/hostap-latest/tests/fuzzing/eapol-key-auth/ |
D | eapol-key-auth.c | 17 struct wpa { struct 47 static int auth_read_msg(struct wpa *wpa); argument 51 static u8 * read_msg(struct wpa *wpa, size_t *ret_len) in read_msg() argument 56 if (wpa->data_len - wpa->data_offset < 2) { in read_msg() 61 msg_len = WPA_GET_BE16(&wpa->data[wpa->data_offset]); in read_msg() 62 wpa->data_offset += 2; in read_msg() 67 if (msg_len > 0 && wpa->data_len - wpa->data_offset < msg_len) { in read_msg() 74 os_memcpy(msg, &wpa->data[wpa->data_offset], msg_len); in read_msg() 75 wpa->data_offset += msg_len; in read_msg() 85 struct wpa *wpa = eloop_data; in auth_eapol_rx() local [all …]
|
/hostap-latest/tests/fuzzing/eapol-key-supp/ |
D | eapol-key-supp.c | 17 struct wpa { struct 41 static u8 * read_msg(struct wpa *wpa, size_t *ret_len) in read_msg() argument 46 if (wpa->data_len - wpa->data_offset < 2) { in read_msg() 51 msg_len = WPA_GET_BE16(&wpa->data[wpa->data_offset]); in read_msg() 52 wpa->data_offset += 2; in read_msg() 57 if (msg_len > 0 && wpa->data_len - wpa->data_offset < msg_len) { in read_msg() 64 os_memcpy(msg, &wpa->data[wpa->data_offset], msg_len); in read_msg() 65 wpa->data_offset += msg_len; in read_msg() 75 struct wpa *wpa = ctx; in supp_get_bssid() local 77 os_memcpy(bssid, wpa->auth_addr, ETH_ALEN); in supp_get_bssid() [all …]
|
/hostap-latest/tests/fuzzing/eapol-supp/ |
D | eapol-supp.c | 22 struct wpa_sm *wpa; member 38 wpa_sm_set_param(ctx->wpa, WPA_PARAM_PROTO, WPA_PROTO_RSN); in test_send_eapol() 39 wpa_sm_set_param(ctx->wpa, WPA_PARAM_RSN_ENABLED, 1); in test_send_eapol() 40 wpa_sm_set_param(ctx->wpa, WPA_PARAM_KEY_MGMT, WPA_KEY_MGMT_PSK); in test_send_eapol() 41 wpa_sm_set_param(ctx->wpa, WPA_PARAM_PAIRWISE, WPA_CIPHER_CCMP); in test_send_eapol() 42 wpa_sm_set_param(ctx->wpa, WPA_PARAM_GROUP, WPA_CIPHER_CCMP); in test_send_eapol() 45 wpa_sm_set_assoc_wpa_ie_default(ctx->wpa, wpa_ie, &wpa_ie_len); in test_send_eapol() 49 wpa_sm_rx_eapol(ctx->wpa, src, ctx->data, ctx->data_len, in test_send_eapol() 137 arg->wpa = wpa_sm_init(ctx); in init_wpa() 138 if (!arg->wpa) in init_wpa() [all …]
|
/hostap-latest/tests/hwsim/ |
D | test_macsec.py | 209 wpa = [] 214 wpa.append(wpas) 220 return wpa 232 def wait_mka_done(wpa, expect_failure=False, hostapd=False): argument 236 for w in wpa: 242 expect_peers = len(wpa) - 1 265 for w in wpa: 278 for w in wpa: 299 wpa = add_wpas_interfaces() 300 wpas0 = wpa[0] [all …]
|
D | wlantest.py | 86 def chan_from_wpa(cls, wpa, is_p2p=False): argument 90 return m.setup(cls.remote_host, [m.get_monitor_params(wpa, is_p2p)]) 93 def setup(cls, wpa, is_p2p=False): argument 94 if wpa: 95 cls.chan_from_wpa(wpa, is_p2p)
|
D | multi-bss-acs.conf | 16 wpa=2 25 wpa=2
|
D | multi-bss-iface.conf | 14 wpa=2 32 wpa=2
|
D | multi-bss-iface-per_sta_vif.conf | 14 wpa=2 33 wpa=2
|
/hostap-latest/wpa_supplicant/ |
