/hostap-latest/tests/ |
D | cipher-and-key-mgmt-testing.txt | 43 to test broadcast traffic. To keep things simple and to reduce 86 link. It should be noted that ping may need to use broadcast ARP at the 88 broadcast and unicast connectivity may be needed to get this started. 115 arping is used to test broadcast connectivity. 126 Sent 5 probes (5 broadcast(s)) 129 This shows working broadcast data connectivity. 133 Sent 5 probes (5 broadcast(s)) 136 This shows not working broadcast data connectivity. 172 Verify that broadcast and unicast traffic works correctly (if not, 188 Verify that broadcast traffic works and issue the following command in [all …]
|
/hostap-latest/tests/hwsim/ |
D | hwsim_utils.py | 106 multicast_to_unicast=False, broadcast=True, argument 145 if broadcast: 173 if broadcast: 195 broadcast=True, send_len=None): argument 209 broadcast=broadcast, send_len=send_len)
|
D | test_ap_acs.py | 660 broadcast = 6*"ff" 662 probereq = "40000000" + broadcast + addr + broadcast + "1000" 667 probereq = "40000000" + broadcast + addr + broadcast + "1000"
|
D | test_ap_ciphers.py | 961 hwsim_utils.test_connectivity(dev[0], hapd, timeout=1, broadcast=False, 1145 hwsim_utils.test_connectivity(dev[0], hapd, broadcast=False)
|
D | README | 19 is used to verify that data connection (both unicast and broadcast)
|
D | test_ap_pmf.py | 458 def run_ap_pmf_valid(dev, apdev, disassociate, broadcast): argument 475 cmd += "ff:ff:ff:ff:ff:ff" if broadcast else addr0
|
D | test_ap_hs20.py | 2899 hwsim_utils.test_connectivity(dev[0], hapd, broadcast=False)
|
D | test_sigma_dut.py | 4366 hwsim_utils.test_connectivity(dev[0], dev[1], broadcast=False,
|
/hostap-latest/wpa_supplicant/ |
D | dpp_supplicant.c | 62 static const u8 broadcast[ETH_ALEN] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff }; variable 94 broadcast, in wpas_dpp_qr_code() 208 wpa_s->own_addr, broadcast, in wpas_dpp_auth_resp_retry_timeout() 428 auth->peer_mac_addr, wpa_s->own_addr, broadcast, in wpas_dpp_send_conn_status_result() 804 dst = broadcast; in wpas_dpp_auth_init_next() 829 wpa_s->own_addr, broadcast, in wpas_dpp_auth_init_next() 1163 auth->peer_mac_addr, wpa_s->own_addr, broadcast, in wpas_dpp_tx_auth_resp() 1958 addr, wpa_s->own_addr, broadcast, in wpas_dpp_gas_resp_cb() 2120 src, wpa_s->own_addr, broadcast, in wpas_dpp_rx_auth_resp() 2583 if (offchannel_send_action(wpa_s, freq, src, wpa_s->own_addr, broadcast, in wpas_dpp_rx_reconfig_announcement() [all …]
|
D | todo.txt | 11 - Cisco AP and non-zero keyidx for unicast -> map to broadcast
|
D | ChangeLog | 645 - fixed some service discovery cases with broadcast queries not being 888 * avoid excessive Probe Response retries for broadcast Probe Request 1122 - Treat '' in SSIDs of Interface.Scan as a request for broadcast 1937 sure the driver configures broadcast decryption correctly 2266 * fixed static WEP key configuration to use broadcast/default type for 2399 for the broadcast key
|
D | README | 281 - wpa_supplicant configures encryption keys for unicast and broadcast 593 broadcast); use EAP-TLS for authentication
|
D | wpa_supplicant.c | 7014 const u8 broadcast[ETH_ALEN] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff }; in wpas_gas_server_tx() local 7019 offchannel_send_action(wpa_s, freq, da, wpa_s->own_addr, broadcast, in wpas_gas_server_tx()
|
/hostap-latest/doc/ |
D | code_structure.doxygen | 92 RC4 (broadcast/default key encryption) 107 AES Key Wrap Algorithm with 128-bit KEK, RFC3394 (broadcast/default
|
D | driver_wrapper.doxygen | 147 broadcast/unicast addr=addr2). This is the recommended format until
|
/hostap-latest/src/ap/ |
D | dpp_hostapd.c | 47 static const u8 broadcast[ETH_ALEN] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff }; variable 409 " freq=%u type=%d", MAC2STR(broadcast), pkex->freq, in hostapd_dpp_pkex_init() 412 hostapd_drv_send_action(hapd, pkex->freq, 0, broadcast, in hostapd_dpp_pkex_init() 453 MAC2STR(broadcast), pkex->freq, in hostapd_dpp_pkex_retry_timeout() 457 broadcast, in hostapd_dpp_pkex_retry_timeout() 785 dst = broadcast; in hostapd_dpp_auth_init_next() 3606 MAC2STR(broadcast), hapd->dpp_chirp_freq, type); in hostapd_dpp_chirp_start() 3608 hapd, hapd->dpp_chirp_freq, 2000, broadcast, in hostapd_dpp_chirp_start()
|
D | ieee802_1x.c | 211 int idx, int broadcast, in ieee802_1x_tx_key_one() argument 255 key->key_index = idx | (broadcast ? 0 : BIT(7)); in ieee802_1x_tx_key_one() 299 broadcast ? "broadcast" : "unicast", idx); in ieee802_1x_tx_key_one()
|
/hostap-latest/hostapd/ |
D | README | 201 configured to automatically select a random default/broadcast key 328 # Group cipher suite (encryption algorithm for broadcast and multicast frames) 334 # Time interval for rekeying GTK (broadcast/multicast encryption keys) in
|
D | ChangeLog | 529 * avoid excessive Probe Response retries for broadcast Probe Request 1269 (instead of broadcast) for IAPP ADD-notify (moved from draft 3 to
|
/hostap-latest/wpa_supplicant/doc/docbook/ |
D | wpa_supplicant.conf.sgml | 126 (require both unicast and broadcast); use EAP-TLS for
|
D | wpa_supplicant.sgml | 128 keys for unicast and broadcast</para>
|