Home
last modified time | relevance | path

Searched refs:from (Results 1 – 25 of 67) sorted by relevance

123

/hostap-latest/wpa_supplicant/
Dctrl_iface_udp.c78 struct sockaddr_in6 *from, in wpa_supplicant_ctrl_iface_attach() argument
80 struct sockaddr_in *from, in wpa_supplicant_ctrl_iface_attach()
92 os_memcpy(&dst->addr, from, sizeof(*from)); in wpa_supplicant_ctrl_iface_attach()
99 inet_ntop(AF_INET6, &from->sin6_addr, addr, sizeof(*from)), in wpa_supplicant_ctrl_iface_attach()
100 ntohs(from->sin6_port)); in wpa_supplicant_ctrl_iface_attach()
103 inet_ntoa(from->sin_addr), ntohs(from->sin_port)); in wpa_supplicant_ctrl_iface_attach()
111 struct sockaddr_in6 *from, argument
113 struct sockaddr_in *from,
125 if (from->sin6_port == dst->addr.sin6_port &&
126 !os_memcmp(&from->sin6_addr, &dst->addr.sin6_addr,
[all …]
Dwpa_priv.c57 struct sockaddr_un *from, socklen_t fromlen) in wpa_priv_cmd_register() argument
109 os_memcpy(&iface->drv_addr, from, fromlen); in wpa_priv_cmd_register()
121 struct sockaddr_un *from) in wpa_priv_cmd_unregister() argument
182 struct sockaddr_un *from, in wpa_priv_get_scan_results2() argument
217 sendto(iface->fd, buf, pos - buf, 0, (struct sockaddr *) from, fromlen); in wpa_priv_get_scan_results2()
226 sendto(iface->fd, "", 0, 0, (struct sockaddr *) from, fromlen); in wpa_priv_get_scan_results2()
231 struct sockaddr_un *from, in wpa_priv_cmd_get_scan_results() argument
238 wpa_priv_get_scan_results2(iface, from, fromlen); in wpa_priv_cmd_get_scan_results()
240 sendto(iface->fd, "", 0, 0, (struct sockaddr *) from, fromlen); in wpa_priv_cmd_get_scan_results()
345 struct sockaddr_un *from, socklen_t fromlen) in wpa_priv_cmd_get_bssid() argument
[all …]
Dctrl_iface_unix.c103 struct sockaddr_storage *from, in wpa_supplicant_ctrl_iface_attach() argument
106 return ctrl_iface_attach(ctrl_dst, from, fromlen, NULL); in wpa_supplicant_ctrl_iface_attach()
111 struct sockaddr_storage *from, in wpa_supplicant_ctrl_iface_detach() argument
114 return ctrl_iface_detach(ctrl_dst, from, fromlen); in wpa_supplicant_ctrl_iface_detach()
119 struct sockaddr_storage *from, in wpa_supplicant_ctrl_iface_level() argument
125 return ctrl_iface_level(&priv->ctrl_dst, from, fromlen, level); in wpa_supplicant_ctrl_iface_level()
136 struct sockaddr_storage from; in wpa_supplicant_ctrl_iface_receive() local
137 socklen_t fromlen = sizeof(from); in wpa_supplicant_ctrl_iface_receive()
146 (struct sockaddr *) &from, &fromlen); in wpa_supplicant_ctrl_iface_receive()
161 if (wpa_supplicant_ctrl_iface_attach(&priv->ctrl_dst, &from, in wpa_supplicant_ctrl_iface_receive()
[all …]
DREADME-Windows.txt37 cross-compiling from Linux to MinGW/Windows. It should also be
56 downloaded from http://www.winpcap.org/install/bin/WpdPack_4_0_2.zip. The
64 OpenSSL source package can be downloaded from
74 binary installation package of OpenSSL from
80 files from {Win32OpenSSLRoot}\VC (i.e., libeay*.lib and ssleay*.lib).
82 needed) for it. Alternative, you can copy files from
93 for WinPcap (WPdpack.zip) from
113 wpa_gui uses Qt application framework from Trolltech. It can be built
131 service and which reads its configuration from registry instead of
186 (remove '#' from the comment out ap_scan line to enable mode in which
[all …]
DREADME-NAN-USD7 More information about Wi-Fi Aware is available from this Wi-Fi
49 NAN_CANCEL_PUBLISH publish_id=<id from NAN_PUBLISH>
54 NAN_UPDATE_PUBLISH publish_id=<id from NAN_PUBLISH> [ssi=<service specific information (hexdump)>]
74 NAN_CANCEL_SUBSCRIBE subscribe_id=<id from NAN_SUBSCRIBE>
78 NAN_TRANSMIT handle=<id from NAN_PUBLISH or NAN_SUBSCRIBE> req_instance_id=<peer's id> address=<pee…
DREADME-WPS41 More information about WPS is available from Wi-Fi Alliance:
164 wps_reg uses the AP PIN (e.g., from a label on the AP) instead of a
202 selecting an AP from scan results.
210 control these operations from external programs, if desired.
