/hostap-latest/src/tls/ |
D | libtommath.c | 119 int used, alloc, sign; member 125 #define mp_iszero(a) (((a)->used == 0) ? MP_YES : MP_NO) 126 #define mp_iseven(a) (((a)->used > 0 && (((a)->dp[0] & 1) == 0)) ? MP_YES : MP_NO) 127 #define mp_isodd(a) (((a)->used > 0 && (((a)->dp[0] & 1) == 1)) ? MP_YES : MP_NO) 131 #define s_mp_mul(a, b, c) s_mp_mul_digs(a, b, c, (a)->used + (b)->used + 1) 220 if (a->used > b->used) { in s_mp_add() 221 min = b->used; in s_mp_add() 222 max = a->used; in s_mp_add() 225 min = a->used; in s_mp_add() 226 max = b->used; in s_mp_add() [all …]
|
D | tlsv1_server.c | 139 int used; in tlsv1_server_handshake() local 155 used = tlsv1_record_receive(&conn->rl, pos, end - pos, in tlsv1_server_handshake() 157 if (used < 0) { in tlsv1_server_handshake() 163 if (used == 0) { in tlsv1_server_handshake() 186 pos += used; in tlsv1_server_handshake() 265 int used; in tlsv1_server_decrypt() local 277 used = tlsv1_record_receive(&conn->rl, pos, in_end - pos, in tlsv1_server_decrypt() 279 if (used < 0) { in tlsv1_server_decrypt() 284 if (used == 0) { in tlsv1_server_decrypt() 304 pos += used; in tlsv1_server_decrypt() [all …]
|
D | tlsv1_client.c | 172 int used; in tlsv1_client_handshake() local 208 used = tlsv1_record_receive(&conn->rl, pos, end - pos, in tlsv1_client_handshake() 210 if (used < 0) { in tlsv1_client_handshake() 216 if (used == 0) { in tlsv1_client_handshake() 252 pos += used; in tlsv1_client_handshake() 335 int used; in tlsv1_client_decrypt() local 366 used = tlsv1_record_receive(&conn->rl, pos, in_end - pos, in tlsv1_client_decrypt() 368 if (used < 0) { in tlsv1_client_decrypt() 373 if (used == 0) { in tlsv1_client_decrypt() 402 pos += used; in tlsv1_client_decrypt() [all …]
|
/hostap-latest/src/utils/ |
D | wpabuf.c | 40 buf, (unsigned long) buf->size, (unsigned long) buf->used, in wpabuf_overflow() 69 if (buf->used + add_len > buf->size) { in wpabuf_resize() 72 nbuf = os_realloc(buf->buf, buf->used + add_len); in wpabuf_resize() 75 os_memset(nbuf + buf->used, 0, add_len); in wpabuf_resize() 81 buf->used + add_len); in wpabuf_resize() 87 sizeof(struct wpabuf) + buf->used, 0, in wpabuf_resize() 91 buf->used + add_len); in wpabuf_resize() 95 os_memset(nbuf + sizeof(struct wpabuf) + buf->used, 0, in wpabuf_resize() 101 buf->size = buf->used + add_len; in wpabuf_resize() 152 buf->used = len; in wpabuf_alloc_ext_data() [all …]
|
/hostap-latest/wpa_supplicant/ |
D | README-HS20 | 7 GUI or Wi-Fi framework) is used to manage this functionality. 13 Hotspot 2.0 is the name of the Wi-Fi Alliance specification that is used 37 used similarly to the network blocks that can be configured by the user, 38 but it is not stored into the configuration file and is meant to be used 49 used based on configured priorities, scan results, and ANQP information. 70 wpa_supplicant.conf when using the configuration file) that can be used 82 # If this is set, scans will be used to request response only from BSSes 83 # belonging to the specified Homogeneous ESS. This is used only if interworking 106 # Each credential used for automatic network selection is configured as a set 108 # interworking_select and interworking_connect commands are used. [all …]
|
D | README-WPS | 6 management GUI) is used to enable WPS enrollment and registrar 38 when WPS is used to configure the access point. 48 wpa_supplicant includes an optional WPS component that can be used as 69 The following parameter can be used to enable support for NFC config 102 The PIN value used in the commands must be processed by an UI to 104 digit. "wpa_cli wps_check_pin <PIN>" can be used to do such processing. 122 used. wpa_supplicant is notified this with a control interface 131 interface, an optional timeout parameter can be used to specify 137 can be used to generate a new PIN without starting WPS negotiation. 162 This is used to fetch the current AP settings instead of actually [all …]
|
