/hostap-latest/wpa_supplicant/ |
D | driver_i.h | 18 if (wpa_s->driver->init2) in wpa_drv_init() 19 return wpa_s->driver->init2(wpa_s, ifname, in wpa_drv_init() 21 if (wpa_s->driver->init) { in wpa_drv_init() 22 return wpa_s->driver->init(wpa_s, ifname); in wpa_drv_init() 29 if (wpa_s->driver->deinit) in wpa_drv_deinit() 30 wpa_s->driver->deinit(wpa_s->drv_priv); in wpa_drv_deinit() 36 if (wpa_s->driver->set_param) in wpa_drv_set_param() 37 return wpa_s->driver->set_param(wpa_s->drv_priv, param); in wpa_drv_set_param() 44 if (wpa_s->driver->set_countermeasures) { in wpa_drv_set_countermeasures() 45 return wpa_s->driver->set_countermeasures(wpa_s->drv_priv, in wpa_drv_set_countermeasures() [all …]
|
D | wpa_priv.c | 35 const struct wpa_driver_ops *driver; member 63 if (iface->driver->deinit) in wpa_priv_cmd_register() 64 iface->driver->deinit(iface->drv_priv); in wpa_priv_cmd_register() 67 iface->driver->global_deinit(iface->drv_global_priv); in wpa_priv_cmd_register() 82 if (iface->driver->init2) { in wpa_priv_cmd_register() 83 if (iface->driver->global_init) { in wpa_priv_cmd_register() 85 iface->driver->global_init(iface->ctx); in wpa_priv_cmd_register() 94 iface->drv_priv = iface->driver->init2(iface, iface->ifname, in wpa_priv_cmd_register() 96 } else if (iface->driver->init) { in wpa_priv_cmd_register() 97 iface->drv_priv = iface->driver->init(iface, iface->ifname); in wpa_priv_cmd_register() [all …]
|
D | todo.txt | 8 - if driver/hw is not WPA2 capable, must remove WPA_PROTO_RSN flag from 9 ssid->proto fields to avoid detecting downgrade attacks when the driver 14 for unicast); worked also with Host AP driver and madwifi 37 * global options (ap_scan, ctrl_interfaces) based on OS/driver 42 * "configuration wizard" (step 1: select OS, step 2: select driver, ...) to
|
D | ChangeLog | 27 * improve cross-AKM roaming with driver-based SME/BSS selection 102 * changed driver interface selection to default to automatic fallback 192 * extended driver flags indication for separate 802.1X and PSK 225 - new macsec_linux driver interface support for the Linux 247 * added support for nl80211 to offload 4-way handshake into the driver 286 * fixed TK configuration to the driver in EAPOL-Key 3/4 retry case 433 - allow driver-based roaming to change ESS 530 * enable HT for IBSS if supported by the driver 540 * enable AP/GO mode HT Tx STBC automatically based on driver support 547 not available from driver; estimate maximum throughput based on common [all …]
|
D | README | 82 * LEAP (note: requires special support from the driver for IEEE 802.11 121 number of driver specific interface included in wpa_supplicant, please 124 should be the default option to start with before falling back to driver 130 In theory, any driver that supports Linux wireless extensions can be 136 BSD net80211 layer (e.g., Atheros driver) 150 driver-specific interface code in wpa_supplicant. 261 802.11 authentication/association of the wlan driver. 270 - wpa_supplicant requests the kernel driver to scan neighboring BSSes 272 - wpa_supplicant requests the kernel driver to associate with the chosen 300 driver interfaces (e.g., nl80211, wext, ..) and which authentication [all …]
|
/hostap-latest/src/ap/ |
