Home
last modified time | relevance | path

Searched refs:version (Results 1 – 25 of 125) sorted by relevance

12345

/hostap-latest/src/wps/
Dwps_validate.c21 static int wps_validate_version(const u8 *version, int mandatory) in wps_validate_version() argument
23 if (version == NULL) { in wps_validate_version()
31 if (*version != 0x10) { in wps_validate_version()
33 "value 0x%x", *version); in wps_validate_version()
1101 if (wps_validate_version(attr.version, 1) || in wps_validate_beacon()
1141 if (wps_validate_version(attr.version, 1) || in wps_validate_beacon_probe_resp()
1197 if (wps_validate_version(attr.version, 1) || in wps_validate_probe_req()
1244 if (wps_validate_version(attr.version, 1) || in wps_validate_assoc_req()
1273 if (wps_validate_version(attr.version, 1) || in wps_validate_assoc_resp()
1301 if (wps_validate_version(attr.version, 1) || in wps_validate_m1()
[all …]
/hostap-latest/src/eap_server/
Deap_server_methods.c72 struct eap_method * eap_server_method_alloc(int version, int vendor, in eap_server_method_alloc() argument
80 eap->version = version; in eap_server_method_alloc()
113 method->version != EAP_SERVER_METHOD_INTERFACE_VERSION) { in eap_server_method_register()
Deap_server_sake.c108 sake->version = EAP_SAKE_VERSION; in eap_sake_build_msg()
241 u8 version, session_id, subtype; in eap_sake_check() local
251 version = resp->version; in eap_sake_check()
255 if (version != EAP_SAKE_VERSION) { in eap_sake_check()
256 wpa_printf(MSG_INFO, "EAP-SAKE: Unknown version %d", version); in eap_sake_check()
Deap_tls_common.h90 int eap_type, int version, u8 id);
91 struct wpabuf * eap_server_tls_build_ack(u8 id, int eap_type, int version);
Deap_server_tls_common.c201 int eap_type, int version, u8 id) in eap_server_tls_build_msg() argument
213 flags = version; in eap_server_tls_build_msg()
260 struct wpabuf * eap_server_tls_build_ack(u8 id, int eap_type, int version) in eap_server_tls_build_ack() argument
268 wpabuf_put_u8(req, version); /* Flags */ in eap_server_tls_build_ack()
/hostap-latest/wpa_supplicant/
Dp2p_supplicant_sd.c168 wpas_p2p_service_get_upnp(struct wpa_supplicant *wpa_s, u8 version, in wpas_p2p_service_get_upnp() argument
175 if (version == usrv->version && in wpas_p2p_service_get_upnp()
385 wpabuf_put_u8(resp, usrv->version); in wpas_sd_all_upnp()
401 u8 version; in wpas_sd_req_upnp() local
428 version = query[0]; in wpas_sd_req_upnp()
437 if (version != usrv->version) in wpas_sd_req_upnp()
450 wpabuf_put_u8(resp, version); in wpas_sd_req_upnp()
968 u8 version, const char *query) in wpas_p2p_sd_request_upnp() argument
979 wpabuf_put_u8(tlvs, version); in wpas_p2p_sd_request_upnp()
1249 int wpas_p2p_service_add_upnp(struct wpa_supplicant *wpa_s, u8 version, in wpas_p2p_service_add_upnp() argument
[all …]
/hostap-latest/src/common/
Ddpp_reconfig.c446 const u8 *trans_id, *version, *i_connector, *c_nonce; in dpp_reconfig_auth_req_rx() local
464 version = dpp_get_attr(attr_start, attr_len, DPP_ATTR_PROTOCOL_VERSION, in dpp_reconfig_auth_req_rx()
466 if (!version || version_len < 1 || version[0] < 2) { in dpp_reconfig_auth_req_rx()
531 auth->peer_version = version[0]; in dpp_reconfig_auth_req_rx()
667 const u8 *trans_id, *version, *r_connector, *r_proto, *wrapped_data, in dpp_reconfig_auth_resp_rx() local
