/hostap-latest/wpa_supplicant/ |
D | ctrl_iface_udp.c | 78 struct sockaddr_in6 *from, in wpa_supplicant_ctrl_iface_attach() argument 80 struct sockaddr_in *from, in wpa_supplicant_ctrl_iface_attach() 92 os_memcpy(&dst->addr, from, sizeof(*from)); in wpa_supplicant_ctrl_iface_attach() 99 inet_ntop(AF_INET6, &from->sin6_addr, addr, sizeof(*from)), in wpa_supplicant_ctrl_iface_attach() 100 ntohs(from->sin6_port)); in wpa_supplicant_ctrl_iface_attach() 103 inet_ntoa(from->sin_addr), ntohs(from->sin_port)); in wpa_supplicant_ctrl_iface_attach() 111 struct sockaddr_in6 *from, argument 113 struct sockaddr_in *from, 125 if (from->sin6_port == dst->addr.sin6_port && 126 !os_memcmp(&from->sin6_addr, &dst->addr.sin6_addr, [all …]
|
D | wpa_priv.c | 57 struct sockaddr_un *from, socklen_t fromlen) in wpa_priv_cmd_register() argument 109 os_memcpy(&iface->drv_addr, from, fromlen); in wpa_priv_cmd_register() 121 struct sockaddr_un *from) in wpa_priv_cmd_unregister() argument 182 struct sockaddr_un *from, in wpa_priv_get_scan_results2() argument 217 sendto(iface->fd, buf, pos - buf, 0, (struct sockaddr *) from, fromlen); in wpa_priv_get_scan_results2() 226 sendto(iface->fd, "", 0, 0, (struct sockaddr *) from, fromlen); in wpa_priv_get_scan_results2() 231 struct sockaddr_un *from, in wpa_priv_cmd_get_scan_results() argument 238 wpa_priv_get_scan_results2(iface, from, fromlen); in wpa_priv_cmd_get_scan_results() 240 sendto(iface->fd, "", 0, 0, (struct sockaddr *) from, fromlen); in wpa_priv_cmd_get_scan_results() 345 struct sockaddr_un *from, socklen_t fromlen) in wpa_priv_cmd_get_bssid() argument [all …]
|
D | ctrl_iface_unix.c | 103 struct sockaddr_storage *from, in wpa_supplicant_ctrl_iface_attach() argument 106 return ctrl_iface_attach(ctrl_dst, from, fromlen, NULL); in wpa_supplicant_ctrl_iface_attach() 111 struct sockaddr_storage *from, in wpa_supplicant_ctrl_iface_detach() argument 114 return ctrl_iface_detach(ctrl_dst, from, fromlen); in wpa_supplicant_ctrl_iface_detach() 119 struct sockaddr_storage *from, in wpa_supplicant_ctrl_iface_level() argument 125 return ctrl_iface_level(&priv->ctrl_dst, from, fromlen, level); in wpa_supplicant_ctrl_iface_level() 136 struct sockaddr_storage from; in wpa_supplicant_ctrl_iface_receive() local 137 socklen_t fromlen = sizeof(from); in wpa_supplicant_ctrl_iface_receive() 146 (struct sockaddr *) &from, &fromlen); in wpa_supplicant_ctrl_iface_receive() 161 if (wpa_supplicant_ctrl_iface_attach(&priv->ctrl_dst, &from, in wpa_supplicant_ctrl_iface_receive() [all …]
|
D | README-Windows.txt | 37 cross-compiling from Linux to MinGW/Windows. It should also be 56 downloaded from http://www.winpcap.org/install/bin/WpdPack_4_0_2.zip. The 64 OpenSSL source package can be downloaded from 74 binary installation package of OpenSSL from 80 files from {Win32OpenSSLRoot}\VC (i.e., libeay*.lib and ssleay*.lib). 82 needed) for it. Alternative, you can copy files from 93 for WinPcap (WPdpack.zip) from 113 wpa_gui uses Qt application framework from Trolltech. It can be built 131 service and which reads its configuration from registry instead of 186 (remove '#' from the comment out ap_scan line to enable mode in which [all …]
|
D | README-NAN-USD | 7 More information about Wi-Fi Aware is available from this Wi-Fi 49 NAN_CANCEL_PUBLISH publish_id=<id from NAN_PUBLISH> 54 NAN_UPDATE_PUBLISH publish_id=<id from NAN_PUBLISH> [ssi=<service specific information (hexdump)>] 74 NAN_CANCEL_SUBSCRIBE subscribe_id=<id from NAN_SUBSCRIBE> 78 NAN_TRANSMIT handle=<id from NAN_PUBLISH or NAN_SUBSCRIBE> req_instance_id=<peer's id> address=<pee…
|
D | README-WPS | 41 More information about WPS is available from Wi-Fi Alliance: 164 wps_reg uses the AP PIN (e.g., from a label on the AP) instead of a 202 selecting an AP from scan results. 210 control these operations from external programs, if desired. 261 - use AP configuration from a locally configured network (e.g., from 315 containing a password token from the Enrollee can be used to 334 interface (AP or P2P GO). The output value from this command is a 356 then be used with wps_reg command (when the NFC password token was from 378 "nfc_report_handover <INIT/RESP> WPS <carrier from handover request> 379 <carrier from handover select>" can be used as an alternative way for [all …]
|
