/hostap-3.6.0/src/crypto/ |
D | tls_internal.c | 419 int ret = -1, skip = 0; in tls_connection_prf() local 424 skip = tls_get_keyblock_size(conn); in tls_connection_prf() 425 if (skip < 0) in tls_connection_prf() 427 tmp_out = os_malloc(skip + out_len); in tls_connection_prf() 437 _out, skip + out_len); in tls_connection_prf() 444 _out, skip + out_len); in tls_connection_prf() 448 os_memcpy(out, _out + skip, out_len); in tls_connection_prf() 449 bin_clear_free(tmp_out, skip); in tls_connection_prf()
|
D | rc4.c | 16 int rc4_skip(const u8 *key, size_t keylen, size_t skip, in rc4_skip() argument 38 for (k = 0; k < skip; k++) { in rc4_skip()
|
D | crypto_linux.c | 537 int rc4_skip(const u8 *key, size_t keylen, size_t skip, in rc4_skip() argument 549 skip_buf = os_zalloc(skip + 1); in rc4_skip() 559 io[0].iov_len = skip; in rc4_skip() 596 if ((size_t) ret < skip + data_len) { in rc4_skip() 599 __func__, (int) ret, (int) (skip + data_len)); in rc4_skip()
|
D | tls_wolfssl.c | 2018 int skip = 0; in tls_connection_get_eap_fast_key() local 2030 skip = 2 * (wolfSSL_GetKeySize(ssl) + wolfSSL_GetHmacSize(ssl) + in tls_connection_get_eap_fast_key() 2033 tmp_out = os_malloc(skip + out_len); in tls_connection_get_eap_fast_key() 2046 _out, skip + out_len); in tls_connection_get_eap_fast_key() 2051 _out, skip + out_len); in tls_connection_get_eap_fast_key() 2056 os_memcpy(out, _out + skip, out_len); in tls_connection_get_eap_fast_key() 2057 bin_clear_free(tmp_out, skip + out_len); in tls_connection_get_eap_fast_key()
|
D | crypto_wolfssl.c | 440 int rc4_skip(const u8 *key, size_t keylen, size_t skip, u8 *data, in rc4_skip() argument 449 while (skip >= sizeof(skip_buf)) { in rc4_skip() 450 size_t len = skip; in rc4_skip() 455 skip -= len; in rc4_skip()
|
D | tls_openssl.c | 4212 int skip = 0; in tls_connection_get_eap_fast_key() local 4237 skip = openssl_get_keyblock_size(ssl); in tls_connection_get_eap_fast_key() 4238 if (skip < 0) in tls_connection_get_eap_fast_key() 4240 tmp_out = os_malloc(skip + out_len); in tls_connection_get_eap_fast_key() 4262 _out, skip + out_len); in tls_connection_get_eap_fast_key() 4266 _out, skip + out_len) == 0) { in tls_connection_get_eap_fast_key() 4272 os_memcpy(out, _out + skip, out_len); in tls_connection_get_eap_fast_key() 4273 bin_clear_free(tmp_out, skip); in tls_connection_get_eap_fast_key()
|
D | crypto.h | 484 int rc4_skip(const u8 *key, size_t keylen, size_t skip,
|
D | crypto_openssl.c | 289 int rc4_skip(const u8 *key, size_t keylen, size_t skip, in rc4_skip() argument 310 while (skip >= sizeof(skip_buf)) { in rc4_skip() 311 size_t len = skip; in rc4_skip() 316 skip -= len; in rc4_skip()
|
/hostap-3.6.0/tests/hwsim/vm/ |
D | parallel-vm.py | 551 skip = len(vm[i]['fail_seq']) 552 skip -= min(skip, 30) 554 if skip > 0: 555 skip -= 1
|
/hostap-3.6.0/src/utils/ |
D | edit.c | 871 int skip = search_skip; in search_find() local 878 if (skip == 0) in search_find() 880 skip--; in search_find()
|
/hostap-3.6.0/src/ap/ |
D | ieee802_11_auth.c | 420 goto skip; in decode_tunnel_passwords() 430 skip: in decode_tunnel_passwords()
|
D | hostapd.c | 2879 goto skip; in hostapd_config_alloc() 2895 skip: in hostapd_config_alloc()
|
D | wpa_auth_ft.c | 253 goto skip; in wpa_ft_rrb_get_tlv_vlan() 292 skip: in wpa_ft_rrb_get_tlv_vlan()
|
/hostap-3.6.0/src/tls/ |
D | tlsv1_client_read.c | 958 goto skip; in tls_process_certificate_status() 1012 skip: in tls_process_certificate_status()
|
/hostap-3.6.0/doc/ |
D | ctrl_iface.doxygen | 394 (e.g., "P2P_FIND 5 type=social") will skip the initial full scan and 695 In most cases, the external program can skip over the priority field
|
/hostap-3.6.0/wpa_supplicant/ |
D | events.c | 2280 int skip; in wpas_select_network_from_last_scan() local 2281 skip = !wpa_supplicant_need_to_roam(wpa_s, selected, ssid); in wpas_select_network_from_last_scan() 2282 if (skip) { in wpas_select_network_from_last_scan()
|
D | ChangeLog | 522 ifindex values to incorrect interface to skip foreign interface events 1763 * wpa_cli/wpa_gui: skip non-socket files in control directory when 2297 * fixed a bug in PMKSA cache processing: skip sending of EAPOL-Start
|
/hostap-3.6.0/hostapd/ |
D | ChangeLog | 519 * EAP-AKA: skip AKA/Identity exchange if EAP identity is recognized 834 * added peer identity into EAP-FAST PAC-Opaque and skip Phase 2 1242 deauthenticate the station, i.e., skip long wait for inactivity poll
|