708 version = dpp_get_attr(attr_start, attr_len, DPP_ATTR_PROTOCOL_VERSION, in dpp_reconfig_auth_resp_rx()
710 if (!version || version_len < 1 || version[0] < 2) { in dpp_reconfig_auth_resp_rx()
715 auth->peer_version = version[0]; in dpp_reconfig_auth_resp_rx()
852 const u8 *trans_id, *version, *wrapped_data, *c_nonce, *e_nonce, in dpp_reconfig_auth_conf_rx() local
926 version = dpp_get_attr(unwrapped, unwrapped_len, in dpp_reconfig_auth_conf_rx()
[all …]
Ddpp_pkex.c371 const u8 *version; in dpp_pkex_rx_exchange_req() local
374 version = dpp_get_attr(buf, len, DPP_ATTR_PROTOCOL_VERSION, in dpp_pkex_rx_exchange_req()
376 if (!version || version_len < 1 || version[0] == 0) { in dpp_pkex_rx_exchange_req()
381 peer_version = version[0]; in dpp_pkex_rx_exchange_req()
736 const u8 *version; in dpp_pkex_rx_exchange_resp() local
739 version = dpp_get_attr(buf, buflen, DPP_ATTR_PROTOCOL_VERSION, in dpp_pkex_rx_exchange_resp()
741 if (!version || version_len < 1 || version[0] == 0) { in dpp_pkex_rx_exchange_resp()
746 pkex->peer_version = version[0]; in dpp_pkex_rx_exchange_resp()
/hostap-latest/tests/hwsim/
Dexample-setup.txt44 For this step, the kernel version may be updated, but the simpler option
45 is to install the latest version of Backports package. For example:
71 in the version that Ubuntu 14.04.1 includes (iw v3.4). Following steps
72 can be used to replace that version with a custom build. This is
73 optional, i.e., most test cases will work with the old iw version, but
89 version from Ubuntu 14.04 (2013.02.13) is used. Following steps can
98 # following command can be used to verify that the new version is trusted
172 WEXT failures are due to the specific cfg80211/mac80211 version from
178 With that version, ibss_rsn is failing due to a known cfg80211
Dnetlink.py210 def __init__(self, cmd, version=0): argument
212 self.version = version
214 return struct.pack("BBxx", self.cmd, self.version)
/hostap-latest/tests/fuzzing/eap-sim-peer/
Deap-sim-peer.c22 struct eap_method * eap_peer_method_alloc(int version, int vendor, in eap_peer_method_alloc() argument
30 eap->version = version; in eap_peer_method_alloc()
/hostap-latest/tests/fuzzing/eap-aka-peer/
Deap-aka-peer.c22 struct eap_method * eap_peer_method_alloc(int version, int vendor, in eap_peer_method_alloc() argument
30 eap->version = version; in eap_peer_method_alloc()
/hostap-latest/wpadebug/res/raw/
Dshell_commands.txt2 version@cat /proc/version
/hostap-latest/tests/fuzzing/eap-mschapv2-peer/
Deap-mschapv2-peer.c22 struct eap_method * eap_peer_method_alloc(int version, int vendor, in eap_peer_method_alloc() argument
30 eap->version = version; in eap_peer_method_alloc()
/hostap-latest/src/eap_peer/
Deap_methods.c282 struct eap_method * eap_peer_method_alloc(int version, int vendor, in eap_peer_method_alloc() argument
290 eap->version = version; in eap_peer_method_alloc()
323 method->version != EAP_PEER_METHOD_INTERFACE_VERSION) { in eap_peer_method_register()
/hostap-latest/wpa_supplicant/systemd/
Dwpa_supplicant-wired.service.arg.in2 Description=WPA supplicant daemon (interface- and wired driver-specific version)
8 # NetworkManager users will probably want the dbus version instead.