D | README-P2P | 15 More information about Wi-Fi P2P is available from Wi-Fi Alliance: 105 dev_id - Optional to request responses from a single known remote device 166 from local display, keypad=PIN entered from peer display). "persistent" 248 This command sends a provision discovery response from responder side. 277 Reject connection attempt from a peer (specified with a device 300 This command can be used to remove the specified client from all groups 301 (operating and persistent) from the local GO. Note that the peer device 346 attributes from the initiator side. The replacement is only allowed if 412 p2p_serv_disc_req 00:00:00:00:00:00 upnp <version hex> <ST: from M-SEARCH> 465 Will match from beginning of remote Service Name [all …]
|
/hostap-latest/src/common/ |
D | ctrl_iface_common.c | 143 int ctrl_iface_attach(struct dl_list *ctrl_dst, struct sockaddr_storage *from, in ctrl_iface_attach() argument 150 if (!sockaddr_compare(from, fromlen, in ctrl_iface_attach() 159 os_memcpy(&dst->addr, from, fromlen); in ctrl_iface_attach() 165 sockaddr_print(MSG_DEBUG, "CTRL_IFACE monitor attached", from, fromlen); in ctrl_iface_attach() 170 int ctrl_iface_detach(struct dl_list *ctrl_dst, struct sockaddr_storage *from, in ctrl_iface_detach() argument 176 if (!sockaddr_compare(from, fromlen, in ctrl_iface_detach() 179 from, fromlen); in ctrl_iface_detach() 190 int ctrl_iface_level(struct dl_list *ctrl_dst, struct sockaddr_storage *from, in ctrl_iface_level() argument 198 if (!sockaddr_compare(from, fromlen, in ctrl_iface_level() 202 from, fromlen); in ctrl_iface_level()
|
D | ctrl_iface_common.h | 35 int ctrl_iface_attach(struct dl_list *ctrl_dst, struct sockaddr_storage *from, 37 int ctrl_iface_detach(struct dl_list *ctrl_dst, struct sockaddr_storage *from, 39 int ctrl_iface_level(struct dl_list *ctrl_dst, struct sockaddr_storage *from,
|
/hostap-latest/tests/ |
D | cipher-and-key-mgmt-testing.txt | 44 interference from unrelated traffic, the steps here assume static IPv4 94 64 bytes from 192.168.1.2: icmp_seq=1 ttl=64 time=43.7 ms 95 64 bytes from 192.168.1.2: icmp_seq=2 ttl=64 time=67.9 ms 96 64 bytes from 192.168.1.2: icmp_seq=3 ttl=64 time=900 ms 97 64 bytes from 192.168.1.2: icmp_seq=4 ttl=64 time=5.81 ms 98 64 bytes from 192.168.1.2: icmp_seq=5 ttl=64 time=135 ms 120 ARPING 192.168.1.2 from 192.168.1.1 wlan0 121 Unicast reply from 192.168.1.2 [<DUT MAC address>] 119.695ms 122 Unicast reply from 192.168.1.2 [<DUT MAC address>] 144.496ms 123 Unicast reply from 192.168.1.2 [<DUT MAC address>] 166.788ms [all …]
|
/hostap-latest/src/l2_packet/ |
D | l2_packet_privsep.c | 99 struct sockaddr_un from; in l2_packet_receive() local 100 socklen_t fromlen = sizeof(from); in l2_packet_receive() 102 os_memset(&from, 0, sizeof(from)); in l2_packet_receive() 103 res = recvfrom(sock, buf, sizeof(buf), 0, (struct sockaddr *) &from, in l2_packet_receive() 115 if (from.sun_family != AF_UNIX || in l2_packet_receive() 116 os_strncmp(from.sun_path, l2->priv_addr.sun_path, in l2_packet_receive() 117 sizeof(from.sun_path)) != 0) { in l2_packet_receive()
|
/hostap-latest/radius_example/ |
D | README | 9 functionality from hostapd can be used as a library in another 12 from the RADIUS authentication server will be processed and it is used 15 The RADIUS library links in couple of helper functions from src/utils and 18 by dropping this file from the library and re-implementing the 31 would involve removing src/utils/eloop.o from the library and
|
/hostap-latest/src/radius/ |
D | radius_server.c | 1249 struct sockaddr *from, socklen_t fromlen, in radius_server_reject() argument 1301 (struct sockaddr *) from, sizeof(*from)) < 0) { in radius_server_reject() 1359 struct sockaddr *from, socklen_t fromlen, in radius_server_request() argument 1390 radius_server_reject(data, client, msg, from, fromlen, in radius_server_request() 1398 radius_server_reject(data, client, msg, from, fromlen, in radius_server_request() 1417 (struct sockaddr *) from, fromlen); in radius_server_request() 1474 os_memcpy(&sess->last_from, from, fromlen); in radius_server_request() 1528 (struct sockaddr *) from, fromlen); in radius_server_request() 1679 } from; in radius_server_receive_auth() local 1692 fromlen = sizeof(from); in radius_server_receive_auth() [all …]
|
D | radius_das.c | 401 } from; in radius_das_receive() local 413 fromlen = sizeof(from); in radius_das_receive() 415 (struct sockaddr *) &from.ss, &fromlen); in radius_das_receive() 421 os_strlcpy(abuf, inet_ntoa(from.sin.sin_addr), sizeof(abuf)); in radius_das_receive() 422 from_port = ntohs(from.sin.sin_port); in radius_das_receive() 427 das->client_addr.u.v4.s_addr != from.sin.sin_addr.s_addr) { in radius_das_receive() 509 (struct sockaddr *) &from.ss, fromlen); in radius_das_receive()
|
/hostap-latest/hostapd/ |