D | README-P2P | 6 client (e.g., management GUI) is used to enable WPS enrollment and 68 to be used for some operations (mainly WPS activation in GO). This may 85 optional freq parameter can be used to override the first scan to use only 88 The optional dev_id option can be used to specify a single P2P peer to 89 search for. The optional delay parameter can be used to request an extra 90 delay to be used between search iterations (e.g., to free up radio 93 The optional dev_type option can be used to specify a single device type 118 other devices). Optional parameter can be used to specify the duration 121 testing. It can also be used to keep the device discoverable without 144 The optional "join" parameter can be used to indicate that this command [all …]
|
D | android.config | 3 # This file lists the configuration options that are used when building the 20 # used to fix build issues on such systems (krb5.h not found). 102 # EAP-SIM (enable CONFIG_PCSC, if EAP-SIM is used) 117 # EAP-AKA (enable CONFIG_PCSC, if EAP-AKA is used) 120 # EAP-AKA' (enable CONFIG_PCSC, if EAP-AKA' is used). 154 # PKCS#12 (PFX) support (used to read private key and certificate file from 193 # Include internal line edit mode in wpa_cli. This can be used as a replacement 198 # This can be used to reduce the size of the wpa_supplicant considerably 208 # This option can be used to reduce code size by removing support for 215 # This can be used if ap_scan=1 mode is never enabled. [all …]
|
D | defconfig | 3 # This file lists the configuration options that are used when building the 20 # used to fix build issues on such systems (krb5.h not found). 122 # any other implementation. This should not be used for anything else than 133 # EAP-SIM (enable CONFIG_PCSC, if EAP-SIM is used) 151 # EAP-AKA (enable CONFIG_PCSC, if EAP-AKA is used) 154 # EAP-AKA' (enable CONFIG_PCSC, if EAP-AKA' is used). 191 # PKCS#12 (PFX) support (used to read private key and certificate file from 236 # Include internal line edit mode in wpa_cli. This can be used as a replacement 241 # This can be used to reduce the size of the wpa_supplicant considerably 251 # This option can be used to reduce code size by removing support for [all …]
|
D | README-Windows.txt | 11 wpa_supplicant has support for being used as a WPA/WPA2/IEEE 802.1X 40 the Makefile unless cygwin is used. 49 can also be used by creating a project that includes the files and 51 files are included in vs2005 subdirectory. This can be used as a 61 used, these Include and Lib directories need to be added to project 115 be used to build the binary in the Qt 4 Command Prompt: 130 version of wpa_supplicant, wpasvc.exe, which can be used as a Windows 135 be used (see wpa_supplicant.conf for more information). 139 adapter description can be used as the interface name which may be 141 format. win_if_list.exe can be used to find out the proper interface [all …]
|
D | README | 18 This software may be distributed, used, and modified under the terms of 33 names of its contributors may be used to endorse or promote products 85 material, they cannot be used with WPA or IEEE 802.1X WEP keying) 100 - can be used in place of an external TLS/crypto library 131 used with IEEE 802.1X (i.e., not WPA) when using ap_scan=0 option in 159 These libraries are _not_ used in the default Linux build. Instead, 160 internal Linux specific implementation is used. libpcap/libdnet are 161 more portable and they can be used by adding CONFIG_L2_PACKET=pcap into 163 systems. In case of Windows builds, WinPcap is used by default 178 EAP-GTC, EAP-OTP, and EAP-MSCHAPV2 cannot be used alone with WPA, so [all …]
|
D | README-NAN-USD | 5 in the Wi-Fi Aware specification v4.0 can be used with wpa_spplicant. 14 The following parameters must be included in the config file used to 27 Following control interface commands can be used: 35 the 2.4 GHz band) is used. 38 channels. A special freq_list=all value can be used to generate the 65 the 2.4 GHz band) is used. 82 Following control interface events are used:
|
/hostap-latest/hostapd/ |
D | README-WPS | 6 used to enable enrollment of client devices. 37 when WPS is used to configure the access point. 47 hostapd includes an optional WPS component that can be used as an 50 be used to allow external WPS Registrars to configure the access 67 Following parameter can be used to enable support for NFC config method: 125 The PIN value used in the commands must be processed by an UI to 127 digit. "hostapd_cli wps_check_pin <PIN>" can be used to do such 177 to be selected before connecting), wildcard UUID may be used to allow 178 the PIN to be used once with any UUID: 182 To reduce likelihood of PIN being used with other devices or of [all …]
|
D | README | 19 This software may be distributed, used, and modified under the terms of 34 names of its contributors may be used to endorse or promote products 102 control. In case of IEEE 802.11 networks, a "virtual port" is used 125 frames used by that server. RADIUS is suitable for this, but IEEE 136 device that is also used with IEEE 802.11 management frames. The 152 configured to be used, the virtual port for the station is set in 162 The user space daemon has its own configuration file that can be used to 164 configuration file (hostapd/hostapd.conf) that can be used as a basis 174 used to test IEEE 802.1X authentication. However, it should not be 175 used in normal use since it does not provide any security. This can be [all …]
|
D | hostapd.eap_user | 7 # in unicode) if it is used for MSCHAP or MSCHAPv2 authentication. This means 12 # [2] flag in the end of the line can be used to mark users for tunneled phase 14 # identity can be used in the unencrypted phase 1 and the real user identity 25 # * can be used as a wildcard to match any user identity. The main purposes for 28 # first matching entry is selected, so * should be used as the last phase 1 31 # "prefix"* can be used to match the given prefix and anything after this. The 40 # [ver=0] and [ver=1] flags after EAP type PEAP can be used to force PEAP 53 # to the way radius_auth_req_attr is used for Access-Request packet in
|
D | defconfig | 3 # This file lists the configuration options that are used when building the 112 # any other implementation. This should not be used for anything else than 133 # PKCS#12 (PFX) support (used to read private key and certificate file from 178 # This can be used to reduce the size of the hostapd considerably if debugging 213 # This can be used to reduce binary size at the cost of disabling a debugging 236 # operating system. os_get_random() function is used to fetch random data when 262 # considered for builds that are known to be used on devices that meet the 271 # Should we use poll instead of select? Select is used by default. 274 # Should we use epoll instead of select? Select is used by default. 277 # Should we use kqueue instead of select? Select is used by default. [all …]
|
D | hlr_auc_gw.milenage_db | 3 # 4.3.20 Test Set 20. SQN is the last used SQN value. 4 # These values can be used for both UMTS (EAP-AKA) and GSM (EAP-SIM) 5 # authentication. In case of GSM/EAP-SIM, AMF and SQN values are not used, but
|
/hostap-latest/doc/ |
D | hostapd_ctrl_iface.doxygen | 4 hostapd implements a control interface that can be used by 11 wpa_supplicant. This library can also be used with C++. \ref hostapd_cli.c 17 be used to hide the details of the used IPC from external programs. 38 If the control interface connection is used both for commands and 51 be closed by calling \ref wpa_ctrl_close(). If the connection was used for 58 Following commands can be used with \ref wpa_ctrl_request(): 62 This command can be used to test whether hostapd is replying
|