D | ap_drv_ops.h | 122 if (!hapd->driver || !hapd->driver->send_action_cancel_wait || in hostapd_drv_send_action_cancel_wait() 125 hapd->driver->send_action_cancel_wait(hapd->drv_priv); in hostapd_drv_send_action_cancel_wait() 173 if (hapd->driver == NULL || in hostapd_drv_set_countermeasures() 174 hapd->driver->hapd_set_countermeasures == NULL) in hostapd_drv_set_countermeasures() 176 return hapd->driver->hapd_set_countermeasures(hapd->drv_priv, enabled); in hostapd_drv_set_countermeasures() 184 if (hapd->driver == NULL || hapd->driver->set_sta_vlan == NULL) in hostapd_drv_set_sta_vlan() 186 return hapd->driver->set_sta_vlan(hapd->drv_priv, addr, ifname, in hostapd_drv_set_sta_vlan() 193 if (hapd->driver == NULL || hapd->driver->get_inact_sec == NULL) in hostapd_drv_get_inact_sec() 195 return hapd->driver->get_inact_sec(hapd->drv_priv, addr); in hostapd_drv_get_inact_sec() 201 if (!hapd->driver || !hapd->driver->sta_remove || !hapd->drv_priv) in hostapd_drv_sta_remove() [all …]
|
D | ap_drv_ops.c | 243 if (hapd->driver == NULL || hapd->driver->set_ap_wps_ie == NULL) in hostapd_reset_ap_wps_ie() 246 return hapd->driver->set_ap_wps_ie(hapd->drv_priv, NULL, NULL, NULL); in hostapd_reset_ap_wps_ie() 255 if (hapd->driver == NULL || hapd->driver->set_ap_wps_ie == NULL) in hostapd_set_ap_wps_ie() 262 ret = hapd->driver->set_ap_wps_ie(hapd->drv_priv, beacon, proberesp, in hostapd_set_ap_wps_ie() 389 if (hapd->driver == NULL || hapd->driver->set_wds_sta == NULL) in hostapd_set_wds_sta() 395 return hapd->driver->set_wds_sta(hapd->drv_priv, addr, aid, val, in hostapd_set_wds_sta() 403 if (hapd->driver == NULL || hapd->driver->add_sta_node == NULL) in hostapd_add_sta_node() 405 return hapd->driver->add_sta_node(hapd->drv_priv, addr, auth_alg); in hostapd_add_sta_node() 417 if (hapd->driver == NULL || hapd->driver->sta_auth == NULL) in hostapd_sta_auth() 449 return hapd->driver->sta_auth(hapd->drv_priv, ¶ms); in hostapd_sta_auth() [all …]
|
D | wpa_auth_kay.c | 29 if (!hapd->driver->macsec_init) in hapd_macsec_init() 31 return hapd->driver->macsec_init(hapd->drv_priv, params); in hapd_macsec_init() 39 if (!hapd->driver->macsec_deinit) in hapd_macsec_deinit() 41 return hapd->driver->macsec_deinit(hapd->drv_priv); in hapd_macsec_deinit() 49 if (!hapd->driver->macsec_get_capability) in hapd_macsec_get_capability() 51 return hapd->driver->macsec_get_capability(hapd->drv_priv, cap); in hapd_macsec_get_capability() 59 if (!hapd->driver->enable_protect_frames) in hapd_enable_protect_frames() 61 return hapd->driver->enable_protect_frames(hapd->drv_priv, enabled); in hapd_enable_protect_frames() 69 if (!hapd->driver->enable_encrypt) in hapd_enable_encrypt() 71 return hapd->driver->enable_encrypt(hapd->drv_priv, enabled); in hapd_enable_encrypt() [all …]
|
D | hostapd.c | 1306 if (hapd->driver && hapd->driver->set_operstate) in hostapd_start_beacon() 1307 hapd->driver->set_operstate(hapd->drv_priv, 1); in hostapd_start_beacon() 2035 iface->bss[i]->driver = hapd->driver; in setup_interface() 2893 hapd->driver = conf->driver; in hostapd_alloc_bss_data() 3383 static void hostapd_cleanup_driver(const struct wpa_driver_ops *driver, in hostapd_cleanup_driver() argument 3386 if (!driver || !driver->hapd_deinit || !drv_priv) in hostapd_cleanup_driver() 3395 driver->hapd_deinit(drv_priv); in hostapd_cleanup_driver() 3397 driver->is_drv_shared && in hostapd_cleanup_driver() 3398 !driver->is_drv_shared(drv_priv, iface->bss[0])) { in hostapd_cleanup_driver() 3399 driver->hapd_deinit(drv_priv); in hostapd_cleanup_driver() [all …]
