/hostap-latest/hostapd/ |
D | hostapd.android.rc | 18 disabled
|
D | ChangeLog | 34 (a mitigation for CVE-2023-52424; disabled by default for now, can be 80 * added EAP-TLS server support for TLS 1.3 (disabled by default for now) 104 fast reauthentication use to be disabled 431 Interworking is disabled to avoid interop issues 616 * Allow PMKSA caching to be disabled on the Authenticator. See 918 phase 2 user, now all four are disabled by default and need to be 1045 disabled by default; define AKA_USE_MILENAGE when building hlr_auc_gw 1064 direct link setup (DLS); note: this is disabled by default in both 1085 disabled by default, but should be enabled with use_pae_group_addr=1
|
D | README-WPS | 260 The internal credential generation can be disabled with 268 Processing of received configuration updates can be disabled with
|
/hostap-latest/wpa_supplicant/ |
D | wpa_supplicant.c | 4654 if (!ssid || !ssid->disabled || ssid->disabled == 2) in wpa_supplicant_enable_one_network() 4657 ssid->disabled = 0; in wpa_supplicant_enable_one_network() 4690 ssid->disabled = 1; in wpa_supplicant_add_network() 4741 was_disabled = ssid->disabled; in wpa_supplicant_remove_network() 4854 was_disabled = other_ssid->disabled; in wpa_supplicant_disable_network() 4859 other_ssid->disabled = 1; in wpa_supplicant_disable_network() 4861 if (was_disabled != other_ssid->disabled) in wpa_supplicant_disable_network() 4871 } else if (ssid->disabled != 2) { in wpa_supplicant_disable_network() 4879 was_disabled = ssid->disabled; in wpa_supplicant_disable_network() 4881 ssid->disabled = 1; in wpa_supplicant_disable_network() [all …]
|
D | wps_supplicant.c | 127 int disabled = wpa_s->current_ssid->disabled; in wpas_wps_eapol_cb() local 139 if (disabled) { in wpas_wps_eapol_cb() 534 ssid->disabled = 1; in wpa_supplicant_wps_cred() 694 if (ssid->disabled_for_connect && ssid->disabled) { in wpas_wps_reenable_networks() 696 ssid->disabled = 0; in wpas_wps_reenable_networks() 1106 int was_disabled = ssid->disabled; in wpas_wps_temp_disable() 1115 ssid->disabled = ssid != selected; in wpas_wps_temp_disable() 1116 if (was_disabled != ssid->disabled) { in wpas_wps_temp_disable() 1117 if (ssid->disabled) in wpas_wps_temp_disable() 1978 if ((ssid->key_mgmt & WPA_KEY_MGMT_WPS) && !ssid->disabled) in wpas_wps_searching()
|
D | notify.c | 934 if (ssid->disabled == 2) { in wpas_notify_network_type_changed() 936 ssid->disabled = 0; in wpas_notify_network_type_changed() 938 ssid->disabled = 2; in wpas_notify_network_type_changed()
|
D | ChangeLog | 36 caching with FT-EAP was, and still is, disabled by default 46 (a mitigation for CVE-2023-52424; disabled by default for now, can be 58 sae_pwe=2); this is currently disabled by default, but will likely 100 * added EAP-TLS peer support for TLS 1.3 (disabled by default for now) 117 (disabled by default for backwards compatibility; can be enabled 267 - disabled PMKSA caching with FT since it is not fully functional 299 - allow HT to be disabled (disable_ht=1) 366 - allow specific TLS versions to be disabled with phase2 parameter 396 - do not add NL80211_ATTR_SMPS_MODE attribute if HT is disabled 552 * add optional reassoc_same_bss_optim=1 (disabled by default) [all …]
|
D | config_ssid.h | 485 int disabled; member
|
D | bss.h | 139 bool disabled; member
|
D | defconfig | 69 # However, this requires that WZC is disabled (net stop wzcsvc) before starting 104 # Enable EAP-TLSv1.3 support by default (currently disabled unless explicitly 492 # disabled. This will save some in binary size and CPU use. However, this 681 # If this is disabled then for networks with capped SNR, the preference is given
|
