/hostap-latest/wpa_supplicant/ |
D | README-NAN-USD | 34 If freq is not included, the default frequency 2437 MHz (channel 6 on 39 channel list automatically based on the list of allowed 2.4 and 5 GHz 45 This command returns the assigned publish_id value or FAIL on failure. 64 If freq is not included, the default frequency 2437 MHz (channel 6 on 70 This command returns the assigned subscribe_id value or FAIL on failure. 121 event on dev0: <3>NAN-DISCOVERY-RESULT subscribe_id=7 publish_id=5 address=02:00:00:00:01:00 fsd=1 … 126 event on dev1: <3>NAN-RECEIVE id=5 peer_instance_id=7 address=02:00:00:00:00:00 ssi= 134 event on dev1: <3>NAN-RECEIVE id=5 peer_instance_id=7 address=02:00:00:00:00:00 ssi=8899 142 event on dev0: <3>NAN-RECEIVE id=7 peer_instance_id=5 address=02:00:00:00:01:00 ssi=aabbccdd
|
D | README-DPP | 108 separating colons. The channel list includes the possible channels on which the 110 GHz channel 1 on 2412 MHz.) 117 AP as an Enrollee is listening on its operating channel. 144 > set dpp_connector <Connector-value-printed-on-console> 145 > set dpp_csign <csign-value-on-console> 146 > set dpp_netaccesskey <netaccess-value-on-console>
|
D | android.config | 20 # used to fix build issues on such systems (krb5.h not found). 51 # Additional directories for cross-compilation on Linux host for mingw target 158 # Smartcard support (i.e., private key on a smartcard), e.g., with openssl 220 # path is given on command line, not here; this option is just used to 226 # file to be updated based on runtime configuration changes). The runtime 306 # LibTomMath can be used. See beginning of libtommath.c for details on benefits 404 # wpa_supplicant depends on strong random number generation being available 409 # important especially on embedded devices that do not have a hardware random 427 # If the os_get_random() is known to provide strong random data (e.g., on 431 # should only be considered for builds that are known to be used on devices [all …]
|
D | ChangeLog | 33 - this is based on additional details being added in the IEEE 802.11 126 * fixed Hotspot 2.0 credential selection based on roaming consortium 140 completely based on REVmd changes 144 on both the station and the selected AP 148 - reject use of unsuitable groups based on new implementation guidance 295 - improve robustness on various exchanges 326 - fix follow-on PD Response behavior 402 * added support for PBSS/PCP and P2P on 60 GHz 471 * fixed BSS selection based on estimated throughput 484 * fixed number of small issues based on hwsim test case failures and [all …]
|
D | defconfig | 20 # used to fix build issues on such systems (krb5.h not found). 63 # Additional directories for cross-compilation on Linux host for mingw target 195 # Smartcard support (i.e., private key on a smartcard), e.g., with openssl 269 # path is given on command line, not here; this option is just used to 275 # file to be updated based on runtime configuration changes). The runtime 356 # LibTomMath can be used. See beginning of libtommath.c for details on benefits 466 # wpa_supplicant depends on strong random number generation being available 471 # important especially on embedded devices that do not have a hardware random 489 # If the os_get_random() is known to provide strong random data (e.g., on 493 # should only be considered for builds that are known to be used on devices [all …]
|
D | README-P2P | 5 wpa_supplicant can be configured and how an external component on the 58 wpa_cli starts in interactive mode if no command string is included on 62 by adding -i argument on the command line (e.g., 'wpa_cli -i wlan1'). 64 Most of the P2P operations are done on the main interface (e.g., the 169 SSID/passphrase configuration based on a previously used persistent 201 based on SSID to avoid selecting an incorrect BSS entry in case the same 271 the GO to be started on a specific frequency. Special freq=2 or freq=5 303 per_sta_psk command below for more details on how the peer can be 502 each request based on pre-configured services), 1 = external 505 that there is quite strict limit on how quickly the response needs to [all …]
|
D | todo.txt | 2 - add support for WPA with ap_scan=0 (update selected cipher etc. based on 5 authentication has been completed (cache scard data based on serial#(?) 21 authentication ("canned" Success); this should be ignored based on 37 * global options (ap_scan, ctrl_interfaces) based on OS/driver
|
/hostap-latest/tests/ |
D | cipher-and-key-mgmt-testing.txt | 9 extensions are focused on the fully automated testing framework with 42 this document focuses on using ping to test unicast traffic and arping 85 ping is used to test whether unicast frames go through on the data 162 Testing replay protection on a station device 165 Start hostapd and use hostapd_cli on the test device to control testing 201 Testing replay protection on an AP device 204 Start the AP (DUT) and start wpa_supplicant on the test device to 228 on the link layer). 231 Testing GTK reinstallation protection on a station device (group handshake) 249 Testing GTK reinstallation protection on a station device (4-way handshake) [all …]
|
D | test-https_server.c | 213 int on = 1; in main() local 231 if (setsockopt(s, SOL_SOCKET, SO_REUSEADDR, &on, sizeof(on)) < 0) { in main()
|
/hostap-latest/hostapd/ |
D | README-MULTI-AP | 34 In a Multi-AP network, the central controller can configure the BSSs on the 93 multi_ap_backhaul_sta=1 in wpa_supplicant on STA, and multi_ap=1 or 3 in 94 hostapd on AP). Note that point 1 means that hostapd must not be configured 95 with WPS support on the backhaul BSS (multi_ap=1). hostapd does not check for 110 WPS requires more special handling. WPS must only be advertised on fronthaul 111 BSSs, not on backhaul BSSs, so WPS should not be enabled on a backhaul-only 112 BSS in hostapd.conf. The WPS configuration purely works on the fronthaul BSS. 120 When these are set on an BSS with WPS, they are used instead of the normal 138 multi_ap=1 option is given in the wps_pbc call on the STA side, and multi_ap=2 141 in hostapd on Registrar AP).
