/hostap-3.7.0/src/wps/ |
D | http_client.c | 317 char * http_link_update(char *url, const char *base) in http_link_update() argument 332 if (os_strncmp(base, "http://", 7) != 0) in http_link_update() 335 len = os_strlen(url) + 1 + os_strlen(base) + 1; in http_link_update() 341 pos = os_strchr(base + 7, '/'); in http_link_update() 343 os_snprintf(n, len, "%s%s", base, url); in http_link_update() 345 os_memcpy(n, base, pos - base); in http_link_update() 346 os_memcpy(n + (pos - base), url, os_strlen(url) + 1); in http_link_update() 349 pos = os_strrchr(base + 7, '/'); in http_link_update() 351 os_snprintf(n, len, "%s/%s", base, url); in http_link_update() 353 os_memcpy(n, base, pos - base + 1); in http_link_update() [all …]
|
D | http_client.h | 38 char * http_link_update(char *url, const char *base);
|
/hostap-3.7.0/wpa_supplicant/ |
D | autoscan_exponential.c | 17 int base; member 32 data->base = atoi(params); in autoscan_exponential_get_params() 60 "and limit is %d", data->base, data->limit); in autoscan_exponential_init() 88 data->interval = data->base; in autoscan_exponential_notify_scan() 90 data->interval = data->interval * data->base; in autoscan_exponential_notify_scan()
|
D | README-P2P | 103 Timeout - Optional ASCII base-10-encoded u16. If missing, request will not
|
D | README | 195 to address the flaws of the base standard and has in practice
|
/hostap-3.7.0/src/crypto/ |
D | crypto_internal-modexp.c | 89 int crypto_mod_exp(const u8 *base, size_t base_len, in crypto_mod_exp() argument 106 if (bignum_set_unsigned_bin(bn_base, base, base_len) < 0 || in crypto_mod_exp()
|
D | crypto_nettle.c | 375 int crypto_mod_exp(const u8 *base, size_t base_len, in crypto_mod_exp() argument 385 mpz_import(bn_base, base_len, 1, 1, 1, 0, base); in crypto_mod_exp()
|
D | crypto_gnutls.c | 361 int crypto_mod_exp(const u8 *base, size_t base_len, in crypto_mod_exp() argument 370 if (gcry_mpi_scan(&bn_base, GCRYMPI_FMT_USG, base, base_len, NULL) != in crypto_mod_exp()
|
D | crypto_libtomcrypt.c | 738 int crypto_mod_exp(const u8 *base, size_t base_len, in crypto_mod_exp() argument 748 if (mp_read_unsigned_bin(b, (u8 *) base, base_len) != CRYPT_OK || in crypto_mod_exp()
|
D | crypto_mbedtls.c | 604 const uint8_t *base, size_t base_len, const uint8_t *power, in crypto_mod_exp() argument 617 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&bn_base, base, base_len)); in crypto_mod_exp()
|
D | crypto.h | 466 int __must_check crypto_mod_exp(const u8 *base, size_t base_len,
|
D | crypto_openssl.c | 662 int crypto_mod_exp(const u8 *base, size_t base_len, in crypto_mod_exp() argument 675 bn_base = BN_bin2bn(base, base_len, NULL); in crypto_mod_exp()
|
/hostap-3.7.0/tests/hwsim/ |
D | test_owe.py | 617 if (int(status[0], base=0) != 77 or int(status[1], base=0) != 77 or 618 int(status[2], base=0) != 0):
|
D | test_he.py | 340 capab0 = int(sta0['vht_caps_info'], base=16) 341 capab2 = int(sta2['vht_caps_info'], base=16)
|
D | test_ap_vht.py | 200 capab0 = int(sta0['vht_caps_info'], base=16) 201 capab2 = int(sta2['vht_caps_info'], base=16)
|
D | test_ap_pmf.py | 1067 rx_spec = int(sta_key['rx_spec'], base=16) 1071 tx_spec = int(ap_key['tx_spec'], base=16)
|
D | README | 88 base kernel.
|
/hostap-3.7.0/wpa_supplicant/doc/docbook/ |
D | wpa_background.sgml | 24 the base standard and has in practice completed its work in May
|
/hostap-3.7.0/hostapd/ |
D | README | 233 to address the flaws of the base standard and has in practice
|