Home
last modified time | relevance | path

Searched refs:use (Results 1 – 25 of 60) sorted by relevance

123

/hostap-latest/doc/
Dhostapd_ctrl_iface.doxygen8 provides helper functions to facilitate the use of the control
9 interface. External programs can link this file into them and then use
16 control interface. The use of the functions defined in \ref wpa_ctrl.h can
24 allows them to use helper functions to open connection to the control
44 then use one of the connections for commands and the other one for
47 to use only one connection for both purposes and wpa_gui demonstrates
48 how to use two separate connections.
Ddriver_wrapper.doxygen18 least in theory, could use the same driver wrapper code.
30 modified to use the native interface of the target OS. It is possible
43 \ref driver_wext.c. All Linux driver wrappers can use these when the kernel
53 implementation for Linux drivers that use wpa_supplicant-based control
92 support external control for scan process. In case of Linux, use of
128 \ref driver.h). wpa_supplicant is normally configured to use
139 On Linux, association and disassociation can use existing Wireless
145 Extensions will need to use a custom event. Host AP driver used a custom
148 the driver can be moved to use WE-18 mechanism.
150 \subsection driver_wext_summary Summary of Linux Wireless Extensions use
[all …]
Dmainpage.doxygen13 contributions to wpa_supplicant and hostapd are expected to use
32 The design goal for wpa_supplicant was to use hardware, driver, and
43 In addition to programs aimed at normal production use,
54 a small C library that provides helper functions to facilitate the use of the
70 The design goal for hostapd was to use hardware, driver, and
82 Both IEEE 802.1X and RADIUS authentication server can use EAP server
89 the use of the control interface. This library can also be used with
Deap_server.doxygen6 implementation. This module was designed to use only a minimal set of
25 methods use the same interface between the server state machine and
32 method should use a build-time configuration option, e.g., EAP_TLS, in
41 It is recommended that the EAP methods would use generic helper
Deap.doxygen6 peer implementation. This module was designed to use only a minimal set
25 methods use the same interface between the peer state machine and
32 method should use a build-time configuration option, e.g., EAP_TLS, in
41 It is recommended that the EAP methods would use generic helper
/hostap-latest/hostapd/
DChangeLog18 - use Secure=1 in message 3 during PTK rekeying
37 * use stricter validation for some RADIUS messages
85 - disable use of groups using Brainpool curves
89 - disable use of groups using Brainpool curves
104 fast reauthentication use to be disabled
118 - reject use of unsuitable groups based on new implementation guidance
121 - minimize timing and memory use differences in PWE derivation
126 - minimize timing and memory use differences in PWE derivation
152 * extended PEAP to derive EMSK to enable use with ERP/FILS
180 - fixed wpa_psk_file use for FT-PSK
[all …]
Dandroid.config9 # be modified from here. In most cass, these lines should use += in order not
22 # newer libnl version and point the hostapd build to use it.
163 # This tracks use of memory allocations and other registrations and reports
164 # incorrect use with a backtrace of call (or allocation) location.
172 # This enables use of libbfd to get more detailed symbols for the backtraces
180 # Should we use poll instead of select? Select is used by default.
183 # Should we use epoll instead of select? Select is used by default.
193 # These extensions facilitate efficient use of multiple frequency bands
214 # functionality needed to use WEP is available in the current hostapd
Ddefconfig9 # be modified from here. In most cass, these lines should use += in order not
109 # enabled for production use. The IETF RFC 7170 that defines EAP-TEAP has number
218 # This tracks use of memory allocations and other registrations and reports
219 # incorrect use with a backtrace of call (or allocation) location.
227 # This enables use of libbfd to get more detailed symbols for the backtraces
261 # This will save some in binary size and CPU use. However, this should only be
266 # Should we attempt to use the getrandom(2) call that provides more reliable
271 # Should we use poll instead of select? Select is used by default.
274 # Should we use epoll instead of select? Select is used by default.
277 # Should we use kqueue instead of select? Select is used by default.
