/hostap-latest/tests/hwsim/ |
D | hostapd.py | 30 port = apdev['port'] 33 port = 8878 36 self.port = port 45 self.ctrl = wpaspy.Ctrl(hostname, port) 46 self.mon = wpaspy.Ctrl(hostname, port) 47 self.dbg = hostname + "/" + str(port) 150 port=8877): argument 159 self.ctrl = wpaspy.Ctrl(hostname, port) 160 self.mon = wpaspy.Ctrl(hostname, port) 640 port = apdev['port'] [all …]
|
D | test_macsec.py | 127 def set_mka_psk_config(dev, mka_priority=None, integ_only=False, port=None, argument 147 if port is not None: 148 dev.set_network(id, "macsec_port", str(port)) 154 def set_mka_eap_config(dev, mka_priority=None, integ_only=False, port=None, argument 168 if port is not None: 169 dev.set_network(id, "macsec_port", str(port)) 303 set_mka_psk_config(wpas0, integ_only=integ_only, port=port0, ckn=ckn0, 306 port=port1, ckn=ckn1, cak=cak1, csindex=csindex) 768 set_mka_psk_config(wpas0, integ_only=integ_only, port=port0, ckn=ckn0, 861 set_mka_eap_config(wpas0, integ_only=integ_only, port=port0,
|
D | remotehost.py | 52 def __init__(self, host=None, ifname=None, port=None, name="", user="root"): argument 60 self.port = port
|
D | wpasupplicant.py | 22 port=9877, global_port=9878, monitor=True): argument 35 self.set_ifname(ifname, hostname, port) 163 def set_ifname(self, ifname, hostname=None, port=9877): argument 167 self.ctrl = wpaspy.Ctrl(hostname, port) 169 self.mon = wpaspy.Ctrl(hostname, port) 236 port = self.get_ctrl_iface_port(ifname) 237 self.set_ifname(ifname, self.hostname, port) 277 port = self.get_ctrl_iface_port(self.group_ifname) 278 gctrl = wpaspy.Ctrl(self.hostname, port) 716 port = self.get_ctrl_iface_port(self.group_ifname) [all …]
|
/hostap-latest/src/wps/ |
D | http_server.c | 34 int port; member 228 struct http_server * http_server_init(struct in_addr *addr, int port, in http_server_init() argument 257 if (port < 0) in http_server_init() 258 srv->port = 49152; in http_server_init() 260 srv->port = port; in http_server_init() 267 sin.sin_port = htons(srv->port); in http_server_init() 272 if (++srv->port == 65535 || port >= 0) in http_server_init() 277 "%s", srv->port, strerror(errno)); in http_server_init() 287 inet_ntoa(*addr), srv->port); in http_server_init() 313 return srv->port; in http_server_get_port()
|
D | http_client.c | 190 char *u, *addr, *port, *path; in http_client_url_parse() local 200 port = os_strchr(addr, ':'); in http_client_url_parse() 205 if (port > path) in http_client_url_parse() 206 port = NULL; in http_client_url_parse() 208 if (port) in http_client_url_parse() 209 *port++ = '\0'; in http_client_url_parse() 215 url, addr, port); in http_client_url_parse() 220 if (port) in http_client_url_parse() 221 dst->sin_port = htons(atoi(port)); in http_client_url_parse()
|
D | http_server.h | 26 struct http_server * http_server_init(struct in_addr *addr, int port,
|
/hostap-latest/wpaspy/ |
D | test.py | 16 def wpas_connect(host=None, port=9877): argument 21 wpas = wpaspy.Ctrl(host, port) 47 def main(host=None, port=9877): argument 49 wpas = wpas_connect(host, port) 55 mon = wpas_connect(host, port) 80 main(host=sys.argv[1], port=int(sys.argv[2]))
|
D | wpaspy.py | 17 def __init__(self, path, port=9877): argument 22 self.port = port 48 ai_list = socket.getaddrinfo(path, port, socket.AF_INET, 58 self.port = port 60 print("connect exception ", path, str(port))
|
/hostap-latest/wpa_supplicant/ |
D | ctrl_iface_udp.c | 398 int port = WPA_CTRL_IFACE_PORT; local 421 port = atoi(pos); 422 if (port <= 0) { 453 addr.sin6_port = htons(port); 455 addr.sin_port = htons(port); 458 port--; 459 if ((WPA_CTRL_IFACE_PORT - port) < WPA_CTRL_IFACE_PORT_LIMIT) 466 os_snprintf(port_str, sizeof(port_str), "udp:%d", port); 475 wpa_msg(wpa_s, MSG_DEBUG, "ctrl_iface_init UDP port: %d", port); 752 int port = WPA_GLOBAL_CTRL_IFACE_PORT; local [all …]
|
/hostap-latest/tests/remote/ |
D | rutils.py | 24 port=dev['port'], 121 …status, buf = host.execute([setup_params['hostapd'], "-B", "-ddt", "-g", "udp:" + host.port, "-P",… 139 …xecute([setup_params['wpa_supplicant'], "-B", "-ddt", "-g", "udp:" + host.port, "-P", pidfile, log… 464 port="5001", iperf="iperf"): argument 474 iperf_client = [iperf, "-c", server_ip, "-p", port] 475 iperf_server = iperf_server + ["-p", port] 477 iperf_client = [iperf, "-V", "-c", server_ip + "%" + ifname, "-p", port] 478 iperf_server = iperf_server + ["-V", "-p", port] 522 qos="be", bw="30M", ifname=None, port="5001"): argument 531 port=port)