D | preauth_test.c | 193 rsn_preauth_deinit(wpa_s->wpa); in test_eapol_clean() 194 pmksa_candidate_free(wpa_s->wpa); in test_eapol_clean() 195 wpa_sm_deinit(wpa_s->wpa); in test_eapol_clean() 215 if (!rsn_preauth_in_progress(wpa_s->wpa)) in eapol_test_poll() 257 wpa_s->wpa = wpa_sm_init(ctx); in wpa_init_conf() 258 assert(wpa_s->wpa != NULL); in wpa_init_conf() 259 wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_PROTO, WPA_PROTO_RSN); in wpa_init_conf() 262 wpa_sm_set_ifname(wpa_s->wpa, wpa_s->ifname, NULL); in wpa_init_conf() 272 wpa_sm_set_own_addr(wpa_s->wpa, wpa_s->own_addr); in wpa_init_conf() 347 if (rsn_preauth_init(wpa_s.wpa, bssid, &wpa_s.conf->ssid->eap)) in main() [all …]
|
D | events.c | 455 cur_pmksa = pmksa_cache_get_current(wpa_s->wpa); in wpa_find_assoc_pmkid() 457 pmksa_cache_clear_current(wpa_s->wpa); in wpa_find_assoc_pmkid() 459 if (wpa_sm_parse_own_wpa_ie(wpa_s->wpa, &ie) < 0 || in wpa_find_assoc_pmkid() 464 pmksa_set = pmksa_cache_set_current(wpa_s->wpa, in wpa_find_assoc_pmkid() 471 wpa_sm_set_pmk_from_pmksa(wpa_s->wpa); in wpa_find_assoc_pmkid() 495 pmksa_candidate_add(wpa_s->wpa, data->pmkid_candidate.bssid, in wpa_supplicant_event_pmkid_candidate() 584 wpa_sm_set_scard_ctx(wpa_s->wpa, wpa_s->scard); in wpa_supplicant_scard_init() 1281 bool wpa, check_ssid, osen, rsn_osen = false; in wpa_scan_res_ok() local 1292 wpa = ie && ie[1]; in wpa_scan_res_ok() 1294 wpa |= ie && ie[1]; in wpa_scan_res_ok() [all …]
|
D | wpa_supplicant.c | 231 wpa_sm_notify_disassoc(wpa_s->wpa); in wpa_supplicant_timeout() 416 wpa_sm_set_ap_wpa_ie(wpa_s->wpa, NULL, 0); in wpa_supplicant_set_non_wpa_policy() 417 wpa_sm_set_ap_rsn_ie(wpa_s->wpa, NULL, 0); in wpa_supplicant_set_non_wpa_policy() 418 wpa_sm_set_ap_rsnxe(wpa_s->wpa, NULL, 0); in wpa_supplicant_set_non_wpa_policy() 419 wpa_sm_set_ap_rsne_override(wpa_s->wpa, NULL, 0); in wpa_supplicant_set_non_wpa_policy() 420 wpa_sm_set_ap_rsne_override_2(wpa_s->wpa, NULL, 0); in wpa_supplicant_set_non_wpa_policy() 421 wpa_sm_set_ap_rsnxe_override(wpa_s->wpa, NULL, 0); in wpa_supplicant_set_non_wpa_policy() 422 wpa_sm_set_assoc_wpa_ie(wpa_s->wpa, NULL, 0); in wpa_supplicant_set_non_wpa_policy() 423 wpa_sm_set_assoc_rsnxe(wpa_s->wpa, NULL, 0); in wpa_supplicant_set_non_wpa_policy() 443 wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_RSN_ENABLED, 0); in wpa_supplicant_set_non_wpa_policy() [all …]
|
D | wpas_glue.c | 117 int encrypt = wpa_s->wpa && in wpa_ether_send() 118 wpa_sm_has_ptk_installed(wpa_s->wpa); in wpa_ether_send() 170 if (pmksa_cache_get_current(wpa_s->wpa) && in wpa_supplicant_eapol_send() 265 wpa_sm_aborted_cached(wpa_s->wpa); in wpa_supplicant_aborted_cached() 425 if (wpa_sm_set_ap_wpa_ie(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0)) in wpa_get_beacon_ie() 429 if (wpa_sm_set_ap_rsn_ie(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0)) in wpa_get_beacon_ie() 433 if (wpa_sm_set_ap_rsnxe(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0)) in wpa_get_beacon_ie() 437 if (wpa_sm_set_ap_rsne_override(wpa_s->wpa, ie, in wpa_get_beacon_ie() 443 if (wpa_sm_set_ap_rsne_override_2(wpa_s->wpa, ie, in wpa_get_beacon_ie() 448 if (wpa_sm_set_ap_rsnxe_override(wpa_s->wpa, ie, in wpa_get_beacon_ie() [all …]
