Searched refs:force (Results 1 – 22 of 22) sorted by relevance
| /hostap-latest/src/ap/ |
| D | beacon.h | 27 void sta_track_expire(struct hostapd_iface *iface, int force);
|
| D | beacon.c | 1222 void sta_track_expire(struct hostapd_iface *iface, int force) in sta_track_expire() argument 1233 if (!force && in sta_track_expire() 1237 force = 0; in sta_track_expire()
|
| /hostap-latest/tests/hwsim/ |
| D | build.sh | 21 -f | --force-config ) shift
|
| D | wpasupplicant.py | 1264 def roam_over_ds(self, bssid, fail_test=False, force=False): argument 1267 if force:
|
| D | test_ap_ft.py | 926 dev[0].roam_over_ds("02:11:22:33:44:55", fail_test=True, force=True) 3090 dev[0].roam_over_ds(apdev[1]['bssid'], fail_test=True, force=True)
|
| /hostap-latest/wpa_supplicant/doc/docbook/ |
| D | wpa_cli.sgml | 269 <para>force reassociation</para> 275 <para>force wpa_supplicant to re-read its configuration file</para> 282 <para>force preauthentication</para>
|
| /hostap-latest/hostapd/ |
| D | hostapd.eap_user | 40 # [ver=0] and [ver=1] flags after EAP type PEAP can be used to force PEAP
|
| D | ChangeLog | 365 * add UPDATE_BEACON ctrl_iface command; this can be used to force Beacon
|
| /hostap-latest/src/rsn_supp/ |
| D | wpa_ft.c | 1293 const u8 *mdie, bool force) in wpa_ft_start_over_ds() argument 1298 if (!force && in wpa_ft_start_over_ds()
|
| D | wpa.h | 549 const u8 *mdie, bool force);
|
| /hostap-latest/src/utils/ |
| D | common.h | 479 #define __force __attribute__((force))
|
| /hostap-latest/wpa_supplicant/ |
| D | eap_testing.txt | 131 8) PEAPv1 used non-standard version negotiation (client had to force v1 even
|
| D | README | 760 reassociate = force reassociation 761 reconfigure = force wpa_supplicant to re-read its configuration file 762 preauthenticate <BSSID> = force preauthentication
|
| D | README-P2P | 270 a persistent group. Optional freq=<freq in MHz> can be used to force 572 persistent group, the P2P client device can use freq parameter to force
|
| D | wpa_supplicant_i.h | 1916 bool force);
|
| D | android.config | 349 # unless at least one of them was included in the main build to force inclusion
|
| D | defconfig | 395 # unless at least one of them was included in the main build to force inclusion
|
| D | ChangeLog | 451 - do not allow 40 MHz co-ex PRI/SEC switch to force MCC 1031 - mix RAND_bytes() output into random_get_bytes() to force OpenSSL 2164 * added new phase1 option parameter, include_tls_length=1, to force
|
| D | p2p_supplicant.c | 7420 bool force) in wpas_p2p_clear_pending_action_tx() argument 7422 if (!offchannel_pending_action_tx(wpa_s) && !force) in wpas_p2p_clear_pending_action_tx()
|
| D | ctrl_iface.c | 1348 bool force = os_strstr(addr, " force") != NULL; in wpa_supplicant_ctrl_iface_ft_ds() local 1364 return wpa_ft_start_over_ds(wpa_s->wpa, target_ap, mdie, force); in wpa_supplicant_ctrl_iface_ft_ds()
|
| D | wpa_supplicant.c | 2496 bool force) in wpa_s_setup_sae_pt() argument
|
| /hostap-latest/doc/ |
| D | dbus.doxygen | 215 …<tr><td>NonColoc6GHz</td><td>b</td><td>TRUE to force scanning of non-PSC 6 GHz channels, FALSE (or… 1128 <p>Whether to force passive scan for network connection</p>
|