Home
last modified time | relevance | path

Searched refs:enabled (Results 1 – 25 of 72) sorted by relevance

123

/hostap-latest/wpa_supplicant/wpa_gui-qt4/
Dnetworkconfig.ui140 <property name="enabled" >
163 <property name="enabled" >
177 <property name="enabled" >
194 <property name="enabled" >
214 <property name="enabled" >
221 <property name="enabled" >
230 <property name="enabled" >
240 <property name="enabled" >
250 <property name="enabled" >
260 <property name="enabled" >
[all …]
Dnetworkconfig.cpp445 void NetworkConfig::wepEnabled(bool enabled) in wepEnabled() argument
447 wep0Edit->setEnabled(enabled); in wepEnabled()
448 wep1Edit->setEnabled(enabled); in wepEnabled()
449 wep2Edit->setEnabled(enabled); in wepEnabled()
450 wep3Edit->setEnabled(enabled); in wepEnabled()
451 wep0Radio->setEnabled(enabled); in wepEnabled()
452 wep1Radio->setEnabled(enabled); in wepEnabled()
453 wep2Radio->setEnabled(enabled); in wepEnabled()
454 wep3Radio->setEnabled(enabled); in wepEnabled()
Dwpagui.ui334 <property name="enabled" >
344 <property name="enabled" >
361 <property name="enabled" >
476 <property name="enabled" >
484 <property name="enabled" >
497 <property name="enabled" >
Dnetworkconfig.h51 virtual void wepEnabled(bool enabled);
/hostap-latest/wpa_supplicant/
Dwpas_kay.c47 static int wpas_enable_protect_frames(void *wpa_s, bool enabled) in wpas_enable_protect_frames() argument
49 return wpa_drv_enable_protect_frames(wpa_s, enabled); in wpas_enable_protect_frames()
53 static int wpas_enable_encrypt(void *wpa_s, bool enabled) in wpas_enable_encrypt() argument
55 return wpa_drv_enable_encrypt(wpa_s, enabled); in wpas_enable_encrypt()
59 static int wpas_set_replay_protect(void *wpa_s, bool enabled, u32 window) in wpas_set_replay_protect() argument
61 return wpa_drv_set_replay_protect(wpa_s, enabled, window); in wpas_set_replay_protect()
71 static int wpas_enable_controlled_port(void *wpa_s, bool enabled) in wpas_enable_controlled_port() argument
73 return wpa_drv_enable_controlled_port(wpa_s, enabled); in wpas_enable_controlled_port()
Ddriver_i.h42 int enabled) in wpa_drv_set_countermeasures() argument
46 enabled); in wpa_drv_set_countermeasures()
785 bool enabled) in wpa_drv_enable_protect_frames() argument
789 return wpa_s->driver->enable_protect_frames(wpa_s->drv_priv, enabled); in wpa_drv_enable_protect_frames()
793 bool enabled) in wpa_drv_enable_encrypt() argument
797 return wpa_s->driver->enable_encrypt(wpa_s->drv_priv, enabled); in wpa_drv_enable_encrypt()
801 bool enabled, u32 window) in wpa_drv_set_replay_protect() argument
805 return wpa_s->driver->set_replay_protect(wpa_s->drv_priv, enabled, in wpa_drv_set_replay_protect()
826 bool enabled) in wpa_drv_enable_controlled_port() argument
830 return wpa_s->driver->enable_controlled_port(wpa_s->drv_priv, enabled); in wpa_drv_enable_controlled_port()
Dwifi_display.c229 void wifi_display_enable(struct wpa_global *global, int enabled) in wifi_display_enable() argument
232 enabled ? "enabled" : "disabled"); in wifi_display_enable()
233 global->wifi_display = enabled; in wifi_display_enable()
Dwifi_display.h15 void wifi_display_enable(struct wpa_global *global, int enabled);
Ddefconfig105 # enabled in network configuration)
119 # enabled for production use. The IETF RFC 7170 that defines EAP-TEAP has number
155 # This requires CONFIG_EAP_AKA to be enabled, too.
264 # This can be used if ap_scan=1 mode is never enabled.
337 # can be enabled to get a stronger construction of messages when block ciphers
344 # can be enabled to enable use of stronger crypto algorithms. It should be
384 # When this option is enabled, each EAP method can be either included
393 # main program must have been build with the EAP method enabled (=y or =dyn).
