/hostap-latest/src/rsn_supp/ |
D | wpa.c | 92 int ver, const u8 *dest, u16 proto, in wpa_eapol_key_send() argument 100 MAC2STR(dest), ver, (int) mic_len, sm->key_mgmt); in wpa_eapol_key_send() 124 wpa_eapol_key_mic(ptk->kck, ptk->kck_len, sm->key_mgmt, ver, in wpa_eapol_key_send() 128 ver, sm->key_mgmt); in wpa_eapol_key_send() 224 int key_info, ver; in wpa_sm_key_request() local 242 ver = WPA_KEY_INFO_TYPE_AKM_DEFINED; in wpa_sm_key_request() 245 ver = WPA_KEY_INFO_TYPE_AES_128_CMAC; in wpa_sm_key_request() 247 ver = WPA_KEY_INFO_TYPE_HMAC_SHA1_AES; in wpa_sm_key_request() 249 ver = WPA_KEY_INFO_TYPE_HMAC_MD5_RC4; in wpa_sm_key_request() 261 key_info = WPA_KEY_INFO_REQUEST | ver; in wpa_sm_key_request() [all …]
|
D | wpa_i.h | 534 int ver, const u8 *dest, u16 proto, 538 int ver, const u8 *nonce, 543 u16 ver, u16 key_info,
|
/hostap-latest/src/tls/ |
D | tlsv1_common.c | 289 int tls_version_ok(u16 ver) in tls_version_ok() argument 291 if (ver == TLS_VERSION_1) in tls_version_ok() 294 if (ver == TLS_VERSION_1_1) in tls_version_ok() 298 if (ver == TLS_VERSION_1_2) in tls_version_ok() 306 const char * tls_version_str(u16 ver) in tls_version_str() argument 308 switch (ver) { in tls_version_str() 321 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, in tls_prf() argument 325 if (ver >= TLS_VERSION_1_2) { in tls_prf()
|
D | tlsv1_common.h | 258 int tls_version_ok(u16 ver); 259 const char * tls_version_str(u16 ver); 260 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label,
|
D | tlsv1_client_read.c | 30 static int tls_version_disabled(struct tlsv1_client *conn, u16 ver) in tls_version_disabled() argument 33 ver == TLS_VERSION_1) || in tls_version_disabled() 35 ver == TLS_VERSION_1_1) || in tls_version_disabled() 37 ver == TLS_VERSION_1_2)); in tls_version_disabled()
|
/hostap-latest/wlantest/ |
D | rx_eapol.c | 58 int ver, const u8 *data, size_t len) in check_mic() argument 76 if (wpa_eapol_key_mic(kck, kck_len, sta->key_mgmt, ver, buf, len, in check_mic() 178 struct wlantest_sta *sta, u16 ver, in try_pmk() argument 237 check_mic(sta, ptk.kck, ptk.kck_len, ver, data, len) < 0) in try_pmk() 244 check_mic(sta, ptk.kck, ptk.kck_len, ver, data, len) < 0) { in try_pmk() 281 struct wlantest_sta *sta, u16 ver, in derive_ptk() argument 288 MAC2STR(sta->addr), MAC2STR(sta->mld_mac_addr), ver); in derive_ptk() 291 if (try_pmk(wt, bss, sta, ver, data, len, pmk) == 0) in derive_ptk() 297 if (try_pmk(wt, bss, sta, ver, data, len, pmk) == 0) in derive_ptk() 308 ver, data, len) < 0) in derive_ptk() [all …]
|
/hostap-latest/tests/hwsim/ |
D | test_suite_b.py | 33 for ver in ['1.0.2', '1.1.0', '1.1.1', '3.']: 34 if "build=OpenSSL " + ver in tls and "run=OpenSSL " + ver in tls: 37 if not dhe and not level128 and "build=OpenSSL " + ver in tls and "run=BoringSSL" in tls: 446 ver = dev[0].get_status_field("eap_tls_version") 447 logger.info("TLS version: " + ver) 448 if tls13 and ver != "TLSv1.3": 449 raise Exception("Unexpected TLS version: " + ver)
|
D | test_p2p_service.py | 413 ver = ev.split(' ')[3] 440 if ver == ver2:
|
D | hostapd.py | 559 extra=None, use_id=None, ver=None): argument 568 if ver is not None: 569 cmd += "ver=" + str(ver) + " "
|
/hostap-latest/hs20/client/ |
D | Android.mk | 22 ver = $(filter 5.0%,$(PLATFORM_VERSION)) 23 ifneq (,$(strip $(ver)))
|
/hostap-latest/tests/ |
D | Makefile | 2 test-rsa-sig-ver \ 73 test-rsa-sig-ver: $(call BUILDOBJ,test-rsa-sig-ver.o) $(LIBS) 148 ./test-rsa-sig-ver
|
/hostap-latest/src/wps/ |
D | wps_dev_attr.c | 394 int wps_process_os_version(struct wps_device_data *dev, const u8 *ver) in wps_process_os_version() argument 396 if (ver == NULL) { in wps_process_os_version() 401 dev->os_version = WPA_GET_BE32(ver); in wps_process_os_version()
|
D | wps_dev_attr.h | 31 int wps_process_os_version(struct wps_device_data *dev, const u8 *ver);
|
/hostap-latest/src/drivers/ |