|
D | sme.c | 702 if (pmksa_cache_set_current(wpa_s->wpa, NULL, in sme_send_authentication() 800 wpa_sm_set_ft_params(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0); in sme_send_authentication() 806 wpa_ft_prepare_auth_request(wpa_s->wpa, ie); in sme_send_authentication() 830 wpa_sm_has_ft_keys(wpa_s->wpa, md)) { in sme_send_authentication() 1020 pmksa_cache_set_current(wpa_s->wpa, NULL, in sme_send_authentication() 1030 wpa_sm_set_pmk_from_pmksa(wpa_s->wpa); in sme_send_authentication() 1065 wpa_sm_set_ssid(wpa_s->wpa, bss->ssid, bss->ssid_len); in sme_send_authentication() 1121 if (pmksa_cache_set_current(wpa_s->wpa, NULL, in sme_send_authentication() 1129 resp = fils_build_auth(wpa_s->wpa, ssid->fils_dh_group, md); in sme_send_authentication() 1256 wpa_sm_set_assoc_wpa_ie(wpa_s->wpa, NULL, 0); in sme_auth_start_cb() [all …]
|
D | pasn_supplicant.c | 243 pmksa_cache_get_current(wpa_s->wpa)) { in wpas_pasn_get_params_from_bss() 249 pmksa_cache_clear_current(wpa_s->wpa); in wpas_pasn_get_params_from_bss() 281 pmksa_cache_get_current(wpa_s->wpa)) { in wpas_pasn_get_params_from_bss() 287 pmksa_cache_clear_current(wpa_s->wpa); in wpas_pasn_get_params_from_bss() 632 pasn_set_initiator_pmksa(pasn, wpa_sm_get_pmksa_cache(wpa_s->wpa)); in wpas_pasn_auth_start_cb() 636 ret = wpa_pasn_ft_derive_pmk_r1(wpa_s->wpa, awork->akmp, in wpas_pasn_auth_start_cb() 821 wpa_sm_set_cur_pmksa(wpa_s->wpa, pasn->pmksa_entry); in wpas_pasn_auth_rx()
|
/hostap-latest/tests/fuzzing/wnm/ |
D | wnm.c | 29 struct wpa_sm wpa; member 54 ctx->wpa_s.wpa = &ctx->wpa; in init_wpa()
|
/hostap-latest/src/ap/ |
D | ap_config.c | 1221 if (bss->wpa != WPA_PROTO_RSN) { in hostapd_config_check_bss_6g() 1283 if (bss->wpa) { in hostapd_config_check_bss() 1302 if (full_config && bss->wpa && in hostapd_config_check_bss() 1311 if (full_config && bss->wpa && in hostapd_config_check_bss() 1367 if (full_config && conf->ieee80211n && bss->wpa && in hostapd_config_check_bss() 1388 if (full_config && conf->ieee80211ac && bss->wpa && in hostapd_config_check_bss() 1409 if (full_config && conf->ieee80211ax && bss->wpa && in hostapd_config_check_bss() 1429 bss->ssid.wep.keys_set && bss->wpa == 0) { in hostapd_config_check_bss() 1436 if (full_config && bss->wps_state && bss->wpa && in hostapd_config_check_bss() 1437 (!(bss->wpa & 2) || in hostapd_config_check_bss() [all …]
|
D | wps_hostapd.c | 370 bss->wpa = 2; in hapd_wps_reconfig_in_memory() 372 bss->wpa = 0; in hapd_wps_reconfig_in_memory() 376 bss->wpa = 3; in hapd_wps_reconfig_in_memory() 378 bss->wpa = 2; in hapd_wps_reconfig_in_memory() 380 bss->wpa = 1; in hapd_wps_reconfig_in_memory() 382 bss->wpa = 0; in hapd_wps_reconfig_in_memory() 385 if (bss->wpa) { in hapd_wps_reconfig_in_memory() 403 bss->wpa_group = wpa_select_ap_group_cipher(bss->wpa, in hapd_wps_reconfig_in_memory() 463 int wpa; in hapd_wps_cred_cb() local 575 wpa = 2; in hapd_wps_cred_cb() [all …]
