Home
last modified time | relevance | path

Searched refs:ver (Results 1 – 25 of 38) sorted by relevance

12

/hostap-latest/src/rsn_supp/
Dwpa.c92 int ver, const u8 *dest, u16 proto, in wpa_eapol_key_send() argument
100 MAC2STR(dest), ver, (int) mic_len, sm->key_mgmt); in wpa_eapol_key_send()
124 wpa_eapol_key_mic(ptk->kck, ptk->kck_len, sm->key_mgmt, ver, in wpa_eapol_key_send()
128 ver, sm->key_mgmt); in wpa_eapol_key_send()
224 int key_info, ver; in wpa_sm_key_request() local
242 ver = WPA_KEY_INFO_TYPE_AKM_DEFINED; in wpa_sm_key_request()
245 ver = WPA_KEY_INFO_TYPE_AES_128_CMAC; in wpa_sm_key_request()
247 ver = WPA_KEY_INFO_TYPE_HMAC_SHA1_AES; in wpa_sm_key_request()
249 ver = WPA_KEY_INFO_TYPE_HMAC_MD5_RC4; in wpa_sm_key_request()
261 key_info = WPA_KEY_INFO_REQUEST | ver; in wpa_sm_key_request()
[all …]
Dwpa_i.h534 int ver, const u8 *dest, u16 proto,
538 int ver, const u8 *nonce,
543 u16 ver, u16 key_info,
/hostap-latest/src/tls/
Dtlsv1_common.c289 int tls_version_ok(u16 ver) in tls_version_ok() argument
291 if (ver == TLS_VERSION_1) in tls_version_ok()
294 if (ver == TLS_VERSION_1_1) in tls_version_ok()
298 if (ver == TLS_VERSION_1_2) in tls_version_ok()
306 const char * tls_version_str(u16 ver) in tls_version_str() argument
308 switch (ver) { in tls_version_str()
321 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, in tls_prf() argument
325 if (ver >= TLS_VERSION_1_2) { in tls_prf()
Dtlsv1_common.h258 int tls_version_ok(u16 ver);
259 const char * tls_version_str(u16 ver);
260 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label,
Dtlsv1_client_read.c30 static int tls_version_disabled(struct tlsv1_client *conn, u16 ver) in tls_version_disabled() argument
33 ver == TLS_VERSION_1) || in tls_version_disabled()
35 ver == TLS_VERSION_1_1) || in tls_version_disabled()
37 ver == TLS_VERSION_1_2)); in tls_version_disabled()
/hostap-latest/wlantest/
Drx_eapol.c58 int ver, const u8 *data, size_t len) in check_mic() argument
76 if (wpa_eapol_key_mic(kck, kck_len, sta->key_mgmt, ver, buf, len, in check_mic()
178 struct wlantest_sta *sta, u16 ver, in try_pmk() argument
237 check_mic(sta, ptk.kck, ptk.kck_len, ver, data, len) < 0) in try_pmk()
244 check_mic(sta, ptk.kck, ptk.kck_len, ver, data, len) < 0) { in try_pmk()
281 struct wlantest_sta *sta, u16 ver, in derive_ptk() argument
288 MAC2STR(sta->addr), MAC2STR(sta->mld_mac_addr), ver); in derive_ptk()
291 if (try_pmk(wt, bss, sta, ver, data, len, pmk) == 0) in derive_ptk()
297 if (try_pmk(wt, bss, sta, ver, data, len, pmk) == 0) in derive_ptk()
308 ver, data, len) < 0) in derive_ptk()
[all …]
/hostap-latest/tests/hwsim/
Dtest_suite_b.py33 for ver in ['1.0.2', '1.1.0', '1.1.1', '3.']:
34 if "build=OpenSSL " + ver in tls and "run=OpenSSL " + ver in tls:
37 if not dhe and not level128 and "build=OpenSSL " + ver in tls and "run=BoringSSL" in tls:
446 ver = dev[0].get_status_field("eap_tls_version")
447 logger.info("TLS version: " + ver)
448 if tls13 and ver != "TLSv1.3":
449 raise Exception("Unexpected TLS version: " + ver)
Dtest_p2p_service.py413 ver = ev.split(' ')[3]
440 if ver == ver2:
Dhostapd.py559 extra=None, use_id=None, ver=None): argument
568 if ver is not None:
569 cmd += "ver=" + str(ver) + " "
/hostap-latest/hs20/client/
DAndroid.mk22 ver = $(filter 5.0%,$(PLATFORM_VERSION))
23 ifneq (,$(strip $(ver)))
/hostap-latest/tests/
DMakefile2 test-rsa-sig-ver \
73 test-rsa-sig-ver: $(call BUILDOBJ,test-rsa-sig-ver.o) $(LIBS)
148 ./test-rsa-sig-ver
/hostap-latest/src/wps/
Dwps_dev_attr.c394 int wps_process_os_version(struct wps_device_data *dev, const u8 *ver) in wps_process_os_version() argument
396 if (ver == NULL) { in wps_process_os_version()
401 dev->os_version = WPA_GET_BE32(ver); in wps_process_os_version()
Dwps_dev_attr.h31 int wps_process_os_version(struct wps_device_data *dev, const u8 *ver);
/hostap-latest/src/drivers/
Ddriver_hostap.c145 int ver; in handle_frame() local
166 ver = fc & WLAN_FC_PVER; in handle_frame()
