Home
last modified time | relevance | path

Searched refs:command (Results 1 – 25 of 46) sorted by relevance

12

/hostap-latest/wpa_supplicant/doc/docbook/
Dwpa_priv.sgml20 <command>wpa_priv</command>
31 <para><command>wpa_priv</command> is a privilege separation helper that
32 minimizes the size of <command>wpa_supplicant</command> code that needs
43 <para><command>wpa_priv</command> needs to be run with network admin
45 interface that is included on the command line; any other interface will
46 be off limits for <command>wpa_supplicant</command> in this kind of
47 configuration. After this, <command>wpa_supplicant</command> can be run as
56 <command>wpa_priv</command> to allow users in the
58 <command>wpa_supplicant</command> with privilege separation:</para>
73 <para>Start <command>wpa_priv</command> as root (e.g., from system
[all …]
Dwpa_supplicant.sgml18 <command>wpa_supplicant</command>
57 <para><command>wpa_supplicant</command> is an implementation of
64 <para><command>wpa_supplicant</command> is designed to be a
67 connection. <command>wpa_supplicant</command> supports separate
69 <command>wpa_cli</command>, is included with
78 <para>After <command>wpa_supplicant</command> has configured the
89 <para><command>wpa_supplicant</command> requests the kernel
94 <para><command>wpa_supplicant</command> selects a BSS based on
99 <para><command>wpa_supplicant</command> requests the kernel
116 <para>If WPA-PSK: <command>wpa_supplicant</command> uses PSK
[all …]
Dwpa_passphrase.sgml18 <command>wpa_passphrase</command>
27 <para><command>wpa_passphrase</command> pre-computes PSK entries for
46 <para>The passphrase to use. If not included on the command line,
Dwpa_cli.sgml15 <refpurpose>WPA command line client</refpurpose>
20 <command>wpa_cli</command>
28 <arg><replaceable>command ...</replaceable></arg>
57 <para>wpa_cli supports two modes: interactive and command
58 line. Both modes share the same command set and the main
63 including the command as a command line parameter. Commands are
64 then entered on the wpa_cli prompt. In command line mode, the same
65 commands are entered as command line arguments for wpa_cli.</para>
185 <term>command</term>
187 <listitem><para>Run a command. The available commands are
[all …]
Dwpa_supplicant.conf.sgml18 <para><command>wpa_supplicant</command> is configured using a text
21 probably in <command>/usr/share/doc/wpa_supplicant/</command>, for
31 SIGHUP signal to <command>wpa_supplicant</command> ('killall -HUP
33 the <emphasis>wpa_cli reconfigure</emphasis> command.</para>
182 (-Dwired or -Droboswitch on command line).</para>
Deapol_test.sgml20 <command>eapol_test</command>
35 <command>eapol_test scard</command>
38 <command>eapol_test sim</command>
Dwpa_gui.sgml20 <command>wpa_gui</command>
37 configuration features of the command line client, wpa_cli. Refer
/hostap-latest/tests/hwsim/
Dremotehost.py21 def execute_thread(command, reply): argument
22 cmd = ' '.join(command)
27 buf = subprocess.check_output(command, stderr=err, bufsize=0).decode()
66 def local_execute(self, command): argument
67 logger.debug("execute: " + str(command))
71 buf = subprocess.check_output(command, stderr=err)
82 def execute(self, command): argument
84 return self.local_execute(command)
86 cmd = ["ssh", self.user + "@" + self.host, ' '.join(command)]
104 def thread_run(self, command, res, use_reaper=True): argument
[all …]
/hostap-latest/wpa_supplicant/
DREADME-NAN-USD45 This command returns the assigned publish_id value or FAIL on failure.
47 This command maps to the Publish() method in the NAN Discovery Engine.
51 This command maps to the CancelPublish() method in the NAN Discovery
56 This command maps to the UpdatePublish() method in the NAN Discovery
70 This command returns the assigned subscribe_id value or FAIL on failure.
72 This command maps to the Subscribe() method in the NAN Discovery Engine.
76 This command maps to the CancelSubscribe() method in the NAN Discovery Engine.
80 This command maps to the Transmit() method in the NAN Discovery Engine.
DREADME-P2P58 wpa_cli starts in interactive mode if no command string is included on
59 the command line. By default, it will select the first network interface
62 by adding -i argument on the command line (e.g., 'wpa_cli -i wlan1').
98 With one or more seek arguments, the command sends Probe Request frames
119 for the Listen operation in seconds. This command may not be of that
138 parameters for this command are the P2P device address of the peer and
144 The optional "join" parameter can be used to indicate that this command
163 the command return code), PIN# means that a pre-selected PIN can be
174 "join" indicates that this is a command to join an existing group as a
205 P2PS attribute changes to p2p_connect command:
[all …]
DREADME-WPS130 When the wps_pin command is issued for an AP (including P2P GO) mode
163 changing them. The main difference with the wps_pin command is that
168 parameters are given to the wps_reg command:
236 example, the following command could be used to start the ER:
262 wps_reg command); this does not change the AP's configuration, but
323 "wps_nfc [BSSID]" command starts WPS protocol run with the local end as
327 "wps_nfc_token <WPS|NDEF>" command. The included nfc_pw_token tool
332 The "wps_nfc_config_token <WPS/NDEF>" command can be used to build an
334 interface (AP or P2P GO). The output value from this command is a
342 The "wps_nfc_config_token <WPS/NDEF> <network id>" command can be used
[all …]
DREADME123 interface driver_nl80211 (-Dnl80211 on wpa_supplicant command line)
372 wpa_supplicant and wpa_cli with 'make' command. You may then install
389 command to start it on foreground with debugging enabled:
