Searched refs:accept (Results 1 – 19 of 19) sorted by relevance
/hostap-latest/tests/hwsim/ |
D | test_ap_params.py | 198 accept = hapd.request("ACCEPT_ACL SHOW").splitlines() 199 logger.info("accept: " + str(accept)) 202 if len(accept) != 0: 218 accept = hapd.request("ACCEPT_ACL SHOW").splitlines() 219 logger.info("accept: " + str(accept)) 222 if len(accept) != 1: 230 if "22:33:44:55:66:77 VLAN_ID=0" not in accept: 236 accept = hapd.request("ACCEPT_ACL SHOW").splitlines() 237 logger.info("accept: " + str(accept)) 240 if len(accept) != 0: [all …]
|
D | test_wpas_ap.py | 1165 accept = dev.request("ACCEPT_ACL SHOW").splitlines() 1166 logger.info("accept entries: " + str(accept)) 1167 if len(accept) != num_accept:
|
/hostap-latest/hs20/server/www/ |
D | terms.php | 22 $accept = isset($_GET["accept"]) && $_GET["accept"] == "yes"; variable 32 if (!$accept) {
|
/hostap-latest/wpa_supplicant/wpa_gui-qt4/ |
D | stringquery.cpp | 24 connect(edit, SIGNAL(returnPressed()), this, SLOT(accept())); in StringQuery()
|
D | userdatarequest.cpp | 93 accept(); in sendReply()
|
D | wpagui.cpp | 1633 event->accept(); in closeEvent()
|
/hostap-latest/wpa_supplicant/ |
D | README-P2P | 192 P2P implementations that require this to allow the user to accept the 308 p2p_service_add asp <auto accept> <adv id> <status 0/1> <Config Methods> 313 are "asp" to identify the command as P2PS one, auto accept value, 324 auto accept - Mandatory ASCII hex-encoded boolean (0 == no auto-accept, 325 1 == auto-accept ANY role, 2 == auto-accept CLIENT role, 326 4 == auto-accept GO role) 337 Session response information - Optional (used only if auto accept is TRUE) 342 p2p_service_rep asp <auto accept> <adv id> <status 0/1> <Config Methods> 356 auto accept - Mandatory ASCII hex-encoded boolean (1 == true, 0 == false) 367 Session response information - Optional (used only if auto accept is TRUE)
|
D | README-WPS | 275 - accept an Enrollee PBC using External Registrar
|
D | ChangeLog | 686 - extend ANQP_GET to accept Hotspot 2.0 subtypes 919 - accept 0x67 (Wrong length) as a response to READ RECORD to fix 1909 (e.g., proto or key_mgmt) that the file parser would not accept
|
/hostap-latest/src/crypto/ |
D | crypto_linux.c | 78 t = accept(s, NULL, NULL); in linux_af_alg_hash_vector() 302 ctx->t = accept(ctx->s, NULL, NULL); in crypto_hash_init() 434 skcipher->t = accept(skcipher->s, NULL, NULL); in linux_af_alg_skcipher()
|
/hostap-latest/tests/ |
D | test-https_server.c | 257 conn = accept(s, (struct sockaddr *) &addr, &addr_len); in main()
|
/hostap-latest/src/wps/ |
D | http_server.c | 207 conn = accept(srv->fd, (struct sockaddr *) &addr, &addr_len); in http_server_cb()
|
/hostap-latest/doc/ |
D | p2p.doxygen | 235 automatically accept the Provision Discovery for display and keypad 261 the GO to accept associations from devices and the client to connect to
|
D | ctrl_iface.doxygen | 967 used to accept the request with the same PIN configured for the 992 peer_address. P2P_CONNECT command can be used to accept the request.
|
D | dbus.doxygen | 1321 …<dd>Operation, e.g., "started", "accept proposed method", "remote certificate verification", "eap …
|
/hostap-latest/src/common/ |
D | dpp_tcp.c | 1869 fd = accept(ctrl->sock, (struct sockaddr *) &addr, &addr_len); in dpp_controller_tcp_cb() 2431 fd = accept(dpp->relay_sock, (struct sockaddr *) &addr, &addr_len); in dpp_relay_tcp_cb()
|
/hostap-latest/hostapd/ |
D | README | 114 controlling the virtual port authorization, i.e., whether to accept
|
D | ChangeLog | 158 * RADIUS server: started to accept ERP keyName-NAI as user identity
|
/hostap-latest/wlantest/ |
D | ctrl.c | 1395 conn = accept(sock, NULL, NULL); in ctrl_connect()
|