Home
last modified time | relevance | path

Searched refs:on (Results 1 – 25 of 61) sorted by relevance

123

/hostap-latest/wpa_supplicant/
DREADME-NAN-USD34 If freq is not included, the default frequency 2437 MHz (channel 6 on
39 channel list automatically based on the list of allowed 2.4 and 5 GHz
45 This command returns the assigned publish_id value or FAIL on failure.
64 If freq is not included, the default frequency 2437 MHz (channel 6 on
70 This command returns the assigned subscribe_id value or FAIL on failure.
121 event on dev0: <3>NAN-DISCOVERY-RESULT subscribe_id=7 publish_id=5 address=02:00:00:00:01:00 fsd=1 …
126 event on dev1: <3>NAN-RECEIVE id=5 peer_instance_id=7 address=02:00:00:00:00:00 ssi=
134 event on dev1: <3>NAN-RECEIVE id=5 peer_instance_id=7 address=02:00:00:00:00:00 ssi=8899
142 event on dev0: <3>NAN-RECEIVE id=7 peer_instance_id=5 address=02:00:00:00:01:00 ssi=aabbccdd
DREADME-DPP108 separating colons. The channel list includes the possible channels on which the
110 GHz channel 1 on 2412 MHz.)
117 AP as an Enrollee is listening on its operating channel.
144 > set dpp_connector <Connector-value-printed-on-console>
145 > set dpp_csign <csign-value-on-console>
146 > set dpp_netaccesskey <netaccess-value-on-console>
Dandroid.config20 # used to fix build issues on such systems (krb5.h not found).
51 # Additional directories for cross-compilation on Linux host for mingw target
158 # Smartcard support (i.e., private key on a smartcard), e.g., with openssl
220 # path is given on command line, not here; this option is just used to
226 # file to be updated based on runtime configuration changes). The runtime
306 # LibTomMath can be used. See beginning of libtommath.c for details on benefits
404 # wpa_supplicant depends on strong random number generation being available
409 # important especially on embedded devices that do not have a hardware random
427 # If the os_get_random() is known to provide strong random data (e.g., on
431 # should only be considered for builds that are known to be used on devices
[all …]
DChangeLog33 - this is based on additional details being added in the IEEE 802.11
126 * fixed Hotspot 2.0 credential selection based on roaming consortium
140 completely based on REVmd changes
144 on both the station and the selected AP
148 - reject use of unsuitable groups based on new implementation guidance
295 - improve robustness on various exchanges
326 - fix follow-on PD Response behavior
402 * added support for PBSS/PCP and P2P on 60 GHz
471 * fixed BSS selection based on estimated throughput
484 * fixed number of small issues based on hwsim test case failures and
[all …]
Ddefconfig20 # used to fix build issues on such systems (krb5.h not found).
63 # Additional directories for cross-compilation on Linux host for mingw target
195 # Smartcard support (i.e., private key on a smartcard), e.g., with openssl
269 # path is given on command line, not here; this option is just used to
275 # file to be updated based on runtime configuration changes). The runtime
356 # LibTomMath can be used. See beginning of libtommath.c for details on benefits
466 # wpa_supplicant depends on strong random number generation being available
471 # important especially on embedded devices that do not have a hardware random
489 # If the os_get_random() is known to provide strong random data (e.g., on
493 # should only be considered for builds that are known to be used on devices
[all …]
DREADME-P2P5 wpa_supplicant can be configured and how an external component on the
58 wpa_cli starts in interactive mode if no command string is included on
62 by adding -i argument on the command line (e.g., 'wpa_cli -i wlan1').
64 Most of the P2P operations are done on the main interface (e.g., the
169 SSID/passphrase configuration based on a previously used persistent
201 based on SSID to avoid selecting an incorrect BSS entry in case the same
271 the GO to be started on a specific frequency. Special freq=2 or freq=5
303 per_sta_psk command below for more details on how the peer can be
502 each request based on pre-configured services), 1 = external
505 that there is quite strict limit on how quickly the response needs to
[all …]
Dtodo.txt2 - add support for WPA with ap_scan=0 (update selected cipher etc. based on
5 authentication has been completed (cache scard data based on serial#(?)
21 authentication ("canned" Success); this should be ignored based on
37 * global options (ap_scan, ctrl_interfaces) based on OS/driver
/hostap-latest/tests/
Dcipher-and-key-mgmt-testing.txt9 extensions are focused on the fully automated testing framework with
42 this document focuses on using ping to test unicast traffic and arping
85 ping is used to test whether unicast frames go through on the data
162 Testing replay protection on a station device
165 Start hostapd and use hostapd_cli on the test device to control testing
201 Testing replay protection on an AP device
204 Start the AP (DUT) and start wpa_supplicant on the test device to
228 on the link layer).
231 Testing GTK reinstallation protection on a station device (group handshake)
249 Testing GTK reinstallation protection on a station device (4-way handshake)
[all …]
Dtest-https_server.c213 int on = 1; in main() local
231 if (setsockopt(s, SOL_SOCKET, SO_REUSEADDR, &on, sizeof(on)) < 0) { in main()
/hostap-latest/hostapd/
DREADME-MULTI-AP34 In a Multi-AP network, the central controller can configure the BSSs on the
93 multi_ap_backhaul_sta=1 in wpa_supplicant on STA, and multi_ap=1 or 3 in
94 hostapd on AP). Note that point 1 means that hostapd must not be configured
95 with WPS support on the backhaul BSS (multi_ap=1). hostapd does not check for
110 WPS requires more special handling. WPS must only be advertised on fronthaul
111 BSSs, not on backhaul BSSs, so WPS should not be enabled on a backhaul-only
112 BSS in hostapd.conf. The WPS configuration purely works on the fronthaul BSS.