261 - use AP configuration from a locally configured network (e.g., from
315 containing a password token from the Enrollee can be used to
334 interface (AP or P2P GO). The output value from this command is a
356 then be used with wps_reg command (when the NFC password token was from
378 "nfc_report_handover <INIT/RESP> WPS <carrier from handover request>
379 <carrier from handover select>" can be used as an alternative way for
[all …]
DREADME-P2P15 More information about Wi-Fi P2P is available from Wi-Fi Alliance:
105 dev_id - Optional to request responses from a single known remote device
166 from local display, keypad=PIN entered from peer display). "persistent"
248 This command sends a provision discovery response from responder side.
277 Reject connection attempt from a peer (specified with a device
300 This command can be used to remove the specified client from all groups
301 (operating and persistent) from the local GO. Note that the peer device
346 attributes from the initiator side. The replacement is only allowed if
412 p2p_serv_disc_req 00:00:00:00:00:00 upnp <version hex> <ST: from M-SEARCH>
465 Will match from beginning of remote Service Name
[all …]
/hostap-latest/src/common/
Dctrl_iface_common.c143 int ctrl_iface_attach(struct dl_list *ctrl_dst, struct sockaddr_storage *from, in ctrl_iface_attach() argument
150 if (!sockaddr_compare(from, fromlen, in ctrl_iface_attach()
159 os_memcpy(&dst->addr, from, fromlen); in ctrl_iface_attach()
165 sockaddr_print(MSG_DEBUG, "CTRL_IFACE monitor attached", from, fromlen); in ctrl_iface_attach()
170 int ctrl_iface_detach(struct dl_list *ctrl_dst, struct sockaddr_storage *from, in ctrl_iface_detach() argument
176 if (!sockaddr_compare(from, fromlen, in ctrl_iface_detach()
179 from, fromlen); in ctrl_iface_detach()
190 int ctrl_iface_level(struct dl_list *ctrl_dst, struct sockaddr_storage *from, in ctrl_iface_level() argument
198 if (!sockaddr_compare(from, fromlen, in ctrl_iface_level()
202 from, fromlen); in ctrl_iface_level()
Dctrl_iface_common.h35 int ctrl_iface_attach(struct dl_list *ctrl_dst, struct sockaddr_storage *from,
37 int ctrl_iface_detach(struct dl_list *ctrl_dst, struct sockaddr_storage *from,
39 int ctrl_iface_level(struct dl_list *ctrl_dst, struct sockaddr_storage *from,
/hostap-latest/tests/
Dcipher-and-key-mgmt-testing.txt44 interference from unrelated traffic, the steps here assume static IPv4
94 64 bytes from 192.168.1.2: icmp_seq=1 ttl=64 time=43.7 ms
95 64 bytes from 192.168.1.2: icmp_seq=2 ttl=64 time=67.9 ms
96 64 bytes from 192.168.1.2: icmp_seq=3 ttl=64 time=900 ms
97 64 bytes from 192.168.1.2: icmp_seq=4 ttl=64 time=5.81 ms
98 64 bytes from 192.168.1.2: icmp_seq=5 ttl=64 time=135 ms
120 ARPING 192.168.1.2 from 192.168.1.1 wlan0
121 Unicast reply from 192.168.1.2 [<DUT MAC address>] 119.695ms
122 Unicast reply from 192.168.1.2 [<DUT MAC address>] 144.496ms
123 Unicast reply from 192.168.1.2 [<DUT MAC address>] 166.788ms
[all …]
/hostap-latest/src/l2_packet/
Dl2_packet_privsep.c99 struct sockaddr_un from; in l2_packet_receive() local
100 socklen_t fromlen = sizeof(from); in l2_packet_receive()
102 os_memset(&from, 0, sizeof(from)); in l2_packet_receive()
103 res = recvfrom(sock, buf, sizeof(buf), 0, (struct sockaddr *) &from, in l2_packet_receive()
115 if (from.sun_family != AF_UNIX || in l2_packet_receive()
116 os_strncmp(from.sun_path, l2->priv_addr.sun_path, in l2_packet_receive()
117 sizeof(from.sun_path)) != 0) { in l2_packet_receive()
/hostap-latest/radius_example/
DREADME9 functionality from hostapd can be used as a library in another
12 from the RADIUS authentication server will be processed and it is used
15 The RADIUS library links in couple of helper functions from src/utils and
18 by dropping this file from the library and re-implementing the
31 would involve removing src/utils/eloop.o from the library and
/hostap-latest/src/radius/
Dradius_server.c1249 struct sockaddr *from, socklen_t fromlen, in radius_server_reject() argument
1301 (struct sockaddr *) from, sizeof(*from)) < 0) { in radius_server_reject()
1359 struct sockaddr *from, socklen_t fromlen, in radius_server_request() argument
1390 radius_server_reject(data, client, msg, from, fromlen, in radius_server_request()
1398 radius_server_reject(data, client, msg, from, fromlen, in radius_server_request()
1417 (struct sockaddr *) from, fromlen); in radius_server_request()
1474 os_memcpy(&sess->last_from, from, fromlen); in radius_server_request()
1528 (struct sockaddr *) from, fromlen); in radius_server_request()
1679 } from; in radius_server_receive_auth() local
1692 fromlen = sizeof(from); in radius_server_receive_auth()
[all …]
Dradius_das.c401 } from; in radius_das_receive() local
413 fromlen = sizeof(from); in radius_das_receive()
415 (struct sockaddr *) &from.ss, &fromlen); in radius_das_receive()
421 os_strlcpy(abuf, inet_ntoa(from.sin.sin_addr), sizeof(abuf)); in radius_das_receive()
422 from_port = ntohs(from.sin.sin_port); in radius_das_receive()
427 das->client_addr.u.v4.s_addr != from.sin.sin_addr.s_addr) { in radius_das_receive()
509 (struct sockaddr *) &from.ss, fromlen); in radius_das_receive()
/hostap-latest/hostapd/
DREADME-WPS40 More information about WPS is available from Wi-Fi Alliance:
148 - timestamp (seconds from 1970-01-01)
258 control these operations from external programs, if desired.
