/hostap-latest/wpa_supplicant/wpa_gui-qt4/ |
D | networkconfig.ui | 140 <property name="enabled" > 163 <property name="enabled" > 177 <property name="enabled" > 194 <property name="enabled" > 214 <property name="enabled" > 221 <property name="enabled" > 230 <property name="enabled" > 240 <property name="enabled" > 250 <property name="enabled" > 260 <property name="enabled" > [all …]
|
D | networkconfig.cpp | 445 void NetworkConfig::wepEnabled(bool enabled) in wepEnabled() argument 447 wep0Edit->setEnabled(enabled); in wepEnabled() 448 wep1Edit->setEnabled(enabled); in wepEnabled() 449 wep2Edit->setEnabled(enabled); in wepEnabled() 450 wep3Edit->setEnabled(enabled); in wepEnabled() 451 wep0Radio->setEnabled(enabled); in wepEnabled() 452 wep1Radio->setEnabled(enabled); in wepEnabled() 453 wep2Radio->setEnabled(enabled); in wepEnabled() 454 wep3Radio->setEnabled(enabled); in wepEnabled()
|
D | wpagui.ui | 334 <property name="enabled" > 344 <property name="enabled" > 361 <property name="enabled" > 476 <property name="enabled" > 484 <property name="enabled" > 497 <property name="enabled" >
|
D | networkconfig.h | 51 virtual void wepEnabled(bool enabled);
|
/hostap-latest/wpa_supplicant/ |
D | wpas_kay.c | 47 static int wpas_enable_protect_frames(void *wpa_s, bool enabled) in wpas_enable_protect_frames() argument 49 return wpa_drv_enable_protect_frames(wpa_s, enabled); in wpas_enable_protect_frames() 53 static int wpas_enable_encrypt(void *wpa_s, bool enabled) in wpas_enable_encrypt() argument 55 return wpa_drv_enable_encrypt(wpa_s, enabled); in wpas_enable_encrypt() 59 static int wpas_set_replay_protect(void *wpa_s, bool enabled, u32 window) in wpas_set_replay_protect() argument 61 return wpa_drv_set_replay_protect(wpa_s, enabled, window); in wpas_set_replay_protect() 71 static int wpas_enable_controlled_port(void *wpa_s, bool enabled) in wpas_enable_controlled_port() argument 73 return wpa_drv_enable_controlled_port(wpa_s, enabled); in wpas_enable_controlled_port()
|
D | driver_i.h | 42 int enabled) in wpa_drv_set_countermeasures() argument 46 enabled); in wpa_drv_set_countermeasures() 785 bool enabled) in wpa_drv_enable_protect_frames() argument 789 return wpa_s->driver->enable_protect_frames(wpa_s->drv_priv, enabled); in wpa_drv_enable_protect_frames() 793 bool enabled) in wpa_drv_enable_encrypt() argument 797 return wpa_s->driver->enable_encrypt(wpa_s->drv_priv, enabled); in wpa_drv_enable_encrypt() 801 bool enabled, u32 window) in wpa_drv_set_replay_protect() argument 805 return wpa_s->driver->set_replay_protect(wpa_s->drv_priv, enabled, in wpa_drv_set_replay_protect() 826 bool enabled) in wpa_drv_enable_controlled_port() argument 830 return wpa_s->driver->enable_controlled_port(wpa_s->drv_priv, enabled); in wpa_drv_enable_controlled_port()
|
D | wifi_display.c | 229 void wifi_display_enable(struct wpa_global *global, int enabled) in wifi_display_enable() argument 232 enabled ? "enabled" : "disabled"); in wifi_display_enable() 233 global->wifi_display = enabled; in wifi_display_enable()
|
D | wifi_display.h | 15 void wifi_display_enable(struct wpa_global *global, int enabled);
|
D | defconfig | 105 # enabled in network configuration) 119 # enabled for production use. The IETF RFC 7170 that defines EAP-TEAP has number 155 # This requires CONFIG_EAP_AKA to be enabled, too. 264 # This can be used if ap_scan=1 mode is never enabled. 337 # can be enabled to get a stronger construction of messages when block ciphers 344 # can be enabled to enable use of stronger crypto algorithms. It should be 384 # When this option is enabled, each EAP method can be either included 393 # main program must have been build with the EAP method enabled (=y or =dyn). 486 # reboot. This can be enabled with -e<entropy file> command line option. The 671 # design is still subject to change. As such, this should not yet be enabled in [all …]
|
/hostap-latest/src/pae/ |