|
D | wpa_auth_ie.c | 657 if (wpa_auth->conf.wpa == WPA_PROTO_OSEN) { in wpa_auth_gen_wpa_ie() 660 if (wpa_auth->conf.wpa & WPA_PROTO_RSN) { in wpa_auth_gen_wpa_ie() 718 if (wpa_auth->conf.wpa & WPA_PROTO_WPA) { in wpa_auth_gen_wpa_ie() 725 if ((wpa_auth->conf.wpa & WPA_PROTO_RSN) && in wpa_auth_gen_wpa_ie() 751 if ((wpa_auth->conf.wpa & WPA_PROTO_RSN) && in wpa_auth_gen_wpa_ie() 777 if ((wpa_auth->conf.wpa & WPA_PROTO_RSN) && in wpa_auth_gen_wpa_ie() 880 if (!(wpa_auth->conf.wpa & version)) { in wpa_validate_wpa_ie() 1216 sm->wpa = WPA_VERSION_WPA2; in wpa_validate_wpa_ie() 1218 sm->wpa = WPA_VERSION_WPA; in wpa_validate_wpa_ie() 1316 if (conf->extended_key_id && sm->wpa == WPA_VERSION_WPA2 && in wpa_validate_wpa_ie() [all …]
|
/hostap-latest/wpa_supplicant/examples/ |
D | wpas-dbus-new.py | 57 wpa = "no" 59 wpa = "yes" 76 …print(" %s :: ssid='%s' wpa=%s wpa2=%s signal=%d rate=%d freq=%d" % (bssid, ssid, wpa, wpa…
|
D | wpas-dbus-new-signals.py | 64 wpa = "no" 66 wpa = "yes" 83 …print(" %s :: ssid='%s' wpa=%s wpa2=%s signal=%d rate=%d freq=%d" % (bssid, ssid, wpa, wpa…
|
/hostap-latest/tests/remote/ |
D | monitor.py | 153 def get_monitor_params(wpa, is_p2p=False): argument 155 get_status_field_f = wpa.get_group_status_field 157 get_status_field_f = wpa.get_status_field
|
/hostap-latest/ |
D | build_release | 32 git archive --format=tar --prefix=wpa-$VER/ HEAD \ 34 gzip > $RELDIR/wpa-$VER.tar.gz
|
/hostap-latest/src/drivers/ |
D | driver_bsd.c | 494 wpa_printf(MSG_DEBUG, "%s: enable WPA= 0x%x", __func__, params->wpa); in bsd_configure_wpa() 495 if (set80211param(priv, IEEE80211_IOC_WPA, params->wpa)) { in bsd_configure_wpa() 496 wpa_printf(MSG_INFO, "Unable to set WPA to %u", params->wpa); in bsd_configure_wpa() 512 if (!params->wpa && !params->ieee802_1x) { in bsd_set_ieee8021x() 517 if (params->wpa && bsd_configure_wpa(priv, params) != 0) { in bsd_set_ieee8021x() 523 (params->wpa ? IEEE80211_AUTH_WPA : IEEE80211_AUTH_8021X))) { in bsd_set_ieee8021x() 1130 wpa_driver_bsd_set_wpa_internal(void *priv, int wpa, int privacy) in wpa_driver_bsd_set_wpa_internal() argument 1135 __func__, wpa, privacy); in wpa_driver_bsd_set_wpa_internal() 1137 if (!wpa && wpa_driver_bsd_set_wpa_ie(priv, NULL, 0) < 0) in wpa_driver_bsd_set_wpa_internal() 1141 if (set80211param(priv, IEEE80211_IOC_WPA, wpa) < 0) in wpa_driver_bsd_set_wpa_internal()
|
/hostap-latest/wpa_supplicant/wpa_gui-qt4/ |
D | networkconfig.cpp | 525 int wpa = 0; in paramsFromConfig() local 529 wpa = 2; in paramsFromConfig() 531 wpa = 1; in paramsFromConfig() 540 auth = wpa & 2 ? AUTH_WPA2_EAP : AUTH_WPA_EAP; in paramsFromConfig() 542 auth = wpa & 2 ? AUTH_WPA2_PSK : AUTH_WPA_PSK; in paramsFromConfig()
|
/hostap-latest/src/rsn_supp/ |
D | Makefile | 11 wpa.o \
|