/hostap-latest/src/wps/ |
D | wps_validate.c | 21 static int wps_validate_version(const u8 *version, int mandatory) in wps_validate_version() argument 23 if (version == NULL) { in wps_validate_version() 31 if (*version != 0x10) { in wps_validate_version() 33 "value 0x%x", *version); in wps_validate_version() 1101 if (wps_validate_version(attr.version, 1) || in wps_validate_beacon() 1141 if (wps_validate_version(attr.version, 1) || in wps_validate_beacon_probe_resp() 1197 if (wps_validate_version(attr.version, 1) || in wps_validate_probe_req() 1244 if (wps_validate_version(attr.version, 1) || in wps_validate_assoc_req() 1273 if (wps_validate_version(attr.version, 1) || in wps_validate_assoc_resp() 1301 if (wps_validate_version(attr.version, 1) || in wps_validate_m1() [all …]
|
/hostap-latest/src/eap_server/ |
D | eap_server_methods.c | 72 struct eap_method * eap_server_method_alloc(int version, int vendor, in eap_server_method_alloc() argument 80 eap->version = version; in eap_server_method_alloc() 113 method->version != EAP_SERVER_METHOD_INTERFACE_VERSION) { in eap_server_method_register()
|
D | eap_server_sake.c | 108 sake->version = EAP_SAKE_VERSION; in eap_sake_build_msg() 241 u8 version, session_id, subtype; in eap_sake_check() local 251 version = resp->version; in eap_sake_check() 255 if (version != EAP_SAKE_VERSION) { in eap_sake_check() 256 wpa_printf(MSG_INFO, "EAP-SAKE: Unknown version %d", version); in eap_sake_check()
|
D | eap_tls_common.h | 90 int eap_type, int version, u8 id); 91 struct wpabuf * eap_server_tls_build_ack(u8 id, int eap_type, int version);
|
D | eap_server_tls_common.c | 201 int eap_type, int version, u8 id) in eap_server_tls_build_msg() argument 213 flags = version; in eap_server_tls_build_msg() 260 struct wpabuf * eap_server_tls_build_ack(u8 id, int eap_type, int version) in eap_server_tls_build_ack() argument 268 wpabuf_put_u8(req, version); /* Flags */ in eap_server_tls_build_ack()
|
/hostap-latest/wpa_supplicant/ |
D | p2p_supplicant_sd.c | 168 wpas_p2p_service_get_upnp(struct wpa_supplicant *wpa_s, u8 version, in wpas_p2p_service_get_upnp() argument 175 if (version == usrv->version && in wpas_p2p_service_get_upnp() 385 wpabuf_put_u8(resp, usrv->version); in wpas_sd_all_upnp() 401 u8 version; in wpas_sd_req_upnp() local 428 version = query[0]; in wpas_sd_req_upnp() 437 if (version != usrv->version) in wpas_sd_req_upnp() 450 wpabuf_put_u8(resp, version); in wpas_sd_req_upnp() 968 u8 version, const char *query) in wpas_p2p_sd_request_upnp() argument 979 wpabuf_put_u8(tlvs, version); in wpas_p2p_sd_request_upnp() 1249 int wpas_p2p_service_add_upnp(struct wpa_supplicant *wpa_s, u8 version, in wpas_p2p_service_add_upnp() argument [all …]
|
/hostap-latest/src/common/ |
D | dpp_reconfig.c | 446 const u8 *trans_id, *version, *i_connector, *c_nonce; in dpp_reconfig_auth_req_rx() local 464 version = dpp_get_attr(attr_start, attr_len, DPP_ATTR_PROTOCOL_VERSION, in dpp_reconfig_auth_req_rx() 466 if (!version || version_len < 1 || version[0] < 2) { in dpp_reconfig_auth_req_rx() 531 auth->peer_version = version[0]; in dpp_reconfig_auth_req_rx() 667 const u8 *trans_id, *version, *r_connector, *r_proto, *wrapped_data, in dpp_reconfig_auth_resp_rx() local 708 version = dpp_get_attr(attr_start, attr_len, DPP_ATTR_PROTOCOL_VERSION, in dpp_reconfig_auth_resp_rx() 710 if (!version || version_len < 1 || version[0] < 2) { in dpp_reconfig_auth_resp_rx() 715 auth->peer_version = version[0]; in dpp_reconfig_auth_resp_rx() 852 const u8 *trans_id, *version, *wrapped_data, *c_nonce, *e_nonce, in dpp_reconfig_auth_conf_rx() local 926 version = dpp_get_attr(unwrapped, unwrapped_len, in dpp_reconfig_auth_conf_rx() [all …]