D | ieee802_1x_secy_ops.c | 28 int secy_cp_control_protect_frames(struct ieee802_1x_kay *kay, bool enabled) in secy_cp_control_protect_frames() argument 44 return ops->enable_protect_frames(ops->ctx, enabled); in secy_cp_control_protect_frames() 48 int secy_cp_control_encrypt(struct ieee802_1x_kay *kay, bool enabled) in secy_cp_control_encrypt() argument 64 return ops->enable_encrypt(ops->ctx, enabled); in secy_cp_control_encrypt() 68 int secy_cp_control_replay(struct ieee802_1x_kay *kay, bool enabled, u32 win) in secy_cp_control_replay() argument 84 return ops->set_replay_protect(ops->ctx, enabled, win); in secy_cp_control_replay() 136 int secy_cp_control_enable_port(struct ieee802_1x_kay *kay, bool enabled) in secy_cp_control_enable_port() argument 152 return ops->enable_controlled_port(ops->ctx, enabled); in secy_cp_control_enable_port()
|
D | ieee802_1x_kay.h | 145 int (*enable_protect_frames)(void *ctx, bool enabled); 146 int (*enable_encrypt)(void *ctx, bool enabled); 147 int (*set_replay_protect)(void *ctx, bool enabled, u32 window); 149 int (*enable_controlled_port)(void *ctx, bool enabled);
|
/hostap-latest/src/ap/ |
D | wpa_auth_kay.c | 55 static int hapd_enable_protect_frames(void *priv, bool enabled) in hapd_enable_protect_frames() argument 61 return hapd->driver->enable_protect_frames(hapd->drv_priv, enabled); in hapd_enable_protect_frames() 65 static int hapd_enable_encrypt(void *priv, bool enabled) in hapd_enable_encrypt() argument 71 return hapd->driver->enable_encrypt(hapd->drv_priv, enabled); in hapd_enable_encrypt() 75 static int hapd_set_replay_protect(void *priv, bool enabled, u32 window) in hapd_set_replay_protect() argument 81 return hapd->driver->set_replay_protect(hapd->drv_priv, enabled, in hapd_set_replay_protect() 96 static int hapd_enable_controlled_port(void *priv, bool enabled) in hapd_enable_controlled_port() argument 102 return hapd->driver->enable_controlled_port(hapd->drv_priv, enabled); in hapd_enable_controlled_port()
|
D | hs20.c | 236 int enabled) in hs20_t_c_filtering() argument 238 if (enabled) { in hs20_t_c_filtering()
|
D | ap_drv_ops.h | 35 int enabled); 53 int hostapd_set_privacy(struct hostapd_data *hapd, int enabled); 171 int enabled) in hostapd_drv_set_countermeasures() argument 176 return hapd->driver->hapd_set_countermeasures(hapd->drv_priv, enabled); in hostapd_drv_set_countermeasures()
|
D | hs20.h | 24 int enabled);
|
D | wnm_ap.c | 435 int enabled = hapd->conf->bss_transition; in ieee802_11_rx_bss_trans_mgmt_query() local 441 enabled = 1; in ieee802_11_rx_bss_trans_mgmt_query() 443 if (!enabled) { in ieee802_11_rx_bss_trans_mgmt_query() 504 int enabled = hapd->conf->bss_transition; in ieee802_11_rx_bss_trans_mgmt_resp() local 509 enabled = 1; in ieee802_11_rx_bss_trans_mgmt_resp() 511 if (!enabled) { in ieee802_11_rx_bss_trans_mgmt_resp()
|
/hostap-latest/src/drivers/ |
D | driver_macsec_qca.c | 447 static int macsec_qca_enable_protect_frames(void *priv, bool enabled) in macsec_qca_enable_protect_frames() argument 452 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled); in macsec_qca_enable_protect_frames() 454 drv->protect_frames = enabled; in macsec_qca_enable_protect_frames() 460 static int macsec_qca_set_replay_protect(void *priv, bool enabled, in macsec_qca_set_replay_protect() argument 467 __func__, enabled, window); in macsec_qca_set_replay_protect() 469 drv->replay_protect = enabled; in macsec_qca_set_replay_protect() 505 static int macsec_qca_enable_controlled_port(void *priv, bool enabled) in macsec_qca_enable_controlled_port() argument 510 wpa_printf(MSG_DEBUG, "%s: enable=%d", __func__, enabled); in macsec_qca_enable_controlled_port() 512 ret += nss_macsec_secy_controlled_port_en_set(drv->secy_id, enabled); in macsec_qca_enable_controlled_port() 585 bool enabled = false; in macsec_qca_get_receive_lowest_pn() local [all …]
|
