/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ap_drv_ops.c | 273 int enabled) 278 params.enabled = enabled; 279 if (enabled) { 397 int hostapd_set_privacy(struct hostapd_data *hapd, int enabled) argument 401 return hapd->driver->set_privacy(hapd->drv_priv, enabled); 764 "is not enabled"); 272 hostapd_set_drv_ieee8021x(struct hostapd_data *hapd, const char *ifname, int enabled) argument
|
H A D | ap_drv_ops.h | 32 int enabled); 44 int hostapd_set_privacy(struct hostapd_data *hapd, int enabled); 126 int enabled) 131 return hapd->driver->hapd_set_countermeasures(hapd->drv_priv, enabled); 125 hostapd_drv_set_countermeasures(struct hostapd_data *hapd, int enabled) argument
|
H A D | ieee802_1x.c | 840 "802.1X not enabled and WPS not used"); 977 "802.1X not enabled or forced for WPS"); 2191 int enabled) 2195 sm->eap_if->portEnabled = enabled ? TRUE : FALSE; 2190 ieee802_1x_notify_port_enabled(struct eapol_state_machine *sm, int enabled) argument
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver.h | 420 int sec_channel_offset; /* 0 = HT40 disabled, -1 = HT40 enabled, 422 * enabled, secondary channel above primary */ 665 * AP mode: 1 = enabled, 0 = disabled 666 * STA mode: bits 0..3 UAPSD enabled for VO,VI,BK,BE 850 * cts_protect - Whether CTS protection is enabled 855 * preamble - Whether short preamble is enabled 860 * short_slot_time - Whether short slot time is enabled 862 * 0 = short slot time disable, 1 = short slot time enabled, -1 = do 873 * interworking - Whether Interworking is enabled 886 * enabled 1184 int enabled; member in struct:wpa_bss_params [all...] |
H A D | driver_atheros.c | 81 static int atheros_set_privacy(void *priv, int enabled); 365 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, params->enabled); 367 if (!params->enabled) { 376 wpa_printf(MSG_WARNING, "No 802.1X or WPA enabled!"); 393 atheros_set_privacy(void *priv, int enabled) argument 397 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled); 399 return set80211param(drv, IEEE80211_PARAM_PRIVACY, enabled); 1338 * so all are enabled fo 1856 atheros_set_countermeasures(void *priv, int enabled) argument [all...] |
H A D | driver_bsd.c | 471 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, params->enabled); 473 if (!params->enabled) { 479 wpa_printf(MSG_ERROR, "%s: No 802.1X or WPA enabled", 631 bsd_set_privacy(void *priv, int enabled) argument 633 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled); 635 return set80211param(priv, IEEE80211_IOC_PRIVACY, enabled); 972 wpa_driver_bsd_set_wpa(void *priv, int enabled) argument 974 wpa_printf(MSG_DEBUG, "%s: enabled 980 wpa_driver_bsd_set_countermeasures(void *priv, int enabled) argument 988 wpa_driver_bsd_set_drop_unencrypted(void *priv, int enabled) argument [all...] |
H A D | driver_hostap.c | 511 int enabled = params->enabled; local 514 if (hostap_ioctl_prism2param(drv, PRISM2_PARAM_IEEE_802_1X, enabled)) { 520 if (!enabled) 536 static int hostap_set_privacy(void *priv, int enabled) argument 541 enabled);
|
H A D | driver_macsec_qca.c | 455 static int macsec_qca_enable_protect_frames(void *priv, Boolean enabled) argument 460 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled); 462 drv->protect_frames = enabled; 468 static int macsec_qca_set_replay_protect(void *priv, Boolean enabled, argument 474 wpa_printf(MSG_DEBUG, "%s: enabled=%d, win=%u", 475 __func__, enabled, window); 477 drv->replay_protect = enabled; 503 static int macsec_qca_enable_controlled_port(void *priv, Boolean enabled) argument 508 wpa_printf(MSG_DEBUG, "%s: enable=%d", __func__, enabled); 522 bool enabled = FALSE; local [all...] |