/hostap-latest/src/eap_common/
Deap_peap_common.c15 int peap_prfplus(int version, const u8 *key, size_t key_len, in peap_prfplus() argument
34 if (version == 0) { in peap_prfplus()
Deap_peap_common.h12 int peap_prfplus(int version, const u8 *key, size_t key_len,
/hostap-latest/src/ap/
Dwpa_auth_ie.c38 WPA_PUT_LE16(hdr->version, WPA_VERSION); in wpa_write_wpa_ie()
411 WPA_PUT_LE16(hdr->version, RSN_VERSION); in wpa_write_rsn_ie()
864 int ciphers, key_mgmt, res, version; in wpa_validate_wpa_ie() local
876 version = WPA_PROTO_RSN; in wpa_validate_wpa_ie()
878 version = WPA_PROTO_WPA; in wpa_validate_wpa_ie()
880 if (!(wpa_auth->conf.wpa & version)) { in wpa_validate_wpa_ie()
882 version, MAC2STR(sm->addr)); in wpa_validate_wpa_ie()
886 if (version == WPA_PROTO_RSN) { in wpa_validate_wpa_ie()
1092 if (version == WPA_PROTO_RSN && sm->rsn_override_2) in wpa_validate_wpa_ie()
1095 else if (version == WPA_PROTO_RSN && sm->rsn_override) in wpa_validate_wpa_ie()
[all …]
Dwmm.c121 wmm->version = WMM_VERSION; in hostapd_eid_wmm()
170 wmm->oui_subtype, wmm->version, wmm->qos_info); in hostapd_eid_wmm_valid()
172 wmm->version != WMM_VERSION) { in hostapd_eid_wmm_valid()
Dap_drv_ops.h342 int version, const u8 *ipaddr, in hostapd_drv_br_add_ip_neigh() argument
348 return hapd->driver->br_add_ip_neigh(hapd->drv_priv, version, ipaddr, in hostapd_drv_br_add_ip_neigh()
353 u8 version, const u8 *ipaddr) in hostapd_drv_br_delete_ip_neigh() argument
358 return hapd->driver->br_delete_ip_neigh(hapd->drv_priv, version, in hostapd_drv_br_delete_ip_neigh()
/hostap-latest/src/tls/
Dx509v3.c1504 cert->version = value; in x509_parse_tbs_certificate()
1505 if (cert->version != X509_CERT_V1 && in x509_parse_tbs_certificate()
1506 cert->version != X509_CERT_V2 && in x509_parse_tbs_certificate()
1507 cert->version != X509_CERT_V3) { in x509_parse_tbs_certificate()
1509 cert->version + 1); in x509_parse_tbs_certificate()
1516 cert->version = X509_CERT_V1; in x509_parse_tbs_certificate()
1517 wpa_printf(MSG_MSGDUMP, "X509: Version X.509v%d", cert->version + 1); in x509_parse_tbs_certificate()
1571 if (cert->version == X509_CERT_V1) in x509_parse_tbs_certificate()
1624 if (cert->version != X509_CERT_V3) { in x509_parse_tbs_certificate()
1627 "version 3", cert->version + 1); in x509_parse_tbs_certificate()
[all …]
/hostap-latest/
DCONTRIBUTIONS15 the Developer Certificate of Origin (DCO) version 1.1 terms (see below;
43 for some reason, it is better to include an attached version of the
44 patch file than just send a whitespace damaged version in the message
80 Until February 13, 2014, the project used an extended version of the DCO
89 license terms. Acceptance of this extended DCO version was indicated
/hostap-latest/doc/
Dporting.doxygen28 platform specific version in case standard C libraries are not
44 different size and byte order. Suitable version of these definitions
94 version using libpcap/libdnet libraries (\ref l2_packet_pcap.c; this
95 supports WinPcap, too), and FreeBSD specific version of libpcap
177 Following command can be used to build very simple version of
193 Once this version can be build successfully, the end result can be
/hostap-latest/hostapd/
Dhostapd.eap_user41 # version based on the Phase 1 identity. Without this flag, the EAP
42 # authenticator advertises the highest supported version and select the version

12345