D | driver_bsd.c | 505 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, params->enabled); in bsd_set_ieee8021x() 507 if (!params->enabled) { in bsd_set_ieee8021x() 900 bsd_set_privacy(void *priv, int enabled) in bsd_set_privacy() argument 902 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled); in bsd_set_privacy() 904 return set80211param(priv, IEEE80211_IOC_PRIVACY, enabled); in bsd_set_privacy() 1148 wpa_driver_bsd_set_wpa(void *priv, int enabled) in wpa_driver_bsd_set_wpa() argument 1150 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled); in wpa_driver_bsd_set_wpa() 1152 return wpa_driver_bsd_set_wpa_internal(priv, enabled ? 3 : 0, enabled); in wpa_driver_bsd_set_wpa() 1156 wpa_driver_bsd_set_countermeasures(void *priv, int enabled) in wpa_driver_bsd_set_countermeasures() argument 1158 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled); in wpa_driver_bsd_set_countermeasures() [all …]
|
D | driver_macsec_linux.c | 418 static int macsec_drv_enable_protect_frames(void *priv, bool enabled) in macsec_drv_enable_protect_frames() argument 422 wpa_printf(MSG_DEBUG, "%s -> %s", __func__, enabled ? "TRUE" : "FALSE"); in macsec_drv_enable_protect_frames() 425 drv->protect_frames = enabled; in macsec_drv_enable_protect_frames() 438 static int macsec_drv_enable_encrypt(void *priv, bool enabled) in macsec_drv_enable_encrypt() argument 442 wpa_printf(MSG_DEBUG, "%s -> %s", __func__, enabled ? "TRUE" : "FALSE"); in macsec_drv_enable_encrypt() 445 drv->encrypt = enabled; in macsec_drv_enable_encrypt() 459 static int macsec_drv_set_replay_protect(void *priv, bool enabled, in macsec_drv_set_replay_protect() argument 465 enabled ? "TRUE" : "FALSE", window); in macsec_drv_set_replay_protect() 468 drv->replay_protect = enabled; in macsec_drv_set_replay_protect() 469 if (enabled) in macsec_drv_set_replay_protect() [all …]
|
D | driver_hostap.c | 520 int enabled = params->enabled; in hostap_set_ieee8021x() local 523 if (hostap_ioctl_prism2param(drv, PRISM2_PARAM_IEEE_802_1X, enabled)) { in hostap_set_ieee8021x() 529 if (!enabled) in hostap_set_ieee8021x() 545 static int hostap_set_privacy(void *priv, int enabled) in hostap_set_privacy() argument 550 enabled); in hostap_set_privacy()
|
D | driver_atheros.c | 85 static int atheros_set_privacy(void *priv, int enabled); 390 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, params->enabled); in atheros_set_ieee8021x() 392 if (!params->enabled) { in atheros_set_ieee8021x() 418 atheros_set_privacy(void *priv, int enabled) in atheros_set_privacy() argument 422 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled); in atheros_set_privacy() 424 return set80211param(drv, IEEE80211_PARAM_PRIVACY, enabled); in atheros_set_privacy() 1887 atheros_set_countermeasures(void *priv, int enabled) in atheros_set_countermeasures() argument 1890 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __FUNCTION__, enabled); in atheros_set_countermeasures() 1891 return set80211param(drv, IEEE80211_PARAM_COUNTERMEASURES, enabled); in atheros_set_countermeasures() 1948 bss_params.enabled = 1; in atheros_set_ap()
|
/hostap-latest/tests/hwsim/ |
D | example-hostapd.config | 93 # AddressSanitizer (ASan) can be enabled by uncommenting the following lines. 103 # Undefined Behavior Sanitizer (UBSan) can be enabled by uncommenting the
|
D | example-wpa_supplicant.config | 141 # AddressSanitizer (ASan) can be enabled by uncommenting the following lines. 150 # Undefined Behavior Sanitizer (UBSan) can be enabled by uncommenting the
|
/hostap-latest/hostapd/ |
D | defconfig | 84 # This requires CONFIG_EAP_AKA to be enabled, too. 109 # enabled for production use. The IETF RFC 7170 that defines EAP-TEAP has number 255 # This can be enabled with -e<entropy file> command line option. The specified 289 # can be enabled to get a stronger construction of messages when block ciphers 294 # can be enabled to enable use of stronger crypto algorithms. 408 # build includes this to allow mixed mode WPA+WPA2 networks to be enabled, but 414 # design is still subject to change. As such, this should not yet be enabled in
|
/hostap-latest/src/eapol_supp/ |
D | eapol_supp_sm.h | 341 void eapol_sm_notify_portEnabled(struct eapol_sm *sm, bool enabled); 414 bool enabled) in eapol_sm_notify_portEnabled() argument
|