Searched +full:network +full:- +full:based (Results 1 – 25 of 1082) sorted by relevance
12345678910>>...44
| /external/wpa_supplicant_8/wpa_supplicant/ |
| D | README-HS20 | 4 This document describe how the IEEE 802.11u Interworking and Wi-Fi 7 GUI or Wi-Fi framework) is used to manage this functionality. 10 Introduction to Wi-Fi Hotspot 2.0 11 --------------------------------- 13 Hotspot 2.0 is the name of the Wi-Fi Alliance specification that is used 14 in the Wi-Fi CERTIFIED Passpoint<TM> program. More information about 17 http://www.wi-fi.org/knowledge-center/white-papers/wi-fi-certified-passpoint%E2%84%A2-new-program-w… 20 https://www.wi-fi.org/knowledge-center/published-specifications 22 The core Interworking functionality (network selection, GAS/ANQP) were 23 standardized in IEEE Std 802.11u-2011 which is now part of the IEEE Std [all …]
|
| D | ChangeLog | 3 2022-01-16 - v2.10 5 - improved protection against side channel attacks 6 [https://w1.fi/security/2022-1/] 7 - added support for the hash-to-element mechanism (sae_pwe=1 or 10 - fixed PMKSA caching with OKC 11 - added support for SAE-PK 12 * EAP-pwd changes 13 - improved protection against side channel attacks 14 [https://w1.fi/security/2022-1/] 17 [https://w1.fi/security/2021-1/] [all …]
|
| D | README-WPS | 1 wpa_supplicant and Wi-Fi Protected Setup (WPS) 11 ------------------- 13 Wi-Fi Protected Setup (WPS) is a mechanism for easy configuration of a 14 wireless network. It allows automated generation of random keys (WPA 17 with PIN method and push-button configuration (PBC) being the most 21 wireless network, it should be noted that the use of the PIN and 24 environments that require secure network access without chance for 28 in the network setup: 29 - access point: the WLAN access point 30 - Registrar: a device that control a network and can authorize [all …]
|
| D | wpa_supplicant.conf | 19 # file whenever configuration is changed (e.g., new network block is added with 26 # global configuration (shared by all network blocks) 38 # The socket file will be named based on the interface name, so multiple 46 # possible to run wpa_supplicant as root (since it needs to change network 48 # run as non-root users. However, since the control interface can be used to 49 # change the network configuration, this access needs to be protected in many 51 # want to allow non-root users to use the control interface, add a new group 69 # library/default.asp?url=/library/en-us/secauthz/security/ 72 # DACL (which will reject all connections). See README-Windows.txt for more 78 # wpa_supplicant is implemented based on IEEE Std 802.1X-2004 which defines [all …]
|
| D | README | 4 Copyright (c) 2003-2022, Jouni Malinen <j@w1.fi> and contributors 16 ------- 32 3. Neither the name(s) of the above-listed copyright holder(s) nor the 51 -------- 54 - WPA-PSK ("WPA-Personal") 55 - WPA with EAP (e.g., with RADIUS authentication server) ("WPA-Enterprise") 58 * EAP-TLS 59 * EAP-PEAP/MSCHAPv2 (both PEAPv0 and PEAPv1) 60 * EAP-PEAP/TLS (both PEAPv0 and PEAPv1) 61 * EAP-PEAP/GTC (both PEAPv0 and PEAPv1) [all …]
|
| /external/google-cloud-java/java-compute/proto-google-cloud-compute-v1/src/main/java/com/google/cloud/compute/v1/ |
| D | BackendServiceGroupHealthOrBuilder.java | 8 * https://www.apache.org/licenses/LICENSE-2.0 30 * Metadata defined as annotations on the network endpoint group. 40 * Metadata defined as annotations on the network endpoint group. 53 * Metadata defined as annotations on the network endpoint group. 63 * Metadata defined as annotations on the network endpoint group. 77 * Metadata defined as annotations on the network endpoint group. 88 …backend instances or endpoints in requested instance or network endpoint group, determined based o… 98 …backend instances or endpoints in requested instance or network endpoint group, determined based o… 108 …backend instances or endpoints in requested instance or network endpoint group, determined based o… 118 …backend instances or endpoints in requested instance or network endpoint group, determined based o… [all …]
