/hostap-latest/src/drivers/ |
D | driver_macsec_linux.c | 56 struct rtnl_link *link; member 187 if (!drv->link) in try_commit() 219 rtnl_link_macsec_set_protect(drv->link, drv->protect_frames); in try_commit() 225 rtnl_link_macsec_set_encrypt(drv->link, drv->encrypt); in try_commit() 233 rtnl_link_macsec_set_replay_protect(drv->link, in try_commit() 236 rtnl_link_macsec_set_window(drv->link, in try_commit() 245 rtnl_link_macsec_set_offload(drv->link, drv->offload); in try_commit() 253 rtnl_link_macsec_set_encoding_sa(drv->link, drv->encoding_sa); in try_commit() 256 err = rtnl_link_add(drv->sk, drv->link, 0); in try_commit() 1157 struct rtnl_link *link; in macsec_drv_create_transmit_sc() local [all …]
|
D | driver_nl80211_event.c | 499 struct nlattr *link; in nl80211_parse_qca_vendor_mlo_link_info() local 502 nla_for_each_nested(link, mlo_links, rem_links) { in nl80211_parse_qca_vendor_mlo_link_info() 506 nla_parse(tb,QCA_WLAN_VENDOR_ATTR_MLO_LINK_MAX, nla_data(link), in nl80211_parse_qca_vendor_mlo_link_info() 507 nla_len(link), NULL); in nl80211_parse_qca_vendor_mlo_link_info() 538 struct nlattr *link; in nl80211_parse_mlo_link_info() local 541 nla_for_each_nested(link, mlo_links, rem_links) { in nl80211_parse_mlo_link_info() 545 nla_parse(tb, NL80211_ATTR_MAX, nla_data(link), nla_len(link), in nl80211_parse_mlo_link_info() 1194 struct nlattr *ifindex, struct nlattr *link, in mlme_event_ch_switch() argument 1263 if (link) in mlme_event_ch_switch() 1264 data.ch_switch.link_id = nla_get_u8(link); in mlme_event_ch_switch() [all …]
|
D | driver_nl80211.c | 3084 struct i802_link *link = nl80211_get_link(bss, link_id); in wpa_driver_nl80211_del_beacon() local 3086 if (!link->beacon_set) in wpa_driver_nl80211_del_beacon() 3091 link->beacon_set = 0; in wpa_driver_nl80211_del_beacon() 3092 link->freq = 0; in wpa_driver_nl80211_del_beacon() 4212 struct i802_link *link = nl80211_get_link(bss, link_id); in nl80211_link_set_freq() local 4214 link->freq = freq; in nl80211_link_set_freq() 4256 struct i802_link *link = nl80211_get_link(bss, link_id); in wpa_driver_nl80211_send_mlme() local 4358 link->freq); in wpa_driver_nl80211_send_mlme() 4359 freq = link->freq; in wpa_driver_nl80211_send_mlme() 4365 freq, link->freq); in wpa_driver_nl80211_send_mlme() [all …]
|
/hostap-latest/hostapd/ |
D | README-MULTI-AP | 40 links. A backhaul link is a link between two access point devices, giving 41 internet access to access point devices that don't have a wired link. The 42 Multi-AP specification doesn't dictate this, but typically the backhaul link 46 A backhaul link must be treated specially by hostapd and wpa_supplicant. One 47 side of the backhaul link is configured through the Multi-AP protocol as the 48 "backhaul STA", i.e., the client side of the link. A backhaul STA is like any 52 must use 4-address mode for all frames sent over this link ([3], section 14). 62 The AP side of the backhaul link is called a "backhaul BSS". Such a BSS must 114 a Multi-AP backhaul link, hostapd must not respond with the normal fronthaul 137 In summary, this is the end-to-end behavior for WPS of a backhaul link (i.e.,
|
D | ChangeLog | 1012 direct link setup (DLS) to replace STAKey handshake 1064 direct link setup (DLS); note: this is disabled by default in both
|
/hostap-latest/wpa_supplicant/ |
D | nmake.mak | 182 link.exe /out:wpa_supplicant.exe $(LFLAGS) $(OBJS) $(OBJS2) $(LIBS) 185 link.exe /out:wpasvc.exe $(LFLAGS) $(OBJS) $(OBJS3) $(LIBS) 188 link.exe /out:wpa_cli.exe $(LFLAGS) $(OBJS_c) $(LIBS) 191 link.exe /out:wpa_passphrase.exe $(LFLAGS) $(OBJS_p) $(LIBS) 194 link.exe /out:eapol_test.exe $(LFLAGS) $(OBJS_t) $(LIBS) 197 link.exe /out:preauth_test.exe $(LFLAGS) $(OBJS_t2) $(LIBS) 200 link.exe /out:win_if_list.exe $(LFLAGS) $(OBJDIR)\win_if_list.obj $(LIBS)
|
D | README-HS20 | 537 pairwise_cipher=CCMP <--- link layer security indication 625 link-layer protected Hotspot 2.0 online signup connection with
|
D | ChangeLog | 296 - fix peer link counting in reconnect case 519 * add support for link measurement 1585 * updated Windows binary build to link against OpenSSL 0.9.8d and 1710 direct link setup (DLS) to replace STAKey handshake 1833 direct link setup (DLS); note: this is disabled by default in both 1856 * made it possible to link ndis_events.exe functionality into 1975 * cleaned up internal EAPOL frame processing by not including link 1978 to use wpa_supplicant on link layers that use different header than