D | p2p.doxygen | 15 src/drivers/driver.h. This defines both the commands and events used to 21 information about neighboring P2P Devices. This module could be used 40 components. In the diagrams below, green arrows are used to show 44 operations. Glue code is used to bind the P2P module API to the rest 51 wpa_supplicant process is used with Linux mac80211-based drivers, 76 functionality for Device Discovery phase, but are not used in the 77 implementation (the SEARCH state is used to manage the initial Scan 91 used for P2P related operations. 181 This section shows an example sequence of operations that can be used 184 the glue code outside the P2P module depends on the architecture used [all …]
|
D | porting.doxygen | 6 already used with number of operating systems and numerous wireless 11 side, wpa_supplicant is used on various systems: desktops, laptops, 21 on modern UNIX systems are used. Number of these are listed with 26 Many of the common ANSI C functions are used through a wrapper 36 functions are used by defining the os_*() wrappers to use them 57 and \ref config_winreg.c uses Windows registry. These files can be used as 60 \ref config_none.c can be used as an empty starting point for building a 80 used for this in the core wpa_supplicant implementation. 99 libdnet (sending), \ref l2_packet_pcap.c can likely be used with minimal or 104 be used to override the l2_packet library if the link layer access is [all …]
|
D | ctrl_iface.doxygen | 4 wpa_supplicant implements a control interface that can be used by 11 wpa_supplicant. This library can also be used with C++. \ref wpa_cli.c and 17 the functions defined in \ref wpa_ctrl.h can be used to hide the details of 18 the used IPC from external programs. 39 If the control interface connection is used both for commands and 52 be closed by calling \ref wpa_ctrl_close(). If the connection was used for 59 Following commands can be used with \ref wpa_ctrl_request(): 63 This command can be used to test whether wpa_supplicant is replying 289 Get detailed per-BSS scan results. \c BSS command can be used to 331 used to enable all network. [all …]
|
D | directories.doxygen | 27 driver wrappers that can be used to interact with different drivers 29 driver is used. 51 also included here. This is used to port packet access for new 53 depend on which OS network stack is used. 67 This module can be used as an alternative to using an external TLS
|
/hostap-latest/tests/hwsim/ |
D | README | 13 device combinations to be tested. wlantest is used analyze raw packets 15 sent on all channels. wlantest is used to store the frames for 16 analysis. Three wpa_supplicant processes are used to control three 17 virtual radios and one hostapd process is used to dynamically control 19 is used to verify that data connection (both unicast and broadcast) 24 interfaces to perform the operations. In addition, wlantest_cli is used 53 Alternatively, the build.sh script here can be used to run these steps 60 Please note that some of the configuration parameters used to enable 116 run-tests.py to allow other names to be used. 135 test tools. run-tests.sh is then used to run through all the defined [all …]
|
/hostap-latest/tests/ |
D | cipher-and-key-mgmt-testing.txt | 5 special test builds to be used for testing functionality related to 10 mac80211_hwsim (see tests/hwsim subdirectory), many of these can be used 27 interfaces are used to perform unexpected operations and normal data 28 traffic is used to verify reaction of the tested device to such 37 wpa_supplicant is used to control a test device in station mode to test 38 an AP and hostapd is similarly used to control a test device in AP mode 41 Various data traffic generators could be used to test the behavior, but 45 addresses are used and IPv6 is disabled. 85 ping is used to test whether unicast frames go through on the data 115 arping is used to test broadcast connectivity. [all …]
|
/hostap-latest/tests/hwsim/auth_serv/ |
D | hlr_auc_gw.milenage_db | 3 # 4.3.20 Test Set 20. SQN is the last used SQN value. 4 # These values can be used for both UMTS (EAP-AKA) and GSM (EAP-SIM) 5 # authentication. In case of GSM/EAP-SIM, AMF and SQN values are not used, but
|