/hostap-3.6.0/src/crypto/ |
D | crypto_module_tests.c | 226 u8 result[24], result2[24]; in test_omac1_vector() local 230 if (omac1_aes_128(tv->k, tv->msg, tv->msg_len, result) || in test_omac1_vector() 231 os_memcmp(result, tv->tag, 16) != 0) { in test_omac1_vector() 243 if (omac1_aes_128_vector(tv->k, 2, addr, len, result) || in test_omac1_vector() 244 os_memcmp(result, tv->tag, 16) != 0) { in test_omac1_vector() 258 if (omac1_aes_128_vector(tv->k, 3, addr, len, result) || in test_omac1_vector() 259 os_memcmp(result, tv->tag, 16) != 0) { in test_omac1_vector() 273 if (omac1_aes_128(key, msg, sizeof(msg), result) || in test_omac1_vector() 275 os_memcmp(result, result2, 16) != 0) { in test_omac1_vector() 614 u8 result[40]; in test_key_wrap() local [all …]
|
D | tls_openssl_ocsp.c | 502 enum ocsp_result result = OCSP_INVALID; in check_ocsp_resp() local 675 result = OCSP_NO_RESPONSE; in check_ocsp_resp() 702 result = OCSP_NO_RESPONSE; in check_ocsp_resp() 809 result = OCSP_NO_RESPONSE; in check_ocsp_resp() 823 result = OCSP_REVOKED; in check_ocsp_resp() 830 result = OCSP_NO_RESPONSE; in check_ocsp_resp() 835 result = OCSP_GOOD; in check_ocsp_resp() 843 return result; in check_ocsp_resp()
|
D | crypto_internal-modexp.c | 92 u8 *result, size_t *result_len) in crypto_mod_exp() argument 114 ret = bignum_get_unsigned_bin(bn_result, result, result_len); in crypto_mod_exp()
|
/hostap-3.6.0/src/eap_common/ |
D | eap_teap_common.c | 434 tlv->result = TEAP_STATUS_FAILURE; in eap_teap_parse_tlv() 443 if (tlv->result) { in eap_teap_parse_tlv() 446 tlv->result = TEAP_STATUS_FAILURE; in eap_teap_parse_tlv() 451 tlv->result = TEAP_STATUS_FAILURE; in eap_teap_parse_tlv() 454 tlv->result = WPA_GET_BE16(pos); in eap_teap_parse_tlv() 455 if (tlv->result != TEAP_STATUS_SUCCESS && in eap_teap_parse_tlv() 456 tlv->result != TEAP_STATUS_FAILURE) { in eap_teap_parse_tlv() 458 tlv->result); in eap_teap_parse_tlv() 459 tlv->result = TEAP_STATUS_FAILURE; in eap_teap_parse_tlv() 462 tlv->result == TEAP_STATUS_SUCCESS ? in eap_teap_parse_tlv() [all …]
|
D | eap_fast_common.c | 166 if (tlv->result) { in eap_fast_parse_tlv() 169 tlv->result = EAP_TLV_RESULT_FAILURE; in eap_fast_parse_tlv() 175 tlv->result = EAP_TLV_RESULT_FAILURE; in eap_fast_parse_tlv() 178 tlv->result = WPA_GET_BE16(pos); in eap_fast_parse_tlv() 179 if (tlv->result != EAP_TLV_RESULT_SUCCESS && in eap_fast_parse_tlv() 180 tlv->result != EAP_TLV_RESULT_FAILURE) { in eap_fast_parse_tlv() 182 tlv->result); in eap_fast_parse_tlv() 183 tlv->result = EAP_TLV_RESULT_FAILURE; in eap_fast_parse_tlv() 186 tlv->result == EAP_TLV_RESULT_SUCCESS ? in eap_fast_parse_tlv()
|
D | eap_pwd_common.c | 46 size_t labellen, u8 *result, size_t resultbitlen) in eap_pwd_kdf() argument 72 os_memcpy(result + len, digest, resultbytelen - len); in eap_pwd_kdf() 74 os_memcpy(result + len, digest, mdlen); in eap_pwd_kdf() 82 result[resultbytelen - 1] &= mask; in eap_pwd_kdf()
|
D | eap_teap_common.h | 101 be16 result; member 186 int result; member
|
/hostap-3.6.0/tests/hwsim/ |
D | run-tests.py | 102 def report(conn, prefill, build, commit, run, test, result, duration, logdir, argument 112 params = (test, result, run, time.time(), duration, build, commit) 121 if result == "FAIL": 536 result = "PASS" 546 result = "FAIL" 566 result = "SKIP" 571 result = "FAIL" 578 result = "FAIL" 587 result = "FAIL" 613 result = "FAIL" [all …]
|
D | fst_module_aux.py | 487 result = '' 488 while result == '': 497 result = "OK" 503 result = event['reason'] 505 if result == '': 507 return result 521 result = '' 522 while result == '': 534 result = event['reason'] 536 return result
|
/hostap-3.6.0/wpadebug/src/w1/fi/wpadebug/ |
D | QrCodeDisplayActivity.java | 66 BitMatrix result; in encodeAsBitmap() local 68 … result = new MultiFormatWriter().encode(str, BarcodeFormat.QR_CODE, WIDTH, HEIGHT, null); in encodeAsBitmap() 74 int width = result.getWidth(); in encodeAsBitmap() 75 int height = result.getHeight(); in encodeAsBitmap() 80 pixels[offset + x] = result.get(x, y) ? BLACK : WHITE; in encodeAsBitmap()
