/external/wpa_supplicant_8/hostapd/ |
H A D | config_file.c | 538 nserv->port = def_port; 2129 bss->radius->auth_server->port = atoi(pos); 2154 bss->radius->acct_server->port = atoi(pos);
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | hostapd.c | 815 das_conf.port = conf->radius_das_port;
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | wpa_ctrl.c | 337 char *port, *name; local 351 port = os_strchr(name, ','); 353 port = os_strchr(name, ':'); 356 if (port) { 357 port_id = atoi(&port[1]); 358 port[0] = '\0';
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_nl80211.c | 107 uint32_t port = nl_socket_get_local_port(handle); local 109 port >>= 22; 110 port_bitmap[port / 32] &= ~(1 << (port % 32)); 8829 wpa_printf(MSG_DEBUG, " * control port"); 9474 wpa_printf(MSG_DEBUG, "nl80211: Set supplicant port %sauthorized for "
|
/external/wpa_supplicant_8/hostapd/src/pae/ |
H A D | ieee802_1x_kay.c | 130 be_to_host16(body->actor_sci.port)); 550 wpa_printf(MSG_DEBUG, "\tPort: %d", peer->sci.port); 582 wpa_printf(MSG_DEBUG, "\tPort: %d", peer->sci.port); 614 wpa_printf(MSG_DEBUG, "\tPort: %d", peer->sci.port); 685 body->actor_sci.port = host_to_be16(kay->actor_sci.port); 740 participant->current_peer_sci.port = be_to_host16(body->actor_sci.port); 1276 * the attribute of controlled port 3140 kay->actor_sci.port [all...] |
H A D | ieee802_1x_kay.h | 35 u16 port; member in struct:ieee802_1x_mka_sci
|
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius_client.c | 464 old->port); 488 old->port); 778 /* TODO: also match by src addr:port of the packet when using 977 nserv->port); 1021 serv.sin_port = htons(nserv->port); 1032 serv6.sin6_port = htons(nserv->port); 1454 serv->port, 1502 serv->port,
|
H A D | radius_client.h | 34 * port - radiusAuthClientServerPortNumber or radiusAccClientServerPortNumber 36 int port; member in struct:hostapd_radius_server
|
H A D | radius_das.c | 313 static int radius_das_open_socket(int port) argument 326 addr.sin_port = htons(port); 342 if (conf->port == 0 || conf->shared_secret == NULL || 367 das->sock = radius_das_open_socket(conf->port);
|
H A D | radius_das.h | 38 int port; member in struct:radius_das_conf
|
H A D | radius_server.c | 1426 static int radius_server_open_socket(int port) argument 1441 addr.sin_port = htons(port); 1453 static int radius_server_open_socket6(int port) argument 1468 addr.sin6_port = htons(port);
|
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | http_client.c | 196 char *u, *addr, *port, *path; local 206 port = os_strchr(addr, ':'); 211 if (port > path) 212 port = NULL; 214 if (port) 215 *port++ = '\0'; 220 "(addr='%s' port='%s')", 221 url, addr, port); 226 if (port) 227 dst->sin_port = htons(atoi(port)); [all...] |
H A D | http_server.c | 34 int port; member in struct:http_server 228 struct http_server * http_server_init(struct in_addr *addr, int port, argument 257 if (port < 0) 258 srv->port = 49152; 260 srv->port = port; 267 sin.sin_port = htons(srv->port); 271 /* search for unused port */ 272 if (++srv->port == 65535 || port > [all...] |
H A D | http_server.h | 26 struct http_server * http_server_init(struct in_addr *addr, int port,
|
H A D | wps_upnp.c | 136 * certain fixed multicast IP address and port, and "control points" sending 313 int port = 80; /* port to send to (default is port 80) */ local 336 /* Process and remove optional port component */ 341 port = atol(delim + 1); 364 rerr = getaddrinfo(host, NULL /* fill in port ourselves */, 373 *delim = ':'; /* Restore port */ 402 a->saddr.sin_port = htons(port);
|
/external/wpa_supplicant_8/hs20/client/ |
H A D | osu_client.c | 934 char *proto, *port; local 952 port = node ? xml_node_get_text(ctx->xml, node) : NULL; 953 if (port) { 955 port); 956 buflen = os_strlen(proto) + os_strlen(port) + 10; 959 os_snprintf(buf, buflen, "%s:%s", proto, port); 960 xml_node_get_text_free(ctx->xml, port);
|
/external/wpa_supplicant_8/hs20/server/ca/ |
H A D | ocsp-responder-ica.sh | 3 openssl ocsp -index demoCA/index.txt -port 8888 -nmin 5 -rsigner demoCA/cacert.pem -rkey demoCA/private/cakey-plain.pem -CA demoCA/cacert.pem -resp_no_certs -text
|
H A D | ocsp-responder.sh | 3 openssl ocsp -index demoCA/index.txt -port 8888 -nmin 5 -rsigner ocsp.pem -rkey ocsp.key -CA demoCA/cacert.pem -text
|
/external/wpa_supplicant_8/src/ap/ |
H A D | hostapd.c | 815 das_conf.port = conf->radius_das_port;
|
/external/wpa_supplicant_8/src/common/ |
H A D | wpa_ctrl.c | 337 char *port, *name; local 351 port = os_strchr(name, ','); 353 port = os_strchr(name, ':'); 356 if (port) { 357 port_id = atoi(&port[1]); 358 port[0] = '\0';
|
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_nl80211.c | 107 uint32_t port = nl_socket_get_local_port(handle); local 109 port >>= 22; 110 port_bitmap[port / 32] &= ~(1 << (port % 32)); 8829 wpa_printf(MSG_DEBUG, " * control port"); 9474 wpa_printf(MSG_DEBUG, "nl80211: Set supplicant port %sauthorized for "
|
/external/wpa_supplicant_8/src/pae/ |
H A D | ieee802_1x_kay.c | 130 be_to_host16(body->actor_sci.port)); 550 wpa_printf(MSG_DEBUG, "\tPort: %d", peer->sci.port); 582 wpa_printf(MSG_DEBUG, "\tPort: %d", peer->sci.port); 614 wpa_printf(MSG_DEBUG, "\tPort: %d", peer->sci.port); 685 body->actor_sci.port = host_to_be16(kay->actor_sci.port); 740 participant->current_peer_sci.port = be_to_host16(body->actor_sci.port); 1276 * the attribute of controlled port 3140 kay->actor_sci.port [all...] |
H A D | ieee802_1x_kay.h | 35 u16 port; member in struct:ieee802_1x_mka_sci
|
/external/wpa_supplicant_8/src/radius/ |
H A D | radius_client.c | 464 old->port); 488 old->port); 778 /* TODO: also match by src addr:port of the packet when using 977 nserv->port); 1021 serv.sin_port = htons(nserv->port); 1032 serv6.sin6_port = htons(nserv->port); 1454 serv->port, 1502 serv->port,
|
H A D | radius_client.h | 34 * port - radiusAuthClientServerPortNumber or radiusAccClientServerPortNumber 36 int port; member in struct:hostapd_radius_server
|