member
Ddrv_callbacks.c369 info->links[link_id].valid = true; in hostapd_notif_assoc()
384 if (info->links[i].valid) in hostapd_notif_assoc()
938 if (!sta->mld_info.links[link_id].valid) in hostapd_notif_disassoc_mld()
2352 info->links[link_id].valid = true; in hostapd_notif_update_dh_ie()
Dwpa_auth.h679 if (sm->mld_links[link_id].valid && \
Dieee802_1x.c167 if (!link->valid) in ieee802_1x_ml_set_sta_authorized()
2826 void ieee802_1x_notify_port_valid(struct eapol_state_machine *sm, bool valid) in ieee802_1x_notify_port_valid() argument
2830 sm->portValid = valid; in ieee802_1x_notify_port_valid()
Dwnm_ap.c1038 if (sta->mld_info.links[i].valid) in wnm_send_bss_tm_req()
/hostap-latest/hs20/server/
Dspp_server.c1291 const char *urn, int *valid, char **ret_err) in spp_get_mo() argument
1299 *valid = -1; in spp_get_mo()
1334 *valid = 1; in spp_get_mo()
1340 *valid = 1; in spp_get_mo()
1342 *valid = 0; in spp_get_mo()
2082 int valid; in hs20_spp_post_dev_data() local
2142 devinfo = spp_get_mo(ctx, node, URN_OMA_DM_DEVINFO, &valid, &err); in hs20_spp_post_dev_data()
2155 if (valid == 0) { in hs20_spp_post_dev_data()
2168 devdetail = spp_get_mo(ctx, node, URN_OMA_DM_DEVDETAIL, &valid, &err); in hs20_spp_post_dev_data()
2181 if (valid == 0) { in hs20_spp_post_dev_data()
[all …]
/hostap-latest/tests/hwsim/
Dtest_ap_ft.py2776 valid = "0601" + _addr + _bssid1
2782 valid,
2783 valid + "01",
2784 valid + "3700",
2785 valid + "3600",
2786 valid + "3603ffffff",
2787 valid + "3603a1b2ff",
2788 valid + "3603a1b2ff" + "3700",
2789 valid + "3603a1b2ff" + "37520000" + 16*"00" + 32*"00" + 32*"00",
2790 valid + "3603a1b2ff" + "37520001" + 16*"00" + 32*"00" + 32*"00",
[all …]
/hostap-latest/src/drivers/
Ddriver_macsec_qca.c703 entry.valid = 1; in macsec_qca_create_receive_sc()
889 entry.valid = 1; in macsec_qca_create_transmit_sc()
/hostap-latest/wpa_supplicant/doc/docbook/
Dwpa_supplicant.conf.sgml55 # home network; allow all valid ciphers
/hostap-latest/hostapd/
DREADME-WPS130 characters removed) if the PIN is valid.
264 i.e., it will have to include valid WPS attributes. extra_cred can
/hostap-latest/wpa_supplicant/
Deap_testing.txt237 server generates a valid looking reply in the same way as in Phase
DREADME-Windows.txt219 (close to wide open, but you have to be a valid user on
DREADME-P2P302 can rejoin the group if it is in possession of a valid key. See p2p_set
669 learned previously is still valid. It should be noted that the default

12