Home
last modified time | relevance | path

Searched refs:protocol (Results 1 – 25 of 31) sorted by relevance

12

/hostap-latest/src/l2_packet/
Dl2_packet_zephyr.c32 unsigned short protocol; member
107 l2_packet_init(const char *ifname, const u8 *own_addr, unsigned short protocol, in l2_packet_init() argument
132 l2->protocol = protocol; in l2_packet_init()
147 htons(protocol)); in l2_packet_init()
151 strerror(errno), htons(protocol), AF_PACKET); in l2_packet_init()
159 ll.sll_protocol = htons(protocol); in l2_packet_init()
203 const u8 *own_addr, unsigned short protocol, in l2_packet_init_bridge() argument
208 return l2_packet_init(br_ifname, own_addr, protocol, rx_callback, in l2_packet_init_bridge()
Dl2_packet_freebsd.c114 unsigned short protocol) in l2_packet_init_libpcap() argument
139 protocol, protocol); in l2_packet_init_libpcap()
239 const char *ifname, const u8 *own_addr, unsigned short protocol, in l2_packet_init() argument
261 if (l2_packet_init_libpcap(l2, protocol)) { in l2_packet_init()
272 unsigned short protocol, in l2_packet_init_bridge() argument
277 return l2_packet_init(br_ifname, own_addr, protocol, rx_callback, in l2_packet_init_bridge()
Dl2_packet_ndis.c331 static int l2_ndisuio_set_ether_type(unsigned short protocol) in l2_ndisuio_set_ether_type() argument
333 USHORT proto = htons(protocol); in l2_ndisuio_set_ether_type()
350 const char *ifname, const u8 *own_addr, unsigned short protocol, in l2_packet_init() argument
361 l2_ndisuio_global->first_proto = protocol; in l2_packet_init()
383 if (l2_ndisuio_set_ether_type(protocol) < 0) { in l2_packet_init()
390 "filtering ethertype to %04x", protocol); in l2_packet_init()
456 unsigned short protocol, in l2_packet_init_bridge() argument
461 return l2_packet_init(br_ifname, own_addr, protocol, rx_callback, in l2_packet_init_bridge()
Dl2_packet_winpcap.c162 unsigned short protocol) in l2_packet_init_libpcap() argument
181 protocol); in l2_packet_init_libpcap()
199 const char *ifname, const u8 *own_addr, unsigned short protocol, in l2_packet_init() argument
222 if (l2_packet_init_libpcap(l2, protocol)) { in l2_packet_init()
256 unsigned short protocol, in l2_packet_init_bridge() argument
261 return l2_packet_init(br_ifname, own_addr, protocol, rx_callback, in l2_packet_init_bridge()
Dl2_packet_pcap.c198 unsigned short protocol) in l2_packet_init_libpcap() argument
238 protocol); in l2_packet_init_libpcap()
280 const char *ifname, const u8 *own_addr, unsigned short protocol, in l2_packet_init() argument
303 if (l2_packet_init_libpcap(l2, protocol)) { in l2_packet_init()
317 unsigned short protocol, in l2_packet_init_bridge() argument
322 return l2_packet_init(br_ifname, own_addr, protocol, rx_callback, in l2_packet_init_bridge()
Dl2_packet_none.c68 const char *ifname, const u8 *own_addr, unsigned short protocol, in l2_packet_init() argument
96 unsigned short protocol, in l2_packet_init_bridge() argument
101 return l2_packet_init(br_ifname, own_addr, protocol, rx_callback, in l2_packet_init_bridge()
Dl2_packet_linux.c272 const char *ifname, const u8 *own_addr, unsigned short protocol, in l2_packet_init() argument
293 htons(protocol)); in l2_packet_init()
314 ll.sll_protocol = htons(protocol); in l2_packet_init()
342 unsigned short protocol, in l2_packet_init_bridge() argument
353 BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, protocol, 0, 1), in l2_packet_init_bridge()
366 l2 = l2_packet_init(br_ifname, own_addr, protocol, rx_callback, in l2_packet_init_bridge()
Dl2_packet_privsep.c129 const char *ifname, const u8 *own_addr, unsigned short protocol, in l2_packet_init() argument
183 reg_cmd[0] = protocol; in l2_packet_init()