|
D | dpp_pkex.c | 371 const u8 *version; in dpp_pkex_rx_exchange_req() local 374 version = dpp_get_attr(buf, len, DPP_ATTR_PROTOCOL_VERSION, in dpp_pkex_rx_exchange_req() 376 if (!version || version_len < 1 || version[0] == 0) { in dpp_pkex_rx_exchange_req() 381 peer_version = version[0]; in dpp_pkex_rx_exchange_req() 736 const u8 *version; in dpp_pkex_rx_exchange_resp() local 739 version = dpp_get_attr(buf, buflen, DPP_ATTR_PROTOCOL_VERSION, in dpp_pkex_rx_exchange_resp() 741 if (!version || version_len < 1 || version[0] == 0) { in dpp_pkex_rx_exchange_resp() 746 pkex->peer_version = version[0]; in dpp_pkex_rx_exchange_resp()
|
/hostap-latest/tests/hwsim/ |
D | example-setup.txt | 44 For this step, the kernel version may be updated, but the simpler option 45 is to install the latest version of Backports package. For example: 71 in the version that Ubuntu 14.04.1 includes (iw v3.4). Following steps 72 can be used to replace that version with a custom build. This is 73 optional, i.e., most test cases will work with the old iw version, but 89 version from Ubuntu 14.04 (2013.02.13) is used. Following steps can 98 # following command can be used to verify that the new version is trusted 172 WEXT failures are due to the specific cfg80211/mac80211 version from 178 With that version, ibss_rsn is failing due to a known cfg80211
|
D | netlink.py | 210 def __init__(self, cmd, version=0): argument 212 self.version = version 214 return struct.pack("BBxx", self.cmd, self.version)
|
/hostap-latest/tests/fuzzing/eap-sim-peer/ |
D | eap-sim-peer.c | 22 struct eap_method * eap_peer_method_alloc(int version, int vendor, in eap_peer_method_alloc() argument 30 eap->version = version; in eap_peer_method_alloc()
|
/hostap-latest/tests/fuzzing/eap-aka-peer/ |
D | eap-aka-peer.c | 22 struct eap_method * eap_peer_method_alloc(int version, int vendor, in eap_peer_method_alloc() argument 30 eap->version = version; in eap_peer_method_alloc()
|
/hostap-latest/wpadebug/res/raw/ |
D | shell_commands.txt | 2 version@cat /proc/version
|
/hostap-latest/tests/fuzzing/eap-mschapv2-peer/ |
D | eap-mschapv2-peer.c | 22 struct eap_method * eap_peer_method_alloc(int version, int vendor, in eap_peer_method_alloc() argument 30 eap->version = version; in eap_peer_method_alloc()
|
/hostap-latest/src/eap_peer/ |
D | eap_methods.c | 282 struct eap_method * eap_peer_method_alloc(int version, int vendor, in eap_peer_method_alloc() argument 290 eap->version = version; in eap_peer_method_alloc() 323 method->version != EAP_PEER_METHOD_INTERFACE_VERSION) { in eap_peer_method_register()
|
/hostap-latest/wpa_supplicant/systemd/ |
D | wpa_supplicant-wired.service.arg.in | 2 Description=WPA supplicant daemon (interface- and wired driver-specific version) 8 # NetworkManager users will probably want the dbus version instead.