486 # reboot. This can be enabled with -e<entropy file> command line option. The
671 # design is still subject to change. As such, this should not yet be enabled in
[all …]
/hostap-latest/src/pae/
Dieee802_1x_secy_ops.c28 int secy_cp_control_protect_frames(struct ieee802_1x_kay *kay, bool enabled) in secy_cp_control_protect_frames() argument
44 return ops->enable_protect_frames(ops->ctx, enabled); in secy_cp_control_protect_frames()
48 int secy_cp_control_encrypt(struct ieee802_1x_kay *kay, bool enabled) in secy_cp_control_encrypt() argument
64 return ops->enable_encrypt(ops->ctx, enabled); in secy_cp_control_encrypt()
68 int secy_cp_control_replay(struct ieee802_1x_kay *kay, bool enabled, u32 win) in secy_cp_control_replay() argument
84 return ops->set_replay_protect(ops->ctx, enabled, win); in secy_cp_control_replay()
136 int secy_cp_control_enable_port(struct ieee802_1x_kay *kay, bool enabled) in secy_cp_control_enable_port() argument
152 return ops->enable_controlled_port(ops->ctx, enabled); in secy_cp_control_enable_port()
Dieee802_1x_kay.h145 int (*enable_protect_frames)(void *ctx, bool enabled);
146 int (*enable_encrypt)(void *ctx, bool enabled);
147 int (*set_replay_protect)(void *ctx, bool enabled, u32 window);
149 int (*enable_controlled_port)(void *ctx, bool enabled);
/hostap-latest/src/ap/
Dwpa_auth_kay.c55 static int hapd_enable_protect_frames(void *priv, bool enabled) in hapd_enable_protect_frames() argument
61 return hapd->driver->enable_protect_frames(hapd->drv_priv, enabled); in hapd_enable_protect_frames()
65 static int hapd_enable_encrypt(void *priv, bool enabled) in hapd_enable_encrypt() argument
71 return hapd->driver->enable_encrypt(hapd->drv_priv, enabled); in hapd_enable_encrypt()
75 static int hapd_set_replay_protect(void *priv, bool enabled, u32 window) in hapd_set_replay_protect() argument
81 return hapd->driver->set_replay_protect(hapd->drv_priv, enabled, in hapd_set_replay_protect()
96 static int hapd_enable_controlled_port(void *priv, bool enabled) in hapd_enable_controlled_port() argument
102 return hapd->driver->enable_controlled_port(hapd->drv_priv, enabled); in hapd_enable_controlled_port()
Dhs20.c236 int enabled) in hs20_t_c_filtering() argument
238 if (enabled) { in hs20_t_c_filtering()
Dap_drv_ops.h35 int enabled);
53 int hostapd_set_privacy(struct hostapd_data *hapd, int enabled);
171 int enabled) in hostapd_drv_set_countermeasures() argument
176 return hapd->driver->hapd_set_countermeasures(hapd->drv_priv, enabled); in hostapd_drv_set_countermeasures()
Dhs20.h24 int enabled);
Dwnm_ap.c435 int enabled = hapd->conf->bss_transition; in ieee802_11_rx_bss_trans_mgmt_query() local
441 enabled = 1; in ieee802_11_rx_bss_trans_mgmt_query()
443 if (!enabled) { in ieee802_11_rx_bss_trans_mgmt_query()
504 int enabled = hapd->conf->bss_transition; in ieee802_11_rx_bss_trans_mgmt_resp() local
509 enabled = 1; in ieee802_11_rx_bss_trans_mgmt_resp()
511 if (!enabled) { in ieee802_11_rx_bss_trans_mgmt_resp()
/hostap-latest/src/drivers/
Ddriver_macsec_qca.c447 static int macsec_qca_enable_protect_frames(void *priv, bool enabled) in macsec_qca_enable_protect_frames() argument
452 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled); in macsec_qca_enable_protect_frames()
454 drv->protect_frames = enabled; in macsec_qca_enable_protect_frames()
460 static int macsec_qca_set_replay_protect(void *priv, bool enabled, in macsec_qca_set_replay_protect() argument
467 __func__, enabled, window); in macsec_qca_set_replay_protect()
469 drv->replay_protect = enabled; in macsec_qca_set_replay_protect()
505 static int macsec_qca_enable_controlled_port(void *priv, bool enabled) in macsec_qca_enable_controlled_port() argument
510 wpa_printf(MSG_DEBUG, "%s: enable=%d", __func__, enabled); in macsec_qca_enable_controlled_port()
512 ret += nss_macsec_secy_controlled_port_en_set(drv->secy_id, enabled); in macsec_qca_enable_controlled_port()
585 bool enabled = false; in macsec_qca_get_receive_lowest_pn() local
[all …]
Ddriver_bsd.c505 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, params->enabled); in bsd_set_ieee8021x()