171 if (ver == 1 || ver == 2) { in handle_frame()
172 handle_tx_callback(drv, buf, data_len, ver == 2 ? 1 : 0); in handle_frame()
174 } else if (ver != 0) { in handle_frame()
175 printf("unknown protocol version %d\n", ver); in handle_frame()
/hostap-latest/src/eap_server/
Deap_server_sim.c108 u8 ver[2]; in eap_sim_build_start() local
158 ver[0] = 0; in eap_sim_build_start()
159 ver[1] = EAP_SIM_VERSION; in eap_sim_build_start()
160 eap_sim_msg_add(msg, EAP_SIM_AT_VERSION_LIST, sizeof(ver), in eap_sim_build_start()
161 ver, sizeof(ver)); in eap_sim_build_start()
/hostap-latest/tests/hwsim/vm/
Dlinux.gdb10 ver = p.stdout.strip().decode('ascii')
18 gdb.execute(f'lx-symbols {mdir}/{ver}/')
Dparallel-vm.py701 ver = cmd.stdout.read().decode().strip()
703 ver = "unknown"
705 …: {} Total time: {} Version: {}".format(total_started, total_failed, end_time - start_time, ver))
/hostap-latest/src/ap/
Ddpp_hostapd.c374 enum dpp_pkex_ver ver, in hostapd_dpp_pkex_init() argument
381 bool v2 = ver != PKEX_VER_ONLY_1; in hostapd_dpp_pkex_init()
391 pkex->forced_ver = ver != PKEX_VER_AUTO; in hostapd_dpp_pkex_init()
1988 u8 ver = DPP_VERSION; in hostapd_dpp_send_peer_disc_resp() local
1993 if (conn_ver > 0 && ver != conn_ver) { in hostapd_dpp_send_peer_disc_resp()
1996 conn_ver, ver); in hostapd_dpp_send_peer_disc_resp()
1997 ver = conn_ver; in hostapd_dpp_send_peer_disc_resp()
2004 ver = 1; in hostapd_dpp_send_peer_disc_resp()
2011 wpabuf_put_u8(msg, ver); in hostapd_dpp_send_peer_disc_resp()
2719 u8 ver = DPP_VERSION; in hostapd_dpp_rx_priv_peer_intro_query() local
[all …]
Dwpa_auth.c1396 struct wpa_state_machine *sm, u16 ver) argument
1398 if (ver > WPA_KEY_INFO_TYPE_AES_128_CMAC) {
1401 MAC2STR(wpa_auth_get_spa(sm)), ver);
1407 ver != WPA_KEY_INFO_TYPE_AES_128_CMAC) {
1417 ver != WPA_KEY_INFO_TYPE_HMAC_SHA1_AES) {
1425 ver != WPA_KEY_INFO_TYPE_AKM_DEFINED) {
1541 u16 key_info, ver, key_data_length; local
1622 ver = key_info & WPA_KEY_INFO_TYPE_MASK;
1623 if (!wpa_auth_valid_key_desc_ver(wpa_auth, sm, ver))
1627 (ver == WPA_KEY_INFO_TYPE_HMAC_SHA1_AES ||
[all …]
/hostap-latest/src/eap_peer/
Dtncc.h34 struct wpabuf * tncc_process_soh_request(int ver, const u8 *data, size_t len);
Dtncc.c1169 static struct wpabuf * tncc_build_soh(int ver) in tncc_build_soh() argument
1197 wpabuf_put_be16(buf, ver); /* Inner Type */ in tncc_build_soh()
1200 if (ver == 2) { in tncc_build_soh()
1282 struct wpabuf * tncc_process_soh_request(int ver, const u8 *data, size_t len) in tncc_process_soh_request() argument
/hostap-latest/wpa_supplicant/
Ddpp_supplicant.c3032 enum dpp_pkex_ver ver, in wpas_dpp_pkex_init() argument
3039 bool v2 = ver != PKEX_VER_ONLY_1; in wpas_dpp_pkex_init()
3050 pkex->forced_ver = ver != PKEX_VER_AUTO; in wpas_dpp_pkex_init()
3802 u8 ver = DPP_VERSION; in wpas_dpp_send_private_peer_intro_update() local
3819 if (conn_ver > 0 && ver != conn_ver) { in wpas_dpp_send_private_peer_intro_update()
3822 conn_ver, ver); in wpas_dpp_send_private_peer_intro_update()
3823 ver = conn_ver; in wpas_dpp_send_private_peer_intro_update()
3827 wpabuf_put_u8(pt, ver); in wpas_dpp_send_private_peer_intro_update()
4447 u8 ver = DPP_VERSION; in wpas_dpp_start_private_peer_intro() local
4461 if (conn_ver > 0 && ver != conn_ver) { in wpas_dpp_start_private_peer_intro()
[all …]
/hostap-latest/hostapd/
Dhostapd.eap_user40 # [ver=0] and [ver=1] flags after EAP type PEAP can be used to force PEAP
/hostap-latest/src/crypto/
Dtls_gnutls.c1659 gnutls_protocol_t ver; in tls_get_version() local
1661 ver = gnutls_protocol_get_version(conn->session); in tls_get_version()
1662 if (ver == GNUTLS_TLS1_0) in tls_get_version()
1664 else if (ver == GNUTLS_TLS1_1) in tls_get_version()
1666 else if (ver == GNUTLS_TLS1_2) in tls_get_version()
/hostap-latest/src/common/
Ddpp_reconfig.c134 u8 ver = DPP_VERSION; in dpp_reconfig_build_req() local
155 ver = 1; in dpp_reconfig_build_req()
162 wpabuf_put_u8(msg, ver); in dpp_reconfig_build_req()

12