120 When these are set on an BSS with WPS, they are used instead of the normal
138 multi_ap=1 option is given in the wps_pbc call on the STA side, and multi_ap=2
141 in hostapd on Registrar AP).
Dhostapd.android.rc2 # init.rc fragment for hostapd on Android
9 on post-fs-data
DREADME-WPS5 configured and how an external component on an AP (e.g., web UI) is
100 # If UUID is not configured, it will be generated based on local MAC address.
137 PINs on the AP for a set of Enrollee).
166 When the user enters a PIN for a pending Enrollee, e.g., on the web
203 enabled by pushing a button on both the AP and the client at about the
219 AP PIN only based on user action (and even better security by using a
271 configuration updates based on messages received from hostapd over
272 control interface. This will also include the initial configuration on
283 state (random configuration based on the first successful WPS
325 can be used to touch an NFC interface on a station to provision the
[all …]
Dhostapd.eap_user41 # version based on the Phase 1 identity. Without this flag, the EAP
43 # based on the first PEAP packet from the supplicant.
71 # Default to EAP-SIM and EAP-AKA based on fixed identity prefixes
94 # Default to EAP-SIM and EAP-AKA based on fixed identity prefixes in phase 2
/hostap-latest/tests/hwsim/vm/
Dlinux.gdb28 # on some place, it writes there a breakpoint instruction (which is
29 # a single 0xCC byte on x86). This breaks out into the debugger and
49 # simply put a breakpoint on init_new_ldt which happens just after
65 echo breakpoint pending on future load.\n\n
66 echo Do NOT, however, delete the breakpoint on 'init_new_ldt'!\n\n
/hostap-latest/wpadebug/
DREADME14 not supposed to be installed on a production use device and doing so may
15 result in complete loss of security protections on the device.
24 wpadebug depends on zxing core to launch QR code display/scanning.
47 NOTE: Following steps enable any app on the system to get root access!
/hostap-latest/tests/hwsim/
DREADME15 sent on all channels. wlantest is used to store the frames for
57 built. It is also possible to install wlantest_cli somewhere on the path
68 example-setup.txt provides more complete step-by-step example on how a
101 Or on a dedicated test system, you could even disable password prompting
172 verbose debug output) and -q (less verbose output) on the command
179 operation on multi channels in order to run. These tests will be skipped
193 likely to take a look at some of the example scripts. When working on a
194 new test, run-tests.py with -d and the test case name on the command
Dexample-setup.txt14 testing coverage) configuration on a Linux host system, parallel virtual
16 for more details on that.
67 Update iw based on custom iw.git build
144 vm/README for information on how parallel VMs can be used to speed this
168 passed on second attempt):
180 at least on retry or were skipped due to missing testing capability.
/hostap-latest/doc/
Dporting.doxygen11 side, wpa_supplicant is used on various systems: desktops, laptops,
17 \section ansi_c_extra Extra functions on top of ANSI C
19 wpa_supplicant is mostly using ANSI C functions that are available on
21 on modern UNIX systems are used. Number of these are listed with
52 a suitable source depending on the target platform. \ref config.c
111 to provide callbacks on events (registered timeout, received packet,
142 function is responsible on initializing wpa_supplicant.
150 good example on how the initialization process should be done.
163 used dynamically to add and remove interfaces based on when
Ddriver_wrapper.doxygen33 to a new operating system. These will be addressed on case by case
51 of driver interface examples before starting on implementing a new
71 them. Depending on the used wlan hardware, some parts of these may be
89 wpa_supplicant can optionally control AP selection based on the
117 are used. Based on this information, it generates a WPA IE. This is
152 AP selection depends on ap_scan configuration:
160 - wpa_supplicant decides which AP to use based on scan results
Deap.doxygen9 implementation is based loosely on RFC 4137. The state machine is
15 EAPOL (IEEE 802.1X), but there is no strict requirement on the lower
39 this structure. This interface is based on section 4.4 of RFC 4137.
75 devices based on an external protocol. For example, in IEEE 802.11
Dmainpage.doxygen34 code is divided into separate C files as shown on the \ref
38 to different target boards and operating systems is available on
72 code is divided into separate C files as shown on the \ref
76 to different target boards and operating systems is available on
Deap_server.doxygen9 implementation is based loosely on RFC 4137. The state machine is
15 EAPOL (IEEE 802.1X), but there is no strict requirement on the lower
39 this structure. This interface is based on section 4.4 of RFC 4137.
/hostap-latest/tests/fuzzing/
DREADME6 tool that focuses on one input handler. Each tool can be compiled either
8 from a file specified on the command line, e.g., for American fuzzy lop
/hostap-latest/src/wps/
Dhttp_server.c235 int on = 1; in http_server_init() local
247 if (setsockopt(srv->fd, SOL_SOCKET, SO_REUSEADDR, &on, sizeof(on)) < 0) in http_server_init()
/hostap-latest/src/utils/
Dhttp_curl.c210 struct http_othername *on; in add_alt_name_othername() local
213 on = os_realloc_array(cert->othername, cert->num_othername + 1, in add_alt_name_othername()
215 if (on == NULL) in add_alt_name_othername()
217 cert->othername = on; in add_alt_name_othername()
218 on = &on[cert->num_othername]; in add_alt_name_othername()
219 os_memset(on, 0, sizeof(*on)); in add_alt_name_othername()
225 on->oid = os_strdup(txt); in add_alt_name_othername()
226 if (on->oid == NULL) in add_alt_name_othername()
230 on->data = val->value.octet_string->data; in add_alt_name_othername()
231 on->len = val->value.octet_string->length; in add_alt_name_othername()

123