H A D | driver_madwifi.c | 316 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, params->enabled); 318 if (!params->enabled) { 324 wpa_printf(MSG_WARNING, "No 802.1X or WPA enabled!"); 341 madwifi_set_privacy(void *priv, int enabled) argument 345 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled); 347 return set80211param(drv, IEEE80211_PARAM_PRIVACY, enabled); 1271 madwifi_set_countermeasures(void *priv, int enabled) argument 1274 wpa_printf(MSG_DEBUG, "%s: enabled [all...] |
H A D | driver_nl80211.c | 4301 /* rtnetlink ifup handler will report interface as enabled */ 4453 int enabled = 1; local 4456 &enabled, sizeof(enabled)) < 0) { 5208 * rates are left enabled. 10778 * enabled in nl80211_setup_ap(). 10842 * rates. All 5 GHz rates are left enabled. 11587 static int nl80211_set_power_save(struct i802_bss *bss, int enabled) argument 11598 enabled ? NL80211_PS_ENABLED : NL80211_PS_DISABLED);
|
H A D | driver_test.c | 1070 static int test_driver_set_privacy(void *priv, int enabled) argument 1074 wpa_printf(MSG_DEBUG, "%s(enabled=%d)", __func__, enabled); 1075 dbss->privacy = enabled;
|
H A D | driver_wext.c | 751 /* rtnetlink ifup handler will report interface as enabled */ 1803 int enabled) 1809 enabled); 1814 int enabled) 1818 drv->use_crypt = enabled; 1820 enabled); 1802 wpa_driver_wext_set_countermeasures(void *priv, int enabled) argument 1813 wpa_driver_wext_set_drop_unencrypted(void *priv, int enabled) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap.c | 199 * occurs when the port becomes enabled. 588 * Accept this kind of Id if EAP workarounds are enabled. These are 1945 * @enabled: 1 = Fast reauthentication is enabled, 0 = Disabled 1947 void eap_set_fast_reauth(struct eap_sm *sm, int enabled) argument 1949 sm->fast_reauth = enabled; 2337 * @disabled: 1 = EAP disabled, 0 = EAP enabled
|
/external/wpa_supplicant_8/hostapd/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 235 * not enabled. Since this variable is used only within HELD state, 520 * not enabled. Since this variable is used only within RECEIVE state, 1385 * @enabled: New portEnabled value 1389 void eapol_sm_notify_portEnabled(struct eapol_sm *sm, Boolean enabled) argument 1394 "portEnabled=%d", enabled); 1395 if (sm->portEnabled != enabled) 1397 sm->portEnabled = enabled;
|
H A D | eapol_supp_sm.h | 43 * fast_reauth - Whether fast EAP reauthentication is enabled 48 * workaround - Whether EAP workarounds are enabled 285 void eapol_sm_notify_portEnabled(struct eapol_sm *sm, Boolean enabled); 345 Boolean enabled) 344 eapol_sm_notify_portEnabled(struct eapol_sm *sm, Boolean enabled) argument
|
/external/wpa_supplicant_8/hostapd/src/p2p/ |
H A D | p2p.c | 2268 * P2P Management is enabled) 3760 void p2p_set_client_discoverability(struct p2p_data *p2p, int enabled) argument 3762 if (enabled) { 3763 p2p_dbg(p2p, "Client discoverability enabled"); 4095 void p2p_set_managed_oper(struct p2p_data *p2p, int enabled) argument 4097 if (enabled) { 4098 p2p_dbg(p2p, "Managed P2P Device operations enabled"); 4261 void p2p_set_cross_connect(struct p2p_data *p2p, int enabled) argument 4263 p2p_dbg(p2p, "Cross connection %s", enabled ? "enabled" 4282 p2p_set_intra_bss_dist(struct p2p_data *p2p, int enabled) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/pae/ |