|
/hostap-latest/src/ap/ |
D | ieee802_11_eht.c | 536 struct mld_link_info *link = &mld_info->links[link_id]; in hostapd_eid_eht_basic_ml_common() local 546 link->resp_sta_profile_len; in hostapd_eid_eht_basic_ml_common() 549 if (link_id == hapd->mld_link_id || !link->valid) in hostapd_eid_eht_basic_ml_common() 581 wpabuf_put_data(buf, link->local_addr, ETH_ALEN); in hostapd_eid_eht_basic_ml_common() 598 if (!link->resp_sta_profile) in hostapd_eid_eht_basic_ml_common() 603 wpabuf_put_data(buf, link->resp_sta_profile, in hostapd_eid_eht_basic_ml_common() 604 link->resp_sta_profile_len); in hostapd_eid_eht_basic_ml_common() 606 ptr = link->resp_sta_profile; in hostapd_eid_eht_basic_ml_common() 607 len = link->resp_sta_profile_len; in hostapd_eid_eht_basic_ml_common() 755 struct mld_link_info *link; in hostapd_eid_eht_ml_len() local [all …]
|
D | ieee802_11.c | 3927 bool link) in __check_assoc_ies() argument 4032 if (!link) { in __check_assoc_ies() 4109 if (!link) in __check_assoc_ies() 4174 if (link) in __check_assoc_ies() 4448 struct mld_link_info *link) in ieee80211_ml_build_assoc_resp() argument 4459 WPA_PUT_LE16(p, link->status); in ieee80211_ml_build_assoc_resp() 4462 if (link->status != WLAN_STATUS_SUCCESS) in ieee80211_ml_build_assoc_resp() 4502 os_free(link->resp_sta_profile); in ieee80211_ml_build_assoc_resp() 4503 link->resp_sta_profile = os_memdup(buf, p - buf); in ieee80211_ml_build_assoc_resp() 4504 link->resp_sta_profile_len = link->resp_sta_profile ? p - buf : 0; in ieee80211_ml_build_assoc_resp() [all …]
|
D | beacon.c | 1043 struct hostapd_data *link; in hostapd_fill_probe_resp_ml_params() local 1054 for_each_mld_link(link, hapd) { in hostapd_fill_probe_resp_ml_params() 1057 u8 mld_link_id = link->mld_link_id; in hostapd_fill_probe_resp_ml_params() 1067 if (mld_id != -1 && link->iface == hapd->iface) in hostapd_fill_probe_resp_ml_params() 1068 params->mld_ap = link; in hostapd_fill_probe_resp_ml_params() 1071 if (link == hapd) in hostapd_fill_probe_resp_ml_params() 1087 buflen += hostapd_probe_resp_elems_len(link, &sta_info_params); in hostapd_fill_probe_resp_ml_params() 1108 link, &sta_info_params, epos, in hostapd_fill_probe_resp_ml_params() 1116 os_memcpy(link_info->local_addr, link->own_addr, ETH_ALEN); in hostapd_fill_probe_resp_ml_params()
|
D | hostapd.h | 484 struct dl_list link; member 843 dl_list_for_each(partner, &self->mld->links, struct hostapd_data, link)
|
D | wpa_auth.c | 7386 struct mld_link_info *link = &info->links[link_id]; local 7390 sm_link->valid = link->valid; 7391 if (!link->valid) 7394 os_memcpy(sm_link->peer_addr, link->peer_addr, ETH_ALEN); 7403 ctx.addr = link->local_addr;
|
D | ieee802_1x.c | 165 struct mld_link_info *link = &sta->mld_info.links[link_id]; in ieee802_1x_ml_set_sta_authorized() local 167 if (!link->valid) in ieee802_1x_ml_set_sta_authorized()
|
D | hostapd.c | 4857 dl_list_add_tail(&mld->links, &hapd->link); in hostapd_mld_add_link() 4885 dl_list_del(&hapd->link); in hostapd_mld_remove_link() 4899 link); in hostapd_mld_remove_link()
|
/hostap-latest/tests/hwsim/vm/ |
D | inside.sh | 106 ip link set lo up 140 ip link set eth0 up
|
/hostap-latest/doc/ |
D | porting.doxygen | 75 \section l2_packet_porting l2_packet (link layer access) 78 (link layer) packets with two Ethertypes: EAP-over-LAN (EAPOL) 0x888e 82 If the target operating system supports a generic mechanism for link 100 no changes. If this is not a case or a proprietary interface for link 104 be used to override the l2_packet library if the link layer access is
|
D | hostapd_ctrl_iface.doxygen | 9 interface. External programs can link this file into them and then use 23 communicate with hostapd should link in \ref wpa_ctrl.c. This
|
D | directories.doxygen | 49 This module defines an interface for layer 2 (link layer) packet
|
D | code_structure.doxygen | 65 Layer 2 (link) access wrapper (includes Linux packet socket
|
D | ctrl_iface.doxygen | 9 interface. External programs can link this file into them and then use 24 communicate with wpa_supplicant should link in \ref wpa_ctrl.c. This
|
D | dbus.doxygen | 458 <dd>Current status of the TDLS link with the selected peer.</dd>
|
/hostap-latest/tests/hwsim/ |
D | stop.sh | 18 sudo ip link set hwsim0 down
|
D | start.sh | 120 sudo ip link set hwsim0 up
|
/hostap-latest/tests/ |
D | cipher-and-key-mgmt-testing.txt | 86 link. It should be noted that ping may need to use broadcast ARP at the 228 on the link layer).
|