D | p2p_supplicant.c | 569 if (s->disabled != 0 || !s->p2p_group || in wpas_get_p2p_group() 627 wpa_s, s, s->disabled, s->p2p_group, in p2p_group_go_member_count() 629 if (!s->disabled && s->p2p_group && in p2p_group_go_member_count() 644 !wpa_s->current_ssid->disabled && in p2p_is_active_persistent_group() 708 if (s->disabled == 2 && s->mode == WPAS_MODE_P2P_GO) in wpas_p2p_get_persistent_go() 930 if (ssid->p2p_group && ssid->disabled != 2) in wpas_p2p_group_delete() 1188 if (s->disabled == 2 && in wpas_p2p_store_persistent_group() 1225 s->disabled = 2; in wpas_p2p_store_persistent_group() 1283 if (s->disabled != 2 || s->mode != WPAS_MODE_P2P_GO) in wpas_p2p_add_persistent_group_client() 2497 if (ssid && ssid->disabled == 2 && in wpas_go_neg_completed() [all …]
|
D | config_file.c | 42 if (ssid->disabled == 2) in wpa_config_validate_network() 135 ssid->disabled = 1; in wpa_config_read_network() 787 INT(disabled); in wpa_config_write_network()
|
D | driver_i.h | 626 int disabled) in wpa_drv_radio_disable() argument 630 return wpa_s->driver->radio_disable(wpa_s->drv_priv, disabled); in wpa_drv_radio_disable()
|
D | ctrl_iface.c | 607 int disabled = atoi(value); in wpa_supplicant_ctrl_iface_set() local 608 wpa_printf(MSG_DEBUG, "TDLS: tdls_disabled=%d", disabled); in wpa_supplicant_ctrl_iface_set() 609 if (disabled) { in wpa_supplicant_ctrl_iface_set() 614 wpa_tdls_enable(wpa_s->wpa, !disabled); in wpa_supplicant_ctrl_iface_set() 619 int disabled = atoi(value); in wpa_supplicant_ctrl_iface_set() local 620 if (wpa_drv_radio_disable(wpa_s, disabled) < 0) in wpa_supplicant_ctrl_iface_set() 622 else if (disabled) in wpa_supplicant_ctrl_iface_set() 2805 ssid->disabled ? "[DISABLED]" : "", in wpa_supplicant_ctrl_iface_list_networks() 2808 ssid->disabled == 2 ? "[P2P-PERSISTENT]" : in wpa_supplicant_ctrl_iface_list_networks() 3498 if (ssid->disabled == 2) { in wpa_supplicant_ctrl_iface_select_network() [all …]
|
D | sme.c | 537 wpa_s->links[i].disabled = bss->mld_links[i].disabled; in wpas_sme_set_mlo_links() 2689 params.mld_params.mld_links[i].disabled = in sme_associate() 2690 wpa_s->links[i].disabled; in sme_associate() 2695 wpa_s->links[i].disabled, in sme_associate()
|
D | wpa_supplicant_i.h | 746 bool disabled; member 1890 return ssid->disabled == 2 && ssid->p2p_persistent_group; in network_is_persistent_group()
|
D | scan.c | 123 int count = 0, disabled = 0; in wpa_supplicant_enabled_networks() local 132 disabled++; in wpa_supplicant_enabled_networks() 138 if (count == 0 && disabled > 0) { in wpa_supplicant_enabled_networks() 140 "networks)", disabled); in wpa_supplicant_enabled_networks()
|
/hostap-latest/src/common/ |
D | hw_features_common.h | 53 int disabled);
|
D | hw_features_common.c | 814 int disabled) in set_disable_ht40() argument 820 if (disabled) in set_disable_ht40()
|
/hostap-latest/src/eap_peer/ |
D | eap.h | 352 void eap_set_force_disabled(struct eap_sm *sm, int disabled);
|
/hostap-latest/doc/ |
D | porting.doxygen | 167 enabled/disabled if it is desirable that wpa_supplicant processing 168 for the interface is fully enabled/disabled at the same time.
|
/hostap-latest/tests/ |
D | cipher-and-key-mgmt-testing.txt | 15 disabled in default wpa_supplicant and hostapd builds for production 45 addresses are used and IPv6 is disabled.
|
/hostap-latest/src/drivers/ |
D | driver.h | 967 bool disabled; member 4534 int (*radio_disable)(void *priv, int disabled); 6694 bool disabled; member
|
/hostap-latest/src/ap/ |
D | drv_callbacks.c | 2704 if (hapd->disabled && hapd->started) { in hostapd_event() 2705 hapd->disabled = 0; in hostapd_event() 2717 } else if (hapd->disabled && hapd->iface->cac_started) { in hostapd_event() 2726 hapd->disabled = 1; in hostapd_event()
|
D | hostapd.h | 186 unsigned int disabled:1; member
|