237 unsigned short protocol, in l2_packet_init_bridge() argument
242 return l2_packet_init(br_ifname, own_addr, protocol, rx_callback, in l2_packet_init_bridge()
Dl2_packet.h70 const char *ifname, const u8 *own_addr, unsigned short protocol,
83 unsigned short protocol,
/hostap-latest/eap_example/
DREADME14 which maps the EAPOL<->EAP variables to another protocol.
31 devices based on an external protocol. For example, in IEEE 802.11
/hostap-latest/src/utils/
Dpcsc_funcs.c118 uint32_t protocol; member
120 DWORD protocol; member
608 &scard->card, &scard->protocol); in scard_init()
621 (unsigned int) scard->card, (unsigned long) scard->protocol, in scard_init()
622 scard->protocol == SCARD_PROTOCOL_T0 ? "T0" : "T1"); in scard_init()
790 scard->protocol == SCARD_PROTOCOL_T1 ? in scard_transmit()
/hostap-latest/tests/
Dcipher-and-key-mgmt-testing.txt11 for over-the-air testing of the protocol as well.
225 IEEE 802.11 protocol uses unicast frames in station-to-AP direction, so
358 tool to the AP using FT protocol (e.g., connect to another AP first and
/hostap-latest/hostapd/
DREADME-MULTI-AP19 summarized below. The rest of the protocol must be implemented by a separate
47 side of the backhaul link is configured through the Multi-AP protocol as the
DChangeLog30 * fix beacon protection with FT protocol (incorrect BIGTK was provided)
141 * added Multi-AP protocol support
157 in preparation for DPP protocol extension
173 - replaced inter-AP protocol with a cleaner design that is more
236 * fixed EAPOL reauthentication after FT protocol run
237 * fixed FTIE generation for 4-way handshake after FT protocol run
446 - added option for TLS protocol testing of an EAP peer by simulating
471 * fixed GTK rekeying when the station uses FT protocol
507 - improved protocol
685 for testing protocol extensibility.
[all …]
DREADME-WPS303 going through the WPS protocol.
337 token was received to run through WPS protocol to provision the
Ddefconfig413 # Experimental implementation based on IEEE P802.11z/D2.6 and the protocol
/hostap-latest/wpa_supplicant/
Drobust_av.c67 wpabuf_put_u8(buf, type4_param->ip_params.v4.protocol); in wpas_populate_type4_classifier()
1006 res = os_snprintf(pos, rem_len, " protocol=%d", v4->protocol); in write_ipv4_info()
1165 type4_param->ip_params.v4.protocol = frame_classifier[16]; in set_frame_classifier_type4_ipv4()
DREADME-WPS318 going through the WPS protocol.
323 "wps_nfc [BSSID]" command starts WPS protocol run with the local end as
DREADME-HS20300 # This value is used to configure set of required protocol/port pairs that
305 # Format: <protocol>[:<comma-separated list of ports]
DChangeLog272 using FT protocol
350 * fixed EAPOL reauthentication after FT protocol run
351 * fixed FTIE generation for 4-way handshake after FT protocol run
845 - improved protocol for WPS
923 - allow T1 protocol to be enabled
1214 for testing protocol extensibility.
1230 * wlantest: Add a tool wlantest for IEEE802.11 protocol testing.
1281 * nl80211: add support for IEEE 802.11r/FT protocol (both over-the-air
1346 nl80211; SME in wpa_supplicant); this allows over-the-air FT protocol
DREADME-P2P399 Query Data (Length - 2 octets of data) - service protocol specific data
647 protocol failures.
/hostap-latest/doc/
Deap.doxygen75 devices based on an external protocol. For example, in IEEE 802.11
Dp2p.doxygen75 dotted ellipse are listed for clarity to describe the protocol
274 P2P protocol includes service discovery functionality that can be used
276 group. This leverages the Generic Advertisement Service (GAS) protocol
Dcode_structure.doxygen179 TLSv1 record protocol
Dporting.doxygen87 driver. This is usually an intermediate or protocol driver that is

12