Searched refs:connection (Results 1 – 21 of 21) sorted by relevance
/hostap-latest/doc/ |
D | hostapd_ctrl_iface.doxygen | 24 allows them to use helper functions to open connection to the control 33 interface connection without specific request from the external program 38 If the control interface connection is used both for commands and 47 to use only one connection for both purposes and wpa_gui demonstrates 50 Once the control interface connection is not needed anymore, it should 51 be closed by calling \ref wpa_ctrl_close(). If the connection was used for 64 connection is open and hostapd is processing commands.
|
D | ctrl_iface.doxygen | 25 allows them to use helper functions to open connection to the control 34 interface connection without specific request from the external program 39 If the control interface connection is used both for commands and 48 to use only one connection for both purposes and wpa_gui demonstrates 51 Once the control interface connection is not needed anymore, it should 52 be closed by calling \ref wpa_ctrl_close(). If the connection was used for 65 connection is open and wpa_supplicant is processing commands. 219 Attach the connection as a monitor for unsolicited events. This can 225 Detach the connection as a monitor for unsolicited events. This can 414 establishing data connection. [all …]
|
D | dbus.doxygen | 656 <p>Fetch signal properties for the current connection.</p> 1128 <p>Whether to force passive scan for network connection</p> 1406 …ote: This is used to specify the peer MAC address when authorizing WPS connection in AP or P2P GO … 1407 …s</td><td>ay</td><td>P2P Device Address of a peer to authorize for PBC connection. Used only in P2… 1617 A dictionary with parameters for the requested connection: 1690 …connection attempt from a peer (specified with a device address). This is a mechanism to reject a …
|
D | p2p.doxygen | 238 to actually authorize the connection.
|
/hostap-latest/wpa_supplicant/ |
D | README-WPS | 192 suggest possible WPS connection to the user. 231 can be either over a wired or wireless connection). 316 authenticate the connection instead of the PIN. In addition, an NFC tag 363 WPS carrier record for a Handover Request Message for connection 365 the second argument selects which type of connection handover is 369 build the contents of a Handover Select Message for connection handover 372 the second argument selects which type of connection handover is 380 reporting completed NFC connection handover. The first parameter 382 connection handover and the carrier records are the selected carrier
|
D | README-HS20 | 45 selection automatically whenever trying to find a network for connection 285 # limit would prevent any connection. Values are in kilobits per second. 295 # BSS Load or if the limit would prevent any connection, this constraint 298 # req_conn_capab: Required connection capability 304 # network connection. This policy is not used in home networks. 530 The connection status can be shown with the status command: 625 link-layer protected Hotspot 2.0 online signup connection with 643 Hotspot 2.0 connection with external network selection 649 Hotspot 2.0 connection (e.g., with SET, ADD_NETWORK, SET_NETWORK, and
|
D | todo.txt | 4 - consider closing smart card / PCSC connection when EAP-SIM/EAP-AKA 6 and try to optimize next connection if the same card is present for next
|
D | README-DPP | 17 three phases of DPP connection are authentication, configuration and 153 will automatically connect to the already provisioned AP and connection
|
D | README-P2P | 158 and establishing data connection. 193 connection. 230 adv_id - Mandatory remote Advertising ID of service connection is being 255 adv_id - Mandatory local Advertising ID of service connection is being 277 Reject connection attempt from a peer (specified with a device 279 a peer and request to automatically block any further connection or 768 Show status information (connection state, role, use encryption 856 TODO: cross-connection
|
D | ChangeLog | 263 - added support for OSEN connection in a shared RSN BSS 345 connection cannot succeed 357 * added an option to abort an ongoing scan (used to speed up connection 495 - allow cross connection on parent interface (this fixes number of 665 - prefer the last added network in Interworking connection to make the 673 * OSEN network for online signup connection 679 * slow down automatic connection attempts on EAP failure to meet 692 - enable FT for the connection automatically if the AP advertises 713 i.e., to allow connection from disconnected state 777 * optimized connection time by allowing recently received scan results [all …]
|
D | README-Windows.txt | 273 network connection available before any user has logged in, there may
|
D | README | 265 connection. wpa_supplicant supports separate frontend programs and an 986 to control the network connection. Traditionally this has been achieved
|
/hostap-latest/wpa_supplicant/dbus/ |
D | dbus_new_helpers.c | 375 static DBusHandlerResult message_handler(DBusConnection *connection, in message_handler() argument 420 dbus_connection_send(connection, reply, NULL); in message_handler() 424 wpa_dbus_flush_all_changed_properties(connection); in message_handler() 453 static void free_dbus_object_desc_cb(DBusConnection *connection, void *obj_dsc) in free_dbus_object_desc_cb() argument 482 obj_desc->connection = iface->con; in wpa_dbus_ctrl_iface_init() 547 obj_desc->connection = con; in wpa_dbus_register_object_per_iface()
|
D | dbus_new_helpers.h | 30 DBusConnection *connection; member
|
D | dbus_new_introspect.c | 271 add_child_nodes(xml, obj_dsc->connection, in wpa_dbus_introspect()
|
/hostap-latest/hostapd/ |
D | README-WPS | 301 authenticate the connection instead of the PIN. In addition, an NFC tag 341 contents of a Handover Select Message for connection handover when this 344 argument selects which type of connection handover is requested (WPS = 349 connection handover. The first parameter indicates whether the local 350 device initiated or responded to the connection handover and the carrier
|
D | ChangeLog | 213 - added support for OSEN connection in a shared RSN BSS 421 * OSEN network for online signup connection 650 the data connection is not working properly, e.g., due to the STA 953 * fixed IPv6 connection to RADIUS accounting server
|
D | README | 146 connection, based on the IEEE 802.1X state.
|
/hostap-latest/tests/hwsim/ |
D | README | 19 is used to verify that data connection (both unicast and broadcast) 26 network connection works in the expected way.
|
/hostap-latest/wpa_supplicant/doc/docbook/ |
D | wpa_supplicant.sgml | 67 connection. <command>wpa_supplicant</command> supports separate 716 based on wpa_cli to wait for a connection and then run
|
/hostap-latest/tests/ |
D | cipher-and-key-mgmt-testing.txt | 170 This indicates that the connection was completed successfully.
|