/hostap-latest/tests/hwsim/ |
D | tshark.py | 24 def _run_tshark(filename, filter, display=None, wait=True): argument 34 _tshark_filter_arg, filter] 92 def run_tshark(filename, filter, display=None, wait=True): argument 95 return _run_tshark(filename, filter.replace('wlan_mgt', 'wlan'), 106 return _run_tshark(filename, filter, display, wait) 108 def run_tshark_json(filename, filter): argument 110 _tshark_filter_arg, filter]
|
D | test_mbo.py | 246 …filter = 'wlan.fc.type == 0 && wlan.fc.type_subtype == 0x00 && frame.time > "' + timestamp.rstrip(… 248 filter, wait=False)
|
D | hostapd.py | 991 idx = ''.join(filter(str.isdigit, conf.split('-')[-1]))
|
D | test_scan.py | 1971 entries = len(list(filter(lambda x: x.startswith('BSS '), lines)))
|
D | test_ap_hs20.py | 4779 def tshark_get_arp(cap, filter): argument 4780 res = run_tshark(cap, filter,
|
/hostap-latest/src/wps/ |
D | ndef.c | 90 int (*filter)(struct ndef_record *)) in ndef_parse_records() 101 if (filter == NULL || filter(&record)) in ndef_parse_records()
|
D | wps_er.c | 1249 wps_er_init(struct wps_context *wps, const char *ifname, const char *filter) in wps_er_init() argument 1274 if (filter && os_strncmp(filter, "ifname=", 7) == 0) { in wps_er_init() 1276 pos = filter + 7; in wps_er_init() 1282 filter = end + 1; in wps_er_init() 1285 filter = NULL; in wps_er_init() 1290 if (filter) { in wps_er_init() 1291 if (inet_aton(filter, &er->filter_addr) == 0) { in wps_er_init() 1293 "address %s", filter); in wps_er_init() 1298 "with %s", filter); in wps_er_init()
|
D | wps.h | 907 const char *filter);
|
/hostap-latest/src/l2_packet/ |
D | l2_packet_linux.c | 66 .filter = dhcp_sock_filter_insns, 84 .filter = ndisc_sock_filter_insns, 104 .filter = pkt_type_filter_insns, 361 .filter = ethertype_sock_filter_insns, in l2_packet_init_bridge()
|
/hostap-latest/src/ |
D | objs.mk | 2 -include $(filter-out %.a,$($(_OBJS_VAR):%.o=%.d))
|
/hostap-latest/ |
D | Android.mk | 3 ifneq ($(filter VER_0_8_X VER_2_1_DEVEL,$(WPA_SUPPLICANT_VERSION)),)
|
/hostap-latest/hs20/client/ |
D | Android.mk | 22 ver = $(filter 5.0%,$(PLATFORM_VERSION))
|
/hostap-latest/wpa_supplicant/ |
D | wps_supplicant.h | 50 int wpas_wps_er_start(struct wpa_supplicant *wpa_s, const char *filter);
|
D | hs20_supplicant.c | 73 u32 filter = 0; in hs20_configure_frame_filters() local 88 filter |= WPA_DATA_FRAME_FILTER_FLAG_GTK; in hs20_configure_frame_filters() 98 filter |= WPA_DATA_FRAME_FILTER_FLAG_ARP | in hs20_configure_frame_filters() 101 wpa_drv_configure_frame_filters(wpa_s, filter); in hs20_configure_frame_filters()
|
D | wps_supplicant.c | 2002 int wpas_wps_er_start(struct wpa_supplicant *wpa_s, const char *filter) in wpas_wps_er_start() argument 2009 wpa_s->wps_er = wps_er_init(wpa_s->wps, wpa_s->ifname, filter); in wpas_wps_er_start()
|
D | README-WPS | 249 - the optional IP address parameter can be used to filter operations only
|
D | ctrl_iface.c | 83 u8 addr[ETH_ALEN], *filter = NULL, *n; in set_bssid_filter() local 91 os_free(filter); in set_bssid_filter() 94 n = os_realloc_array(filter, count + 1, ETH_ALEN); in set_bssid_filter() 96 os_free(filter); in set_bssid_filter() 99 filter = n; in set_bssid_filter() 100 os_memcpy(filter + count * ETH_ALEN, addr, ETH_ALEN); in set_bssid_filter() 108 wpa_hexdump(MSG_DEBUG, "bssid_filter", filter, count * ETH_ALEN); in set_bssid_filter() 110 wpa_s->bssid_filter = filter; in set_bssid_filter()
|
D | ChangeLog | 316 - filter control characters in group client device names to be 321 - improve group-join operation to use SSID, if known, to filter BSS 1284 selection to filter out entries based on the operating channel 1957 * fixed driver_wext.c to filter wireless events based on ifindex to
|
D | README-P2P | 200 operations. This allows the P2P Client interface to filter scan results
|
/hostap-latest/src/drivers/ |
D | driver_nl80211_monitor.c | 280 .filter = msock_filter_insns,
|
/hostap-latest/doc/ |
D | p2p.doxygen | 355 function can be used to filter or received Probe Request frames and
|
/hostap-latest/hostapd/ |
D | ChangeLog | 771 * driver_nl80211: use Linux socket filter to improve performance 1186 * driver_madwifi: filter wireless events based on ifindex to allow more
|