|
D | hostapd.android.rc | 2 # init.rc fragment for hostapd on Android 9 on post-fs-data
|
D | README-WPS | 5 configured and how an external component on an AP (e.g., web UI) is 100 # If UUID is not configured, it will be generated based on local MAC address. 137 PINs on the AP for a set of Enrollee). 166 When the user enters a PIN for a pending Enrollee, e.g., on the web 203 enabled by pushing a button on both the AP and the client at about the 219 AP PIN only based on user action (and even better security by using a 271 configuration updates based on messages received from hostapd over 272 control interface. This will also include the initial configuration on 283 state (random configuration based on the first successful WPS 325 can be used to touch an NFC interface on a station to provision the [all …]
|
D | hostapd.eap_user | 41 # version based on the Phase 1 identity. Without this flag, the EAP 43 # based on the first PEAP packet from the supplicant. 71 # Default to EAP-SIM and EAP-AKA based on fixed identity prefixes 94 # Default to EAP-SIM and EAP-AKA based on fixed identity prefixes in phase 2
|
/hostap-latest/tests/hwsim/vm/ |
D | linux.gdb | 28 # on some place, it writes there a breakpoint instruction (which is 29 # a single 0xCC byte on x86). This breaks out into the debugger and 49 # simply put a breakpoint on init_new_ldt which happens just after 65 echo breakpoint pending on future load.\n\n 66 echo Do NOT, however, delete the breakpoint on 'init_new_ldt'!\n\n
|
/hostap-latest/wpadebug/ |
D | README | 14 not supposed to be installed on a production use device and doing so may 15 result in complete loss of security protections on the device. 24 wpadebug depends on zxing core to launch QR code display/scanning. 47 NOTE: Following steps enable any app on the system to get root access!
|
/hostap-latest/tests/hwsim/ |
D | README | 15 sent on all channels. wlantest is used to store the frames for 57 built. It is also possible to install wlantest_cli somewhere on the path 68 example-setup.txt provides more complete step-by-step example on how a 101 Or on a dedicated test system, you could even disable password prompting 172 verbose debug output) and -q (less verbose output) on the command 179 operation on multi channels in order to run. These tests will be skipped 193 likely to take a look at some of the example scripts. When working on a 194 new test, run-tests.py with -d and the test case name on the command
|
D | example-setup.txt | 14 testing coverage) configuration on a Linux host system, parallel virtual 16 for more details on that. 67 Update iw based on custom iw.git build 144 vm/README for information on how parallel VMs can be used to speed this 168 passed on second attempt): 180 at least on retry or were skipped due to missing testing capability.
|
/hostap-latest/doc/ |
D | porting.doxygen | 11 side, wpa_supplicant is used on various systems: desktops, laptops, 17 \section ansi_c_extra Extra functions on top of ANSI C 19 wpa_supplicant is mostly using ANSI C functions that are available on 21 on modern UNIX systems are used. Number of these are listed with 52 a suitable source depending on the target platform. \ref config.c 111 to provide callbacks on events (registered timeout, received packet, 142 function is responsible on initializing wpa_supplicant. 150 good example on how the initialization process should be done. 163 used dynamically to add and remove interfaces based on when
|
D | driver_wrapper.doxygen | 33 to a new operating system. These will be addressed on case by case 51 of driver interface examples before starting on implementing a new 71 them. Depending on the used wlan hardware, some parts of these may be 89 wpa_supplicant can optionally control AP selection based on the 117 are used. Based on this information, it generates a WPA IE. This is 152 AP selection depends on ap_scan configuration: 160 - wpa_supplicant decides which AP to use based on scan results
|
D | eap.doxygen | 9 implementation is based loosely on RFC 4137. The state machine is 15 EAPOL (IEEE 802.1X), but there is no strict requirement on the lower 39 this structure. This interface is based on section 4.4 of RFC 4137. 75 devices based on an external protocol. For example, in IEEE 802.11
|
D | mainpage.doxygen | 34 code is divided into separate C files as shown on the \ref 38 to different target boards and operating systems is available on 72 code is divided into separate C files as shown on the \ref 76 to different target boards and operating systems is available on
|
D | eap_server.doxygen | 9 implementation is based loosely on RFC 4137. The state machine is 15 EAPOL (IEEE 802.1X), but there is no strict requirement on the lower 39 this structure. This interface is based on section 4.4 of RFC 4137.
|
/hostap-latest/tests/fuzzing/ |
D | README | 6 tool that focuses on one input handler. Each tool can be compiled either 8 from a file specified on the command line, e.g., for American fuzzy lop
|
/hostap-latest/src/wps/ |
D | http_server.c | 235 int on = 1; in http_server_init() local 247 if (setsockopt(srv->fd, SOL_SOCKET, SO_REUSEADDR, &on, sizeof(on)) < 0) in http_server_init()
|
/hostap-latest/src/utils/ |
D | http_curl.c | 210 struct http_othername *on; in add_alt_name_othername() local 213 on = os_realloc_array(cert->othername, cert->num_othername + 1, in add_alt_name_othername() 215 if (on == NULL) in add_alt_name_othername() 217 cert->othername = on; in add_alt_name_othername() 218 on = &on[cert->num_othername]; in add_alt_name_othername() 219 os_memset(on, 0, sizeof(*on)); in add_alt_name_othername() 225 on->oid = os_strdup(txt); in add_alt_name_othername() 226 if (on->oid == NULL) in add_alt_name_othername() 230 on->data = val->value.octet_string->data; in add_alt_name_othername() 231 on->len = val->value.octet_string->length; in add_alt_name_othername()
|