/hostap-latest/hostapd/ |
D | ctrl_iface_zephyr.c | 49 send(sock, "FAIL\n", 5, 0); in hostapd_ctrl_iface_receive() 56 send(sock, reply, reply_len, 0); in hostapd_ctrl_iface_receive() 58 send(sock, "OK\n", 3, 0); in hostapd_ctrl_iface_receive() 60 send(sock, "FAIL\n", 5, 0); in hostapd_ctrl_iface_receive()
|
D | hlr_auc_gw.txt | 6 authentication center (HLR/AuC). hostapd will send SIM/AKA
|
D | hostapd_cli_zephyr.c | 370 if (send(hapd_mon_sockpair[1], &msg, len + 4, 0) < 0) { in hostapd_msg_send()
|
/hostap-latest/wpa_supplicant/ |
D | ctrl_iface_zephyr.c | 81 if (send(dst->sock, &msg, len + 4, 0) < 0) { in wpa_supplicant_ctrl_iface_send() 180 send(sock, reply, reply_len, 0); in wpa_supplicant_ctrl_iface_receive() 182 send(sock, "FAIL\n", 5, 0); in wpa_supplicant_ctrl_iface_receive() 184 send(sock, "OK\n", 3, 0); in wpa_supplicant_ctrl_iface_receive() 312 send(sock, reply, reply_len, 0); in wpa_supplicant_global_ctrl_iface_receive() 314 send(sock, "FAIL\n", 5, 0); in wpa_supplicant_global_ctrl_iface_receive() 316 send(sock, "OK\n", 3, 0); in wpa_supplicant_global_ctrl_iface_receive()
|
D | eapol_test.c | 870 if (keys && !keys->send && !keys->recv) { in ieee802_1x_get_keys() 877 if (keys->send) { in ieee802_1x_get_keys() 879 keys->send, keys->send_len); in ieee802_1x_get_keys() 889 if (e->authenticator_pmk_len == 16 && keys->send && in ieee802_1x_get_keys() 896 keys->send, keys->send_len); in ieee802_1x_get_keys() 901 os_free(keys->send); in ieee802_1x_get_keys()
|
/hostap-latest/tests/hwsim/ |
D | netlink.py | 122 def send(self, conn): member in Message 131 conn.send(hdr + self.payload) 143 self.send(conn) 159 def send(self, msg): member in Connection 160 self.descriptor.send(msg) 231 m.send(self.conn)
|
D | test_pmksa_cache.py | 1210 sock.send(t) 1230 sock.send(_bssid + foreign + proto + struct.pack('>BBH', 2, 1, 0)) 1234 sock.send(_bssid + foreign + proto + struct.pack('>BBH', 2, 1, 0)) 1236 sock.send(_bssid + foreign + proto + struct.pack('>BBH', 2, 1, 0)) 1239 sock.send(_bssid + foreign2 + proto + struct.pack('>BBH', 2, 1, 0)) 1241 sock.send(_bssid + foreign2 + proto + struct.pack('>BBH', 2, 1, 0)) 1260 sock.send(_bssid + foreign + proto + struct.pack('>BBH', 2, 1, 0)) 1261 sock.send(_bssid + foreign2 + proto + struct.pack('>BBH', 2, 1, 0))
|
D | test_monitor_interface.py | 87 sock.send(radiotap + frame)
|
D | test_ap_pmf.py | 1074 sock.send(radiotap + frame) 1119 sock.send(radiotap + frame) 1179 sock.send(radiotap + frame) 1222 sock.send(radiotap + frame) 1605 sock.send(radiotap + frame) 1613 sock.send(radiotap + frame2)
|
D | test_wpas_ctrl.py | 1907 s.send(b"MIB") 1926 s2.send(b"MIB") 1939 s2.send(b"MIB") 1958 s.send(b"ATTACH")
|
/hostap-latest/wlantest/ |
D | wired.c | 130 if (keys && keys->send && keys->recv) { in process_radius_access_accept() 135 keys->send, keys->send_len); in process_radius_access_accept() 146 os_memcpy(pmk + pmk_len, keys->send, len2); in process_radius_access_accept() 154 os_free(keys->send); in process_radius_access_accept()
|
/hostap-latest/tests/ |
D | test-https.c | 113 if (send(s, wpabuf_head(out), wpabuf_len(out), 0) < 0) { in https_client() 146 if (send(s, wpabuf_head(out), wpabuf_len(out), 0) < 0) { in https_client()
|
D | test-https_server.c | 128 if (send(s, wpabuf_head(out), wpabuf_len(out), 0) < 0) { in https_server() 189 if (send(s, wpabuf_head(out), wpabuf_len(out), 0) < 0) { in https_server()
|
/hostap-latest/radius_example/ |
D | README | 10 program. The example program initializes the RADIUS client and send a
|
/hostap-latest/wpaspy/ |
D | wpaspy.py | 93 self.s.send(cmd)
|
/hostap-latest/src/drivers/ |
D | netlink.c | 220 ret = send(netlink->sock, &req, req.hdr.nlmsg_len, 0); in netlink_send_oper_ifla()
|
D | driver_wired.c | 313 res = send(drv->common.sock, (u8 *) hdr, len, 0); in wired_send_eapol()
|
/hostap-latest/src/l2_packet/ |
D | l2_packet_zephyr.c | 51 ret = send(l2->fd, buf, len, 0); in l2_packet_send()
|
/hostap-latest/ |
D | CONTRIBUTIONS | 44 patch file than just send a whitespace damaged version in the message 57 format-patch. The patch can then be sent, e.g., with git send-email.
|
/hostap-latest/src/wps/ |
D | http_server.c | 141 res = send(req->fd, wpabuf_head(resp), wpabuf_len(resp), 0); in http_request_send()
|
D | http_client.c | 97 res = send(c->sd, wpabuf_head_u8(c->req) + c->req_pos, send_len, 0); in http_client_tx_ready()
|
/hostap-latest/doc/ |
D | hostapd_ctrl_iface.doxygen | 25 interface with \ref wpa_ctrl_open() and to send commands with
|
/hostap-latest/src/radius/ |
D | radius_client.c | 524 if (send(s, wpabuf_head(buf), wpabuf_len(buf), 0) < 0) { in radius_client_retransmit() 941 res = send(s, wpabuf_head(buf), wpabuf_len(buf), 0); in radius_client_send() 1025 res = send(sock, wpabuf_head(out), wpabuf_len(out), 0); in radius_client_process_tls_handshake() 1391 res = send(sock, wpabuf_head(out), wpabuf_len(out), 0); in radius_client_write_ready()
|
D | radius.h | 241 u8 *send; member
|
/hostap-latest/src/ap/ |
D | ieee802_1x.c | 1593 if (keys && keys->send && keys->recv) { in ieee802_1x_get_keys() 1596 keys->send, keys->send_len); in ieee802_1x_get_keys() 1606 keys->send, keys->send_len); in ieee802_1x_get_keys() 1613 keys, keys ? keys->send : NULL, in ieee802_1x_get_keys() 1618 os_free(keys->send); in ieee802_1x_get_keys()
|