/device/google/marlin/sepolicy/ |
hostapd.te | 1 allowxperm hostapd self:udp_socket ioctl priv_sock_ioctls; 2 r_dir_file(hostapd, sysfs_type)
|
/external/wpa_supplicant_8/src/drivers/ |
.gitignore | 2 build.hostapd
|
Makefile | 6 rm -f build.wpa_supplicant build.hostapd
|
/system/sepolicy/ |
hostapd.te | 2 type hostapd, domain, domain_deprecated; 5 net_domain(hostapd) 7 allow hostapd self:capability { net_admin net_raw setuid setgid }; 8 allow hostapd self:netlink_socket create_socket_perms; 9 allow hostapd self:netlink_generic_socket create_socket_perms; 10 allow hostapd self:packet_socket create_socket_perms; 11 allow hostapd self:netlink_route_socket nlmsg_write; 13 allow hostapd wifi_data_file:file rw_file_perms; 14 allow hostapd wifi_data_file:dir create_dir_perms; 15 type_transition hostapd wifi_data_file:dir wpa_socket "sockets" [all...] |
/external/wpa_supplicant_8/hostapd/logwatch/ |
hostapd.conf | 1 # Logwatch configuration for hostapd 7 Title = "hostapd" 9 *OnlyService = hostapd
|
README | 3 analyzer script for parsing hostapd system log entries for logwatch. 6 /etc/log.d/conf/services/hostapd.conf 7 /etc/log.d/scripts/services/hostapd
|
hostapd | 3 # Logwatch script for hostapd 15 my %hostapd; 19 print STDERR "\n\nDEBUG: Inside HOSTAPD Filter\n\n"; 34 $hostapd{$iface}->{$mac}->{$layer}->{$details}++; 40 if (keys %hostapd) { 41 foreach my $iface (sort keys %hostapd) { 43 foreach my $mac (sort keys %{$hostapd{$iface}}) { 45 foreach my $layer (sort keys %{$hostapd{$iface}->{$mac}}) { 47 foreach my $details (sort keys %{$hostapd{$iface}->{$mac}->{$layer}}) { 49 my $count = $hostapd{$iface}->{$mac}->{$layer}->{$details} [all...] |
/external/wpa_supplicant_8/hostapd/ |
hostapd.8 | 1 .TH HOSTAPD 8 "April 7, 2005" hostapd hostapd 3 hostapd \- IEEE 802.11 AP, IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator 5 .B hostapd 9 .B hostapd 12 .B hostapd 17 .B hostapd 19 .B hostapd 23 .BR hostapd [all...] |
hapd_module_tests.c | 2 * hostapd module tests 15 wpa_printf(MSG_INFO, "hostapd module tests");
|
hostapd_cli.1 | 1 .TH HOSTAPD_CLI 1 "April 7, 2005" hostapd_cli "hostapd command-line interface" 3 hostapd_cli \- hostapd command-line interface 14 .B hostapd 17 .B hostapd 21 .B hostapd 23 .BR hostapd (8) 34 Default: /var/run/hostapd 42 Run in daemon mode executing the action file based on events from hostapd. 84 .BR hostapd (8).
|
hlr_auc_gw.txt | 1 HLR/AuC testing gateway for hostapd EAP-SIM/AKA database/authenticator 6 authentication center (HLR/AuC). hostapd will send SIM/AKA 11 text files: GSM triplet file (see hostapd.sim_db) and Milenage file (see 19 "CONFIG_SQLITE=y" into hostapd/.config before building hlr_auc_gw ("make 22 hostapd is configured to use hlr_auc_gw with the eap_sim_db parameter in 23 hostapd.conf (e.g., "eap_sim_db=unix:/tmp/hlr_auc_gw.sock"). hlr_auc_gw 66 hostapd (EAP server) can also be configured to store the EAP-SIM/AKA 78 Example configuration files for hostapd to operate as a RADIUS 81 hostapd.conf: 84 radius_server_clients=hostapd.radius_client [all...] |
config_file.h | 2 * hostapd / Configuration file parser
|
hostapd.accept | 3 # MAC address if dynamic VLANs (hostapd.conf dynamic_vlan option) are used.
|
wired.conf | 0 ##### hostapd configuration file ############################################## 4 # Example configuration file for wired authenticator. See hostapd.conf for 12 dump_file=/tmp/hostapd.dump
|
/external/autotest/client/cros/ |
hostapd_server.py | 12 """Hostapd server instance wrapped in a context manager. 19 with hostapd_server.HostapdServer(interface='veth_master') as hostapd: 20 hostapd.send_eap_packets() 30 dump_file=%(config_directory)s/hostapd.dump 43 CONFIG_FILE = 'hostapd.conf' 44 CONTROL_DIRECTORY = 'hostapd.ctl' 49 HOSTAPD_EXECUTABLE = 'hostapd' 56 USER_FILE = 'hostapd.eap_user' 65 config_directory='/tmp/hostapd-test'): 85 """Write out a hostapd configuration file-set based on the calle [all...] |
/external/autotest/client/site_tests/security_SuidBinaries/ |
baseline.fscap | 6 /usr/sbin/hostapd = cap_net_admin,cap_net_raw+ei
|
/external/wpa_supplicant_8/src/ap/ |
tkip_countermeasures.h | 2 * hostapd / TKIP countermeasures
|
wpa_auth_glue.h | 2 * hostapd / WPA authenticator glue code
|
acs.h | 21 wpa_printf(MSG_ERROR, "ACS was disabled on your build, rebuild hostapd with CONFIG_ACS=y or set channel");
|
/system/connectivity/apmanager/ |
apmanager.rc | 3 mkdir /data/misc/apmanager/hostapd 0700 system system
|
hostapd_monitor.cc | 39 "/var/run/apmanager/hostapd/hostapd_ctrl_%s"; 42 "/data/misc/apmanager/hostapd/hostapd_ctrl_%s"; 86 // Start off by checking the control interface file for the hostapd process. 97 // This indicates the hostapd failed to start. Invoke callback indicating 98 // hostapd start failed. 99 LOG(ERROR) << "Timeout waiting for hostapd control interface"; 111 // Control interface is up, meaning hostapd started successfully. 135 LOG(ERROR) << "Failed to open hostapd socket"; 158 LOG(ERROR) << "Failed to attach to hostapd"; 175 // Method for sending message to hostapd control interface [all...] |
hostapd_monitor.h | 39 // Class for monitoring events from hostapd control interface. 72 // Task for checking if hostapd control interface is up or not. 75 // Attach to hostapd control interface to receive unsolicited event 87 // File path for interprocess communication with hostapd. 91 // Socket descriptor for communication with hostapd.
|
/external/autotest/client/site_tests/network_8021xEapDetection/ |
network_8021xEapDetection.py | 17 Runs hostapd on one side of an ethernet pair, and shill on the other. 18 Ensures that shill detects an EAP request frame sent by hostapd. 56 interface=ethernet_pair.interface_name) as hostapd: 57 # Wait for hostapd to initialize. 59 if not hostapd.running(): 60 raise error.TestFail('hostapd process exited.') 62 hostapd.send_eap_packets()
|
/external/autotest/client/site_tests/apmanager_CheckAPProcesses/ |
control | 13 Verify the required processes (hostapd and dnsmasq) are started/terminated
|
/external/wpa_supplicant_8/ |
Android.mk | 8 include $(LOCAL_PATH)/hostapd/Android.mk \
|