D | driver_hostap.c | 145 int ver; in handle_frame() local 166 ver = fc & WLAN_FC_PVER; in handle_frame() 171 if (ver == 1 || ver == 2) { in handle_frame() 172 handle_tx_callback(drv, buf, data_len, ver == 2 ? 1 : 0); in handle_frame() 174 } else if (ver != 0) { in handle_frame() 175 printf("unknown protocol version %d\n", ver); in handle_frame()
|
/hostap-latest/src/eap_server/ |
D | eap_server_sim.c | 108 u8 ver[2]; in eap_sim_build_start() local 158 ver[0] = 0; in eap_sim_build_start() 159 ver[1] = EAP_SIM_VERSION; in eap_sim_build_start() 160 eap_sim_msg_add(msg, EAP_SIM_AT_VERSION_LIST, sizeof(ver), in eap_sim_build_start() 161 ver, sizeof(ver)); in eap_sim_build_start()
|
/hostap-latest/tests/hwsim/vm/ |
D | linux.gdb | 10 ver = p.stdout.strip().decode('ascii') 18 gdb.execute(f'lx-symbols {mdir}/{ver}/')
|
D | parallel-vm.py | 701 ver = cmd.stdout.read().decode().strip() 703 ver = "unknown" 705 …: {} Total time: {} Version: {}".format(total_started, total_failed, end_time - start_time, ver))
|
/hostap-latest/src/ap/ |
D | dpp_hostapd.c | 374 enum dpp_pkex_ver ver, in hostapd_dpp_pkex_init() argument 381 bool v2 = ver != PKEX_VER_ONLY_1; in hostapd_dpp_pkex_init() 391 pkex->forced_ver = ver != PKEX_VER_AUTO; in hostapd_dpp_pkex_init() 1988 u8 ver = DPP_VERSION; in hostapd_dpp_send_peer_disc_resp() local 1993 if (conn_ver > 0 && ver != conn_ver) { in hostapd_dpp_send_peer_disc_resp() 1996 conn_ver, ver); in hostapd_dpp_send_peer_disc_resp() 1997 ver = conn_ver; in hostapd_dpp_send_peer_disc_resp() 2004 ver = 1; in hostapd_dpp_send_peer_disc_resp() 2011 wpabuf_put_u8(msg, ver); in hostapd_dpp_send_peer_disc_resp() 2719 u8 ver = DPP_VERSION; in hostapd_dpp_rx_priv_peer_intro_query() local [all …]
|
D | wpa_auth.c | 1396 struct wpa_state_machine *sm, u16 ver) argument 1398 if (ver > WPA_KEY_INFO_TYPE_AES_128_CMAC) { 1401 MAC2STR(wpa_auth_get_spa(sm)), ver); 1407 ver != WPA_KEY_INFO_TYPE_AES_128_CMAC) { 1417 ver != WPA_KEY_INFO_TYPE_HMAC_SHA1_AES) { 1425 ver != WPA_KEY_INFO_TYPE_AKM_DEFINED) { 1541 u16 key_info, ver, key_data_length; local 1622 ver = key_info & WPA_KEY_INFO_TYPE_MASK; 1623 if (!wpa_auth_valid_key_desc_ver(wpa_auth, sm, ver)) 1627 (ver == WPA_KEY_INFO_TYPE_HMAC_SHA1_AES || [all …]
|
/hostap-latest/src/eap_peer/ |
D | tncc.h | 34 struct wpabuf * tncc_process_soh_request(int ver, const u8 *data, size_t len);
|
D | tncc.c | 1169 static struct wpabuf * tncc_build_soh(int ver) in tncc_build_soh() argument 1197 wpabuf_put_be16(buf, ver); /* Inner Type */ in tncc_build_soh() 1200 if (ver == 2) { in tncc_build_soh() 1282 struct wpabuf * tncc_process_soh_request(int ver, const u8 *data, size_t len) in tncc_process_soh_request() argument
|
/hostap-latest/wpa_supplicant/ |
D | dpp_supplicant.c | 3032 enum dpp_pkex_ver ver, in wpas_dpp_pkex_init() argument 3039 bool v2 = ver != PKEX_VER_ONLY_1; in wpas_dpp_pkex_init() 3050 pkex->forced_ver = ver != PKEX_VER_AUTO; in wpas_dpp_pkex_init() 3802 u8 ver = DPP_VERSION; in wpas_dpp_send_private_peer_intro_update() local 3819 if (conn_ver > 0 && ver != conn_ver) { in wpas_dpp_send_private_peer_intro_update() 3822 conn_ver, ver); in wpas_dpp_send_private_peer_intro_update() 3823 ver = conn_ver; in wpas_dpp_send_private_peer_intro_update() 3827 wpabuf_put_u8(pt, ver); in wpas_dpp_send_private_peer_intro_update() 4447 u8 ver = DPP_VERSION; in wpas_dpp_start_private_peer_intro() local 4461 if (conn_ver > 0 && ver != conn_ver) { in wpas_dpp_start_private_peer_intro() [all …]
|
/hostap-latest/hostapd/ |
D | hostapd.eap_user | 40 # [ver=0] and [ver=1] flags after EAP type PEAP can be used to force PEAP
|
/hostap-latest/src/crypto/ |
D | tls_gnutls.c | 1659 gnutls_protocol_t ver; in tls_get_version() local 1661 ver = gnutls_protocol_get_version(conn->session); in tls_get_version() 1662 if (ver == GNUTLS_TLS1_0) in tls_get_version() 1664 else if (ver == GNUTLS_TLS1_1) in tls_get_version() 1666 else if (ver == GNUTLS_TLS1_2) in tls_get_version()
|
/hostap-latest/src/common/ |
D | dpp_reconfig.c | 134 u8 ver = DPP_VERSION; in dpp_reconfig_build_req() local 155 ver = 1; in dpp_reconfig_build_req() 162 wpabuf_put_u8(msg, ver); in dpp_reconfig_build_req()
|