Home
last modified time | relevance | path

Searched refs:full (Results 1 – 25 of 27) sorted by relevance

12

/hostap-3.6.0/src/crypto/
Dtls_wolfssl.c648 size_t match_len, int full) in domain_suffix_match() argument
661 if (match_len > len || (full && match_len != len)) in domain_suffix_match()
679 size_t match_len, int full) in tls_match_suffix_helper() argument
689 full ? "" : "suffix ", match); in tls_match_suffix_helper()
704 match_len, full) == 1) { in tls_match_suffix_helper()
706 full ? "Match" : "Suffix match"); in tls_match_suffix_helper()
737 match, match_len, full) == 1) { in tls_match_suffix_helper()
739 full ? "Match" : "Suffix match"); in tls_match_suffix_helper()
745 full ? "" : "suffix "); in tls_match_suffix_helper()
750 static int tls_match_suffix(WOLFSSL_X509 *cert, const char *match, int full) in tls_match_suffix() argument
[all …]
Dtls_gnutls.c1090 int full) in tls_match_suffix_helper() argument
1095 if (full) in tls_match_suffix_helper()
1104 full ? "": "suffix ", match, res); in tls_match_suffix_helper()
1110 int full) in tls_match_suffix() argument
1116 return tls_match_suffix_helper(cert, match, full); in tls_match_suffix()
1124 if (tls_match_suffix_helper(cert, token, full)) { in tls_match_suffix()
Dtls_openssl.c1759 size_t match_len, int full) in domain_suffix_match() argument
1771 if (match_len > len || (full && match_len != len)) in domain_suffix_match()
2005 size_t match_len, int full) in tls_match_suffix_helper() argument
2015 full ? "": "suffix ", match); in tls_match_suffix_helper()
2029 match, match_len, full) == 1) { in tls_match_suffix_helper()
2031 full ? "Match" : "Suffix match"); in tls_match_suffix_helper()
2061 match, match_len, full) == 1) { in tls_match_suffix_helper()
2063 full ? "Match" : "Suffix match"); in tls_match_suffix_helper()
2069 full ? "": "suffix "); in tls_match_suffix_helper()
2075 static int tls_match_suffix(X509 *cert, const char *match, int full) in tls_match_suffix() argument
[all …]
/hostap-3.6.0/wpa_supplicant/
Dtodo.txt63 - add support for fetching full user cert chain from Windows certificate
77 - test EAP-FAST peer with OpenSSL and verify that fallback to full handshake
DREADME-Windows.txt159 command line option is the full string following "ifname:" (the
264 Service need to be registered with 'wpasvc.exe reg <full path to
DREADME-P2P78 The default behavior is to run a single full scan in the beginning and
80 channels, i.e., it skips the initial full scan. type=progressive is
84 full scan. When the type parameter is not included (i.e., full scan), the
DChangeLog345 - add support for full station state operations
489 domain_suffix_match, but full match is required)
621 * "fetch_osu" and "cancel_osu_fetch" to start/stop full OSU provider
699 - avoid more concurrent scanning cases during full group formation
780 - avoid concurrent operations requiring full control of the radio when
1401 allow fallback to full handshake if server rejects PAC-Opaque
1486 full handshake when using EAP-FAST (e.g., due to an expired
1803 'wpasvc.exe reg <full path to wpasvc.exe>' to register a service,
2189 ndiswrapper gets full support for RSN PMKSA caching
2190 * improved recovery from PMKID mismatches by requesting full EAP
[all …]
Deap_testing.txt15 The full automated test suite can now be run in couple of seconds, but
DREADME148 is to add full WPA/WPA2 support to Linux wireless extensions to allow
753 license = show full wpa_cli license
925 process to avoid full system compromise.
/hostap-3.6.0/doc/
Ddriver_wrapper.doxygen17 includes full support for WE-18. After that, all Linux drivers, at
57 example implementations include full support for all security modes.
99 to provide the full WPA IE (including element id and length) as a hex
Dp2p.doxygen189 full scan to be completed by calling \ref p2p_config::p2p_scan(). Results
193 the full scan are reported with the \ref p2p_config::dev_found() callback.
195 After the full scan, P2P module start alternating between Listen and
215 full scan phase described. Similarly, scan results from the search
Dmainpage.doxygen46 programs without having to setup a full test setup with wireless
Dtesting_tools.doxygen11 a full test setup with wireless cards. In addition, these tools can be
Dctrl_iface.doxygen391 The default search type is to first run a full scan of all channels
394 (e.g., "P2P_FIND 5 type=social") will skip the initial full scan and
396 type=progressive") starts with a full scan and then searches
/hostap-3.6.0/hostapd/
DREADME62 EAP server (i.e., allow full authentication without requiring
167 with full path to the configuration file as the command line argument,
308 # and/or WPA2 (full IEEE 802.11i/RSN):
343 # roaming be pre-authenticating IEEE 802.1X/EAP part of the full RSN
DChangeLog221 - update full message for interim accounting updates
232 - added support for full station state operations
376 * enforce full EAP authentication after RADIUS Disconnect-Request by
484 * changed OpenSSL to read full certificate chain from server_cert file
/hostap-3.6.0/tests/hwsim/
Dwpasupplicant.py645 def peer_known(self, peer, full=True): argument
649 if not full:
653 def discover_peer(self, peer, full=True, timeout=15, social=True, argument
656 if not force_find and self.peer_known(peer, full):
663 if self.peer_known(peer, full):
DREADME5 automated tests of full hostapd and wpa_supplicant functionality. This
132 Simplest way to run a full set of the test cases is by running
Dexample-setup.txt10 The steps here describe how to run a full Linux installation in a
/hostap-3.6.0/tests/hwsim/vm/
DREADME37 memory and CPU resources, this can significantly speed up the full test
/hostap-3.6.0/tests/
DREADME7 hwsim directory contains the test setup for full system testing of
/hostap-3.6.0/wpa_supplicant/doc/docbook/
Dwpa_priv.sgml40 unprivileged process to avoid the possibility of a full system
Dwpa_supplicant.conf.sgml25 <para>All file paths in this configuration file should use full
Dwpa_cli.sgml236 <para>show full wpa_cli license</para>
Dwpa_supplicant.sgml622 other drivers. One main goal is to add full WPA/WPA2 support to

12