/hostap-3.6.0/src/crypto/ |
D | tls_wolfssl.c | 648 size_t match_len, int full) in domain_suffix_match() argument 661 if (match_len > len || (full && match_len != len)) in domain_suffix_match() 679 size_t match_len, int full) in tls_match_suffix_helper() argument 689 full ? "" : "suffix ", match); in tls_match_suffix_helper() 704 match_len, full) == 1) { in tls_match_suffix_helper() 706 full ? "Match" : "Suffix match"); in tls_match_suffix_helper() 737 match, match_len, full) == 1) { in tls_match_suffix_helper() 739 full ? "Match" : "Suffix match"); in tls_match_suffix_helper() 745 full ? "" : "suffix "); in tls_match_suffix_helper() 750 static int tls_match_suffix(WOLFSSL_X509 *cert, const char *match, int full) in tls_match_suffix() argument [all …]
|
D | tls_gnutls.c | 1090 int full) in tls_match_suffix_helper() argument 1095 if (full) in tls_match_suffix_helper() 1104 full ? "": "suffix ", match, res); in tls_match_suffix_helper() 1110 int full) in tls_match_suffix() argument 1116 return tls_match_suffix_helper(cert, match, full); in tls_match_suffix() 1124 if (tls_match_suffix_helper(cert, token, full)) { in tls_match_suffix()
|
D | tls_openssl.c | 1759 size_t match_len, int full) in domain_suffix_match() argument 1771 if (match_len > len || (full && match_len != len)) in domain_suffix_match() 2005 size_t match_len, int full) in tls_match_suffix_helper() argument 2015 full ? "": "suffix ", match); in tls_match_suffix_helper() 2029 match, match_len, full) == 1) { in tls_match_suffix_helper() 2031 full ? "Match" : "Suffix match"); in tls_match_suffix_helper() 2061 match, match_len, full) == 1) { in tls_match_suffix_helper() 2063 full ? "Match" : "Suffix match"); in tls_match_suffix_helper() 2069 full ? "": "suffix "); in tls_match_suffix_helper() 2075 static int tls_match_suffix(X509 *cert, const char *match, int full) in tls_match_suffix() argument [all …]
|
/hostap-3.6.0/wpa_supplicant/ |
D | todo.txt | 63 - add support for fetching full user cert chain from Windows certificate 77 - test EAP-FAST peer with OpenSSL and verify that fallback to full handshake
|
D | README-Windows.txt | 159 command line option is the full string following "ifname:" (the 264 Service need to be registered with 'wpasvc.exe reg <full path to
|
D | README-P2P | 78 The default behavior is to run a single full scan in the beginning and 80 channels, i.e., it skips the initial full scan. type=progressive is 84 full scan. When the type parameter is not included (i.e., full scan), the
|
D | ChangeLog | 345 - add support for full station state operations 489 domain_suffix_match, but full match is required) 621 * "fetch_osu" and "cancel_osu_fetch" to start/stop full OSU provider 699 - avoid more concurrent scanning cases during full group formation 780 - avoid concurrent operations requiring full control of the radio when 1401 allow fallback to full handshake if server rejects PAC-Opaque 1486 full handshake when using EAP-FAST (e.g., due to an expired 1803 'wpasvc.exe reg <full path to wpasvc.exe>' to register a service, 2189 ndiswrapper gets full support for RSN PMKSA caching 2190 * improved recovery from PMKID mismatches by requesting full EAP [all …]
|
D | eap_testing.txt | 15 The full automated test suite can now be run in couple of seconds, but
|
D | README | 148 is to add full WPA/WPA2 support to Linux wireless extensions to allow 753 license = show full wpa_cli license 925 process to avoid full system compromise.
|
/hostap-3.6.0/doc/ |
D | driver_wrapper.doxygen | 17 includes full support for WE-18. After that, all Linux drivers, at 57 example implementations include full support for all security modes. 99 to provide the full WPA IE (including element id and length) as a hex
|
D | p2p.doxygen | 189 full scan to be completed by calling \ref p2p_config::p2p_scan(). Results 193 the full scan are reported with the \ref p2p_config::dev_found() callback. 195 After the full scan, P2P module start alternating between Listen and 215 full scan phase described. Similarly, scan results from the search
|
D | mainpage.doxygen | 46 programs without having to setup a full test setup with wireless
|
D | testing_tools.doxygen | 11 a full test setup with wireless cards. In addition, these tools can be
|
D | ctrl_iface.doxygen | 391 The default search type is to first run a full scan of all channels 394 (e.g., "P2P_FIND 5 type=social") will skip the initial full scan and 396 type=progressive") starts with a full scan and then searches
|
/hostap-3.6.0/hostapd/ |
D | README | 62 EAP server (i.e., allow full authentication without requiring 167 with full path to the configuration file as the command line argument, 308 # and/or WPA2 (full IEEE 802.11i/RSN): 343 # roaming be pre-authenticating IEEE 802.1X/EAP part of the full RSN
|
D | ChangeLog | 221 - update full message for interim accounting updates 232 - added support for full station state operations 376 * enforce full EAP authentication after RADIUS Disconnect-Request by 484 * changed OpenSSL to read full certificate chain from server_cert file
|
/hostap-3.6.0/tests/hwsim/ |
D | wpasupplicant.py | 645 def peer_known(self, peer, full=True): argument 649 if not full: 653 def discover_peer(self, peer, full=True, timeout=15, social=True, argument 656 if not force_find and self.peer_known(peer, full): 663 if self.peer_known(peer, full):
|
D | README | 5 automated tests of full hostapd and wpa_supplicant functionality. This 132 Simplest way to run a full set of the test cases is by running
|
D | example-setup.txt | 10 The steps here describe how to run a full Linux installation in a
|
/hostap-3.6.0/tests/hwsim/vm/ |
D | README | 37 memory and CPU resources, this can significantly speed up the full test
|
/hostap-3.6.0/tests/ |
D | README | 7 hwsim directory contains the test setup for full system testing of
|
/hostap-3.6.0/wpa_supplicant/doc/docbook/ |
D | wpa_priv.sgml | 40 unprivileged process to avoid the possibility of a full system
|
D | wpa_supplicant.conf.sgml | 25 <para>All file paths in this configuration file should use full
|
D | wpa_cli.sgml | 236 <para>show full wpa_cli license</para>
|
D | wpa_supplicant.sgml | 622 other drivers. One main goal is to add full WPA/WPA2 support to
|