|
/hostap-latest/src/drivers/ |
D | driver_macsec_linux.c | 860 #define SCI2STR(addr, port) MAC2STR(addr), htons(port) argument 884 drv->ifname, SCI2STR(sc->sci.addr, sc->sci.port), in macsec_drv_create_receive_sc() 921 drv->ifname, SCI2STR(sc->sci.addr, sc->sci.port)); in macsec_drv_delete_receive_sc() 961 SCI2STR(sa->sc->sci.addr, sa->sc->sci.port), in macsec_drv_create_receive_sa() 1018 SCI2STR(sa->sc->sci.addr, sa->sc->sci.port)); in macsec_drv_delete_receive_sa() 1096 SCI2STR(sa->sc->sci.addr, sa->sc->sci.port)); in macsec_drv_enable_receive_sa() 1116 SCI2STR(sa->sc->sci.addr, sa->sc->sci.port)); in macsec_drv_disable_receive_sa() 1165 drv->common.ifname, SCI2STR(sc->sci.addr, sc->sci.port), in macsec_drv_create_transmit_sc() 1247 drv->ifname, SCI2STR(sc->sci.addr, sc->sci.port)); in macsec_drv_delete_transmit_sc() 1287 SCI2STR(sa->sc->sci.addr, sa->sc->sci.port), in macsec_drv_create_transmit_sa() [all …]
|
/hostap-latest/src/common/ |
D | wpa_ctrl.c | 374 char *port, *name; in wpa_ctrl_open() local 388 port = os_strchr(name, ','); in wpa_ctrl_open() 390 port = os_strchr(name, ':'); in wpa_ctrl_open() 393 if (port) { in wpa_ctrl_open() 394 port_id = atoi(&port[1]); in wpa_ctrl_open() 395 port[0] = '\0'; in wpa_ctrl_open()
|
D | dpp_tcp.c | 403 int port) in dpp_ipaddr_to_sockaddr() argument 416 dst->sin_port = htons(port); in dpp_ipaddr_to_sockaddr() 426 dst6->sin6_port = htons(port); in dpp_ipaddr_to_sockaddr() 1915 const struct hostapd_ip_addr *addr, int port, in dpp_tcp_pkex_init() argument 1927 hostapd_ip_txt(addr, txt, sizeof(txt)), port); in dpp_tcp_pkex_init() 1929 addr, port) < 0) { in dpp_tcp_pkex_init() 2010 const struct hostapd_ip_addr *addr, int port, const char *name, in dpp_tcp_init() argument 2026 hostapd_ip_txt(addr, txt, sizeof(txt)), port); in dpp_tcp_init() 2028 addr, port) < 0) { in dpp_tcp_init() 2136 int port; in dpp_controller_start() local [all …]
|
D | dpp.h | 172 unsigned int port; member 754 int dpp_relay_listen(struct dpp_global *dpp, int port, 775 const struct hostapd_ip_addr *addr, int port, 780 const struct hostapd_ip_addr *addr, int port,
|
/hostap-latest/tests/ |
D | test-https_server.c | 212 int port, s, conn; in main() local 223 port = atoi(argv[1]); in main() 240 sin.sin_port = htons(port); in main()
|
/hostap-latest/src/radius/ |
D | radius_das.c | 522 static int radius_das_open_socket(int port) in radius_das_open_socket() argument 535 addr.sin_port = htons(port); in radius_das_open_socket() 551 if (conf->port == 0 || conf->shared_secret == NULL || in radius_das_init() 578 das->sock = radius_das_open_socket(conf->port); in radius_das_init()
|
D | radius_das.h | 45 int port; member
|
D | radius_client.h | 36 int port; member
|
/hostap-latest/hostapd/ |
D | README | 101 IEEE Std 802.1X-2001 is a standard for port-based network access 102 control. In case of IEEE 802.11 networks, a "virtual port" is used 114 controlling the virtual port authorization, i.e., whether to accept 130 or coming from an unauthorized port. PAE allows IEEE 802.1X related 132 on an unauthorized port. 145 controlling virtual port authorization, i.e., station-AP 152 configured to be used, the virtual port for the station is set in 156 the virtual port is set to Authorized state and frames from and to the 180 auth_server_{addr,port,shared_secret} options. In addition,
|
/hostap-latest/doc/ |
D | testing_tools.doxygen | 50 eapol_test [-nWS] -c<conf> [-a<AS IP>] [-p<AS port>] [-s<AS secret>] \ 59 -p<AS port> = UDP port of the authentication server, default 1812 119 be useful especially when verifying port to a new CPU target.
|
/hostap-latest/hs20/server/ca/ |
D | ocsp-responder.sh | 3 openssl ocsp -index demoCA/index.txt -port 8888 -nmin 5 -rsigner ocsp.pem -rkey ocsp.key -CA demoCA…
|
D | ocsp-responder-ica.sh | 3 openssl ocsp -index demoCA/index.txt -port 8888 -nmin 5 -rsigner demoCA/cacert.pem -rkey demoCA/pri…
|
/hostap-latest/wpa_supplicant/doc/docbook/ |
D | eapol_test.sgml | 25 <arg>-p<replaceable>UDP port</replaceable></arg> 108 <term>-p AS port</term> 110 <listitem><para>UDP port of the authentication server. The
|
/hostap-latest/src/pae/ |
D | ieee802_1x_kay.h | 41 be16 port; member 245 u8 macsec_offload, u16 port, u8 priority,
|