Home
last modified time | relevance | path

Searched refs:client (Results 1 – 25 of 66) sorted by relevance

123

/hostap-latest/src/crypto/
Dtls_internal.c34 struct tlsv1_client *client; member
105 conn->client = tlsv1_client_init(); in tls_connection_init()
106 if (conn->client == NULL) { in tls_connection_init()
110 tlsv1_client_set_cb(conn->client, global->event_cb, in tls_connection_init()
155 if (conn->client) in tls_connection_deinit()
156 tlsv1_client_deinit(conn->client); in tls_connection_deinit()
169 if (conn->client) in tls_connection_established()
170 return tlsv1_client_established(conn->client); in tls_connection_established()
191 if (conn->client) in tls_connection_shutdown()
192 return tlsv1_client_shutdown(conn->client); in tls_connection_shutdown()
[all …]
/hostap-latest/src/radius/
Dradius_server.c71 struct radius_client *client; member
335 struct radius_client *client = data->clients; in radius_server_get_client() local
337 while (client) { in radius_server_get_client()
346 client->mask6.s6_addr[i]) != in radius_server_get_client()
347 (client->addr6.s6_addr[i] & in radius_server_get_client()
348 client->mask6.s6_addr[i])) { in radius_server_get_client()
358 if (!ipv6 && (client->addr.s_addr & client->mask.s_addr) == in radius_server_get_client()
359 (addr->s_addr & client->mask.s_addr)) { in radius_server_get_client()
363 client = client->next; in radius_server_get_client()
366 return client; in radius_server_get_client()
[all …]
/hostap-latest/tests/remote/
Drutils.py219 def get_ipv4(client, ifname=None): argument
221 ifname = client.ifname
222 status, buf = client.execute(["ifconfig", ifname])
237 def get_ipv6(client, ifname=None): argument
240 ifname = client.ifname
241 status, buf = client.execute(["ifconfig", ifname])
262 def get_ip(client, addr_type="ipv6", iface=None): argument
264 return get_ipv6(client, iface)
266 return get_ipv4(client, iface)
461 def iperf_run(server, client, server_ip, client_res, server_res, argument
[all …]
/hostap-latest/tests/fuzzing/tls-client/
DMakefile1 ALL=tls-client
17 OBJS += tls-client.o
28 tls-client: $(OBJS) $(LIBS)
32 rm -f tls-client *~ *.o *.d ../*~ ../*.o ../*.d
D.gitignore1 tls-client
/hostap-latest/wpa_supplicant/examples/
Dwps-nfc.py224 client = nfc.handover.HandoverClient(llc)
227 client.connect()
231 client.close()
235 client.close()
240 if not client.send(message):
242 client.close()
246 message = client._recv()
249 client.close()
253 client.close()
282 client.close()
Dp2p-nfc.py188 client = nfc.handover.HandoverClient(llc)
191 client.connect()
195 client.close()
199 client.close()
204 if not client.send(message):
206 client.close()
210 message = client._recv()
213 client.close()
217 client.close()
244 client.close()
Ddpp-nfc.py364 if handover.client:
366 client = handover.client
369 client = HandoverClient(handover, handover.llc)
372 client.connect()
376 client.close()
380 client.close()
382 handover.client = client
393 if not client.send_records(message):
404 message = client.recv_records(timeout=3.0)
442 client.close()
[all …]
/hostap-latest/src/wps/
Dwps_upnp_ssdp.c398 a->state, inet_ntoa(a->client.sin_addr), in msearchreply_state_machine_handler()
399 ntohs(a->client.sin_port)); in msearchreply_state_machine_handler()
409 (struct sockaddr *) &a->client, sizeof(a->client)) < 0) { in msearchreply_state_machine_handler()
413 inet_ntoa(a->client.sin_addr), in msearchreply_state_machine_handler()
414 ntohs(a->client.sin_port)); in msearchreply_state_machine_handler()
448 struct sockaddr_in *client, in msearchreply_state_machine_start() argument
470 os_memcpy(&a->client, client, sizeof(*client)); in msearchreply_state_machine_start()
514 struct sockaddr_in *client, const char *data) in ssdp_parse_msearch() argument
650 msearchreply_state_machine_start(sm, client, mx); in ssdp_parse_msearch()
/hostap-latest/tests/
DREADME76 ##### TLS client
86 mkdir tls-client-examples
87 ./test-tls client write tls-client-examples/client.msg
88 afl-fuzz -i tls-client-examples -o tls-client-findings -- $PWD/test-tls client read @@
/hostap-latest/tests/hwsim/auth_serv/
Dupdate.sh83 if [ ! -r server-eku-client.csr ]; then
84 ….tmp -batch -new -newkey rsa:2048 -nodes -keyout server-eku-client.key -out server-eku-client.csr …
86 $OPENSSL ca -config $PWD/openssl.cnf.tmp -batch -in server-eku-client.csr -out server-eku-client.pe…
91 if [ ! -r server-eku-client-server.csr ]; then
92 … -batch -new -newkey rsa:2048 -nodes -keyout server-eku-client-server.key -out server-eku-client-s…
94 …L ca -config $PWD/openssl.cnf.tmp -batch -in server-eku-client-server.csr -out server-eku-client-s…
/hostap-latest/wpa_supplicant/
Deap_testing.txt6 hostapd (RADIUS client and RADIUS processing, EAP<->RADIUS
10 client card or AP.
120 1) PEAPv1 required new label, "client PEAP encryption" instead of "client EAP
131 8) PEAPv1 used non-standard version negotiation (client had to force v1 even
134 client authentication followed by TNC inside the tunnel
175 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
202 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
224 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
294 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