[all …]
DREADME-WPS19 While WPS can enable more home networks to use encryption in the
20 wireless network, it should be noted that the use of the PIN and
22 not very secure. As such, use of WPS may not be suitable for
33 - Enrollee: a device that is being authorized to use the network
142 a new device. The AP could use, e.g., a web UI for showing active
198 client device and the client can then use that key to connect to the
216 use its AP PIN. A static AP PIN (e.g., one one a label in the AP
218 secure option is to use hostapd_cli wps_ap_pin command to enable the
225 - disable AP PIN (i.e., do not allow external Registrars to use it to
263 for hostapd to use. The exact data from this binary file will be sent,
[all …]
DREADME-MULTI-AP52 must use 4-address mode for all frames sent over this link ([3], section 14).
66 This is important because it is possible to use the same BSS and SSID for
69 frames sent to a backhaul STA must use 4-address mode, while frames sent to a
70 normal STA (fronthaul, when it's a fronthaul and backhaul BSS) must use
104 6. STA and AP both use 4-address mode for Data frames.
DREADME22 Redistribution and use in source and binary forms, with or without
124 use an external Authentication Server and encapsulate EAP frame in the
139 The normal configuration of the Authenticator would use an external
148 When a station would like to use the services of an access point, it
169 LAN card, you can use one hostapd process for multiple interfaces by
175 used in normal use since it does not provide any security. This can be
257 compromise on strong security and possibility to use existing
262 Keys can be managed using two different mechanisms. WPA can either use
/hostap-latest/wpa_supplicant/
DChangeLog22 - use Secure=1 in message 2 during PTK rekeying
108 - disable use of groups using Brainpool curves
112 - disable use of groups using Brainpool curves
122 * extended EAP-SIM/AKA fast re-authentication to allow use with FILS
148 - reject use of unsuitable groups based on new implementation guidance
151 - minimize timing and memory use differences in PWE derivation
154 - minimize timing and memory use differences in PWE derivation
194 * added support for random P2P Device/Interface Address use
195 * extended PEAP to derive EMSK to enable use with ERP/FILS
222 * started to use estimated throughput to avoid undesired signal
[all …]
Ddefconfig9 # be modified from here. In most cases, these lines should use += in order not
26 # replacement for WEXT and its use allows wpa_supplicant to properly control
119 # enabled for production use. The IETF RFC 7170 that defines EAP-TEAP has number
225 # y = use default (backwards compatibility)
287 # main_none = Very basic example (development use only)
301 # Should we use poll instead of select? Select is used by default.
304 # Should we use epoll instead of select? Select is used by default.
307 # Should we use kqueue instead of select? Select is used by default.
344 # can be enabled to enable use of stronger crypto algorithms. It should be
350 # Select which ciphers to use by default with OpenSSL if the user does not
[all …]
Dandroid.config9 # be modified from here. In most cases, these lines should use += in order not
26 # replacement for WEXT and its use allows wpa_supplicant to properly control
182 # y = use default (backwards compatibility)
238 # main_none = Very basic example (development use only)
252 # Should we use poll instead of select? Select is used by default.
255 # Should we use epoll instead of select? Select is used by default.
258 # Should we use kqueue instead of select? Select is used by default.
294 # can be enabled to enable use of stronger crypto algorithms. It should be
300 # Select which ciphers to use by default with OpenSSL if the user does not
346 # and in order to be able to use dynamic EAP methods using these parts, the
[all …]
Deap_testing.txt21 In order for me to be able to use a new authentication server, the
24 certificates, and private keys for testing use. Other alternative
175 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
202 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
224 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
255 Note: Needed to use unknown identity in outer auth and some times the server
264 Note: Needed to use unknown identity in outer auth and some times the server
294 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
333 that wpa_supplicant could not use. Converting this to PKCS#12 and then
334 back to PEM allowed wpa_supplicant to use the key.
DREADME-HS20205 # with this credential. There are an alternative to the use of the realm
221 # Deprecated: use home_ois instead.
225 # alternative to the use of the realm parameter. When using Roaming
231 # Deprecated: use required_home_ois instead.