393 Assuming everything goes fine, you can start using following command
400 interface to use by including -D<driver name> option on the command
401 line. See following section for more details on command line options
464 to specify multiple comma separated driver wrappers on the command
473 one process and list of options at command line. Each interface is
474 separated with -N argument. As an example, following command would
487 As an example, the following command would start wpa_supplicant for a
[all …]
DChangeLog314 (anqp[265]=<hexdump> in "BSS <BSSID>" command output)
324 - added P2P_GROUP_MEMBER command to fetch client interface address
352 * extended INTERFACE_ADD command to allow certain type (sta/ap)
358 and can also be done with the new ABORT_SCAN command)
382 * added SIGNAL_MONITOR command to request signal strength monitoring
384 * added command for retrieving HS 2.0 icons with in-memory storage
397 - add NL80211_ATTR_PREV_BSSID with Connect command
406 * added POLL_STA command to check connectivity in AP mode
432 - fixed vendor command handling to check OUI properly
464 command (optional "ssid <hexdump>" arguments)
[all …]
DREADME-HS2043 unless requested explicitly with the interworking_select command. This
95 # (i.e., require explicit interworking_select command for this; default)
359 external programs to manage various operations. The included command
455 command. This instructs wpa_supplicant to run a network scan and iterate
471 credential. interworking_connect command can be used to select a network
503 "interworking_select auto" command can be used to request wpa_supplicant
530 The connection status can be shown with the status command:
566 command output. Link layer security is indicated with the
577 ANQP information for the BSS can be fetched using the BSS command:
606 In addition, fetch_anqp command can be used to request similar set of
DREADME-DPP103 command.
138 following command.
164 command to get DPP credentials.
/hostap-latest/doc/
Dctrl_iface.doxygen41 unsolicited message between the command request and response.
46 unsolicited messages. This way command request/response pairs will
63 This command can be used to test whether wpa_supplicant is replying
185 Example command:
247 \c LIST_NETWORKS command output.
264 Disconnect and wait for \c REASSOCIATE or \c RECONNECT command before
289 Get detailed per-BSS scan results. \c BSS command can be used to
296 There are two options for selecting the BSS with the \c BSS command:
324 \c LIST_NETWORKS command output.
330 \c LIST_NETWORKS command output. Special network id \c all can be
[all …]
Dhostapd_ctrl_iface.doxygen40 unsolicited message between the command request and response.
45 unsolicited messages. This way command request/response pairs will
62 This command can be used to test whether hostapd is replying
/hostap-latest/wpadebug/src/w1/fi/wpadebug/
DCommandListActivity.java33 String command; field in CmdList
38 command = _command; in CmdList()
99 Toast.makeText(this, "Running: " + item.command, in onListItemClick()
101 String message = run(item.command); in onListItemClick()
DWpaCommandListActivity.java81 Toast.makeText(this, "Running: " + item.command, in onListItemClick()
83 String message = run(item.command); in onListItemClick()
/hostap-latest/tests/
Dcipher-and-key-mgmt-testing.txt176 Verify that unicast traffic works and issue the following command in
185 device increases beyond the value used prior to that RESET_PN command.
188 Verify that broadcast traffic works and issue the following command in
198 RESET_PN command.
214 Verify that unicast traffic works and issue the following command in
223 increases beyond the value used prior to that RESET_PN command.
268 Otherwise same as above, but replace RESEND_M3 command with:
277 Otherwise same as above, but replace RESEND_M3 command with:
306 Otherwise same as above, but replace RESEND_M3 command with:
315 Otherwise same as above, but replace RESEND_M3 command with:
[all …]
/hostap-latest/wpa_supplicant/examples/
Ddpp-qrcode.py124 if args.command == "logcat":
126 elif args.command == "display":
Dwps-nfc.py488 if args.command == "write-config":
492 if args.command == "write-er-config":
496 if args.command == "write-password":
/hostap-latest/hostapd/
DREADME-WPS172 Example command to add a PIN (12345670) for an Enrollee:
218 secure option is to use hostapd_cli wps_ap_pin command to enable the
221 command with a timeout value). Following commands are available for
307 wps_nfc_token command is used to manage use of the NFC password token
315 "wps_nfc_token <WPS|NDEF>" command. The nfc_pw_token tool from
319 The "wps_nfc_config_token <WPS/NDEF>" command can be used to build an
320 NFC configuration token. The output value from this command is a hexdump
331 following hostapd_cli command:
340 "nfc_get_handover_sel <NDEF> <WPS>" command can be used to build the
DChangeLog197 * hostapd_cli: added support for command history and completion
230 * added option (-S as command line argument) to request all interfaces
283 * added command line parameter -i to override interface parameter in
285 * added command completion support to hostapd_cli
287 compile option and "SIGNATURE <addr>" control interface command)
301 - fixed vendor command handling to check OUI properly
344 * add BSS_TM_REQ ctrl_iface command to send BSS Transition Management
365 * add UPDATE_BEACON ctrl_iface command; this can be used to force Beacon
434 - support vendor specific driver command
435 (VENDOR <vendor id> <sub command id> [<hex formatted data>])
[all …]
/hostap-latest/wpadebug/
DREADME61 Optionally, a text file with a set of command can be installed to allow
63 /data/local/wpadebug.cmds and use title@command format per line. For

12