|
| D | BackendServiceGroupHealth.java | 8 * https://www.apache.org/licenses/LICENSE-2.0 113 * Metadata defined as annotations on the network endpoint group. 135 * Metadata defined as annotations on the network endpoint group. 148 * Metadata defined as annotations on the network endpoint group. 168 * Metadata defined as annotations on the network endpoint group. 193 …backend instances or endpoints in requested instance or network endpoint group, determined based o… 206 …backend instances or endpoints in requested instance or network endpoint group, determined based o… 220 …backend instances or endpoints in requested instance or network endpoint group, determined based o… 233 …backend instances or endpoints in requested instance or network endpoint group, determined based o… 246 …backend instances or endpoints in requested instance or network endpoint group, determined based o… [all …]
|
| D | HealthStatusForNetworkEndpointOrBuilder.java | 8 * https://www.apache.org/licenses/LICENSE-2.0 30 * URL of the backend service associated with the health state of the network endpoint. 43 * URL of the backend service associated with the health state of the network endpoint. 56 * URL of the backend service associated with the health state of the network endpoint. 68 * URL of the forwarding rule associated with the health state of the network endpoint. 81 * URL of the forwarding rule associated with the health state of the network endpoint. 94 * URL of the forwarding rule associated with the health state of the network endpoint. 106 * URL of the health check associated with the health state of the network endpoint. 118 * URL of the health check associated with the health state of the network endpoint. 130 * URL of the health check associated with the health state of the network endpoint. [all …]
|
| /external/googleapis/google/cloud/networkconnectivity/v1/ |
| D | policy_based_routing.proto | 7 // http://www.apache.org/licenses/LICENSE-2.0 36 // Policy-Based Routing allows GCP customers to specify flexibile routing 41 "https://www.googleapis.com/auth/cloud-platform"; 90 // Policy Based Routes (PBR) are more powerful routes that allows GCP customers 91 // to route their L4 network traffic based on not just destination IP, but also 101 // VM instances to which this policy based route applies to. 103 // Optional. A list of VM instance tags to which this policy based route 111 // Optional. Cloud region to install this policy based route on interconnect 127 // Optional. The IP protocol that this policy based route applies to. Valid 131 // Optional. The source IP range of outgoing packets that this policy based [all …]
|
| /external/autotest/server/site_tests/nbr_EndToEndTest/ |
| D | nbr_EndToEndTest.py | 2 # Use of this source code is governed by a BSD-style license that can be 14 """Test network based recovery of a DUT.""" 25 Validates the network based recovery flow. 32 @param network_name: The name of the network to connect to for recovery. 33 @param network_password: Optional password for the network. 61 self._MINIOS_CLIENT_CMD, '--start_recovery', 62 f'--network_name={network_name}', '--watch' 65 cmd += [f'--network_password={network_password}'] 66 logging.info(f'Performing network based recovery with cmd: {cmd}.')
