| /hostap-latest/tests/hwsim/ |
| D | test_multi_ap.py | 138 params.update({"wps_state": "2", "eap_server": "1"}) 252 params.update({"multi_ap": "3", 270 params.update({"multi_ap": "3", 280 params.update({"multi_ap": "3", 294 params.update({"wpa_psk": psk, 306 params.update({"multi_ap": "2", 311 params_backhaul.update({"multi_ap": "1"}) 321 params.update({"multi_ap": "2", 325 params_backhaul.update({"multi_ap": "1", "wpa_psk": backhaul_psk}) 336 params.update({"multi_ap": "2", [all …]
|
| D | test_radius.py | 816 hmac_obj.update(struct.pack("B", req.code)) 817 hmac_obj.update(struct.pack("B", req.id)) 828 hmac_obj.update(struct.pack(">H", flen)) 829 hmac_obj.update(16*b"\x00") # all zeros Authenticator in calculation 830 hmac_obj.update(attrs) 1102 hmac_obj.update(struct.pack("B", reply.code)) 1103 hmac_obj.update(struct.pack("B", reply.id)) 1111 hmac_obj.update(struct.pack(">H", flen)) 1112 hmac_obj.update(pkt.authenticator) 1113 hmac_obj.update(attrs) [all …]
|
| D | example-setup.txt | 90 optionally be used to update wireless-regdb to a newer snapshot to 164 - VHT 80 and 160 MHz channels (requires wireless-regdb update)
|
| D | test_ap_csa.py | 19 params.update(kwargs)
|
| D | test_ocv.py | 35 params.update(hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)) 373 params.update(hostapd.wpa2_params(ssid=self.ssid, 732 params.update(hostapd.wpa2_params(ssid=self.ssid,
|
| D | test_dscp.py | 117 p.update(params)
|
| D | test_ieee8021x.py | 269 hmac_obj.update(binascii.unhexlify(frame))
|
| /hostap-latest/wlantest/ |
| D | bss.c | 152 int update = 0; in bss_update() local 155 update = 1; in bss_update() 182 update = 1; in bss_update() 192 update = 1; in bss_update() 207 update = 1; in bss_update() 217 update = 1; in bss_update() 228 update = 1; in bss_update() 238 update = 1; in bss_update() 272 if (!update) in bss_update()
|
| /hostap-latest/hs20/client/ |
| D | spp_client.c | 148 xml_node_t *update) in process_update_node() argument 158 debug_dump_node(ctx, "updateNode", update); in process_update_node() 160 uri = get_spp_attr_value(ctx->xml, update, "managementTreeURI"); in process_update_node() 176 str = xml_node_get_text(ctx->xml, update); in process_update_node() 293 static int update_pps(struct hs20_osu_client *ctx, xml_node_t *update, in update_pps() argument 297 xml_node_for_each_sibling(ctx->xml, update) { in update_pps() 298 xml_node_for_each_check(ctx->xml, update); in update_pps() 299 if (process_update_node(ctx, pps, update) < 0) in update_pps() 604 xml_node_t *update = NULL, *exec = NULL, *add_mo = NULL, *no_mo = NULL; in process_spp_post_dev_data_response() local 632 if (!update && strcasecmp(name, "updateNode") == 0) in process_spp_post_dev_data_response() [all …]
|
| /hostap-latest/src/tls/ |
| D | tlsv1_client_ocsp.c | 126 os_time_t update; in tls_process_ocsp_single_response() local 256 x509_parse_time(hdr.payload, hdr.length, hdr.tag, &update) < 0) { in tls_process_ocsp_single_response() 260 wpa_printf(MSG_DEBUG, "OCSP: thisUpdate %lu", (unsigned long) update); in tls_process_ocsp_single_response() 262 if ((unsigned long) now.sec < (unsigned long) update) { in tls_process_ocsp_single_response() 278 &update) < 0) { in tls_process_ocsp_single_response() 284 (unsigned long) update); in tls_process_ocsp_single_response() 286 if ((unsigned long) now.sec > (unsigned long) update) { in tls_process_ocsp_single_response()
|
| /hostap-latest/wpa_supplicant/examples/p2p/ |
| D | p2p_connect.py | 158 self.p2p_connect_arguements.update({'pin':self.pin}) 172 self.p2p_connect_arguements.update({'pin':self.pin}) 203 self.p2p_connect_arguements.update(
|
| D | p2p_group_add.py | 128 self.P2PDictionary.update({'frequency':int(self.frequency)}) 135 self.P2PDictionary.update({'persistent_group_object':
|
| D | p2p_invite.py | 121 self.P2PDictionary.update({"persistent_group_object":
|
| /hostap-latest/wpadebug/ |
| D | README | 36 - update project target if desired; for example: 38 android update project --target 1 --path $PWD
|
| /hostap-latest/tests/hwsim/vm/ |
| D | example-vm-setup.txt | 19 - update the installed packages: 20 sudo apt update
|
| /hostap-latest/hs20/server/ |
| D | hs20-osu-server.txt | 22 sudo apt-get update 89 # add example configuration (note: need to update URLs to match the system) 216 ./ocsp-update-cache.sh
|
| /hostap-latest/wpa_supplicant/ |
| D | todo.txt | 2 - add support for WPA with ap_scan=0 (update selected cipher etc. based on 15 - IEEE 802.1X and key update with driver_ndis?? wpa_supplicant did not seem
|
| D | mbo.c | 378 goto update; in wpas_mbo_update_non_pref_chan() 448 update: in wpas_mbo_update_non_pref_chan()
|
| D | bss.c | 836 struct os_reltime update; in wpa_bss_update_scan_res() local 837 calculate_update_time(fetch_time, res->age, &update); in wpa_bss_update_scan_res() 838 if (os_reltime_before(&update, &wpa_s->scan_trigger_time)) { in wpa_bss_update_scan_res() 840 os_reltime_sub(&wpa_s->scan_trigger_time, &update, in wpa_bss_update_scan_res()
|
| /hostap-latest/wpa_supplicant/doc/docbook/ |
| D | wpa_gui.sgml | 62 <listitem><para>Set the update interval in seconds for the signal
|
| /hostap-latest/hostapd/ |
| D | hlr_auc_gw.txt | 31 -u = update SQN in Milenage file on exit
|
| D | README-WPS | 284 registration). In addition, this can be used to update AP UI about the 292 This can be used to update the externally stored AP configuration and 293 then update hostapd configuration (followed by restarting of hostapd).
|
| D | ChangeLog | 194 station side implementations will need to be update at the same 220 * fixed WPS configuration update vulnerability with malformed passphrase 258 - update full message for interim accounting updates 538 * added a workaround for 4-way handshake to update SNonce even after 553 * EAP-SIM: fixed re-authentication not to update pseudonym 734 * nl80211: fix WPS IE update 975 * fixed PMKSA cache update in the end of successful RSN 1146 packets to update Class; previously, other RADIUS authentication 1265 * finished update from IEEE 802.1X-2001 to IEEE 802.1X-REV (now d11) 1336 - allow different update intervals for each STA
|
| /hostap-latest/doc/ |
| D | p2p.doxygen | 152 The P2P module will use following callback function to update P2P IE 307 \subsection p2p_sd_indicator Service update indicator 338 called. This will allow the P2P module to update the P2P IE for
|
| /hostap-latest/src/crypto/ |
| D | crypto_nettle.c | 65 alg->update(ctx, len[i], addr[i]); in nettle_digest_vector()
|