363 - uses label "client EAP encryption"
[all …]
DREADME-DPP81 It is assumed that an AP and client station are up by running hostapd
116 band channel 1 is 2412 MHz) in case the Enrollee is a client device. An
129 AP. conf is sta-dpp if Enrollee is a client)
136 values to the hostapd config file. If the Enrollee is a client device,
148 To set values in runtime for client enrollees, set dpp_config_processing
152 in config files, they are taken up in next restart), the client device
DREADME-WPS5 can be configured and how an external component on the client (e.g.,
15 passphrase/PSK) and configuration of an access point and client
36 It should also be noted that the AP and a client device may change
37 roles (i.e., AP acts as an Enrollee and client device as a Registrar)
109 If the client device has a display, a random PIN has to be generated
117 the client will be enrolled with credentials needed to connect to the
120 If the client device does not have a display that could show the
141 If the client design wants to support optional WPS PBC mode, this can
142 be enabled by either a physical button in the client device or a
154 If the client wants to operate in the Registrar role to learn the
[all …]
DREADME-P2P6 client (e.g., management GUI) is used to enable WPS enrollment and
145 is requesting an already running GO to prepare for a new client. This is
175 client. It skips the GO Negotiation part. This will send a Provision
234 2 (group client only) or 4 (group owner only)
258 role - Optional 2 (group client only) or 4 (group owner only)
300 This command can be used to remove the specified client from all groups
572 persistent group, the P2P client device can use freq parameter to force
584 the AP/GO. This is used on the GO when a P2P client joins an existing
594 client joins an existing group.
603 acting as a P2P client). If no duration/interval pairs are given, the
[all …]
/hostap-latest/radius_example/
DREADME1 Example application using RADIUS client as a library
8 This directory contains an example showing how the RADIUS client
10 program. The example program initializes the RADIUS client and send a
22 RADIUS client implementation takes care of receiving messages,
/hostap-latest/wpa_supplicant/doc/docbook/
Deapol_test.sgml15 <refpurpose>EAP peer and RADIUS client testing</refpurpose>
24 <arg>-A<replaceable>client IP address</replaceable></arg>
49 authentication client code from hostapd. In addition, it has
54 client) together to generate a single program that can be used to
56 wireless client.</para>
101 <term>-A client address</term>
103 <listitem><para>IP address of the client. The default is to
/hostap-latest/hs20/client/
DMakefile1 ALL=hs20-osu-client
76 hs20-osu-client: $(OBJS)
77 $(Q)$(LDO) $(LDFLAGS) -o hs20-osu-client $(OBJS) $(LIBS)
/hostap-latest/tests/hwsim/
Dtest_radius.py481 import pyrad.client
504 srv = pyrad.client.Client(server="127.0.0.1", acctport=3799,
518 except pyrad.client.Timeout:
528 except pyrad.client.Timeout:
539 except pyrad.client.Timeout:
837 import pyrad.client
860 srv = pyrad.client.Client(server="127.0.0.1", acctport=3799,
876 except pyrad.client.Timeout:
891 import pyrad.client
910 srv = pyrad.client.Client(server="127.0.0.1", acctport=3799,
[all …]
Dp2p_utils.py207 def connect_cli(go, client, social=False, freq=None): argument
209 pin = client.wps_read_pin()
211 res = client.p2p_connect_group(go.p2p_dev_addr(), pin, timeout=60,
214 go.wait_sta(client.p2p_interface_addr())
215 hwsim_utils.test_connectivity_p2p(go, client)
/hostap-latest/doc/
Dtesting_tools.doxygen14 \section eapol_test eapol_test - EAP peer and RADIUS client testing
18 authentication client code from hostapd. In addition, it has minimal
22 IEEE 802.1X Supplicant (normally, a wireless client) together to
24 having to setup an access point and a wireless client.
52 [-M<client MAC address>]
67 -M<client MAC address> = Set own MAC address (Calling-Station-Id,
Ddirectories.doxygen59 functionality and separate RADIUS client and server functions.
65 \dir src/tls Internal TLS server and client implementation
88 client management.
Dcode_structure.doxygen161 TLSv1 client (RFC 2246)
164 Internal structures for TLSv1 client
167 TLSv1 client: read handshake messages
170 TLSv1 client: write handshake messages
300 RADIUS authentication client implementation for eapol_test
307 client
/hostap-latest/hs20/server/ca/
Dsetup.sh161 …ssl.cnf.tmp -batch -new -newkey rsa:2048 -nodes -out server-client.csr -keyout server-client.key |…
162 $OPENSSL ca -config $PWD/openssl.cnf.tmp -batch -md sha256 -in server-client.csr -out server-client
/hostap-latest/hostapd/
DREADME-WPS6 used to enable enrollment of client devices.
14 passphrase/PSK) and configuration of an access point and client
35 It should also be noted that the AP and a client device may change
36 roles (i.e., AP acts as an Enrollee and client device as a Registrar)
132 When a client device (WPS Enrollee) connects to hostapd (WPS
198 client device and the client can then use that key to connect to the
203 enabled by pushing a button on both the AP and the client at about the
210 At this point, the client has two minutes to complete WPS negotiation

123