H A D | ieee802_1x_secy_ops.c | 28 int secy_cp_control_protect_frames(struct ieee802_1x_kay *kay, Boolean enabled) argument 44 return ops->enable_protect_frames(ops->ctx, enabled); 48 int secy_cp_control_replay(struct ieee802_1x_kay *kay, Boolean enabled, u32 win) argument 64 return ops->set_replay_protect(ops->ctx, enabled, win); 97 int secy_cp_control_enable_port(struct ieee802_1x_kay *kay, Boolean enabled) argument 113 return ops->enable_controlled_port(ops->ctx, enabled);
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | tdls.c | 1778 "direct link is enabled - tear down the " 2869 void wpa_tdls_enable(struct wpa_sm *sm, int enabled) argument 2871 wpa_printf(MSG_DEBUG, "TDLS: %s", enabled ? "enabled" : "disabled"); 2872 sm->tdls_disabled = !enabled;
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_client.c | 785 void tlsv1_client_set_time_checks(struct tlsv1_client *conn, int enabled) argument 787 conn->disable_time_checks = !enabled;
|
/external/wpa_supplicant_8/src/ap/ |
H A D | ap_drv_ops.c | 273 int enabled) 278 params.enabled = enabled; 279 if (enabled) { 397 int hostapd_set_privacy(struct hostapd_data *hapd, int enabled) argument 401 return hapd->driver->set_privacy(hapd->drv_priv, enabled); 764 "is not enabled"); 272 hostapd_set_drv_ieee8021x(struct hostapd_data *hapd, const char *ifname, int enabled) argument
|
H A D | ap_drv_ops.h | 32 int enabled); 44 int hostapd_set_privacy(struct hostapd_data *hapd, int enabled); 126 int enabled) 131 return hapd->driver->hapd_set_countermeasures(hapd->drv_priv, enabled); 125 hostapd_drv_set_countermeasures(struct hostapd_data *hapd, int enabled) argument
|
H A D | ieee802_1x.c | 840 "802.1X not enabled and WPS not used"); 977 "802.1X not enabled or forced for WPS"); 2191 int enabled) 2195 sm->eap_if->portEnabled = enabled ? TRUE : FALSE; 2190 ieee802_1x_notify_port_enabled(struct eapol_state_machine *sm, int enabled) argument
|
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver.h | 420 int sec_channel_offset; /* 0 = HT40 disabled, -1 = HT40 enabled, 422 * enabled, secondary channel above primary */ 665 * AP mode: 1 = enabled, 0 = disabled 666 * STA mode: bits 0..3 UAPSD enabled for VO,VI,BK,BE 850 * cts_protect - Whether CTS protection is enabled 855 * preamble - Whether short preamble is enabled 860 * short_slot_time - Whether short slot time is enabled 862 * 0 = short slot time disable, 1 = short slot time enabled, -1 = do 873 * interworking - Whether Interworking is enabled 886 * enabled 1184 int enabled; member in struct:wpa_bss_params [all...] |
H A D | driver_atheros.c | 81 static int atheros_set_privacy(void *priv, int enabled); 365 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, params->enabled); 367 if (!params->enabled) { 376 wpa_printf(MSG_WARNING, "No 802.1X or WPA enabled!"); 393 atheros_set_privacy(void *priv, int enabled) argument 397 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled); 399 return set80211param(drv, IEEE80211_PARAM_PRIVACY, enabled); 1338 * so all are enabled fo 1856 atheros_set_countermeasures(void *priv, int enabled) argument [all...] |
H A D | driver_bsd.c | 471 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, params->enabled); 473 if (!params->enabled) { 479 wpa_printf(MSG_ERROR, "%s: No 802.1X or WPA enabled", 631 bsd_set_privacy(void *priv, int enabled) argument 633 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled); 635 return set80211param(priv, IEEE80211_IOC_PRIVACY, enabled); 972 wpa_driver_bsd_set_wpa(void *priv, int enabled) argument 974 wpa_printf(MSG_DEBUG, "%s: enabled 980 wpa_driver_bsd_set_countermeasures(void *priv, int enabled) argument 988 wpa_driver_bsd_set_drop_unencrypted(void *priv, int enabled) argument [all...] |