/hostap-latest/src/l2_packet/ |
D | l2_packet_zephyr.c | 32 unsigned short protocol; member 107 l2_packet_init(const char *ifname, const u8 *own_addr, unsigned short protocol, in l2_packet_init() argument 132 l2->protocol = protocol; in l2_packet_init() 147 htons(protocol)); in l2_packet_init() 151 strerror(errno), htons(protocol), AF_PACKET); in l2_packet_init() 159 ll.sll_protocol = htons(protocol); in l2_packet_init() 203 const u8 *own_addr, unsigned short protocol, in l2_packet_init_bridge() argument 208 return l2_packet_init(br_ifname, own_addr, protocol, rx_callback, in l2_packet_init_bridge()
|
D | l2_packet_freebsd.c | 114 unsigned short protocol) in l2_packet_init_libpcap() argument 139 protocol, protocol); in l2_packet_init_libpcap() 239 const char *ifname, const u8 *own_addr, unsigned short protocol, in l2_packet_init() argument 261 if (l2_packet_init_libpcap(l2, protocol)) { in l2_packet_init() 272 unsigned short protocol, in l2_packet_init_bridge() argument 277 return l2_packet_init(br_ifname, own_addr, protocol, rx_callback, in l2_packet_init_bridge()
|
D | l2_packet_ndis.c | 331 static int l2_ndisuio_set_ether_type(unsigned short protocol) in l2_ndisuio_set_ether_type() argument 333 USHORT proto = htons(protocol); in l2_ndisuio_set_ether_type() 350 const char *ifname, const u8 *own_addr, unsigned short protocol, in l2_packet_init() argument 361 l2_ndisuio_global->first_proto = protocol; in l2_packet_init() 383 if (l2_ndisuio_set_ether_type(protocol) < 0) { in l2_packet_init() 390 "filtering ethertype to %04x", protocol); in l2_packet_init() 456 unsigned short protocol, in l2_packet_init_bridge() argument 461 return l2_packet_init(br_ifname, own_addr, protocol, rx_callback, in l2_packet_init_bridge()
|
D | l2_packet_winpcap.c | 162 unsigned short protocol) in l2_packet_init_libpcap() argument 181 protocol); in l2_packet_init_libpcap() 199 const char *ifname, const u8 *own_addr, unsigned short protocol, in l2_packet_init() argument 222 if (l2_packet_init_libpcap(l2, protocol)) { in l2_packet_init() 256 unsigned short protocol, in l2_packet_init_bridge() argument 261 return l2_packet_init(br_ifname, own_addr, protocol, rx_callback, in l2_packet_init_bridge()
|
D | l2_packet_pcap.c | 198 unsigned short protocol) in l2_packet_init_libpcap() argument 238 protocol); in l2_packet_init_libpcap() 280 const char *ifname, const u8 *own_addr, unsigned short protocol, in l2_packet_init() argument 303 if (l2_packet_init_libpcap(l2, protocol)) { in l2_packet_init() 317 unsigned short protocol, in l2_packet_init_bridge() argument 322 return l2_packet_init(br_ifname, own_addr, protocol, rx_callback, in l2_packet_init_bridge()
|
D | l2_packet_none.c | 68 const char *ifname, const u8 *own_addr, unsigned short protocol, in l2_packet_init() argument 96 unsigned short protocol, in l2_packet_init_bridge() argument 101 return l2_packet_init(br_ifname, own_addr, protocol, rx_callback, in l2_packet_init_bridge()
|
D | l2_packet_linux.c | 272 const char *ifname, const u8 *own_addr, unsigned short protocol, in l2_packet_init() argument 293 htons(protocol)); in l2_packet_init() 314 ll.sll_protocol = htons(protocol); in l2_packet_init() 342 unsigned short protocol, in l2_packet_init_bridge() argument 353 BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, protocol, 0, 1), in l2_packet_init_bridge() 366 l2 = l2_packet_init(br_ifname, own_addr, protocol, rx_callback, in l2_packet_init_bridge()
|
D | l2_packet_privsep.c | 129 const char *ifname, const u8 *own_addr, unsigned short protocol, in l2_packet_init() argument 183 reg_cmd[0] = protocol; in l2_packet_init() 237 unsigned short protocol, in l2_packet_init_bridge() argument 242 return l2_packet_init(br_ifname, own_addr, protocol, rx_callback, in l2_packet_init_bridge()
