| /hostap-latest/src/ap/ |
| D | authsrv.c | 112 struct hostapd_data *first; in hostapd_setup_radius_srv() local 117 first = hostapd_mld_get_first_bss(hapd); in hostapd_setup_radius_srv() 118 if (!first) in hostapd_setup_radius_srv() 120 hapd->radius_srv = first->radius_srv; in hostapd_setup_radius_srv() 261 struct hostapd_data *first; in authsrv_init() local 263 first = hostapd_mld_get_first_bss(hapd); in authsrv_init() 264 if (!first) in authsrv_init() 267 if (!first->eap_cfg) { in authsrv_init() 271 if (authsrv_init(first)) in authsrv_init() 278 hapd->ssl_ctx = first->ssl_ctx; in authsrv_init() [all …]
|
| D | acs.c | 262 int first; member 454 while (bw_desc[bw][i].first != -1) { in acs_usable_bw_chan() 455 if (chan->freq == bw_desc[bw][i].first) in acs_usable_bw_chan() 468 while (bw_desc[bw][i].first != -1) { in acs_get_bw_center_chan() 469 if (freq >= bw_desc[bw][i].first && in acs_get_bw_center_chan() 1185 for (i = 0; bw_desc[ACS_BW40][i].first != -1; i++) { in acs_adjust_secondary() 1186 if (iface->freq == bw_desc[ACS_BW40][i].first) in acs_adjust_secondary()
|
| D | vlan_full.c | 566 struct hostapd_vlan *first, *prev, *vlan = hapd->conf->vlan; in vlan_dellink() local 570 first = prev = vlan; in vlan_dellink() 625 if (vlan == first) in vlan_dellink()
|
| D | ieee802_1x.c | 2538 struct hostapd_data *first; in ieee802_1x_init() local 2540 first = hostapd_mld_get_first_bss(hapd); in ieee802_1x_init() 2541 if (!first) in ieee802_1x_init() 2544 if (!first->eapol_auth) { in ieee802_1x_init() 2548 if (ieee802_1x_init(first)) in ieee802_1x_init() 2555 hapd->eapol_auth = first->eapol_auth; in ieee802_1x_init()
|
| /hostap-latest/tests/fuzzing/ |
| D | fuzzer-common.c | 16 static int first = 1; in wpa_fuzzer_set_debug_level() local 18 if (first) { in wpa_fuzzer_set_debug_level() 21 first = 0; in wpa_fuzzer_set_debug_level()
|
| /hostap-latest/src/radius/ |
| D | radius_client.c | 552 os_time_t first; in radius_client_timer() local 587 first = 0; in radius_client_timer() 614 if (first == 0 || entry->next_try < first) in radius_client_timer() 615 first = entry->next_try; in radius_client_timer() 622 if (first < now.sec) in radius_client_timer() 623 first = now.sec; in radius_client_timer() 625 eloop_register_timeout(first - now.sec, 0, in radius_client_timer() 630 (long int) (first - now.sec)); in radius_client_timer() 693 os_time_t first; in radius_client_update_timeout() local 702 first = 0; in radius_client_update_timeout() [all …]
|
| D | radius.c | 1146 int i, first = 1; in decrypt_ms_key() local 1178 if (first) { in decrypt_ms_key() 1187 if (md5_vector(first ? 3 : 2, addr, elen, hash) < 0) { in decrypt_ms_key() 1191 first = 0; in decrypt_ms_key() 1221 int i, len, first = 1; in encrypt_ms_key() local 1244 if (first) { in encrypt_ms_key() 1253 md5_vector(first ? 3 : 2, addr, _len, hash); in encrypt_ms_key() 1254 first = 0; in encrypt_ms_key()
|
| /hostap-latest/hostapd/ |
| D | hostapd.vlan | 6 # Optional wildcard entry matching all VLAN IDs. The first # in the interface
|
| D | hostapd.eap_user | 28 # first matching entry is selected, so * should be used as the last phase 1 43 # based on the first PEAP packet from the supplicant.
