Home
last modified time | relevance | path

Searched refs:first (Results 1 – 25 of 49) sorted by relevance

12

/hostap-latest/src/ap/
Dauthsrv.c112 struct hostapd_data *first; in hostapd_setup_radius_srv() local
117 first = hostapd_mld_get_first_bss(hapd); in hostapd_setup_radius_srv()
118 if (!first) in hostapd_setup_radius_srv()
120 hapd->radius_srv = first->radius_srv; in hostapd_setup_radius_srv()
261 struct hostapd_data *first; in authsrv_init() local
263 first = hostapd_mld_get_first_bss(hapd); in authsrv_init()
264 if (!first) in authsrv_init()
267 if (!first->eap_cfg) { in authsrv_init()
271 if (authsrv_init(first)) in authsrv_init()
278 hapd->ssl_ctx = first->ssl_ctx; in authsrv_init()
[all …]
Dacs.c262 int first; member
454 while (bw_desc[bw][i].first != -1) { in acs_usable_bw_chan()
455 if (chan->freq == bw_desc[bw][i].first) in acs_usable_bw_chan()
468 while (bw_desc[bw][i].first != -1) { in acs_get_bw_center_chan()
469 if (freq >= bw_desc[bw][i].first && in acs_get_bw_center_chan()
1185 for (i = 0; bw_desc[ACS_BW40][i].first != -1; i++) { in acs_adjust_secondary()
1186 if (iface->freq == bw_desc[ACS_BW40][i].first) in acs_adjust_secondary()
Dvlan_full.c566 struct hostapd_vlan *first, *prev, *vlan = hapd->conf->vlan; in vlan_dellink() local
570 first = prev = vlan; in vlan_dellink()
625 if (vlan == first) in vlan_dellink()
Dieee802_1x.c2538 struct hostapd_data *first; in ieee802_1x_init() local
2540 first = hostapd_mld_get_first_bss(hapd); in ieee802_1x_init()
2541 if (!first) in ieee802_1x_init()
2544 if (!first->eapol_auth) { in ieee802_1x_init()
2548 if (ieee802_1x_init(first)) in ieee802_1x_init()
2555 hapd->eapol_auth = first->eapol_auth; in ieee802_1x_init()
/hostap-latest/tests/fuzzing/
Dfuzzer-common.c16 static int first = 1; in wpa_fuzzer_set_debug_level() local
18 if (first) { in wpa_fuzzer_set_debug_level()
21 first = 0; in wpa_fuzzer_set_debug_level()
/hostap-latest/src/radius/
Dradius_client.c552 os_time_t first; in radius_client_timer() local
587 first = 0; in radius_client_timer()
614 if (first == 0 || entry->next_try < first) in radius_client_timer()
615 first = entry->next_try; in radius_client_timer()
622 if (first < now.sec) in radius_client_timer()
623 first = now.sec; in radius_client_timer()
625 eloop_register_timeout(first - now.sec, 0, in radius_client_timer()
630 (long int) (first - now.sec)); in radius_client_timer()
693 os_time_t first; in radius_client_update_timeout() local
702 first = 0; in radius_client_update_timeout()
[all …]
Dradius.c1146 int i, first = 1; in decrypt_ms_key() local
1178 if (first) { in decrypt_ms_key()
1187 if (md5_vector(first ? 3 : 2, addr, elen, hash) < 0) { in decrypt_ms_key()
1191 first = 0; in decrypt_ms_key()
1221 int i, len, first = 1; in encrypt_ms_key() local
1244 if (first) { in encrypt_ms_key()
1253 md5_vector(first ? 3 : 2, addr, _len, hash); in encrypt_ms_key()
1254 first = 0; in encrypt_ms_key()
/hostap-latest/hostapd/
Dhostapd.vlan6 # Optional wildcard entry matching all VLAN IDs. The first # in the interface
Dhostapd.eap_user28 # first matching entry is selected, so * should be used as the last phase 1
43 # based on the first PEAP packet from the supplicant.
DREADME-WPS273 first successful registration if the AP is initially set in
283 state (random configuration based on the first successful WPS
343 first argument selects the format of the output data and the second
349 connection handover. The first parameter indicates whether the local
/hostap-latest/wpa_supplicant/wpa_gui-qt4/
Dwpagui.cpp344 static bool first = true; in openCtrlConnection() local
345 if (first && !serviceRunning()) { in openCtrlConnection()
346 first = false; in openCtrlConnection()
515 static bool first = true; in updateStatus() local
516 if (first && connectedToService && in updateStatus()
518 first = false; in updateStatus()
/hostap-latest/src/common/
Dhw_features_common.c115 int ok, first; in allowed_ht40_channel_pair() local
160 first = pri_chan < sec_chan ? pri_chan : sec_chan; in allowed_ht40_channel_pair()
164 if (first == allowed[k]) { in allowed_ht40_channel_pair()
Ddpp_backup.c1103 struct dpp_asymmetric_key *first = NULL, *last = NULL, *key; in dpp_parse_dpp_asymmetric_key_package() local
1117 dpp_free_asymmetric_key(first); in dpp_parse_dpp_asymmetric_key_package()
1121 first = last = key; in dpp_parse_dpp_asymmetric_key_package()
1128 return first; in dpp_parse_dpp_asymmetric_key_package()
Dnan_de.c988 bool first = true; in nan_de_rx_sda() local
1085 if (first) { in nan_de_rx_sda()
1086 first = false; in nan_de_rx_sda()
/hostap-latest/tests/hwsim/vm/
Dparallel-vm.py566 first = True
570 if first:
571 first = False
DREADME4 To set it up, first compile a kernel with the kernel-config[.uml] file as the
/hostap-latest/tests/hwsim/
Dtest_ap_dynamic.py108 first = True
111 timeout = 0.2 if first else 0.01
112 first = False
Dhostapd.py421 first = True
423 if first and '=' not in l:
425 first = False
/hostap-latest/wpa_supplicant/
Dwps_supplicant.c1541 struct wpa_supplicant *first; in wpas_wps_set_uuid() local
1542 first = wpa_s->global->ifaces; in wpas_wps_set_uuid()
1543 while (first && first->next) in wpas_wps_set_uuid()
1544 first = first->next; in wpas_wps_set_uuid()
1545 if (first && first != wpa_s) { in wpas_wps_set_uuid()
DREADME-P2P59 the command line. By default, it will select the first network interface
85 optional freq parameter can be used to override the first scan to use only
236 session - Mandatory Session ID of the first session to be established
261 session - Mandatory Session ID of the first session to be established
484 response TLV(s). The first three parameters are copied from the
605 presence. The first parameter pair gives the preferred duration and
807 session - always Session ID of the first session to be established
825 session - always Session ID of the first session to be established
/hostap-latest/wpa_supplicant/doc/docbook/
Dwpa_gui.sgml55 configured. By default, choose the first interface found with
Dwpa_cli.sgml131 configured. By default, choose the first interface found with
157 be executed with the first argument set to interface name and
/hostap-latest/
DREADME19 earlier releases, the programs are now built by first going to a
/hostap-latest/tests/
Dcipher-and-key-mgmt-testing.txt34 else, it is strongly recommended that you'll run the first tests with
338 Show the ANonce from the first 4-way handshake, request PTK rekeying,
358 tool to the AP using FT protocol (e.g., connect to another AP first and
/hostap-latest/doc/
Dhostapd_ctrl_iface.doxygen52 unsolicited event messages, it should be first detached by calling

12