|
/hostap-latest/doc/ |
D | driver_wrapper.doxygen | 2 \page driver_wrapper Driver wrapper implementation (driver.h, drivers.c) 4 All hardware and driver dependent functionality is in separate C files 6 of the wpa_supplicant are designed to be hardware, driver, and operating 10 target operating system/driver for controlling wireless LAN 14 Linux Wireless Extensions (in version 18), some driver specific code is used 15 in number of driver interface implementations. These driver dependent parts 16 can be replaced with generic code in \ref driver_wext.c once the target driver 18 least in theory, could use the same driver wrapper code. 20 A driver wrapper needs to implement some or all of the functions 21 defined in \ref driver.h. These functions are registered by filling struct [all …]
|
D | wpa_supplicant.fig | 84 4 0 0 50 -1 0 12 0.0000 4 135 630 4350 6225 driver i/f\001 108 4 0 0 50 -1 0 12 0.0000 4 135 2145 3600 8025 kernel network device driver\001 193 4 0 0 50 -1 0 12 0.0000 4 135 990 2925 5250 driver events\001
|
D | hostapd.fig | 62 4 0 0 50 -1 0 12 0.0000 4 135 2145 3600 8025 kernel network device driver\001 67 4 0 0 50 -1 0 12 0.0000 4 135 630 4350 6225 driver i/f\001 146 4 0 0 50 -1 0 12 0.0000 4 135 990 3300 5700 driver events\001
|
D | mainpage.doxygen | 30 driver. 32 The design goal for wpa_supplicant was to use hardware, driver, and 35 code_structure "code structure page". All hardware/driver specific 37 driver_wrapper "well-defined driver API". Information about porting 70 The design goal for hostapd was to use hardware, driver, and 73 code_structure "code structure page". All hardware/driver specific 75 driver_wrapper "well-defined driver API". Information about porting
|
D | p2p_arch2.dot | 26 driver_iface [label="driver i/f"]; 64 umac -> driver; 81 p2p_module -> umac -> driver;
|
D | porting.doxygen | 66 Unless the target OS and driver is already supported, most porting 67 projects have to implement a driver wrapper. This may be done by 68 adding a new driver interface module or modifying an existing module 71 of the driver interface and discusses the tasks involved in porting 87 driver. This is usually an intermediate or protocol driver that is 88 operating between the device driver and the OS network stack. If such 90 directly in the device driver. 105 integrated with the driver interface implementation. 188 include a driver interface. However, this is a good starting point 195 driver interface (driver_*.c and matching CONFIG_DRIVER_* define for
|
D | p2p.doxygen | 5 stack from low-level driver operations to high-level GUI design. This 10 The driver (or WLAN firmware/hardware) is expected to handle low-level 13 processing is done inside the driver. Configuration for these 14 low-level operations is defined in the driver interface: 15 src/drivers/driver.h. This defines both the commands and events used to 16 interact with the driver. 23 inside the driver/firmware component. P2P module API is defined in 31 (\ref wpa_supplicant/wps_supplicant.c). The driver operations are passed 33 directly with the driver interface. 121 The P2P module uses following functions to request lower layer driver [all …]
|
D | directories.doxygen | 26 This directory includes the driver interface definition and all the 27 driver wrappers that can be used to interact with different drivers 29 driver is used.