|
/hostap-latest/src/eap_common/ |
D | eap_peap_common.c | 15 int peap_prfplus(int version, const u8 *key, size_t key_len, in peap_prfplus() argument 34 if (version == 0) { in peap_prfplus()
|
D | eap_peap_common.h | 12 int peap_prfplus(int version, const u8 *key, size_t key_len,
|
/hostap-latest/src/ap/ |
D | wpa_auth_ie.c | 38 WPA_PUT_LE16(hdr->version, WPA_VERSION); in wpa_write_wpa_ie() 411 WPA_PUT_LE16(hdr->version, RSN_VERSION); in wpa_write_rsn_ie() 864 int ciphers, key_mgmt, res, version; in wpa_validate_wpa_ie() local 876 version = WPA_PROTO_RSN; in wpa_validate_wpa_ie() 878 version = WPA_PROTO_WPA; in wpa_validate_wpa_ie() 880 if (!(wpa_auth->conf.wpa & version)) { in wpa_validate_wpa_ie() 882 version, MAC2STR(sm->addr)); in wpa_validate_wpa_ie() 886 if (version == WPA_PROTO_RSN) { in wpa_validate_wpa_ie() 1092 if (version == WPA_PROTO_RSN && sm->rsn_override_2) in wpa_validate_wpa_ie() 1095 else if (version == WPA_PROTO_RSN && sm->rsn_override) in wpa_validate_wpa_ie() [all …]
|
D | wmm.c | 121 wmm->version = WMM_VERSION; in hostapd_eid_wmm() 170 wmm->oui_subtype, wmm->version, wmm->qos_info); in hostapd_eid_wmm_valid() 172 wmm->version != WMM_VERSION) { in hostapd_eid_wmm_valid()
|
D | ap_drv_ops.h | 342 int version, const u8 *ipaddr, in hostapd_drv_br_add_ip_neigh() argument 348 return hapd->driver->br_add_ip_neigh(hapd->drv_priv, version, ipaddr, in hostapd_drv_br_add_ip_neigh() 353 u8 version, const u8 *ipaddr) in hostapd_drv_br_delete_ip_neigh() argument 358 return hapd->driver->br_delete_ip_neigh(hapd->drv_priv, version, in hostapd_drv_br_delete_ip_neigh()
|
/hostap-latest/src/tls/ |
D | x509v3.c | 1504 cert->version = value; in x509_parse_tbs_certificate() 1505 if (cert->version != X509_CERT_V1 && in x509_parse_tbs_certificate() 1506 cert->version != X509_CERT_V2 && in x509_parse_tbs_certificate() 1507 cert->version != X509_CERT_V3) { in x509_parse_tbs_certificate() 1509 cert->version + 1); in x509_parse_tbs_certificate() 1516 cert->version = X509_CERT_V1; in x509_parse_tbs_certificate() 1517 wpa_printf(MSG_MSGDUMP, "X509: Version X.509v%d", cert->version + 1); in x509_parse_tbs_certificate() 1571 if (cert->version == X509_CERT_V1) in x509_parse_tbs_certificate() 1624 if (cert->version != X509_CERT_V3) { in x509_parse_tbs_certificate() 1627 "version 3", cert->version + 1); in x509_parse_tbs_certificate() [all …]
|
/hostap-latest/ |
D | CONTRIBUTIONS | 15 the Developer Certificate of Origin (DCO) version 1.1 terms (see below; 43 for some reason, it is better to include an attached version of the 44 patch file than just send a whitespace damaged version in the message 80 Until February 13, 2014, the project used an extended version of the DCO 89 license terms. Acceptance of this extended DCO version was indicated
|
/hostap-latest/doc/ |
D | porting.doxygen | 28 platform specific version in case standard C libraries are not 44 different size and byte order. Suitable version of these definitions 94 version using libpcap/libdnet libraries (\ref l2_packet_pcap.c; this 95 supports WinPcap, too), and FreeBSD specific version of libpcap 177 Following command can be used to build very simple version of 193 Once this version can be build successfully, the end result can be
|
/hostap-latest/hostapd/ |
D | hostapd.eap_user | 41 # version based on the Phase 1 identity. Without this flag, the EAP 42 # authenticator advertises the highest supported version and select the version
|