507 if (!params->enabled) { in bsd_set_ieee8021x()
900 bsd_set_privacy(void *priv, int enabled) in bsd_set_privacy() argument
902 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled); in bsd_set_privacy()
904 return set80211param(priv, IEEE80211_IOC_PRIVACY, enabled); in bsd_set_privacy()
1148 wpa_driver_bsd_set_wpa(void *priv, int enabled) in wpa_driver_bsd_set_wpa() argument
1150 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled); in wpa_driver_bsd_set_wpa()
1152 return wpa_driver_bsd_set_wpa_internal(priv, enabled ? 3 : 0, enabled); in wpa_driver_bsd_set_wpa()
1156 wpa_driver_bsd_set_countermeasures(void *priv, int enabled) in wpa_driver_bsd_set_countermeasures() argument
1158 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled); in wpa_driver_bsd_set_countermeasures()
[all …]
Ddriver_macsec_linux.c418 static int macsec_drv_enable_protect_frames(void *priv, bool enabled) in macsec_drv_enable_protect_frames() argument
422 wpa_printf(MSG_DEBUG, "%s -> %s", __func__, enabled ? "TRUE" : "FALSE"); in macsec_drv_enable_protect_frames()
425 drv->protect_frames = enabled; in macsec_drv_enable_protect_frames()
438 static int macsec_drv_enable_encrypt(void *priv, bool enabled) in macsec_drv_enable_encrypt() argument
442 wpa_printf(MSG_DEBUG, "%s -> %s", __func__, enabled ? "TRUE" : "FALSE"); in macsec_drv_enable_encrypt()
445 drv->encrypt = enabled; in macsec_drv_enable_encrypt()
459 static int macsec_drv_set_replay_protect(void *priv, bool enabled, in macsec_drv_set_replay_protect() argument
465 enabled ? "TRUE" : "FALSE", window); in macsec_drv_set_replay_protect()
468 drv->replay_protect = enabled; in macsec_drv_set_replay_protect()
469 if (enabled) in macsec_drv_set_replay_protect()
[all …]
Ddriver_hostap.c520 int enabled = params->enabled; in hostap_set_ieee8021x() local
523 if (hostap_ioctl_prism2param(drv, PRISM2_PARAM_IEEE_802_1X, enabled)) { in hostap_set_ieee8021x()
529 if (!enabled) in hostap_set_ieee8021x()
545 static int hostap_set_privacy(void *priv, int enabled) in hostap_set_privacy() argument
550 enabled); in hostap_set_privacy()
Ddriver_atheros.c85 static int atheros_set_privacy(void *priv, int enabled);
390 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, params->enabled); in atheros_set_ieee8021x()
392 if (!params->enabled) { in atheros_set_ieee8021x()
418 atheros_set_privacy(void *priv, int enabled) in atheros_set_privacy() argument
422 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled); in atheros_set_privacy()
424 return set80211param(drv, IEEE80211_PARAM_PRIVACY, enabled); in atheros_set_privacy()
1887 atheros_set_countermeasures(void *priv, int enabled) in atheros_set_countermeasures() argument
1890 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __FUNCTION__, enabled); in atheros_set_countermeasures()
1891 return set80211param(drv, IEEE80211_PARAM_COUNTERMEASURES, enabled); in atheros_set_countermeasures()
1948 bss_params.enabled = 1; in atheros_set_ap()
/hostap-latest/tests/hwsim/
Dexample-hostapd.config93 # AddressSanitizer (ASan) can be enabled by uncommenting the following lines.
103 # Undefined Behavior Sanitizer (UBSan) can be enabled by uncommenting the
Dexample-wpa_supplicant.config141 # AddressSanitizer (ASan) can be enabled by uncommenting the following lines.
150 # Undefined Behavior Sanitizer (UBSan) can be enabled by uncommenting the
/hostap-latest/hostapd/
Ddefconfig84 # This requires CONFIG_EAP_AKA to be enabled, too.
109 # enabled for production use. The IETF RFC 7170 that defines EAP-TEAP has number
255 # This can be enabled with -e<entropy file> command line option. The specified
289 # can be enabled to get a stronger construction of messages when block ciphers
294 # can be enabled to enable use of stronger crypto algorithms.
408 # build includes this to allow mixed mode WPA+WPA2 networks to be enabled, but
414 # design is still subject to change. As such, this should not yet be enabled in
/hostap-latest/src/eapol_supp/
Deapol_supp_sm.h341 void eapol_sm_notify_portEnabled(struct eapol_sm *sm, bool enabled);
414 bool enabled) in eapol_sm_notify_portEnabled() argument

123