D | README-WPS | 40 More information about WPS is available from Wi-Fi Alliance: 148 - timestamp (seconds from 1970-01-01) 258 control these operations from external programs, if desired. 263 for hostapd to use. The exact data from this binary file will be sent, 271 configuration updates based on messages received from hostapd over 282 This can be used to trigger change from unconfigured to configured 300 containing a password token from the Enrollee can be used to 308 from the AP. "wps_nfc_token enable" enables the use of the AP's NFC 315 "wps_nfc_token <WPS|NDEF>" command. The nfc_pw_token tool from 320 NFC configuration token. The output value from this command is a hexdump [all …]
|
D | hlr_auc_gw.milenage_db | 2 # The example Ki, OPc, and AMF values here are from 3GPP TS 35.208 v6.0.0 13 # These values are from Test Set 19 which has the AMF separation bit set to 1
|
D | ChangeLog | 11 * SAE: add support for fetching the password from a RADIUS server 74 * removed WEP support from the default build (CONFIG_WEP=y can be used 111 (i.e., disable groups 20, 21, 25, 26 from default configuration) and 146 * added RSSI-based association rejection from OCE 278 - use Address 3 = wildcard BSSID in GAS response if a query from an 317 * removed optional fields from RSNE when using FT with PMF 335 * fixed channel switch from VHT to HT 378 * added support for number of new RADIUS attributes from RFC 7268 383 * fixed PMKSA cache timeout from Session-Timeout for WPA/WPA2 cases 457 pulled from R0KH [all …]
|
/hostap-latest/doc/ |
D | ctrl_iface.doxygen | 18 the used IPC from external programs. 31 messages, a request from the external program and a response from 34 interface connection without specific request from the external program 246 Set preferred BSSID for a network. Network id can be received from the 291 information from the found BSSes. This provides access to the same 323 Select a network (disable others). Network id can be received from the 329 Enable a network. Network id can be received from the 336 Disable a network. Network id can be received from the 351 Remove a network. Network id can be received from the 358 Set network variables. Network id can be received from the [all …]
|
D | hostapd_ctrl_iface.doxygen | 17 be used to hide the details of the used IPC from external programs. 30 messages, a request from the external program and a response from 33 interface connection without specific request from the external program
|
D | p2p.doxygen | 5 stack from low-level driver operations to high-level GUI design. This 41 communication paths from the P2P module to upper layer management 131 Events from lower layer driver operations are delivered to the P2P 190 from the scan will be reported by calling \ref p2p_scan_res_handler() and 209 function. If a group owner negotiation from another P2P device is 215 full scan phase described. Similarly, scan results from the search 261 the GO to accept associations from devices and the client to connect to 277 from IEEE 802.11u and P2P vendor-specific contents inside the GAS 301 \subsection p2p_sd_response Replying to service discovery queries from peers 313 frames. The value received from the peers will be included in the [all …]
|
D | driver_wrapper.doxygen | 54 of WPA IE and roaming. \ref driver_ndis.c (with help from \ref driver_ndis_.c) 74 Specification for both TKIP and CCMP is available from IEEE (IEEE 90 information received from Beacon and/or Probe Response frames 124 the driver generates its own WPA IE and that differs from the one 178 information from associnfo and if needed, from scan results if WPA/RSN 179 IE from the Beacon frame is not reported through associnfo)
|
/hostap-latest/src/drivers/ |
D | netlink.c | 41 struct sockaddr_nl from; in netlink_receive() local 47 fromlen = sizeof(from); in netlink_receive() 49 (struct sockaddr *) &from, &fromlen); in netlink_receive()
|
/hostap-latest/eap_example/ |
D | README | 17 code from wpa_supplicant and hostapd can be used as a library. The 37 The EAP library links in number of helper functions from src/utils and 40 by dropping this file from the library and re-implementing the
|
/hostap-latest/tests/hwsim/auth_serv/ |
D | hlr_auc_gw.milenage_db | 2 # The example Ki, OPc, and AMF values here are from 3GPP TS 35.208 v6.0.0 14 # These values are from Test Set 19 which has the AMF separation bit set to 1
|
/hostap-latest/tests/hwsim/vm/ |
D | linux.gdb | 34 # from forked children when detaching from them. This also seems fine. 42 # process to be created by clone() and gdb has to detach from it.
|