|
| /external/webrtc/test/network/g3doc/ |
| D | index.md | 1 # Network Emulation Framework 3 <?% config.freshness.reviewed = '2021-03-01' %?> 9 This documentation explain the implementation details of Network Emulation 19 Network Emulation Framework provides an ability to emulate network behavior 21 configure network behavior, the user can choose different options: 28 routes used to connect them. All network related entities are created and 37 network routes from senders to receivers. This task queue behaviour is 38 determined by `webrtc::TimeController`, which is based on either in real time or 41 The network operates on IP level and supports only UDP for now. 47 * `webrtc::NetworkBehaviorInterface` - defines how emulated network should [all …]
|
| /external/cronet/net/docs/ |
| D | bug-triage.md | 1 # Chrome Network Bug Triage 3 The Chrome network team uses a two day bug triage rotation. The goal is to 5 based rather than objective based. Sheriffs are expected to spend the majority 11 …m/issues/list?sort=pri%20-stars%20-opened&q=status%3Aunconfirmed%2Cuntriaged%20-Needs%3DFeedback%2… 16 * Changing the bug status - marking the bug Available, or closing it. 17 * Removing the `Internals>Network` component or subcomponent. 18 * Adding the label `Network-Triaged` (when there are multiple components). 22 * Remove the `Internals>Network` component or subcomponent if it belongs 29 it `Type-Bug-Security`. 33 [bisect-builds-py](https://www.chromium.org/developers/bisect-builds-py). To [all …]
|
| D | bug-triage-labels.md | 1 # Chrome Network Bug Triage : Components and labels 3 ## Some network component caveats 5 * **Internals>Network>SSL** 13 * **Internals>Network>Cache** 18 * **Internals>Network>HTTP** 23 * **Internals>Network>Logging** 25 Covers **about:net-internals**, **about:net-export** as well as the what's 28 * **Internals>Network>Connectivity** 33 * **Internals>Network>Filters** 39 ## Common non-network components [all …]
|
| /external/iproute2/man/man8/ |
| D | tc.8 | 3 tc \- show / manipulate traffic control settings 11 \fIqdisc-id\fR 14 \fIqdisc-id\fR ] qdisc 23 \fIqdisc-id\fR 25 \fIclass-id\fR ] qdisc 34 \fIqdisc-id\fR 35 .B | root ] [ handle \fIfilter-id\fR ] 42 \fIflow-id\fR 65 \fB[ -force ] -b\fR[\fIatch\fR] \fB[ filename ] \fR| 66 \fB[ \fB-n\fR[\fIetns\fR] name \fB] \fR| [all …]
|
| D | tc-netem.8 | 3 NetEm \- Network Emulator 33 .IR p " [ " r " [ " 1-h " [ " 1-k " ]]] } " 58 characteristics to packets outgoing from a selected network 71 adds the chosen delay to the packets outgoing to chosen network interface. The 78 which network has variable delays depending on traffic flows concurring on the 83 network interface. It is also possible to add a correlation, but this option 87 adds packet losses according to the 4-state Markov using the transition 90 extend the model to 2-state (p31), 3-state (p23 and p32) and 4-state (p14). 95 adds packet losses according to the Gilbert-Elliot loss model or its special 98 values r=1-p, 1-h=1 and 1-k=0. The parameters needed for the Simple Gilbert [all …]
|
| /external/googleapis/google/cloud/networkmanagement/v1/ |
| D | trace.proto | 7 // http://www.apache.org/licenses/LICENSE-2.0 34 // * State is categorized as final or non-final states. 38 // |---------------------Trace----------------------| 39 // Step1(State) Step2(State) --- StepN(State(final)) 52 // network state machine. It is critical to preserve the order of the steps 63 // Each step has a well-defined state and an associated configuration. 65 // Type of states that are defined in the network state machine. 83 // Initial state: packet originating from a VPC or on-premises network 85 // If the source is a VPC network visible to the user, a NetworkInfo 86 // is populated with details of the network. [all …]
|
| /external/googleapis/google/cloud/networkmanagement/v1beta1/ |
| D | trace.proto | 7 // http://www.apache.org/licenses/LICENSE-2.0 34 // * State is categorized as final or non-final states. 38 // |---------------------Trace----------------------| 39 // Step1(State) Step2(State) --- StepN(State(final)) 52 // network state machine. It is critical to preserve the order of the steps 63 // Each step has a well-defined state and an associated configuration. 65 // Type of states that are defined in the network state machine. 83 // Initial state: packet originating from a VPC or on-premises network 85 // If the source is a VPC network visible to the user, a NetworkInfo 86 // is populated with details of the network. [all …]