|
/hostap-3.6.0/wpa_supplicant/ |
D | gas_query.c | 54 enum gas_query_result result, 113 static const char * gas_result_txt(enum gas_query_result result) in gas_result_txt() argument 115 switch (result) { in gas_result_txt() 157 enum gas_query_result result) in gas_query_done() argument 162 query->status_code, gas_result_txt(result)); in gas_query_done() 171 query->cb(query->ctx, query->addr, query->dialog_token, result, in gas_query_done() 225 enum offchannel_send_action_result result) in gas_query_tx_status() argument 234 freq, MAC2STR(dst), result); in gas_query_tx_status() 243 freq, MAC2STR(dst), result, query, query->dialog_token, dur); in gas_query_tx_status() 250 if (result == OFFCHANNEL_SEND_ACTION_SUCCESS || in gas_query_tx_status() [all …]
|
D | offchannel.h | 21 result), 31 size_t data_len, enum offchannel_send_action_result result);
|
D | offchannel.c | 181 size_t data_len, enum offchannel_send_action_result result) in offchannel_send_action_tx_status() argument 218 result, wpa_s->pending_action_tx_status_cb); in offchannel_send_action_tx_status() 225 data, data_len, result); in offchannel_send_action_tx_status() 267 result), in offchannel_send_action()
|
D | dpp_supplicant.c | 42 enum offchannel_send_action_result result); 50 enum offchannel_send_action_result result); 299 enum dpp_status_error result; in wpas_dpp_conn_status_result_timeout() local 308 result = DPP_STATUS_AUTH_FAILURE; in wpas_dpp_conn_status_result_timeout() 310 result = DPP_STATUS_NO_AP; in wpas_dpp_conn_status_result_timeout() 312 result = 255; /* What to report here for unexpected state? */ in wpas_dpp_conn_status_result_timeout() 315 wpas_dpp_send_conn_status_result(wpa_s, result); in wpas_dpp_conn_status_result_timeout() 368 enum dpp_status_error result) in wpas_dpp_send_conn_status_result() argument 383 result); in wpas_dpp_send_conn_status_result() 385 if (result == DPP_STATUS_NO_AP) { in wpas_dpp_send_conn_status_result() [all …]
|
/hostap-3.6.0/src/eap_server/ |
D | eap_server_fast.c | 602 struct eap_tlv_result_tlv *result; in eap_fast_build_crypto_binding() local 605 buf = wpabuf_alloc(2 * sizeof(*result) + sizeof(*binding)); in eap_fast_build_crypto_binding() 619 result = wpabuf_put(buf, sizeof(*result)); in eap_fast_build_crypto_binding() 620 result->tlv_type = host_to_be16( in eap_fast_build_crypto_binding() 623 result->length = host_to_be16(2); in eap_fast_build_crypto_binding() 624 result->status = host_to_be16(EAP_TLV_RESULT_SUCCESS); in eap_fast_build_crypto_binding() 631 result = wpabuf_put(buf, sizeof(*result)); in eap_fast_build_crypto_binding() 632 result->tlv_type = host_to_be16(EAP_TLV_TYPE_MANDATORY | in eap_fast_build_crypto_binding() 634 result->length = host_to_be16(2); in eap_fast_build_crypto_binding() 635 result->status = host_to_be16(EAP_TLV_RESULT_SUCCESS); in eap_fast_build_crypto_binding() [all …]
|
D | eap_server_teap.c | 617 struct teap_tlv_result *result; in eap_teap_build_crypto_binding() local 621 buf = wpabuf_alloc(2 * sizeof(*result) + sizeof(*cb)); in eap_teap_build_crypto_binding() 637 result = wpabuf_put(buf, sizeof(*result)); in eap_teap_build_crypto_binding() 638 result->tlv_type = host_to_be16(TEAP_TLV_MANDATORY | in eap_teap_build_crypto_binding() 640 result->length = host_to_be16(2); in eap_teap_build_crypto_binding() 641 result->status = host_to_be16(TEAP_STATUS_SUCCESS); in eap_teap_build_crypto_binding() 648 result = wpabuf_put(buf, sizeof(*result)); in eap_teap_build_crypto_binding() 649 result->tlv_type = host_to_be16(TEAP_TLV_MANDATORY | in eap_teap_build_crypto_binding() 651 result->length = host_to_be16(2); in eap_teap_build_crypto_binding() 652 result->status = host_to_be16(TEAP_STATUS_SUCCESS); in eap_teap_build_crypto_binding() [all …]
|
/hostap-3.6.0/tests/ |