263 for hostapd to use. The exact data from this binary file will be sent,
271 configuration updates based on messages received from hostapd over
282 This can be used to trigger change from unconfigured to configured
300 containing a password token from the Enrollee can be used to
308 from the AP. "wps_nfc_token enable" enables the use of the AP's NFC
315 "wps_nfc_token <WPS|NDEF>" command. The nfc_pw_token tool from
320 NFC configuration token. The output value from this command is a hexdump
[all …]
Dhlr_auc_gw.milenage_db2 # The example Ki, OPc, and AMF values here are from 3GPP TS 35.208 v6.0.0
13 # These values are from Test Set 19 which has the AMF separation bit set to 1
DChangeLog11 * SAE: add support for fetching the password from a RADIUS server
74 * removed WEP support from the default build (CONFIG_WEP=y can be used
111 (i.e., disable groups 20, 21, 25, 26 from default configuration) and
146 * added RSSI-based association rejection from OCE
278 - use Address 3 = wildcard BSSID in GAS response if a query from an
317 * removed optional fields from RSNE when using FT with PMF
335 * fixed channel switch from VHT to HT
378 * added support for number of new RADIUS attributes from RFC 7268
383 * fixed PMKSA cache timeout from Session-Timeout for WPA/WPA2 cases
457 pulled from R0KH
[all …]
/hostap-latest/doc/
Dctrl_iface.doxygen18 the used IPC from external programs.
31 messages, a request from the external program and a response from
34 interface connection without specific request from the external program
246 Set preferred BSSID for a network. Network id can be received from the
291 information from the found BSSes. This provides access to the same
323 Select a network (disable others). Network id can be received from the
329 Enable a network. Network id can be received from the
336 Disable a network. Network id can be received from the
351 Remove a network. Network id can be received from the
358 Set network variables. Network id can be received from the
[all …]
Dhostapd_ctrl_iface.doxygen17 be used to hide the details of the used IPC from external programs.
30 messages, a request from the external program and a response from
33 interface connection without specific request from the external program
Dp2p.doxygen5 stack from low-level driver operations to high-level GUI design. This
41 communication paths from the P2P module to upper layer management
131 Events from lower layer driver operations are delivered to the P2P
190 from the scan will be reported by calling \ref p2p_scan_res_handler() and
209 function. If a group owner negotiation from another P2P device is
215 full scan phase described. Similarly, scan results from the search
261 the GO to accept associations from devices and the client to connect to
277 from IEEE 802.11u and P2P vendor-specific contents inside the GAS
301 \subsection p2p_sd_response Replying to service discovery queries from peers
313 frames. The value received from the peers will be included in the
[all …]
Ddriver_wrapper.doxygen54 of WPA IE and roaming. \ref driver_ndis.c (with help from \ref driver_ndis_.c)
74 Specification for both TKIP and CCMP is available from IEEE (IEEE
90 information received from Beacon and/or Probe Response frames
124 the driver generates its own WPA IE and that differs from the one
178 information from associnfo and if needed, from scan results if WPA/RSN
179 IE from the Beacon frame is not reported through associnfo)
/hostap-latest/src/drivers/
Dnetlink.c41 struct sockaddr_nl from; in netlink_receive() local
47 fromlen = sizeof(from); in netlink_receive()
49 (struct sockaddr *) &from, &fromlen); in netlink_receive()
/hostap-latest/eap_example/
DREADME17 code from wpa_supplicant and hostapd can be used as a library. The
37 The EAP library links in number of helper functions from src/utils and
40 by dropping this file from the library and re-implementing the
/hostap-latest/tests/hwsim/auth_serv/
Dhlr_auc_gw.milenage_db2 # The example Ki, OPc, and AMF values here are from 3GPP TS 35.208 v6.0.0
14 # These values are from Test Set 19 which has the AMF separation bit set to 1
/hostap-latest/tests/hwsim/vm/
Dlinux.gdb34 # from forked children when detaching from them. This also seems fine.
42 # process to be created by clone() and gdb has to detach from it.

123