|
/hostap-latest/wpa_supplicant/doc/docbook/ |
D | wpa_supplicant.sgml | 22 <arg>-D<replaceable>driver</replaceable></arg> 62 authentication/association of the wireless LAN driver.</para> 74 present and enabled, and the driver for the device must be 90 driver to scan neighboring BSSes (Basic Service Set)</para> 100 driver to associate with the chosen BSS</para> 209 the driver for IEEE 802.11 authentication)</para></listitem> 246 <para>A summary of available driver backends is below. Support for each 247 of the driver backends is chosen at wpa_supplicant compile time. For a 248 list of supported driver backends that may be used with the -D option on 272 <para>wpa_supplicant wired Ethernet driver</para> [all …]
|
D | wpa_priv.sgml | 24 <arg>driver:ifname <replaceable>[driver:ifname ...]</replaceable></arg> 112 <term>driver:ifname [driver:ifname ...]</term> 114 <listitem><para>The <driver> string dictates which of the 115 supported <command>wpa_supplicant</command> driver backends is to be 116 used. To get a list of supported driver types see wpa_supplicant help 117 (e.g, wpa_supplicant -h). The driver backend supported by most good
|
/hostap-latest/wpa_supplicant/binder/ |
D | supplicant.cpp | 21 android::String16 driver, ifname, confname, bridge_ifname; in CreateInterface() local 29 params.getString(android::String16("Driver"), &driver); in CreateInterface() 49 iface.driver = os_strdup(android::String8(driver).string()); in CreateInterface() 77 os_free((void *)iface.driver); in CreateInterface()
|
/hostap-latest/tests/fuzzing/wnm/ |
D | wnm.c | 28 struct wpa_driver_ops driver; member 53 ctx->wpa_s.driver = &ctx->driver; in init_wpa()
|
/hostap-latest/hostapd/ |
D | main.c | 165 if (hapd->driver == NULL || hapd->driver->hapd_init == NULL) { in hostapd_driver_init() 209 if (wpa_drivers[i] != hapd->driver) in hostapd_driver_init() 257 hapd->drv_priv = hapd->driver->hapd_init(hapd, ¶ms); in hostapd_driver_init() 261 hapd->driver->name); in hostapd_driver_init() 262 hapd->driver = NULL; in hostapd_driver_init() 289 if (hapd->driver->get_capa && in hostapd_driver_init() 290 hapd->driver->get_capa(hapd->drv_priv, &capa) == 0) { in hostapd_driver_init() 314 if (triggs && hapd->driver->set_wowlan) { in hostapd_driver_init() 315 if (hapd->driver->set_wowlan(hapd->drv_priv, triggs)) in hostapd_driver_init()
|
D | ChangeLog | 155 * fixed FT and SA Query Action frame with AP-MLME-in-driver cases 339 * dropped support for the madwifi driver interface 342 * fixed a regression with driver=wired 434 - support vendor specific driver command 482 - driver-based MAC ACL 524 - additional information for driver-based AP SME 612 This allows the driver to use PS buffering of Deauthentication and 717 * bsd: Cleaned up driver wrapper and added various low-level 723 * cleaned up driver wrapper API for multi-BSS operations 731 driver wrappers [all …]
|
D | README | 55 driver. It adds more features to the basic IEEE 802.11 management 56 included in the kernel driver: using external RADIUS authentication 72 Host AP driver for Prism2/2.5/3. 73 (http://w1.fi/hostap-driver.html) 77 mac80211-based drivers that support AP mode (with driver=nl80211). 81 Any wired Ethernet driver for wired IEEE 802.1X authentication 85 BSD net80211 layer (e.g., Atheros driver) 128 Host AP driver includes PAE functionality in the kernel driver. It 144 Server. It also controls the PAE functionality in the kernel driver by 206 station driver.
|
/hostap-latest/tests/fuzzing/ap-mgmt/ |
D | ap-mgmt.c | 32 struct wpa_driver_ops driver; member 104 hapd->driver = &ctx->driver; in init_hapd()
|