|
| /external/googleapis/google/ads/googleads/v14/common/ |
| D | metrics.proto | 7 // http://www.apache.org/licenses/LICENSE-2.0 44 // This metric is reported only for the Display Network. 48 // Network site. 77 // https://support.google.com/google-ads/answer/9549009. 83 // biddable and non-biddable conversions. If your campaign has adopted the 86 // https://support.google.com/google-ads/answer/12080169 for more details. 97 // https://support.google.com/google-ads/answer/9549009. 211 // Average cost-per-thousand impressions (CPM). 232 // Number of in-app actions. 236 // are performing based on how often people who see their ad click on it. [all …]
|
| /external/wpa_supplicant_8/hostapd/ |
| D | README-WPS | 1 hostapd and Wi-Fi Protected Setup (WPS) 10 ------------------- 12 Wi-Fi Protected Setup (WPS) is a mechanism for easy configuration of a 13 wireless network. It allows automated generation of random keys (WPA 16 with PIN method and push-button configuration (PBC) being the most 20 wireless network, it should be noted that the use of the PIN and 23 environments that require secure network access without chance for 27 network setup: 28 - access point: the WLAN access point 29 - Registrar: a device that control a network and can authorize [all …]
|
| /external/armnn/python/pyarmnn/examples/speech_recognition/ |
| D | README.md | 20 $ python -c "import pyarmnn as ann;print(ann.GetVersion())" 29 $ sudo apt-get install libsndfile1 libportaudio2 35 $ pip install -r requirements.txt 39 The model we are using is the [Wav2Letter](https://github.com/ARM-software/ML-zoo/tree/master/model… 40 https://github.com/ARM-software/ML-zoo/tree/master/models). 42 …g human speech can be found [here](https://github.com/Azure-Samples/cognitive-services-speech-sdk/… 55 $ python run_audio_file.py --audio_file_path <path/to/your_audio> --model_file_path <path/to/your_m… 60 * `--preferred_backends` 70 * `--help` prints all available options to screen 76 2. [Creating a network](#creating-a-network) [all …]
|
| /external/armnn/python/pyarmnn/examples/keyword_spotting/ |
| D | README.md | 20 $ python -c "import pyarmnn as ann;print(ann.GetVersion())" 29 $ sudo apt-get install libsndfile1 libportaudio2 35 $ pip install -r requirements.txt 40 The model we are using is the [DS CNN Large](https://github.com/ARM-software/ML-zoo/raw/68b5fbc77ed… 41 https://github.com/ARM-software/ML-zoo/tree/master/models). 43 …eywords can be found [here](https://git.mlplatform.org/ml/ethos-u/ml-embedded-evaluation-kit.git/p… 56 $ python run_audio_classification.py --audio_file_path <path/to/your_audio> --model_file_path <path… 61 * `--preferred_backends` 71 * `--help` prints all available options to screen 79 $ python run_audio_classification.py --model_file_path <path/to/your_model> --duration (optional) [all …]
|
| /external/python/google-api-python-client/docs/dyn/ |
| D | dns_v1.policies.html | 8 font-weight: inherit; 9 font-style: inherit; 10 font-size: 100%; 11 font-family: inherit; 12 vertical-align: baseline; 16 font-size: 13px; 21 font-size: 26px; 22 margin-bottom: 1em; 26 font-size: 24px; 27 margin-bottom: 1em; [all …]
|
| D | dns_v1beta2.policies.html | 8 font-weight: inherit; 9 font-style: inherit; 10 font-size: 100%; 11 font-family: inherit; 12 vertical-align: baseline; 16 font-size: 13px; 21 font-size: 26px; 22 margin-bottom: 1em; 26 font-size: 24px; 27 margin-bottom: 1em; [all …]
|
| /external/aws-sdk-java-v2/.changes/2.4.x/ |
| D | 2.4.8.json | 2 "date": "2019-02-14", 8 …-backed instance storage. m5.metal and m5d.metal instances deliver 25 Gbps of aggregate network ba… 13 …"description": "Adds support for Tag-On-Create for Kinesis Video Streams. A list of tags associate…
|
| /external/pigweed/seed/ |
| D | 0107-communications.rst | 1 .. _seed-0107: 10 :proposal_date: 2023-07-19 15 ------- 17 ------- 18 Pigweed does not currently offer an end-to-end solution for network 21 lightweight embedded-focused network protocol stack, inspired by the Internet 24 asynchronous use and zero-copy transmission. 28 - `Sockets API`_ 29 - `Network protocol stack`_ 30 - `Async`_ API pattern [all …]
|
12345678910>>...44