|
D | l2_packet.h | 70 const char *ifname, const u8 *own_addr, unsigned short protocol, 83 unsigned short protocol,
|
/hostap-latest/eap_example/ |
D | README | 14 which maps the EAPOL<->EAP variables to another protocol. 31 devices based on an external protocol. For example, in IEEE 802.11
|
/hostap-latest/src/utils/ |
D | pcsc_funcs.c | 118 uint32_t protocol; member 120 DWORD protocol; member 608 &scard->card, &scard->protocol); in scard_init() 621 (unsigned int) scard->card, (unsigned long) scard->protocol, in scard_init() 622 scard->protocol == SCARD_PROTOCOL_T0 ? "T0" : "T1"); in scard_init() 790 scard->protocol == SCARD_PROTOCOL_T1 ? in scard_transmit()
|
/hostap-latest/tests/ |
D | cipher-and-key-mgmt-testing.txt | 11 for over-the-air testing of the protocol as well. 225 IEEE 802.11 protocol uses unicast frames in station-to-AP direction, so 358 tool to the AP using FT protocol (e.g., connect to another AP first and
|
/hostap-latest/hostapd/ |
D | README-MULTI-AP | 19 summarized below. The rest of the protocol must be implemented by a separate 47 side of the backhaul link is configured through the Multi-AP protocol as the
|
D | ChangeLog | 30 * fix beacon protection with FT protocol (incorrect BIGTK was provided) 141 * added Multi-AP protocol support 157 in preparation for DPP protocol extension 173 - replaced inter-AP protocol with a cleaner design that is more 236 * fixed EAPOL reauthentication after FT protocol run 237 * fixed FTIE generation for 4-way handshake after FT protocol run 446 - added option for TLS protocol testing of an EAP peer by simulating 471 * fixed GTK rekeying when the station uses FT protocol 507 - improved protocol 685 for testing protocol extensibility. [all …]
|
D | README-WPS | 303 going through the WPS protocol. 337 token was received to run through WPS protocol to provision the
|
D | defconfig | 413 # Experimental implementation based on IEEE P802.11z/D2.6 and the protocol
|
/hostap-latest/wpa_supplicant/ |
D | robust_av.c | 67 wpabuf_put_u8(buf, type4_param->ip_params.v4.protocol); in wpas_populate_type4_classifier() 1006 res = os_snprintf(pos, rem_len, " protocol=%d", v4->protocol); in write_ipv4_info() 1165 type4_param->ip_params.v4.protocol = frame_classifier[16]; in set_frame_classifier_type4_ipv4()
|
D | README-WPS | 318 going through the WPS protocol. 323 "wps_nfc [BSSID]" command starts WPS protocol run with the local end as
|
D | README-HS20 | 300 # This value is used to configure set of required protocol/port pairs that 305 # Format: <protocol>[:<comma-separated list of ports]
|
D | ChangeLog | 272 using FT protocol 350 * fixed EAPOL reauthentication after FT protocol run 351 * fixed FTIE generation for 4-way handshake after FT protocol run 845 - improved protocol for WPS 923 - allow T1 protocol to be enabled 1214 for testing protocol extensibility. 1230 * wlantest: Add a tool wlantest for IEEE802.11 protocol testing. 1281 * nl80211: add support for IEEE 802.11r/FT protocol (both over-the-air 1346 nl80211; SME in wpa_supplicant); this allows over-the-air FT protocol
|
D | README-P2P | 399 Query Data (Length - 2 octets of data) - service protocol specific data 647 protocol failures.
|
/hostap-latest/doc/ |
D | eap.doxygen | 75 devices based on an external protocol. For example, in IEEE 802.11
|
D | p2p.doxygen | 75 dotted ellipse are listed for clarity to describe the protocol 274 P2P protocol includes service discovery functionality that can be used 276 group. This leverages the Generic Advertisement Service (GAS) protocol
|
D | code_structure.doxygen | 179 TLSv1 record protocol
|
D | porting.doxygen | 87 driver. This is usually an intermediate or protocol driver that is
|