313 # ocsp: Whether to use/require OCSP to check server certificate
314 # 0 = do not use OCSP stapling (TLS certificate status extension)
315 # 1 = try to use OCSP stapling, but not require response
318 # sim_num: Identifier for which SIM to use in multi-SIM devices
320 # engine: Whether to use an engine for private key operations (0/1)
321 # engine_id: String identifying the engine to use
[all …]
Dtodo.txt26 - use doc/docbook/*.sgml and docbook2{txt,html,pdf} to replace README and
67 - change TLS/crypto library interface to use a structure of function
74 phases should be able to use the same functions for this;
DREADME21 Redistribution and use in source and binary forms, with or without
122 note that Linux drivers are moving to use generic wireless configuration
219 compromise on strong security and possibility to use existing
224 Keys can be managed using two different mechanisms. WPA can either use
385 you are going to use. Configuration file section below includes
400 interface to use by including -D<driver name> option on the command
465 line. wpa_supplicant will use the first driver wrapper that is able to
540 # work network; use EAP-TLS with WPA; allow only CCMP and TKIP ciphers
556 2) WPA-RADIUS/EAP-PEAP/MSCHAPv2 with RADIUS servers that use old peaplabel
575 unencrypted use. Real identity is sent only within an encrypted TLS tunnel.
[all …]
/hostap-latest/
DCOPYING12 selected. As of February 11, 2012, the project has chosen to use only
16 with GPL and as such, does not prevent use of this software in projects
17 that use GPL.
/hostap-latest/wpa_supplicant/doc/docbook/
Dwpa_supplicant.conf.sgml25 <para>All file paths in this configuration file should use full
63 # work network; use EAP-TLS with WPA; allow only CCMP and TKIP ciphers
82 use old peaplabel (e.g., Funk Odyssey and SBR, Meetinghouse
103 identity for the unencrypted use. Real identity is sent only
126 (require both unicast and broadcast); use EAP-TLS for
152 use.</para>
206 <para>Some EAP authentication methods require use of
/hostap-latest/wpadebug/
DREADME14 not supposed to be installed on a production use device and doing so may
48 This is not suitable for any production use. This is needed for direct
50 still use rest of the wpadebug app without doing this, but those
63 /data/local/wpadebug.cmds and use title@command format per line. For
/hostap-latest/tests/hwsim/
DREADME37 You will need to build (or use already built) components to be
58 to use pre-built tools.
75 The python scripts use wpaspy.py to interact with the wpa_supplicant
86 (CONFIG_MAC80211_HWSIM=m) and rebuild your kernel or use Backports with
97 password entry very quickly. For example, use this in the sudoers file:
112 devices that may use conflicting interface names. For example, unload
133 run-all.sh in tests/hwsim directory. This will use start.sh to load the
189 scripts that can use the local helper classes to interact with the test
/hostap-latest/hs20/client/
Dspp_client.c599 enum spp_post_dev_data_use use, xml_node_t *node, in process_spp_post_dev_data_response() argument
642 if (use == SPP_SUBSCRIPTION_REMEDIATION && in process_spp_post_dev_data_response()
664 if (use == SPP_SUBSCRIPTION_REMEDIATION && in process_spp_post_dev_data_response()
675 if (use == SPP_POLICY_UPDATE && in process_spp_post_dev_data_response()
690 if (use == SPP_SUBSCRIPTION_REGISTRATION && in process_spp_post_dev_data_response()
720 process_spp_post_dev_data_response(ctx, use, in process_spp_post_dev_data_response()
749 enum spp_post_dev_data_use use, in spp_post_dev_data() argument
778 process_spp_post_dev_data_response(ctx, use, ret_node, in spp_post_dev_data()
/hostap-latest/radius_example/
DREADME28 The main application may either use the included event loop
30 to use whatever event loop design is used in the main program. This
/hostap-latest/hs20/server/
Dhs20-osu-server.txt94 # Modify PHP scripts to get the desired behavior for user interaction (or use
234 Update SSL configuration to use the OSU server certificate/key.
258 APs can now be configured to use the OSU server as the RADIUS
260 should be configured to use the SPP (SOAP+XML) option and with the

123