|
| D | README-WPS | 273 first successful registration if the AP is initially set in 283 state (random configuration based on the first successful WPS 343 first argument selects the format of the output data and the second 349 connection handover. The first parameter indicates whether the local
|
| /hostap-latest/wpa_supplicant/wpa_gui-qt4/ |
| D | wpagui.cpp | 344 static bool first = true; in openCtrlConnection() local 345 if (first && !serviceRunning()) { in openCtrlConnection() 346 first = false; in openCtrlConnection() 515 static bool first = true; in updateStatus() local 516 if (first && connectedToService && in updateStatus() 518 first = false; in updateStatus()
|
| /hostap-latest/src/common/ |
| D | hw_features_common.c | 115 int ok, first; in allowed_ht40_channel_pair() local 160 first = pri_chan < sec_chan ? pri_chan : sec_chan; in allowed_ht40_channel_pair() 164 if (first == allowed[k]) { in allowed_ht40_channel_pair()
|
| D | dpp_backup.c | 1103 struct dpp_asymmetric_key *first = NULL, *last = NULL, *key; in dpp_parse_dpp_asymmetric_key_package() local 1117 dpp_free_asymmetric_key(first); in dpp_parse_dpp_asymmetric_key_package() 1121 first = last = key; in dpp_parse_dpp_asymmetric_key_package() 1128 return first; in dpp_parse_dpp_asymmetric_key_package()
|
| D | nan_de.c | 988 bool first = true; in nan_de_rx_sda() local 1085 if (first) { in nan_de_rx_sda() 1086 first = false; in nan_de_rx_sda()
|
| /hostap-latest/tests/hwsim/vm/ |
| D | parallel-vm.py | 566 first = True 570 if first: 571 first = False
|
| D | README | 4 To set it up, first compile a kernel with the kernel-config[.uml] file as the
|
| /hostap-latest/tests/hwsim/ |
| D | test_ap_dynamic.py | 108 first = True 111 timeout = 0.2 if first else 0.01 112 first = False
|
| D | hostapd.py | 421 first = True 423 if first and '=' not in l: 425 first = False
|
| /hostap-latest/wpa_supplicant/ |
| D | wps_supplicant.c | 1541 struct wpa_supplicant *first; in wpas_wps_set_uuid() local 1542 first = wpa_s->global->ifaces; in wpas_wps_set_uuid() 1543 while (first && first->next) in wpas_wps_set_uuid() 1544 first = first->next; in wpas_wps_set_uuid() 1545 if (first && first != wpa_s) { in wpas_wps_set_uuid()
|
| D | README-P2P | 59 the command line. By default, it will select the first network interface 85 optional freq parameter can be used to override the first scan to use only 236 session - Mandatory Session ID of the first session to be established 261 session - Mandatory Session ID of the first session to be established 484 response TLV(s). The first three parameters are copied from the 605 presence. The first parameter pair gives the preferred duration and 807 session - always Session ID of the first session to be established 825 session - always Session ID of the first session to be established
|
| /hostap-latest/wpa_supplicant/doc/docbook/ |
| D | wpa_gui.sgml | 55 configured. By default, choose the first interface found with
|
| D | wpa_cli.sgml | 131 configured. By default, choose the first interface found with 157 be executed with the first argument set to interface name and
|
| /hostap-latest/ |
| D | README | 19 earlier releases, the programs are now built by first going to a
|
| /hostap-latest/tests/ |
| D | cipher-and-key-mgmt-testing.txt | 34 else, it is strongly recommended that you'll run the first tests with 338 Show the ANonce from the first 4-way handshake, request PTK rekeying, 358 tool to the AP using FT protocol (e.g., connect to another AP first and
|
| /hostap-latest/doc/ |
| D | hostapd_ctrl_iface.doxygen | 52 unsolicited event messages, it should be first detached by calling
|