D | test-aes.c | 337 u8 bin[2000], k[32], p[1024], c[1024 + 8], result[1024 + 8]; in test_nist_key_wrap_ae() local 434 if (aes_wrap(k, k_len, p_len / 8, p, result)) { in test_nist_key_wrap_ae() 440 if (os_memcmp(c, result, c_len) == 0) { in test_nist_key_wrap_ae() 465 u8 bin[2000], k[32], p[1024], c[1024 + 8], result[1024 + 8]; in test_nist_key_wrap_ad() local 573 if (aes_unwrap(k, k_len, (c_len / 8) - 1, c, result)) { in test_nist_key_wrap_ad() 587 } else if (os_memcmp(p, result, p_len) == 0) { in test_nist_key_wrap_ad()
|
D | test-https.c | 186 struct addrinfo hints, *result, *rp; in main() local 200 res = getaddrinfo(argv[1], argv[2], &hints, &result); in main() 206 for (rp = result; rp; rp = rp->ai_next) { in main() 214 freeaddrinfo(result); in main()
|
/hostap-3.6.0/src/drivers/ |
D | driver_bsd.c | 1357 struct wpa_scan_res *result, **tmp; in wpa_driver_bsd_add_scan_entry() local 1366 result = os_zalloc(sizeof(*result) + extra_len); in wpa_driver_bsd_add_scan_entry() 1367 if (result == NULL) in wpa_driver_bsd_add_scan_entry() 1369 os_memcpy(result->bssid, sr->isr_bssid, ETH_ALEN); in wpa_driver_bsd_add_scan_entry() 1370 result->freq = sr->isr_freq; in wpa_driver_bsd_add_scan_entry() 1371 result->beacon_int = sr->isr_intval; in wpa_driver_bsd_add_scan_entry() 1372 result->caps = sr->isr_capinfo; in wpa_driver_bsd_add_scan_entry() 1373 result->qual = sr->isr_rssi; in wpa_driver_bsd_add_scan_entry() 1374 result->noise = sr->isr_noise; in wpa_driver_bsd_add_scan_entry() 1381 result->level = sr->isr_rssi / 2 + sr->isr_noise; in wpa_driver_bsd_add_scan_entry() [all …]
|
/hostap-3.6.0/src/ap/ |
D | gas_query_ap.c | 51 enum gas_query_ap_result result, 109 static const char * gas_result_txt(enum gas_query_ap_result result) in gas_result_txt() argument 111 switch (result) { in gas_result_txt() 144 enum gas_query_ap_result result) in gas_query_done() argument 149 query->status_code, gas_result_txt(result)); in gas_query_done() 156 query->cb(query->ctx, query->addr, query->dialog_token, result, in gas_query_done() 677 enum gas_query_ap_result result, in gas_query_ap_req() argument
|
/hostap-3.6.0/src/wps/ |
D | wps_module_tests.c | 17 int result; member 286 if (wps_parse_msg(buf, &attr) != test->result) { in wps_attr_parse_tests()
|
/hostap-3.6.0/src/eap_peer/ |
D | eap_fast.c | 537 struct eap_tlv_intermediate_result_tlv *result; in eap_fast_tlv_result() local 538 buf = wpabuf_alloc(sizeof(*result)); in eap_fast_tlv_result() 543 result = wpabuf_put(buf, sizeof(*result)); in eap_fast_tlv_result() 544 result->tlv_type = host_to_be16(EAP_TLV_TYPE_MANDATORY | in eap_fast_tlv_result() 548 result->length = host_to_be16(2); in eap_fast_tlv_result() 549 result->status = host_to_be16(status); in eap_fast_tlv_result() 571 ack->result = host_to_be16(EAP_TLV_RESULT_SUCCESS); in eap_fast_tlv_pac_ack() 1214 if (tlv.result == EAP_TLV_RESULT_FAILURE) { in eap_fast_process_decrypted() 1249 if (tlv.pac && tlv.result != EAP_TLV_RESULT_SUCCESS) { in eap_fast_process_decrypted() 1253 } else if (tlv.pac && tlv.result == EAP_TLV_RESULT_SUCCESS) { in eap_fast_process_decrypted() [all …]
|
/hostap-3.6.0/tests/remote/ |
D | rutils.py | 330 def ping_run(host, ip, result, ifname=None, addr_type="ipv4", deadline="5", qos=None): argument 345 thread = host.thread_run(ping, result) 544 result = server_res[1] 546 result = client_res[1] 548 speed = get_iperf_speed(result)
|
/hostap-3.6.0/src/rsn_supp/ |
D | preauth.c | 83 enum eapol_supp_result result, in rsn_preauth_eapol_cb() argument 89 if (result == EAPOL_SUPP_RESULT_SUCCESS) { in rsn_preauth_eapol_cb() 114 result = EAPOL_SUPP_RESULT_FAILURE; in rsn_preauth_eapol_cb() 120 result == EAPOL_SUPP_RESULT_SUCCESS ? "completed successfully" : in rsn_preauth_eapol_cb()
|
/hostap-3.6.0/src/common/ |
D | common_module_tests.c | 25 ParseRes result; member 101 if (res != test->result || in ieee802_11_parse_tests() 152 int result; member 216 test->result) { in rsn_ie_parse_tests()
|