Home
last modified time | relevance | path

Searched refs:accepted (Results 1 – 12 of 12) sorted by relevance

/hostap-latest/src/ap/
Dieee802_11_auth.c35 int accepted; /* HOSTAPD_ACL_* */ member
95 return entry->accepted; in hostapd_acl_cache_get()
542 cache->accepted = HOSTAPD_ACL_ACCEPT_TIMEOUT; in hostapd_acl_recv_radius()
544 cache->accepted = HOSTAPD_ACL_ACCEPT; in hostapd_acl_recv_radius()
582 cache->accepted = HOSTAPD_ACL_REJECT; in hostapd_acl_recv_radius()
596 cache->accepted = HOSTAPD_ACL_REJECT; in hostapd_acl_recv_radius()
598 cache->accepted = HOSTAPD_ACL_REJECT; in hostapd_acl_recv_radius()
604 bool success = cache->accepted == HOSTAPD_ACL_ACCEPT || in hostapd_acl_recv_radius()
605 cache->accepted == HOSTAPD_ACL_ACCEPT_TIMEOUT; in hostapd_acl_recv_radius()
615 (ieee802_11_set_radius_info(hapd, sta, cache->accepted, in hostapd_acl_recv_radius()
[all …]
Dap_drv_ops.h252 const u8 *mac, int accepted, in hostapd_drv_set_radius_acl_auth() argument
257 return hapd->driver->set_radius_acl_auth(hapd->drv_priv, mac, accepted, in hostapd_drv_set_radius_acl_auth()
/hostap-latest/hostapd/
DREADME153 Unauthorized state and only IEEE 802.1X frames are accepted at this
157 station are accepted.
320 # Set of accepted key management algorithms (WPA-PSK, WPA-EAP, or both). The
324 # Set of accepted cipher suites (encryption algorithms) for pairwise keys
348 # accepted (e.g., 'eth0' or 'eth0 wlan0wds0'. This list should include all
DChangeLog314 * increases maximum value accepted for cwmin/cwmax
/hostap-latest/wpa_supplicant/doc/docbook/
Dwpa_supplicant.conf.sgml19 file that lists all accepted networks and security policies,
/hostap-latest/
DCONTRIBUTIONS29 unfortunately be accepted.
/hostap-latest/doc/
Dp2p.doxygen233 Provision Discovery, an accepted request will be reported with the
Dctrl_iface.doxygen1002 P2P_EVENT_PROV_DISC_PBC_RESP: The peer accepted our provision discovery
/hostap-latest/src/drivers/
Ddriver.h3948 int (*set_radius_acl_auth)(void *priv, const u8 *mac, int accepted,
/hostap-latest/wpa_supplicant/
DREADME-P2P736 accepted without separate authorization (e.g., user interaction).
DREADME508 wpa_supplicant is configured using a text file that lists all accepted
DChangeLog1671 addresses from being accepted as local control requests
2136 is set to an empty string, any SSID will be accepted for non-WPA AP